program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000000180081064e81f782db4cb904021d080004007c03e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a9", 0xd7}], 0x1}, 0x0) 23:05:17 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0400005500810ce00f80ecdb4cb9f207c804a0110000", 0x17}], 0x1, 0x0, 0x0, 0x5865}, 0x0) 23:05:17 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002c000505d25a80308c63940d0c35fc60100006400a13400b053582c137153e37080c188004", 0x29}], 0x1}, 0x0) 23:05:17 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000000180081064e81f782db4cb9040a1d080004007c09e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee", 0xbd}], 0x1}, 0x0) 23:05:17 executing program 4: socketpair(0xa, 0x0, 0xffffff80, &(0x7f0000000000)) 23:05:17 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000000180081064e81f782db4cb904021d080004007c03e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a9", 0xd7}], 0x1}, 0x0) 23:05:17 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0400005500810ce00f80ecdb4cb9f207c804a0110000", 0x17}], 0x1, 0x0, 0x0, 0x5865}, 0x0) 23:05:17 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000000180081064e81f782db4cb9040a1d080004007c09e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92", 0xcb}], 0x1}, 0x0) 23:05:17 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002c000505d25a80308c63940d0c35fc60100006400a13400b053582c137153e37080c188004ac0f00", 0x2c}], 0x1}, 0x0) 23:05:17 executing program 4: syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/net\x00') syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000200)='ns/net\x00') 23:05:17 executing program 5: openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x4001, 0x0) 23:05:18 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) 23:05:18 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0400005500810ce00f80ecdb4cb9f207c804a0110000", 0x17}], 0x1, 0x0, 0x0, 0x5865}, 0x0) 23:05:18 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002c000505d25a80308c63940d0c35fc60100006400a13400b053582c137153e37080c188004ac0f00", 0x2c}], 0x1}, 0x0) 23:05:18 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000000180081064e81f782db4cb9040a1d080004007c09e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92", 0xcb}], 0x1}, 0x0) 23:05:18 executing program 4: socketpair(0x0, 0x0, 0x0, &(0x7f00000011c0)) 23:05:18 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@bloom_filter={0x1e, 0x0, 0x2, 0xb8ff, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x0, 0x5}, 0x48) 23:05:18 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002c000505d25a80308c63940d0c35fc60100006400a13400b053582c137153e37080c188004ac0f00", 0x2c}], 0x1}, 0x0) 23:05:18 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0400005500810ce00f80ecdb4cb9f207c804a011000000020006fb0a0002000a0ada", 0x23}], 0x1, 0x0, 0x0, 0x5865}, 0x0) 23:05:18 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000000180081064e81f782db4cb9040a1d080004007c09e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92", 0xcb}], 0x1}, 0x0) 23:05:18 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0x2, 0x0, 0x0, 0x9}, 0x48) 23:05:18 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0400005500810ce00f80ecdb4cb9f207c804a011000000020006fb0a0002000a0ada", 0x23}], 0x1, 0x0, 0x0, 0x5865}, 0x0) 23:05:18 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x6, 0x0, 0x0, 0xfffffff8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) 23:05:18 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002c000505d25a80308c63940d0c35fc60100006400a13400b053582c137153e37080c188004ac0f00d1", 0x2d}], 0x1}, 0x0) 23:05:18 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x5, &(0x7f0000000200)=@framed={{}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0x7}]}, &(0x7f0000000140)='syzkaller\x00', 0x3, 0x94, &(0x7f0000000280)=""/148, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:18 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000000180081064e81f782db4cb9040a1d080004007c09e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703", 0xd2}], 0x1}, 0x0) 23:05:18 executing program 4: syz_clone(0xc0040080, &(0x7f0000000000), 0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="3dded29476abe8d096d3a4cc30dc454542ed") 23:05:18 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002c000505d25a80308c63940d0c35fc60100006400a13400b053582c137153e37080c188004ac0f00d1", 0x2d}], 0x1}, 0x0) 23:05:18 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0400005500810ce00f80ecdb4cb9f207c804a011000000020006fb0a0002000a0ada", 0x23}], 0x1, 0x0, 0x0, 0x5865}, 0x0) 23:05:18 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@bloom_filter, 0x48) 23:05:18 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000001140)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5}, 0x48) 23:05:18 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000000180081064e81f782db4cb9040a1d080004007c09e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703", 0xd2}], 0x1}, 0x0) 23:05:18 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002c000505d25a80308c63940d0c35fc60100006400a13400b053582c137153e37080c188004ac0f00d1", 0x2d}], 0x1}, 0x0) 23:05:18 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@bloom_filter={0x1e, 0x0, 0x2, 0xb8ff, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x5}, 0x48) 23:05:18 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0xa, 0x0, 0x0, 0x0, 0x1000, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) 23:05:18 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0400005500810ce00f80ecdb4cb9f207c804a011000000020006fb0a0002000a0ada1b40d8050011", 0x29}], 0x1, 0x0, 0x0, 0x5865}, 0x0) 23:05:18 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000000180081064e81f782db4cb9040a1d080004007c09e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703", 0xd2}], 0x1}, 0x0) 23:05:18 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x485}, 0x48) 23:05:18 executing program 4: openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000400), 0x2, 0x0) 23:05:18 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000003d80)={0x0, 0x0, 0x0, 0x0, &(0x7f0000006640)=[{0x10}], 0x10}, 0x0) 23:05:18 executing program 5: syz_clone(0xc0040080, 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000140)="3dded29476abe8d096d3a4cc30dc454542ed0aafd01ea3ca7fe785e2e61527a4ab9b01951e9da2817b32ea2b575330cde4f995f57dfc20c794f08c7ed324461fa2201928463f33eabe53d2b70fb6f21d90b214ed717e9551ebda564dced12f18725cc3f741e72321789acb0d") 23:05:18 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0400005500810ce00f80ecdb4cb9f207c804a011000000020006fb0a0002000a0ada1b40d8050011", 0x29}], 0x1, 0x0, 0x0, 0x5865}, 0x0) 23:05:18 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000000180081064e81f782db4cb9040a1d080004007c09e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723", 0xd5}], 0x1}, 0x0) 23:05:18 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) 23:05:18 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0400005500810ce00f80ecdb4cb9f207c804a011000000020006fb0a0002000a0ada1b40d8050011", 0x29}], 0x1, 0x0, 0x0, 0x5865}, 0x0) 23:05:18 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_lsm={0x11, 0x3, &(0x7f0000000000)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x5, 0x91, &(0x7f0000000100)=""/145, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:18 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000000180081064e81f782db4cb9040a1d080004007c09e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723", 0xd5}], 0x1}, 0x0) 23:05:18 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_lsm={0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xad9a39cc41699dea, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:18 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0400005500810ce00f80ecdb4cb9f207c804a011000000020006fb0a0002000a0ada1b40d805001100c500", 0x2c}], 0x1, 0x0, 0x0, 0x5865}, 0x0) 23:05:18 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x0, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:18 executing program 3: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001200)={0xffffffffffffffff}, 0x4) 23:05:18 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000000180081064e81f782db4cb9040a1d080004007c09e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723", 0xd5}], 0x1}, 0x0) 23:05:19 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) 23:05:19 executing program 2: socketpair(0x28, 0x800, 0x6, &(0x7f00000011c0)) 23:05:19 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, 0x0) 23:05:19 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x104, 0x1}, 0x48) 23:05:19 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0400005500810ce00f80ecdb4cb9f207c804a011000000020006fb0a0002000a0ada1b40d805001100c500", 0x2c}], 0x1, 0x0, 0x0, 0x5865}, 0x0) 23:05:19 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000000180081064e81f782db4cb9040a1d080004007c09e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a9", 0xd7}], 0x1}, 0x0) 23:05:19 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0400005500810ce00f80ecdb4cb9f207c804a011000000020006fb0a0002000a0ada1b40d805001100c500", 0x2c}], 0x1, 0x0, 0x0, 0x5865}, 0x0) 23:05:19 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x5, 0x0, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:19 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x19, 0x0, 0x0, 0x9}, 0x48) 23:05:19 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x12, 0xffffffff, 0x0, 0xd686, 0x0, 0x1}, 0x48) 23:05:19 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000000180081064e81f782db4cb9040a1d080004007c09e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a9", 0xd7}], 0x1}, 0x0) 23:05:19 executing program 5: openat$tun(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) 23:05:19 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x1d}, 0x48) 23:05:19 executing program 4: socketpair(0xa, 0x3, 0x15, &(0x7f0000000080)) 23:05:19 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0400005500810ce00f80ecdb4cb9f207c804a011000000020006fb0a0002000a0ada1b40d805001100c50083", 0x2d}], 0x1, 0x0, 0x0, 0x5865}, 0x0) 23:05:19 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000000180081064e81f782db4cb9040a1d080004007c09e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a9", 0xd7}], 0x1}, 0x0) 23:05:19 executing program 3: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0xa, &(0x7f00000007c0)="96", &(0x7f0000000080)="3c3b6515ecb200000000"}, 0xfffffffffffffe76) 23:05:19 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0400005500810ce00f80ecdb4cb9f207c804a011000000020006fb0a0002000a0ada1b40d805001100c50083", 0x2d}], 0x1, 0x0, 0x0, 0x5865}, 0x0) 23:05:19 executing program 5: syz_clone(0xc0040080, 0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140)="3dded29476abe8d096d3a4cc30dc454542ed0aafd01ea3ca7fe785e2e61527a4ab9b01951e9da2817b32ea2b575330cde4f995f57dfc20c794f08c7ed324461fa2201928463f33ea") 23:05:19 executing program 4: bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000440), 0x10) 23:05:19 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x5, &(0x7f0000000200)=@framed={{}, [@cb_func]}, &(0x7f0000000140)='syzkaller\x00', 0x3, 0x94, &(0x7f0000000280)=""/148, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:19 executing program 3: syz_clone(0xc0040080, &(0x7f0000000000), 0x0, &(0x7f00000000c0), &(0x7f0000000100), 0x0) 23:05:19 executing program 1: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040), 0xffffffffffffff9e) 23:05:19 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000001b40)=@base={0x11, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 23:05:19 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0xc00, &(0x7f0000000000)=@framed={{}, [@func]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xff, &(0x7f00000002c0)=""/255, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:19 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0400005500810ce00f80ecdb4cb9f207c804a011000000020006fb0a0002000a0ada1b40d805001100c50083", 0x2d}], 0x1, 0x0, 0x0, 0x5865}, 0x0) 23:05:19 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000001b40)=@base={0x1e, 0x0, 0x7, 0x4, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x48) 23:05:19 executing program 4: openat$tun(0xffffffffffffff9c, 0x0, 0x410f00, 0x0) 23:05:19 executing program 2: socketpair(0x2, 0x5, 0x3, &(0x7f0000000000)) 23:05:19 executing program 0: socketpair(0x10, 0x0, 0x0, &(0x7f0000001280)) 23:05:19 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x9, 0x3, &(0x7f0000000000)=@framed, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:19 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x12, 0x3, &(0x7f0000000000)=@framed, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:19 executing program 0: socketpair(0x2, 0x3, 0x6, &(0x7f00000001c0)) 23:05:19 executing program 5: syz_clone(0xc0040080, 0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140)="3dded29476abe8d096d3a4cc30dc454542ed0aafd01ea3ca7fe785e2e61527a4ab9b01951e9da2817b32ea2b575330cde4f995f57dfc20c794f08c7ed324461fa2201928463f33ea") 23:05:19 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x3, 0x3, &(0x7f0000000000)=@framed={{}, [], {0x95, 0x60}}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:19 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x4, &(0x7f0000000000)=@framed={{}, [@func={0x85, 0x0, 0xb}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xff, &(0x7f00000002c0)=""/255, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:19 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x1a, 0x3, &(0x7f0000000000)=@framed, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:19 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x44c54695502ff71d, 0x0) 23:05:20 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x4, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6300}}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:20 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000001b40)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, 0x48) 23:05:20 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x5, &(0x7f0000000040)=@framed={{}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xff, &(0x7f00000002c0)=""/255, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:20 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000001b40)=@base={0x1e, 0x0, 0x7, 0x4, 0x0, 0x1}, 0x48) 23:05:20 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0xf4240, &(0x7f0000000000)=@framed={{}, [@func]}, &(0x7f00000000c0)='GPL\x00', 0x0, 0xff, &(0x7f00000002c0)=""/255, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:20 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0xff03, &(0x7f0000000000)=@framed={{}, [@func]}, &(0x7f00000000c0)='GPL\x00', 0x0, 0xff, &(0x7f00000002c0)=""/255, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:20 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000001b40)=@base={0xb, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 23:05:20 executing program 5: syz_clone(0xc0040080, 0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140)="3dded29476abe8d096d3a4cc30dc454542ed0aafd01ea3ca7fe785e2e61527a4ab9b01951e9da2817b32ea2b575330cde4f995f57dfc20c794f08c7ed324461fa2201928463f33ea") 23:05:20 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000035c0)={0x18, 0x1, &(0x7f0000001240)=@raw=[@ldst={0x3}], &(0x7f0000001280)='syzkaller\x00', 0x6, 0xf9, &(0x7f0000003480)=""/249, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:20 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000001b40)=@base={0x7, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 23:05:20 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000035c0)={0x18, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:20 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x12, 0xbdf, 0x0, 0x100}, 0x48) 23:05:20 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x11, 0x3, &(0x7f0000000000)=@framed, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:20 executing program 1: socketpair(0xa, 0x3, 0xc1, &(0x7f0000000180)) 23:05:20 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x12, 0x3, &(0x7f0000000000)=@framed, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:20 executing program 0: socketpair(0x2, 0x3, 0x5, &(0x7f00000001c0)) 23:05:21 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x1b, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000183fffffffffffffe00000000000000018200000", @ANYRES32, @ANYBLOB="00fff604000000000500000000ee000000002a0b10797743548e00000000000018006b0002004000000000000000001085bb1c127300000095"], &(0x7f00000002c0)='syzkaller\x00', 0x6, 0xb5, &(0x7f0000000380)=""/181, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:21 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) 23:05:21 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000001b40)=@base={0x2, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 23:05:21 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x4, 0x3, &(0x7f0000000000)=@framed={{0x18, 0xa}}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x8, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:21 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:21 executing program 5: syz_clone(0xc0040080, 0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140)="3dded29476abe8d096d3a4cc30dc454542ed0aafd01ea3ca7fe785e2e61527a4ab9b01951e9da2817b32ea2b575330cde4f995f57dfc20c794f08c7ed324461fa2201928463f33ea") 23:05:21 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_devices(r1, &(0x7f0000000300)='devices.deny\x00', 0x2, 0x0) openat$cgroup_devices(r0, &(0x7f0000000300)='devices.deny\x00', 0x2, 0x0) 23:05:21 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x1c, 0x3, &(0x7f0000000000)=@framed, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:21 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x6, 0x0, 0x0, 0x21}, 0x48) 23:05:21 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0xc001, &(0x7f0000000000)=@framed={{}, [@func]}, &(0x7f00000000c0)='GPL\x00', 0x0, 0xff, &(0x7f00000002c0)=""/255, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:21 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0xc002, &(0x7f0000000000)=@framed={{}, [@func]}, &(0x7f00000000c0)='GPL\x00', 0x0, 0xff, &(0x7f00000002c0)=""/255, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:21 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000001b40)=@base={0x1e, 0x0, 0x7, 0x4, 0x4, 0x1}, 0x48) 23:05:22 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x3ec, 0x3, &(0x7f0000000000)=@framed, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:22 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x8003, &(0x7f0000000000)=@framed={{}, [@func]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xff, &(0x7f00000002c0)=""/255, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:22 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x5, &(0x7f0000000040)=@framed={{}, [@map_idx_val]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xff, &(0x7f00000002c0)=""/255, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:22 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x3, &(0x7f0000000000)=@framed, &(0x7f00000000c0)='GPL\x00', 0x4, 0xff, &(0x7f00000002c0)=""/255, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:22 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x4, 0x3, &(0x7f0000000000)=@framed={{}, [], {0x95, 0x0, 0x0, 0xfffffff5}}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:22 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x18, 0x3, &(0x7f0000000000)=@framed, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:22 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x4, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x5}}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:22 executing program 3: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000e80)={0x0, 0x0, 0x18}, 0x10) 23:05:22 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x4, 0x3, &(0x7f0000000000)=@framed={{0x18, 0xe}}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:22 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x48) 23:05:22 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000035c0)={0x0, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:22 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000001b40)=@base={0xb, 0x0, 0x0, 0x4, 0x0, 0x1}, 0x48) 23:05:22 executing program 3: bpf$MAP_CREATE(0xa, &(0x7f0000001b40)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 23:05:22 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x8, 0x3, &(0x7f0000000000)=@framed, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:22 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000001b40)=@base={0x1e, 0x0, 0x7, 0x4, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xd}, 0x48) 23:05:22 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000001b40)=@base={0xd, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 23:05:22 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x4, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:22 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x19, 0x3, &(0x7f0000000000)=@framed, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:22 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000001b40)=@base={0x17, 0x0, 0x0, 0x4, 0x0, 0x1}, 0x48) 23:05:22 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x6100, &(0x7f0000000000)=@framed={{}, [@func]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xff, &(0x7f00000002c0)=""/255, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:22 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x7, 0x0, 0x0, 0x0, 0xa00, 0x1}, 0x48) 23:05:22 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x15, 0x3, &(0x7f0000000000)=@framed, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:22 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x100000, &(0x7f0000000000)=@framed={{}, [@func]}, &(0x7f00000000c0)='GPL\x00', 0x0, 0xff, &(0x7f00000002c0)=""/255, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:22 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x14, 0x3, &(0x7f0000000000)=@framed, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:22 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x5, &(0x7f0000000080)=@framed={{}, [@map_fd]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x107, &(0x7f0000000100)=""/263, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:22 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x4, &(0x7f0000000000)=@framed={{}, [@func]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xff, &(0x7f00000002c0)=""/255, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:22 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0xc002, &(0x7f0000000000)=@framed={{}, [@func]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xff, &(0x7f00000002c0)=""/255, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:22 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000240)=@raw=[@alu], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) 23:05:22 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x3, &(0x7f0000000000)=@framed, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x2}, 0x80) 23:05:22 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x12, 0x3, &(0x7f0000000000)=@framed, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:22 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x4, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x3}}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:22 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x7ffff, &(0x7f0000000000)=@framed={{}, [@func]}, &(0x7f00000000c0)='GPL\x00', 0x0, 0xff, &(0x7f00000002c0)=""/255, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:22 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000016c0)=@bpf_lsm={0x1d, 0xe, &(0x7f0000001740)=ANY=[@ANYBLOB="181a0000", @ANYRES32, @ANYBLOB="000000000000000085"], &(0x7f00000001c0)='syzkaller\x00', 0x4, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:22 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000001b40)=@base={0x17, 0x0, 0x7, 0x4, 0x4, 0x1}, 0x48) 23:05:22 executing program 1: socketpair(0x22, 0x0, 0x4, &(0x7f0000001fc0)) 23:05:22 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000001b40)=@base={0x17, 0x2, 0x0, 0x4, 0x0, 0x1}, 0x48) 23:05:22 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000020000000000000183fffffffffffffe00000000000000018200000", @ANYRES32, @ANYBLOB="00fff604000000000500000000ee000000002a0b10797743548e00000000000018006b0002004000000000000000001085bb1c127300000095"], &(0x7f00000002c0)='syzkaller\x00', 0x6, 0xb5, &(0x7f0000000380)=""/181, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:23 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x17, 0x3, &(0x7f0000000000)=@framed, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:23 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x4, 0x3, &(0x7f0000000000)=@framed={{0x21}}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:23 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x4, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x9}}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:23 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000001b40)=@base={0x2, 0x0, 0x0, 0x4, 0x0, 0x1}, 0x48) 23:05:23 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="28000000000000000000000000000000183fffffffffffffe00000000000000018200000", @ANYRES32, @ANYBLOB="00fff604000000000500000000ee000000002a0b10797743548e00000000000018006b0002004000000000000000001085bb1c127300000095"], &(0x7f00000002c0)='syzkaller\x00', 0x6, 0xb5, &(0x7f0000000380)=""/181, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:23 executing program 4: bpf$PROG_LOAD(0x2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0xb8) 23:05:23 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000000000e1227a66af303bd895"], &(0x7f00000000c0)='GPL\x00', 0x4, 0xff, &(0x7f00000002c0)=""/255, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:23 executing program 5: socketpair(0xf, 0x0, 0x0, &(0x7f0000000880)) 23:05:23 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@bloom_filter={0x1e, 0x0, 0x2, 0xb8ff}, 0x48) 23:05:23 executing program 1: socketpair$nbd(0xa, 0x1, 0x0, &(0x7f0000000380)) 23:05:23 executing program 2: socketpair(0x0, 0x0, 0x0, &(0x7f0000002780)) 23:05:23 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000035c0)={0x18, 0x1, &(0x7f0000001240)=@raw=[@ldst], &(0x7f0000001280)='syzkaller\x00', 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:23 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x4, 0x3, &(0x7f0000000000)=@framed={{0x18, 0xa}}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:23 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x4, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x2}}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:23 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/ipc\x00') 23:05:23 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000006f1000000300000095"], &(0x7f00000000c0)='GPL\x00', 0x4, 0xff, &(0x7f00000002c0)=""/255, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:23 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000001b40)=@base={0x0, 0x0, 0x0, 0x0, 0x18, 0x1}, 0x48) 23:05:23 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000001b40)=@base={0x11, 0x0, 0x0, 0x4, 0x0, 0x1}, 0x48) 23:05:23 executing program 3: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000280)='ns/pid\x00') syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000002c0)='ns/pid_for_children\x00') 23:05:23 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x4, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x2}}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:23 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000016c0)=@bpf_ext={0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:23 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001300), 0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000001400)) 23:05:23 executing program 5: bpf$BPF_PROG_DETACH(0x9, &(0x7f0000001200), 0x10) 23:05:23 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000005c0)={@cgroup, 0xffffffffffffffff, 0x1a}, 0x10) 23:05:23 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, 0x0) 23:05:23 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000001240)={'macsec0\x00'}) 23:05:23 executing program 3: socketpair(0x35, 0x0, 0x0, &(0x7f0000000c00)) 23:05:24 executing program 1: socketpair(0x15, 0x0, 0x0, &(0x7f0000000540)) 23:05:24 executing program 3: bpf$OBJ_PIN_PROG(0x6, &(0x7f00000013c0)={&(0x7f0000001380)='./file0\x00'}, 0x10) 23:05:24 executing program 5: openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x141080, 0x0) 23:05:24 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x4}]}]}}, &(0x7f00000000c0)=""/205, 0x2e, 0xcd, 0x1}, 0x20) 23:05:24 executing program 4: socketpair(0x9, 0x0, 0x0, &(0x7f0000000240)) 23:05:24 executing program 2: syz_clone(0x900, 0x0, 0x0, 0x0, 0x0, 0x0) 23:05:24 executing program 3: syz_clone(0x21080, 0x0, 0x0, &(0x7f0000000340), 0x0, 0x0) 23:05:24 executing program 0: bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={0x0}, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f0000000540)) 23:05:24 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x7, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 23:05:24 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001300), 0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, 0x0) 23:05:24 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) 23:05:24 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x1}) 23:05:24 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x91, &(0x7f0000000100)=""/145, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:24 executing program 5: bpf$BPF_PROG_DETACH(0x9, &(0x7f0000001200)={@cgroup, 0xffffffffffffffff, 0x11}, 0x10) 23:05:24 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001180)=@bpf_lsm={0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:24 executing program 0: syz_clone(0x0, 0x0, 0x0, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)="ed7085c55af2b06ca2aa9e6619924a3695ed2d49fc1bf50f5c4f1fbef94758") 23:05:24 executing program 1: r0 = gettid() syz_open_procfs$namespace(r0, &(0x7f0000000680)='ns/ipc\x00') 23:05:24 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1c00000000000000}, 0x48) 23:05:24 executing program 5: syz_clone(0x10001000, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0) 23:05:24 executing program 0: syz_clone(0x21080, 0x0, 0x0, 0x0, &(0x7f0000000380), &(0x7f00000003c0)="e8") 23:05:24 executing program 4: syz_clone(0x21080, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)="e8") 23:05:24 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x2, 0x3, &(0x7f0000000140)=@framed, &(0x7f00000006c0)='syzkaller\x00', 0x2, 0x1000, &(0x7f0000000700)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x9, 0x3, &(0x7f00000001c0)=@framed, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x80) 23:05:24 executing program 3: syz_open_procfs$namespace(0x0, &(0x7f0000000680)='ns/ipc\x00') 23:05:24 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0xc, 0xfc01, &(0x7f0000000440)=ANY=[@ANYBLOB], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:24 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x3, 0x4, 0x4, 0x2100, 0x8, 0x1}, 0x48) 23:05:24 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0xd, 0x4, &(0x7f0000000840)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x5}]}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:24 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0xd, 0x4, &(0x7f0000000840)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xab}]}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:24 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x2, 0x4, &(0x7f0000000840)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x43}]}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:24 executing program 5: r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x2, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000008ddb0095"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={r0, 0xfffffffffffffdd1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdcf, 0x0, 0x0, 0x0, 0x8, 0x0, 0xffffffffffffff96, 0x0, 0x0, 0x0, 0x2a, 0x10, 0x8, 0x0, 0x0}}, 0x10) 23:05:24 executing program 0: syz_clone(0x38000, 0x0, 0x0, 0x0, 0x0, 0x0) 23:05:24 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0xd, 0x4, &(0x7f0000000840)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x8f}]}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:24 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x3, &(0x7f0000000400)=@framed, &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)}, 0x80) 23:05:24 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x7, 0x93, &(0x7f0000000080)=""/147, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:24 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x5, [@var={0x3, 0x0, 0x0, 0xe, 0x1}]}, {0x0, [0x0, 0x0, 0x2e]}}, &(0x7f00000005c0)=""/226, 0x2d, 0xe2, 0x1}, 0x20) 23:05:24 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 23:05:25 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}}, &(0x7f00000001c0)=""/207, 0x2e, 0xcf, 0x1}, 0x20) 23:05:25 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x2, 0x4, &(0x7f0000000840)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x78}]}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:25 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x3, &(0x7f0000000400)=@framed, &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:25 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000c00)={0x11, 0x1, &(0x7f0000000900)=@raw=[@kfunc], &(0x7f0000000940)='syzkaller\x00', 0x0, 0x16, &(0x7f0000000980)=""/22, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:25 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0xc, 0x4, &(0x7f0000000840)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x11}]}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:25 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x9}]}]}}, &(0x7f00000002c0)=""/237, 0x32, 0xed, 0x1}, 0x20) 23:05:25 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f00000002c0)=""/237, 0x26, 0xed, 0x1}, 0x20) 23:05:25 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x2, 0x4, &(0x7f0000000840)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x71}]}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:25 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f00000002c0)=""/237, 0x32, 0xed, 0x1}, 0x20) 23:05:25 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0xc, 0x4, &(0x7f0000000840)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x21}]}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:25 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0xc000, 0x0) 23:05:25 executing program 2: bpf$ITER_CREATE(0x21, &(0x7f0000000600), 0x8) 23:05:25 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x13, 0x4, &(0x7f0000000840)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xab}]}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:25 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x2, 0x4, &(0x7f0000000840)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x73}]}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:25 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0xe, 0x4, &(0x7f0000000840)=@framed={{}, [@call]}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:25 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x3, &(0x7f0000000400)=@framed, &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0), 0x10}, 0x80) 23:05:25 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x2, 0x4, &(0x7f0000000840)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x4}]}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:25 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xe, 0x0, 0x0, 0xfff}, 0x48) 23:05:25 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0xc, 0x4, &(0x7f0000000840)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x1e}]}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:25 executing program 5: bpf$MAP_CREATE(0x5, &(0x7f0000000180), 0x48) 23:05:25 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@bloom_filter={0x1e, 0x0, 0x7, 0x401}, 0x48) 23:05:25 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x3, 0x4, &(0x7f0000000840)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x71}]}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:25 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f00000001c0)=""/207, 0x2e, 0xcf, 0x1}, 0x20) 23:05:25 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x3, 0x4, &(0x7f0000000840)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x6}]}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:25 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x3, &(0x7f0000000400)=@framed, &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:25 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0xd, 0x4, &(0x7f0000000840)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x39}]}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:25 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000003a00)={&(0x7f0000001600)=@name={0x1e, 0x2, 0x0, {{}, 0x1}}, 0x10, &(0x7f0000003980)=[{&(0x7f0000001640)="1a8f26f32174aaffb01ea66defab50c4316a60f83ee5ecb80f79858ca5f296623ca108199ac61800d5b2ae030c4acb640260162f90b322639877283b900d8c4c3a79e6d311adae32", 0x48}, {&(0x7f00000016c0)="1df0a574600d4cd58dae5362806fdd0cc7b972fa90b80e7109a2412fbe6ead8bd46cd11c3cf2902b861f77a4285968c9963f0ae712b725a50fabe26b6f7b21eec97ba6d4d71232efd55cccb358004f9e52e0132cbfdd26236953ddd9058b72d576f6eabbfb96fc477a3ab917b4265758d5286156a0f2c6d27ec14c41f82c2ab8b1488817f7f5227967269297eb435e9253f636c3dc7e556290be7b6c3ad91cb41ee97045d874552a9d4826", 0xab}, {&(0x7f0000001780)="fbae8404c09afd063ee635082de2b3dcf418f72bdd952428ca600f88f66062cc2619e5b19f9e4db198ba8f366ba1e58a94c9469e6e2f467d79c724feff3aef28398f38ecb27c027c762718b5083102db01f7afe36614c3a791d3f0eee393045f696311e388fd354e95c6bc09e52d8e60e9da79ff15124524708f05809aeecb0f5645f047539f09bb8e914d5ee5fcecae2f6595b057813d896b529311ccce74d2ee58cee0bce4493ba223f9972dd7ac16d294a8aa87e23ca7ecf6df0fe5ff9e2c3aaa593cad32031926a9f41990ddf7619cd493ab4813ec56e274c461", 0xdc}, {&(0x7f0000001880)="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", 0x1000}, {&(0x7f0000002880)="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", 0xbfa}], 0x5}, 0x0) 23:05:25 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0xc, &(0x7f0000000000)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x80000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:25 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x5, [@var={0x3}]}, {0x0, [0x0, 0x0, 0x2e]}}, &(0x7f00000005c0)=""/226, 0x2d, 0xe2, 0x1}, 0x20) 23:05:25 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@fwd={0x6}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/234, 0x2b, 0xea, 0x1}, 0x20) 23:05:25 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x5, 0xfc01, &(0x7f0000000840)=@framed={{}, [@call]}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:25 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x13, 0x4, &(0x7f0000000840)=@framed={{}, [@call]}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:25 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xf, 0x0, 0x0, 0xfffffffc}, 0x48) 23:05:25 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x2, 0x4, &(0x7f0000000840)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:25 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x3, &(0x7f0000000400)=@framed, &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$ITER_CREATE(0x21, &(0x7f0000000600), 0x8) bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=@base={0xc, 0x0, 0xffff, 0x7, 0x8, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x4}, 0x48) 23:05:25 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x7, 0x0, 0x0, 0x0, 0x102}, 0x48) 23:05:25 executing program 1: bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000c00)={0x11, 0x1, &(0x7f0000000900)=@raw=[@kfunc], &(0x7f0000000940)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:25 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}]}}, &(0x7f0000000040)=""/247, 0x2a, 0xf7, 0x1}, 0x20) 23:05:25 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x2, 0x4, &(0x7f0000000840)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xae}]}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:25 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x2, 0x4, &(0x7f0000000840)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xc}]}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:25 executing program 5: syz_open_procfs$namespace(0x0, &(0x7f0000001180)='ns/net\x00') 23:05:25 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0xc, 0x4, &(0x7f0000000840)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7}]}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:25 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0xc, 0x4, &(0x7f0000000840)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x18}]}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:25 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0xc, 0x4, &(0x7f0000000840)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xab}]}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:25 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000c00)={0x11, 0x1, &(0x7f0000000900)=@raw=[@kfunc], &(0x7f0000000940)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:25 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func]}}, 0x0, 0x26}, 0x20) 23:05:25 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@bloom_filter={0x1e, 0x0, 0x7, 0x401, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2, 0x0, 0x1}, 0x48) 23:05:25 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x3, 0x4, &(0x7f0000000840)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xb1}]}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:25 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x17, 0x4, &(0x7f0000000000)=@framed={{}, [@alu={0x7, 0x1}]}, &(0x7f00000006c0)='syzkaller\x00', 0x2, 0x1000, &(0x7f0000001700)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:25 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@bloom_filter={0x1e, 0xf0c}, 0x48) 23:05:25 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0xc, 0x4, &(0x7f0000000840)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x1c}]}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:25 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@bloom_filter={0x1e, 0x0, 0x7, 0x401, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) 23:05:26 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0xc, 0x4, &(0x7f0000000840)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x22}]}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:26 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0xf, 0x4, &(0x7f0000000840)=@framed={{}, [@call]}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:26 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x1, &(0x7f00000002c0)=@raw=[@ldst], &(0x7f0000000300)='syzkaller\x00', 0x8, 0xf9, &(0x7f0000000340)=""/249, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:26 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x3, &(0x7f0000000400)=@framed, &(0x7f0000000440)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:26 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0xc, 0x4, &(0x7f0000000440)=ANY=[@ANYBLOB="2ddc020000000008040000000000000085000000ab00000095"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:26 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x5, 0x7ffff, &(0x7f0000000840)=@framed={{}, [@call]}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:26 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0xd, 0x4, &(0x7f0000000840)=@framed={{}, [@call]}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:26 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@bloom_filter={0x1e, 0x0, 0x7, 0x401, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1}, 0x48) 23:05:26 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x2, 0x4, &(0x7f0000000840)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:26 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0xc, 0x4, &(0x7f0000000840)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x29}]}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:26 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0xc, 0x4, &(0x7f0000000840)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x19}]}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:26 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x2, 0x4, &(0x7f0000000840)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x99}]}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:26 executing program 0: r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000400)={0x6, 0x3, &(0x7f0000000540)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x3, 0xf4, &(0x7f0000000180)=""/244, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x15, 0x2, &(0x7f0000000140)=@raw=[@map_idx], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x80) 23:05:26 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f00000001c0)=""/207, 0x26, 0xcf, 0x1}, 0x20) 23:05:26 executing program 3: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00'}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) 23:05:26 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0xc, 0x4, &(0x7f0000000840)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x49}]}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:26 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x3, 0xf4240, &(0x7f0000000840)=@framed={{}, [@call]}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:27 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x2, 0x4, &(0x7f0000000840)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x8d}]}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:27 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) 23:05:27 executing program 3: r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x2, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000edb0095"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffef4, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) 23:05:27 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x4, [@var={0x3}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000200)=""/198, 0x2c, 0xc6, 0x1}, 0x20) 23:05:27 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x5, &(0x7f0000000000)=@framed={{}, [@btf_id]}, &(0x7f0000000180)='syzkaller\x00', 0x2, 0xb9, &(0x7f00000001c0)=""/185, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:27 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0xc, 0x4, &(0x7f0000000840)=@framed={{}, [@call]}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:27 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0xc, 0x4, &(0x7f0000000700)=ANY=[@ANYBLOB="2c00000000000000040000000000000085000000ab00000095"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x9}]}]}}, &(0x7f00000002c0)=""/237, 0x32, 0xed, 0x1}, 0x20) 23:05:27 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x2, 0x4, &(0x7f0000000840)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xad}]}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:27 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x3, &(0x7f0000000400)=@framed, &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000600), 0x8) bpf$ITER_CREATE(0x21, &(0x7f00000009c0), 0x8) bpf$ITER_CREATE(0x21, &(0x7f0000000a80)={r0}, 0x8) 23:05:27 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x485, 0x1}, 0x48) 23:05:28 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x0, 0x0, 0x0, 0x0, 0x18}, 0x48) 23:05:28 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=@base={0xc, 0x0, 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5}, 0x48) 23:05:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@fwd]}}, &(0x7f0000000240)=""/234, 0x26, 0xea, 0x1}, 0x20) 23:05:28 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x2, 0x4, &(0x7f0000000840)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x24}]}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:28 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x1d}, 0x48) 23:05:28 executing program 0: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000d00)='syz1\x00', 0x1ff) 23:05:28 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x2, 0x4, &(0x7f0000000840)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x19}]}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:28 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) 23:05:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{}]}]}}, &(0x7f00000002c0)=""/237, 0x32, 0xed, 0x1}, 0x20) 23:05:28 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000c00)={0x0, 0x1, &(0x7f0000000900)=@raw=[@kfunc], &(0x7f0000000940)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:28 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x7}, 0x48) 23:05:28 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0xe, 0x4, &(0x7f0000000840)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xab}]}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:28 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000780)=@bpf_tracing={0x1a, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:28 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0xc, 0x4, &(0x7f0000000840)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x8}]}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:28 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x5, 0xde01, &(0x7f0000000840)=@framed={{}, [@call]}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:28 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x600, 0x0) 23:05:28 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x2, 0x4, &(0x7f0000000840)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x2d}]}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:28 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0xf, 0x4, &(0x7f0000000840)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xab}]}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:28 executing program 4: r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x3, &(0x7f0000000400)=@framed, &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000780)=@bpf_tracing={0x1a, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x80) 23:05:28 executing program 1: r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x2, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000edb0095"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0xfffffffffffffef4, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) 23:05:28 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000c00)={0x0, 0x0, 0x0, &(0x7f0000000940)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:28 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0xc, 0x4, &(0x7f0000000840)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x15}]}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:28 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x13, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 23:05:28 executing program 1: socketpair(0x25, 0x1, 0x1, &(0x7f0000000000)) 23:05:28 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 23:05:28 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x3, &(0x7f0000000400)=@framed, &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000480), 0x8, 0x10, 0x0}, 0x80) 23:05:28 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, &(0x7f0000000300)=""/40, 0x0, 0x28}, 0x20) 23:05:28 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x48) 23:05:28 executing program 5: socketpair(0xa, 0x80005, 0x0, 0x0) 23:05:28 executing program 4: socketpair(0x1d, 0x0, 0x0, 0x0) [ 167.949626][ T6465] syz-executor.4[6465] is installing a program with bpf_probe_write_user helper that may corrupt user memory! 23:05:28 executing program 1: socketpair(0x25, 0x0, 0x0, 0x0) 23:05:28 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:28 executing program 0: syz_clone(0xa010200, 0x0, 0x0, 0x0, 0x0, 0x0) 23:05:28 executing program 5: syz_clone(0x1900200, 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000140)='\a') 23:05:28 executing program 3: syz_clone(0x10024000, 0x0, 0x0, 0x0, 0x0, 0x0) 23:05:28 executing program 4: socketpair(0x22, 0x0, 0x2b, 0x0) 23:05:29 executing program 1: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='bcache_write\x00'}, 0x5e) 23:05:29 executing program 2: socketpair(0x23, 0x0, 0x5, 0x0) 23:05:29 executing program 0: socketpair(0x11, 0x2, 0x5, 0x0) 23:05:29 executing program 4: socketpair(0x2, 0x2, 0x40, 0x0) 23:05:29 executing program 2: socketpair(0x1d, 0x0, 0x6dc1, 0x0) 23:05:29 executing program 1: socketpair(0x15, 0x5, 0x1, 0x0) 23:05:29 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x5ed813aa42fd9025, 0x0) 23:05:29 executing program 0: socketpair(0x27, 0x0, 0x0, 0x0) 23:05:29 executing program 2: socketpair(0xa, 0x6, 0x0, 0x0) 23:05:29 executing program 4: socketpair(0x29, 0x2, 0x5, 0x0) 23:05:29 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001080)="83") 23:05:29 executing program 1: socketpair(0x9, 0x0, 0x0, 0x0) 23:05:29 executing program 5: syz_clone(0x1900200, 0x0, 0x0, 0x0, 0x0, 0x0) 23:05:29 executing program 4: socketpair(0xa, 0x0, 0x3ff, 0x0) 23:05:29 executing program 0: socketpair(0x0, 0x80e, 0x0, 0x0) 23:05:29 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:05:29 executing program 2: socketpair(0xa, 0x0, 0x7fff, 0x0) 23:05:29 executing program 5: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xc) 23:05:29 executing program 4: socketpair(0x25, 0x5, 0x6, 0x0) 23:05:29 executing program 1: socketpair(0x29, 0x0, 0x0, 0x0) 23:05:29 executing program 3: syz_clone(0x0, 0x0, 0x0, &(0x7f0000001000), 0x0, &(0x7f0000001080)="83") 23:05:29 executing program 0: socketpair(0x22, 0x0, 0x6, 0x0) 23:05:29 executing program 5: socketpair(0x28, 0x0, 0x7, 0x0) 23:05:29 executing program 2: socketpair(0x25, 0x5, 0x2, 0x0) 23:05:29 executing program 1: socketpair(0x15, 0x0, 0x0, 0x0) 23:05:29 executing program 4: socketpair(0x26, 0x5, 0xffffffc1, 0x0) 23:05:29 executing program 0: socketpair(0xa, 0x80005, 0x1, 0x0) 23:05:29 executing program 2: socketpair(0x18, 0x0, 0x7fff, 0x0) 23:05:29 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x1a, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x7, 0x8b, &(0x7f0000000080)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:29 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0xa, 0x4, 0x4301, 0x2100, 0x0, 0x1}, 0x48) 23:05:29 executing program 1: socketpair(0x22, 0x0, 0x1, 0x0) 23:05:29 executing program 3: syz_clone(0x0, 0x0, 0x0, &(0x7f0000001000), 0x0, &(0x7f0000001080)="83") 23:05:29 executing program 0: bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={0x0, 0x0, 0x10}, 0x10) 23:05:29 executing program 2: socketpair(0x22, 0x0, 0x0, 0x0) 23:05:29 executing program 1: syz_open_procfs$namespace(0x0, &(0x7f0000002300)='ns/pid_for_children\x00') 23:05:29 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x3, &(0x7f0000000000)=@framed={{0x61}}, &(0x7f0000000040)='GPL\x00', 0x7, 0x8b, &(0x7f0000000080)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:29 executing program 3: syz_clone(0x0, 0x0, 0x0, &(0x7f0000001000), 0x0, &(0x7f0000001080)="83") 23:05:29 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x4, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:29 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x5, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:29 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0xa, 0x4, 0x4, 0x2100, 0x42, 0x1}, 0x48) 23:05:29 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6a000000}}, &(0x7f0000000040)='GPL\x00', 0x7, 0x8b, &(0x7f0000000080)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:30 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x16}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:30 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x2}}, &(0x7f0000000040)='GPL\x00', 0x7, 0x8b, &(0x7f0000000080)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:30 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9cffffff}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:30 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x2}, 0x80) 23:05:30 executing program 3: syz_clone(0x0, 0x0, 0x0, &(0x7f0000001000), 0x0, &(0x7f0000001080)="83") 23:05:30 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x7, 0x4, 0x8, 0x20fe}, 0x48) 23:05:30 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0xc, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x7, 0x8b, &(0x7f0000000080)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:30 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0xe, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:30 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:30 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000980)=@base={0x1b, 0x0, 0x0, 0x1000000}, 0x48) 23:05:30 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x7, 0x8b, &(0x7f0000000080)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:30 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:31 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x13, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:31 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x3, &(0x7f0000000000)=@framed={{0x29}}, &(0x7f0000000040)='GPL\x00', 0x7, 0x8b, &(0x7f0000000080)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:31 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000040)='GPL\x00', 0x7, 0x8b, &(0x7f0000000080)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:31 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x16, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:31 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x5, 0x0, 0x0, 0x0, 0x2d0, 0x1}, 0x48) 23:05:31 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1}, 0x48) 23:05:31 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x12, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:31 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x2}}, &(0x7f0000000040)='GPL\x00', 0x7, 0x8b, &(0x7f0000000080)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:31 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:31 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x2, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:31 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x6, 0x4, 0x0, 0x1}, 0x48) 23:05:31 executing program 0: socketpair(0xa, 0x6, 0x7a5f8d81, &(0x7f0000000100)) 23:05:31 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x2, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:31 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x1a, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:31 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000980)=@base={0x1b, 0x2}, 0x48) 23:05:31 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0xf, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:31 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000980)=@base={0x1b, 0x0, 0x0, 0x2000000}, 0x48) 23:05:31 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x7, 0x8b, &(0x7f0000000080)=""/139, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:31 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60000000}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:31 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x3, &(0x7f0000000000)=@framed={{0x18, 0xa}}, &(0x7f0000000040)='GPL\x00', 0x7, 0x8b, &(0x7f0000000080)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:31 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x19, 0x4, 0x4, 0x2101, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) 23:05:31 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x8, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:31 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x4, 0x6d, 0x42, 0x1}, 0x48) 23:05:31 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x1c, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x7, 0x8b, &(0x7f0000000080)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:31 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x2}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:31 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0xa, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:31 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000040)='GPL\x00', 0x7, 0x8b, &(0x7f0000000080)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:31 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x14, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:32 executing program 1: bpf$MAP_CREATE(0x15000000, 0x0, 0x0) 23:05:32 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0xf, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x7, 0x8b, &(0x7f0000000080)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:32 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x5, &(0x7f0000000340)=@framed={{}, [@map_val]}, &(0x7f0000000040)='GPL\x00', 0x7, 0x8b, &(0x7f0000000080)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:32 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0xc, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:32 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x6, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:32 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x2, 0x4, 0x4, 0x2100, 0x4, 0x1}, 0x48) 23:05:32 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0xb, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:32 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x1b, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x7, 0x8b, &(0x7f0000000080)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:32 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x1e, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:32 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18f0000000000000ed0000000000c48076"], &(0x7f0000000040)='GPL\x00', 0x7, 0x8b, &(0x7f0000000080)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:32 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x10, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:32 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x3}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:32 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000980)=@base={0x1b, 0x0, 0x0, 0x0, 0x241}, 0x48) 23:05:32 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x7, 0x8b, &(0x7f0000000080)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:32 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000980)=@base={0x1b, 0x0, 0x0, 0x2000}, 0x48) 23:05:32 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x3, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:32 executing program 3: socketpair(0x11, 0xa, 0x8, &(0x7f0000000000)) 23:05:32 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x3}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:32 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x10, 0x4, 0x4, 0x2100, 0x42, 0x1}, 0x48) 23:05:32 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000040)='GPL\x00', 0x7, 0x8b, &(0x7f0000000080)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:32 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x3, &(0x7f0000000000)=@framed={{0x18, 0xb}}, &(0x7f0000000040)='GPL\x00', 0x7, 0x8b, &(0x7f0000000080)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:32 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x2, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000040)='GPL\x00', 0x7, 0x8b, &(0x7f0000000080)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:32 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x5, 0x0, 0x0, 0x0, 0x42, 0x1}, 0x48) 23:05:32 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x2}}, &(0x7f0000000040)='GPL\x00', 0x7, 0x8b, &(0x7f0000000080)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:32 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x6}}, &(0x7f0000000040)='GPL\x00', 0x7, 0x8b, &(0x7f0000000080)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:32 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x3}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:32 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x11, 0x2, &(0x7f00000001c0)=ANY=[@ANYRESHEX=0x0], &(0x7f0000000040)='GPL\x00', 0x7, 0x8b, &(0x7f0000000080)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x36, 0x10, 0x0}, 0x80) 23:05:32 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0xe, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x7, 0x8b, &(0x7f0000000080)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:32 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x3, &(0x7f0000000000)=@framed={{}, [], {0x95, 0x4}}, &(0x7f0000000040)='GPL\x00', 0x7, 0x8b, &(0x7f0000000080)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:32 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x4, 0x2100, 0x42, 0x1}, 0x48) 23:05:32 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x3}}, &(0x7f0000000040)='GPL\x00', 0x7, 0x8b, &(0x7f0000000080)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:32 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x3}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:32 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x0, 0x0, 0x0, 0x124, 0xffffffffffffffff, 0x2f, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1}, 0x48) 23:05:32 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x9, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:33 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x83, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:33 executing program 0: syz_clone(0x99022000, 0x0, 0x0, 0x0, 0x0, 0x0) 23:05:33 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x4, 0x84, 0x42, 0x1}, 0x48) 23:05:33 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x2000010b, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:33 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x3, &(0x7f0000000000)=@framed={{0x63}}, &(0x7f0000000040)='GPL\x00', 0x7, 0x8b, &(0x7f0000000080)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:33 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x8, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x7, 0x8b, &(0x7f0000000080)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:33 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x3, &(0x7f0000000000)=@framed={{}, [], {0x95, 0x0, 0x0, 0x18}}, &(0x7f0000000040)='GPL\x00', 0x7, 0x8b, &(0x7f0000000080)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:33 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000000)=@framed={{}, [], {0x95, 0x0, 0x0, 0x6200}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:33 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x7, 0x4, 0x8, 0x20fe, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) 23:05:33 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[], 0x138}, 0x0) 23:05:33 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x3, &(0x7f0000000000)=@framed={{0xf}}, &(0x7f0000000040)='GPL\x00', 0x7, 0x8b, &(0x7f0000000080)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:33 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0xd, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:33 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x85ffffff}}, &(0x7f0000000040)='GPL\x00', 0x7, 0x8b, &(0x7f0000000080)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:33 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x0, 0x0, 0x0, 0x124, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1}, 0x48) 23:05:33 executing program 0: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000100)) 23:05:33 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x17, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:33 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0xf4240, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x8b, &(0x7f0000000080)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:33 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x2068, &(0x7f0000000340)=@framed={{}, [@map_val, @exit, @btf_id, @initr0, @call, @kfunc, @generic, @initr0, @initr0, @alu]}, &(0x7f0000000040)='GPL\x00', 0x7, 0x8b, &(0x7f0000000080)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x1c}, 0x80) 23:05:33 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0xd, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x7, 0x8b, &(0x7f0000000080)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:33 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x49, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x7, 0x8b, &(0x7f0000000080)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:33 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:33 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@fwd]}}, &(0x7f00000002c0)=""/133, 0x26, 0x85, 0x1}, 0x20) 23:05:33 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000011c0)={0x11, 0x8, &(0x7f0000000000)=@framed={{}, [@func, @map_val={0x18, 0x0, 0x2, 0x0, 0x1}, @ldst, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}]}, &(0x7f0000000080)='syzkaller\x00', 0x7, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:33 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x17, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x7, 0x8b, &(0x7f0000000080)=""/139, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:33 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x19, 0x4, 0x8, 0x2101, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) 23:05:33 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x7, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:33 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x0, 0x0, 0x0, 0x124, 0xffffffffffffffff, 0x2f}, 0x48) 23:05:33 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x400454ca, 0x0) 23:05:33 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x9, 0x0, 0x0, 0x100, 0x40, 0x1}, 0x48) 23:05:33 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000011c0)={0x11, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x4}, [@func, @func]}, &(0x7f0000000080)='syzkaller\x00', 0x7, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:33 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x12, 0xfffffffd, 0x0, 0x10000007}, 0x48) 23:05:33 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x5, 0x100, 0x7, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x48) 23:05:33 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x17, 0x6fa9, 0x0, 0x9, 0x0, 0x1}, 0x48) 23:05:33 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0x7, 0x0, 0x0, 0x3}, 0x48) 23:05:33 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000011c0)={0x0, 0xf4240, &(0x7f0000000000)=@framed={{}, [@func, @map_val={0x18, 0x0, 0x2, 0x0, 0x1}, @ldst, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:33 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x107280, 0x0) 23:05:33 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x894c, 0x0) 23:05:33 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x17, 0x0, 0x854, 0xfff, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x48) 23:05:33 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x3, &(0x7f0000000000)=@framed, &(0x7f00000000c0)='GPL\x00', 0x1, 0xe4, &(0x7f0000000200)=""/228, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={r0, 0x58, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x10, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', r1}, 0x48) 23:05:33 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x800454cf, 0x0) 23:05:33 executing program 5: socketpair(0x2, 0xa, 0x0, &(0x7f0000000280)) 23:05:33 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1b, 0x0, 0x0, 0x2000, 0x4, 0x1}, 0x48) 23:05:33 executing program 0: syz_clone(0x71000100, 0x0, 0x0, 0x0, 0x0, 0x0) 23:05:33 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000100)=""/228, 0x1a, 0xe4, 0x1}, 0x20) 23:05:34 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1b, 0x0, 0x0, 0x2000, 0x0, 0x1}, 0x48) 23:05:34 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x17, 0x0, 0xd00, 0x9, 0x0, 0x1}, 0x48) 23:05:34 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const]}}, &(0x7f0000000100)=""/228, 0x26, 0xe4, 0x1}, 0x20) 23:05:34 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x9, 0x2, 0x9a, 0x100, 0x40, 0x1}, 0x48) 23:05:34 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0xb, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 23:05:34 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x17, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 23:05:34 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0x9, 0x8, 0x9, 0x1, 0x0, 0x1}, 0x48) 23:05:34 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1b}, 0x48) 23:05:34 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0x10, 0x0, 0x0, 0x2}, 0x48) 23:05:34 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x9, 0x2, 0x9a, 0x100, 0x40, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x48) 23:05:34 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1b, 0x0, 0x0, 0x1000000, 0x0, 0x1}, 0x48) 23:05:34 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0x9, 0x11, 0x0, 0x1, 0x0, 0x1}, 0x48) 23:05:34 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1b, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x48) 23:05:34 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000004880)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4}, 0x48) 23:05:34 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) 23:05:34 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0x9, 0x0, 0x0, 0x0, 0x4, 0x1}, 0x48) 23:05:34 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000001440), 0xab) 23:05:34 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1b, 0x0, 0x0, 0x10000000}, 0x48) 23:05:34 executing program 3: bpf$BPF_GET_MAP_INFO(0xf, 0xfffffffffffffffc, 0x0) 23:05:34 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@fwd={0x5}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f00000002c0)=""/133, 0x2a, 0x85, 0x1}, 0x20) 23:05:34 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x17, 0x0, 0x3, 0x9, 0x0, 0x1}, 0x48) 23:05:34 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001580)={0x18, 0x3, &(0x7f0000000380)=@framed, &(0x7f00000003c0)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000400)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:34 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x1, &(0x7f00000001c0)=@raw=[@call], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x80) 23:05:34 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1b, 0x0, 0x0, 0x0, 0x1000}, 0x48) 23:05:34 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const={0x0, 0x0, 0x0, 0xa, 0x4}]}}, &(0x7f0000000100)=""/228, 0x26, 0xe4, 0x1}, 0x20) 23:05:34 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0x5, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 23:05:34 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1b, 0x0, 0x0, 0x0, 0x80}, 0x48) 23:05:34 executing program 1: socketpair(0x1, 0x5, 0x0, &(0x7f0000000180)) 23:05:34 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x9, 0x2, 0x9a, 0x100, 0x0, 0x1}, 0x48) 23:05:36 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000011c0)={0x11, 0x5, &(0x7f0000000000)=@framed={{}, [@func, @func]}, &(0x7f0000000080)='syzkaller\x00', 0x7, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:36 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x7, 0x0, 0x0, 0x0, 0x342}, 0x48) 23:05:36 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x14, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 23:05:36 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x48) 23:05:36 executing program 2: socketpair(0xa, 0x0, 0x0, &(0x7f0000002040)) 23:05:36 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0x9, 0x0, 0x0, 0x0, 0x60}, 0x48) 23:05:37 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x400454d9, 0x0) 23:05:37 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x17, 0x0, 0x854, 0xfff}, 0x48) 23:05:37 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x53fd01, 0x0) 23:05:37 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x17, 0x0, 0x500, 0x9, 0x0, 0x1}, 0x48) 23:05:37 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xe}, 0x48) 23:05:37 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0x17, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 23:05:37 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x400454da, 0x0) 23:05:37 executing program 5: openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x4001, 0x0) 23:05:37 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0x9, 0x0, 0x0, 0x0, 0x6, 0x1}, 0x48) 23:05:37 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000400), 0x98) 23:05:37 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1b, 0x2, 0x0, 0x0, 0x0, 0x1}, 0x48) 23:05:37 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0x9, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x48) 23:05:37 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const={0x2}]}}, &(0x7f0000000100)=""/228, 0x26, 0xe4, 0x1}, 0x20) 23:05:37 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x17, 0x0, 0x1600, 0x9, 0x0, 0x1}, 0x48) 23:05:37 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1b, 0x0, 0x0, 0x2000, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) 23:05:37 executing program 0: perf_event_open$cgroup(&(0x7f0000000340)={0x5, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:05:37 executing program 2: socketpair(0x1f, 0x0, 0x0, &(0x7f0000000080)) 23:05:37 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x9, 0x2, 0x0, 0x100, 0x0, 0x1}, 0x48) 23:05:37 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000400)={0x3fe, 0x3, &(0x7f0000000540)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:37 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x17, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x48) 23:05:37 executing program 0: perf_event_open$cgroup(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:05:37 executing program 2: perf_event_open$cgroup(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xe) 23:05:37 executing program 3: perf_event_open$cgroup(&(0x7f0000000340)={0x2, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:05:37 executing program 4: perf_event_open$cgroup(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x502a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:05:37 executing program 5: perf_event_open$cgroup(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:05:37 executing program 1: perf_event_open$cgroup(&(0x7f0000000340)={0x6, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:05:37 executing program 0: perf_event_open$cgroup(&(0x7f0000000340)={0x2, 0x77, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:05:37 executing program 4: perf_event_open$cgroup(&(0x7f0000000340)={0x2, 0x77, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:05:37 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x14ef03, 0x0) 23:05:37 executing program 3: perf_event_open$cgroup(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1cc40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:05:37 executing program 5: perf_event_open$cgroup(&(0x7f0000000340)={0x2, 0x77, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:05:37 executing program 3: perf_event_open$cgroup(&(0x7f0000000340)={0x2, 0x77, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:05:37 executing program 2: syz_clone(0x4003000, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0) 23:05:37 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000600)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x48) 23:05:37 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000600)=@bloom_filter, 0x48) 23:05:37 executing program 0: perf_event_open$cgroup(&(0x7f0000000340)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:05:37 executing program 5: perf_event_open$cgroup(&(0x7f0000000340)={0x2, 0x77, 0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:05:37 executing program 1: perf_event_open$cgroup(&(0x7f0000000340)={0x5, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:05:37 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x9, 0x0, 0x0, 0x0, 0x2a8}, 0x48) 23:05:37 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x2, 0x4, 0x7ff, 0x7, 0x400, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x48) 23:05:37 executing program 2: socketpair(0xa, 0x3, 0x9, &(0x7f0000000340)) 23:05:37 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'syzkaller0\x00', 0x1}) close(r0) 23:05:37 executing program 4: syz_clone(0x51281180, 0x0, 0x0, 0x0, 0x0, 0x0) 23:05:39 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict]}}, &(0x7f00000001c0)=""/252, 0x26, 0xfc, 0x1}, 0x20) 23:05:39 executing program 0: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0xa, 0xb4, 0x80, 0x9, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x48) 23:05:39 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000400)={0x8, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:39 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=@base={0x17, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 23:05:39 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x1b, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x4, 0xc6, &(0x7f00000000c0)=""/198, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:39 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x10}, 0x48) 23:05:39 executing program 4: bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0), 0xa4) 23:05:39 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0xa, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x16}, 0xbb) 23:05:39 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x3, [@enum={0x1, 0x1, 0x0, 0x6, 0x4, [{0xe}]}]}, {0x0, [0x5f]}}, &(0x7f0000000440)=""/157, 0x2f, 0x9d, 0x1}, 0x20) 23:05:39 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x11, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc6, &(0x7f00000000c0)=""/198, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:39 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x8, &(0x7f0000000640)=ANY=[@ANYBLOB="8520000004"], &(0x7f0000000180)='GPL\x00', 0x2, 0xb0, &(0x7f00000001c0)=""/176, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:39 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x9, 0x4, 0x7, 0x7e75}, 0x48) 23:05:39 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x2e]}}, &(0x7f0000000ec0)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 23:05:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@typedef={0x5}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x61, 0x30]}}, &(0x7f0000000600)=""/190, 0x2c, 0xbe, 0x1}, 0x20) 23:05:39 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001640)={0x6, 0x3, &(0x7f0000000400)=@framed, &(0x7f0000000440)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000000480)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:39 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@const={0x2}]}, {0x0, [0x0]}}, &(0x7f0000000080)=""/234, 0x27, 0xea, 0x1}, 0x20) 23:05:40 executing program 3: bpf$OBJ_GET_PROG(0xf, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) 23:05:40 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict]}}, &(0x7f00000000c0)=""/231, 0x26, 0xe7, 0x1}, 0x20) 23:05:40 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x11, 0x3, &(0x7f0000000040)=@framed={{0x21}}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc6, &(0x7f00000000c0)=""/198, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:40 executing program 1: bpf$PROG_LOAD_XDP(0x1c, &(0x7f0000000400)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:40 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x2, 0x0, 0x0, 0xc}]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/198, 0x27, 0xc6, 0x1}, 0x20) 23:05:40 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000001940)={&(0x7f0000000140)=@nl=@unspec, 0x80, 0x0}, 0x0) 23:05:40 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x11, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x3}}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc6, &(0x7f00000000c0)=""/198, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:40 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x1d, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000180)='syzkaller\x00', 0x2, 0xb0, &(0x7f00000001c0)=""/176, 0x0, 0x10, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:40 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x7, 0x0, 0x0, 0x6}, 0x48) 23:05:40 executing program 1: bpf$PROG_LOAD_XDP(0x10, &(0x7f0000000400)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:40 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x11, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x8}}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc6, &(0x7f00000000c0)=""/198, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:40 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0xf, 0x4, 0x0, 0x7}, 0x48) 23:05:40 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x11, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x6}}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc6, &(0x7f00000000c0)=""/198, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:40 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0xb}, 0x48) 23:05:40 executing program 2: r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000940)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) 23:05:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000280)=""/198, 0x2a, 0xc6, 0x1}, 0x20) 23:05:40 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x2, 0x4, 0x400000, 0x7}, 0x48) 23:05:40 executing program 1: socketpair(0x26, 0x5, 0x8, &(0x7f0000000480)) 23:05:40 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x2}, 0x48) 23:05:40 executing program 2: bpf$OBJ_GET_PROG(0x7, &(0x7f0000001300)={&(0x7f00000012c0)='\x00'}, 0x10) 23:05:40 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0xc, 0x4, 0x4, 0x7}, 0x48) 23:05:40 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x12, 0x4, 0x0, 0x7}, 0x48) 23:05:40 executing program 3: bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000140)={0x0, 0x0}, 0x12) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000100)=r0, 0x4) 23:05:40 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x6, 0x4, 0x7ff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x48) 23:05:40 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_lsm={0x18, 0x3, &(0x7f0000000380)=@framed, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:40 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict={0x0, 0x0, 0x0, 0xb, 0x3}]}}, &(0x7f00000001c0)=""/252, 0x26, 0xfc, 0x1}, 0x20) 23:05:40 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0xd, 0x0, 0x4, 0x0, 0x6}, 0x48) 23:05:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x2}}, @restrict={0x0, 0x0, 0x0, 0xb, 0x2}]}}, &(0x7f00000000c0)=""/231, 0x3e, 0xe7, 0x1}, 0x20) 23:05:41 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x1a, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x4, 0xc6, &(0x7f00000000c0)=""/198, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:41 executing program 4: bpf$OBJ_GET_PROG(0x4, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00'}, 0x10) 23:05:41 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x16, 0x8, 0x0, 0x401}, 0x48) 23:05:41 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x11, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x4, 0xc6, &(0x7f00000000c0)=""/198, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:41 executing program 1: bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff, 0x5350673fb42bbe95}, 0x10) 23:05:41 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) 23:05:41 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{}, [@kfunc]}, &(0x7f00000000c0)='syzkaller\x00', 0x5, 0x95, &(0x7f0000000100)=""/149, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:41 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0x4, &(0x7f0000000040)=@framed={{}, [@generic={0x6, 0x0, 0x0, 0xfe00}]}, &(0x7f00000000c0)='GPL\x00', 0x5, 0xd0, &(0x7f0000000100)=""/208, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:41 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x2, 0x4, 0x7ff, 0x7, 0x404}, 0x48) 23:05:41 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0xa, [@var={0x9}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/136, 0x32, 0x88, 0x1}, 0x20) 23:05:41 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0xd}, 0x48) 23:05:41 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x1e, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:41 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x16, 0x0, 0xbf5, 0x401, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x48) 23:05:41 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1}}]}}, &(0x7f00000000c0)=""/231, 0x32, 0xe7, 0x1}, 0x20) 23:05:41 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x16, 0x0, 0xbf5, 0x401, 0x402}, 0x48) 23:05:41 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0xa, 0x1, 0x5, 0xa31c}, 0x48) 23:05:41 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x6, 0x4, 0x7ff, 0x7, 0x400}, 0x48) 23:05:41 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, &(0x7f00000000c0)=""/205, 0x18, 0xcd, 0x1}, 0x20) 23:05:41 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x48) 23:05:41 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x2}}, &(0x7f00000000c0)=""/205, 0x1a, 0xcd, 0x1}, 0x20) 23:05:41 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x17, 0x0, 0x7, 0x3f}, 0x48) 23:05:41 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x17, 0x3f60ed12, 0x0, 0x3f}, 0x48) 23:05:41 executing program 1: openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x0) 23:05:41 executing program 4: openat$tun(0xffffffffffffff9c, 0x0, 0x58f603, 0x0) 23:05:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, 0x0, 0x26}, 0x20) 23:05:41 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="170000000000d658db6300003f000000874000000000000095"], &(0x7f00000002c0)='syzkaller\x00', 0x7, 0x82, &(0x7f0000000300)=""/130, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:41 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef]}}, 0x0, 0x26}, 0x20) 23:05:43 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0xa, 0x1, 0x6, 0x7f, 0x82, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x48) 23:05:43 executing program 4: bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000080)={0x0, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0)=r0, 0x4) 23:05:43 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x17, 0x0, 0x7, 0x3f, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3}, 0x48) 23:05:43 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const={0x0, 0x0, 0x0, 0xa, 0x2}]}}, &(0x7f0000000400)=""/250, 0x26, 0xfa, 0x1}, 0x20) 23:05:43 executing program 5: socketpair(0x10, 0x2, 0x8, &(0x7f0000000180)) 23:05:43 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x1}, 0x48) 23:05:43 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x10b403, 0x0) 23:05:43 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {}]}]}}, &(0x7f00000000c0)=""/205, 0x3e, 0xcd, 0x1}, 0x20) 23:05:43 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:43 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0x90, 0x0, [{}]}]}}, &(0x7f00000000c0)=""/205, 0x2e, 0xcd, 0x1}, 0x20) 23:05:43 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x19, 0x0, 0x0, 0x5}, 0x48) 23:05:43 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x2}]}, {0x0, [0x0, 0x5f, 0x5f]}}, &(0x7f0000000100)=""/142, 0x29, 0x8e, 0x1}, 0x20) 23:05:43 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0xa, 0x1, 0x6, 0x7f}, 0x48) 23:05:43 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, &(0x7f00000000c0)=""/205, 0x0, 0xcd, 0x8}, 0x20) 23:05:43 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x5c8ca3d44e85e273, 0x0) 23:05:43 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000011c0)=@base={0xa}, 0x48) 23:05:43 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:43 executing program 1: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000300)='.\x00'}, 0x10) 23:05:43 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, &(0x7f00000000c0)=""/205, 0x5f5e0ff, 0xcd}, 0x20) 23:05:43 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x17, 0x0, 0x7, 0x3f, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x48) 23:05:43 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:43 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x40, 0x40, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {0x1}, {}]}]}}, &(0x7f00000000c0)=""/205, 0x5a, 0xcd, 0x1}, 0x20) 23:05:43 executing program 1: syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x10, 0x0, 0x0, 0x0) 23:05:43 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x5, 0x0, 0xffffffff}, 0x48) 23:05:43 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {}]}]}}, &(0x7f00000000c0)=""/205, 0x36, 0xcd, 0x1}, 0x20) 23:05:43 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0xa, 0x1, 0x6, 0x7f, 0x82}, 0x48) 23:05:43 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:43 executing program 5: openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x28082, 0x0) 23:05:43 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x0, [], 0x2}}, &(0x7f00000000c0)=""/205, 0x1a, 0xcd, 0x1}, 0x20) 23:05:43 executing program 0: bpf$MAP_CREATE(0x14, &(0x7f0000000000), 0x48) 23:05:43 executing program 3: socketpair(0x22, 0x2, 0x1, &(0x7f0000000040)) 23:05:43 executing program 5: bpf$MAP_CREATE(0x13, &(0x7f0000000000), 0x48) 23:05:43 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 23:05:43 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x1, 0x9, 0xa95, 0x1}, 0x48) 23:05:44 executing program 1: socketpair(0x21, 0x0, 0x2, &(0x7f0000000040)) 23:05:44 executing program 0: bpf$MAP_CREATE(0x11, &(0x7f0000000000), 0x48) 23:05:44 executing program 3: bpf$MAP_CREATE(0x12, &(0x7f0000000000), 0x48) 23:05:44 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 23:05:44 executing program 5: bpf$MAP_CREATE(0xf, &(0x7f0000000000), 0x48) 23:05:44 executing program 2: bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000)={0x7fffffff}, 0x8) 23:05:44 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 23:05:44 executing program 0: bpf$MAP_CREATE(0x3, 0x0, 0x19a80559) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x1, 0x9, 0xa95, 0x1, 0x0, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2}, 0x48) 23:05:44 executing program 5: socketpair(0x2c, 0x3, 0x10000, &(0x7f0000000000)) 23:05:44 executing program 3: bpf$MAP_CREATE(0x22, &(0x7f0000000000), 0x48) 23:05:44 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000001440)=@base={0xe, 0x0, 0x0, 0x8}, 0x48) 23:05:44 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x1b, 0x0, 0x0, 0x9f, 0x0, 0x1}, 0x48) 23:05:44 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:44 executing program 5: bpf$MAP_CREATE(0x9, &(0x7f0000000000), 0x48) 23:05:44 executing program 2: socketpair(0x1e, 0x4, 0x0, &(0x7f0000000040)) 23:05:44 executing program 0: bpf$MAP_CREATE(0x7, &(0x7f0000000000), 0x48) 23:05:44 executing program 3: bpf$MAP_CREATE(0x21, &(0x7f0000000000), 0x48) 23:05:44 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x0, 0x0, 0xffffffff}, 0x48) 23:05:44 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:44 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1b, 0x0, 0x0, 0x0, 0x1c40}, 0x48) 23:05:44 executing program 2: bpf$MAP_CREATE(0x8, &(0x7f0000000000), 0x48) 23:05:44 executing program 0: bpf$MAP_CREATE(0x2, &(0x7f0000000000), 0x48) 23:05:44 executing program 1: bpf$MAP_CREATE(0x17, &(0x7f0000000000), 0x48) 23:05:44 executing program 3: bpf$MAP_CREATE(0x23, &(0x7f0000000000), 0x48) 23:05:44 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x0, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:44 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x40) 23:05:44 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000880)={0x0, 0x0, 0x0}, 0x8000) 23:05:44 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x0, 0x0, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:44 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x432102, 0x0) 23:05:44 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x1, 0x9, 0xa95, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2}, 0x48) 23:05:44 executing program 3: bpf$MAP_CREATE(0x3, &(0x7f0000000000), 0x48) 23:05:44 executing program 5: bpf$MAP_CREATE(0x15, &(0x7f0000000000), 0x48) 23:05:44 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x22100, 0x0) 23:05:44 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x0, 0x0, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:44 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0xa14c0, 0x0) 23:05:44 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000880)={&(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10, 0x0}, 0x0) 23:05:44 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f00000006c0), 0x18040, 0x0) 23:05:44 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x24840, 0x0) 23:05:44 executing program 5: openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x480000, 0x0) 23:05:44 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x78, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xa203000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:05:44 executing program 3: r0 = perf_event_open$cgroup(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) 23:05:44 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x0, 0x0, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:44 executing program 1: perf_event_open$cgroup(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:05:44 executing program 2: r0 = perf_event_open$cgroup(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) 23:05:44 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:44 executing program 5: openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x200000, 0x0) 23:05:44 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x2c7180, 0x0) 23:05:44 executing program 3: socketpair(0x10, 0x0, 0x8, &(0x7f0000001bc0)) 23:05:44 executing program 1: r0 = perf_event_open$cgroup(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) 23:05:44 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) recvmsg(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000640)=""/4096, 0x1000}], 0x1, &(0x7f0000000440)=""/148, 0x94}, 0x12002) 23:05:44 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000880)={&(0x7f0000000640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x8, [@struct={0x3, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x7}]}]}, {0x0, [0x0, 0x0, 0x5f, 0x0, 0x0, 0x0]}}, &(0x7f0000000780)=""/197, 0x38, 0xc5, 0x1}, 0x20) 23:05:44 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:44 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x1c, 0x2, &(0x7f0000000000)=@raw=[@cb_func], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x16, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:44 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x78, 0x9a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:05:44 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x1, 0x9, 0xa95, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) 23:05:45 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000880)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x9, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x7}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000780)=""/197, 0x39, 0xc5, 0x1}, 0x20) 23:05:45 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:45 executing program 3: r0 = perf_event_open$cgroup(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) 23:05:45 executing program 2: unlink(&(0x7f0000000040)='./file0/file0\x00') 23:05:45 executing program 1: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002680)={0x0, 0x0, &(0x7f0000000240)=[{0x0}, {&(0x7f0000004100)=""/4096, 0x1000}], 0x2}, 0x0) sendmsg$sock(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f00000000c0)="5de9ba409377365d02dd3e20a97b120b95368479eda627266a549278fb1f6557328e2f72fbbdbece30a5b812fb73d335742192723e707d24963cbfe5dbd90036f8488d0f69530b3a7ef24a6e90c120e6884f54c275b96882b2571731a279d201c6a056651894af3106b0587e3a43275a31b0ac23ef0360bbf0f49221697d1116b0aa32a1c76dbb9f83ad89380220e06fab0c6dc47face0784199c79944f8a971e47450daf8337486eef2d25a9ff6359bb054ff59296be1880dd3ada31ef2aa033479f9f1bfa2c8e88d59e5d2ffcd56bb658f8802328d906986ec", 0xda}, {&(0x7f00000003c0)="79ea50c7f808755eaec5e2428c07b6cbfedcfe3b8bebf11b42605ea124e5ffd9e80f524830b0f65065a63730cd84c6f43971bad7069d139882686dd3cda0685ee0d2da02f3c957dd20196228cee1efe0d2f332eed5961126190f922b8d20f64213f3fcfd3fb37c1e11382f168cc2a0e41bb2424ae6ee18fd9a040df41c1af54efb4722371e0eec8f0dcfa7dd1e734b2f1f25080a5909a0c1d2864f75fdecfd2fd88c9c22", 0xa4}, {&(0x7f00000001c0)="d129bf4e07cc0424fcc2ce7eae10f69d1924241c67ffd9aff5a163068cceb9d85a9e618931aa50e1094b1478e902c2fb7c2e4f63030753cf3c5660e9dcd1d7ccd74369682dbf183360f7b8f3b129d20e23d162d3825f881996fcb3d0d42cead32361f996b7ecdaa6b526153b8d38bf141d2d4e4d17d8b4c7d37b28ea091e5dcc", 0x80}, {&(0x7f0000000480)="5a74868b730021d2010160fc3aeaa698139a063ea877fbc0ce9488c2dd0c9d809532a7f12655e6ad44a0e066a95b7ec4a0f68f8905aaf2e3c99e2875de2506bca37c71e3dc9f60f60f2c0526829033f806cb333dc3716007dc0000000000", 0x5e}, {&(0x7f0000000500)="fb92b73439fb70966f6b9576589639cb055d80a0b6f42e0fe771030d01beb573c9f14e4e568bc7b1e0fdfdf9c7c73b1f5ff1245ea20eb26d6a701687ec55e1902f92c22014e149dbf35adb4ddb194067da8f2b5f56145b868d1263b0919988f4c7cf38ff595dbfe082b1710e689ee4ca997bdf70e6800b978a3a766c5edc42f1698003da3b2f7f851f9f5e97fab0dd12b84791b43d40ea", 0x97}, {&(0x7f0000001640)="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", 0xc0e}], 0x6}, 0x0) 23:05:45 executing program 0: r0 = perf_event_open$cgroup(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082406, 0x0) 23:05:45 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb603, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:05:45 executing program 3: perf_event_open$cgroup(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:05:45 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:45 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000022c0)={@cgroup=r2, r1}, 0x10) 23:05:45 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x2}]}}, &(0x7f0000001380)=""/167, 0x32, 0xa7, 0x1}, 0x20) 23:05:45 executing program 0: r0 = perf_event_open$cgroup(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000000)) 23:05:45 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:05:45 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000001680)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001500)="a3", 0x1}], 0x1}, 0x0) recvmsg(r1, &(0x7f0000002680)={0x0, 0x0, &(0x7f0000001440)=[{0x0}, {&(0x7f0000000040)=""/157, 0x9d}], 0x2}, 0x0) 23:05:45 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x3, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_tracing={0x1a, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x189f3, r0}, 0x80) 23:05:45 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:45 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x8, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) 23:05:45 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:05:45 executing program 5: r0 = perf_event_open$cgroup(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x541b, 0x0) 23:05:45 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:45 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) write$cgroup_subtree(r0, &(0x7f0000000000)={[{0x0, 'cpu'}]}, 0x5) 23:05:45 executing program 2: perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x78, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xd403000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:05:45 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001800)={0xffffffffffffffff}) sendmsg$sock(r0, 0x0, 0x0) r1 = perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x78, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) 23:05:45 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x8, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000040)={r0}, 0xc) 23:05:45 executing program 5: perf_event_open$cgroup(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:05:45 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:45 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x8, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000240)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) 23:05:45 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000002040)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f0000000280)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) close(0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x2f0, &(0x7f0000000f80)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa3W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xee\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90\xdd[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde\x9a[\xe2(\x88\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb\x151\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd2\x00\x00\x00\x00\x00\x00\x00\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x832Z\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x007q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xe4\x11(\xb1hN\xd2\xe0\x13x\xb2\x1a\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.\xa2)\xffB2\x02v#\x97FK\xc6^\x13\xce68\xe4\x83\xfd?\x87\x94\v\xb4x\xf4|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x8e\xe4\x81\x0eH\xbe\xf1\xc7\x83\x96\xb7^\x1c\x94G\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xee>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8d\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xdde\xe8p29\v\x02\xa2b\x13R\xef\xffA\f\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec2\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x1e\x00_^9\xb1\b\x87\xc6\xb4\xf0\'f\xba\xbd\xfe\x11\xf8\xc8W\x81s^\xd9\x03\x00\x00\x00\x00\x00\x00\x00\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2\x1fA\x00\xdc\xdd\x11x\x90\x97QJ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x85\x13\xfe-t\xc0\xea\xc1C\x1c\xdf!\x00\x00\x00\x00&\xd8\xb3S\xe0\x1e\xa7\xc3`~U\x91\xfa\x92\x1e\xccdfFz\xa8\t\xe4+\x83\xac\x94\x9cr/\x00'/752}, 0x30) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@bloom_filter={0x1e, 0x3, 0x4, 0x6, 0x20, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x5, 0xa}, 0x48) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r2, &(0x7f0000000080), 0x11ffffce1) 23:05:45 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000001340), 0x12) 23:05:45 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r1, &(0x7f00000005c0)={0x0, 0x0, 0x0}, 0x0) recvmsg(r0, &(0x7f0000001ec0)={0x0, 0x0, 0x0}, 0x2) 23:05:45 executing program 5: socketpair(0xa, 0x806, 0x0, &(0x7f0000001bc0)) 23:05:45 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:45 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x1, 0x95, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:05:45 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbc43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4080, 0x1000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:05:45 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000880)={&(0x7f0000000640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@struct]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000780)=""/197, 0x1000000, 0xc5, 0x1}, 0x20) 23:05:45 executing program 1: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) unlink(&(0x7f0000000140)='./file0\x00') 23:05:45 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:45 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x78, 0xb3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:05:45 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x78, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:05:46 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000880)={&(0x7f0000000640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@struct={0x3, 0x0, 0x0, 0x8}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000000780)=""/197, 0x29, 0xc5, 0x1}, 0x20) 23:05:46 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x3}}, @fwd]}}, &(0x7f0000001380)=""/167, 0x3e, 0xa7, 0x1}, 0x20) 23:05:46 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:46 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:05:46 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x8, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xb, &(0x7f0000000240)={r0, 0x0, 0x0}, 0x10) 23:05:46 executing program 3: perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x78, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x6000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:05:46 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0x6, 0x1, &(0x7f0000000080)=@raw=[@alu={0x4}], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0xa3, &(0x7f0000000100)=""/163, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:46 executing program 0: r0 = perf_event_open$cgroup(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) 23:05:46 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:46 executing program 5: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000002680)={&(0x7f0000000240)=@nfc, 0x80, &(0x7f0000000340)=[{&(0x7f0000001540)=""/248, 0xf8}, {0x0, 0x7ffffffff000}], 0x8, &(0x7f0000002640)=""/34, 0x22}, 0x0) 23:05:46 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x3}}, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1}]}]}}, &(0x7f0000001380)=""/167, 0x46, 0xa7, 0x1}, 0x20) 23:05:46 executing program 0: r0 = perf_event_open$cgroup(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x8000000000000001) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) 23:05:46 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000002c00)=@base={0xc, 0x0, 0x4, 0xfffff738}, 0x48) 23:05:46 executing program 1: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file1/file0\x00', 0x0) 23:05:46 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c00000007000000000000000600000d000001"], &(0x7f0000000080)=""/207, 0x5b, 0xcf, 0x1}, 0x20) 23:05:46 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:46 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:05:46 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:46 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0x1, 0x0, 0x0, 0x0, 0x42}, 0x48) 23:05:46 executing program 3: r0 = perf_event_open$cgroup(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)) 23:05:46 executing program 1: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) unlink(&(0x7f0000000080)='./file1/file0\x00') 23:05:47 executing program 5: perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x2, 0xffffffffffffffff, 0x0) 23:05:47 executing program 2: perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x78, 0x99, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:05:47 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0x6, 0x1, &(0x7f0000000080)=@raw=[@alu={0x0, 0x0, 0x3}], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0xa3, &(0x7f0000000100)=""/163, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:47 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x78, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:05:47 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:47 executing program 1: socketpair$unix(0x1, 0x2, 0x0, 0x0) r0 = perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x78, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r0) 23:05:47 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:47 executing program 3: perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x78, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x5000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:05:47 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x2}}, @enum]}}, &(0x7f0000001380)=""/167, 0x3e, 0xa7, 0x1}, 0x20) 23:05:47 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000880)={&(0x7f0000000640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x8, [@struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x7}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000780)=""/197, 0x38, 0xc5, 0x1}, 0x20) 23:05:47 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001800)={0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000001cc0)={&(0x7f0000001840)=@nfc, 0x80, 0x0}, 0x0) recvmsg$unix(r0, &(0x7f0000000700)={&(0x7f0000000000), 0x6e, 0x0, 0x0, &(0x7f0000000640)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x88}, 0x2040) r1 = perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x78, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) 23:05:47 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x421, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:05:47 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001300)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000040)={&(0x7f0000000080)=@nfc, 0x80, &(0x7f0000001880)=[{&(0x7f0000000140)=""/147}, {&(0x7f0000000480)=""/4096}, {&(0x7f0000001540)=""/194}, {&(0x7f0000001900)=""/95}, {&(0x7f0000000300)=""/72}, {&(0x7f0000001640)=""/254}, {&(0x7f0000001740)=""/190}, {&(0x7f0000001800)=""/109}], 0x307, &(0x7f0000000100)=""/43, 0x2b}, 0x0) 23:05:47 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:47 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) close(r1) 23:05:47 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000880)={&(0x7f0000000640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0xe}]}}, &(0x7f0000000780)=""/197, 0x26, 0xc5, 0x1}, 0x20) 23:05:47 executing program 2: r0 = perf_event_open$cgroup(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) 23:05:47 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x3}}, @enum={0x1000000}]}}, &(0x7f0000001380)=""/167, 0x3e, 0xa7, 0x1}, 0x20) 23:05:47 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:47 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000880)={&(0x7f0000000640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@struct={0x3, 0x0, 0x0, 0xc}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000000780)=""/197, 0x29, 0xc5, 0x1}, 0x20) 23:05:47 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f00000004c0)={&(0x7f00000000c0)=@name={0x1e, 0x2, 0x0, {{}, 0x4}}, 0x10, 0x0}, 0x0) 23:05:47 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x8, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2, 0x0, 0x0}}, 0x10) 23:05:47 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x8, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) 23:05:48 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:48 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) syz_clone(0xc10e8400, &(0x7f0000000100), 0x0, &(0x7f0000000080), 0x0, &(0x7f00000001c0)) r2 = syz_clone(0x40080, &(0x7f0000000200)="239a9f12c217ec893128e4fffc4221c3703535d00fbe", 0x16, 0x0, 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000001340)=r2, 0x12) 23:05:48 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:05:48 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000880)={&(0x7f0000000640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x3, 0x0, 0x0, 0xd}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000780)=""/197, 0x28, 0xc5, 0x1}, 0x20) 23:05:48 executing program 2: perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x78, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:05:48 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000002c00)=@base={0xc, 0x0, 0x4}, 0x48) 23:05:48 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:48 executing program 3: socketpair(0x2, 0x2, 0xffd8, &(0x7f0000000000)) 23:05:48 executing program 2: perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:05:48 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:48 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbc43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x50c1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:05:48 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x78, 0x9a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:05:48 executing program 2: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4400}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:05:49 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000880)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb010018000000000000001800000018000000080000000000000002000001"], &(0x7f0000000780)=""/197, 0x38, 0xc5, 0x1}, 0x20) 23:05:49 executing program 3: r0 = perf_event_open$cgroup(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x2402, 0x0) 23:05:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000880)={&(0x7f0000000640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xd, 0x0, 0x0, [{}]}]}}, &(0x7f0000000780)=""/197, 0x32, 0xc5, 0x1}, 0x20) 23:05:49 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:49 executing program 0: recvmsg$unix(0xffffffffffffffff, 0x0, 0x2040) r0 = perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x78, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r0) 23:05:49 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x8, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={@cgroup, r0}, 0x14) 23:05:49 executing program 5: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002680)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000001540)=""/248, 0xf8}], 0x1, &(0x7f0000002640)=""/34, 0x22}, 0x0) close(r0) 23:05:49 executing program 0: r0 = perf_event_open$cgroup(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x5452, 0x8000000000000001) 23:05:49 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000001680)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001500)="a3b5605bb02f1dce3a7beff07307afbd4cce44c18f23f76dc5d739bb95c80d45380fa23d45f33f674c643fbc646d1e93d90963de7499a89932a9cf80ca7f75a69a526f957e328b1abc0e120888421b9372e3f5997161c99d6e9e87f84169e85a6d08e375a0424e692ae6ed75ce825e0ce5c4c453911af6e7735857121e298a5865f173fc6aca9eac53f74db328c708087b50f95f450ccead36e7a2ff79f60b19279f2c", 0xa3}, {&(0x7f0000000100)="5e887a6fda630e24654744dc5d9fb142caea91da7960c5624938095ae717c6165991ea56fbe865a78112fa3cbd08c9", 0x2f}, {&(0x7f0000000280)="38ef36c065ff1608920b9061f0e2c2ae8862beb0a072f262cec4a3febf5bed8d7b", 0x21}], 0x3}, 0x0) recvmsg(r1, &(0x7f0000002680)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)=""/34, 0x22}, {&(0x7f0000000040)=""/157, 0x9d}, {&(0x7f0000000100)}, {&(0x7f0000000140)=""/51, 0x33}, {&(0x7f0000000180)=""/79, 0x4f}, {&(0x7f0000000200)=""/82, 0x52}, {&(0x7f0000000300)=""/76, 0xfffffea4}, {&(0x7f0000000380)=""/184, 0x89}, {&(0x7f00000026c0)=""/102400, 0x19000}, {&(0x7f0000000440)=""/4096, 0x1000}], 0xa}, 0x48efdf7c) 23:05:49 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000001640), 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000001680)={[{0x0, 'hugetlb'}]}, 0x9) 23:05:49 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x6, &(0x7f0000000140)=@framed={{}, [@alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:49 executing program 1: perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x78, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:05:49 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000022c0)={@cgroup=r0}, 0x10) 23:05:49 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0x12) write$cgroup_pid(r1, &(0x7f0000001340), 0x12) 23:05:49 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x78, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:05:49 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x6, &(0x7f0000000140)=@framed={{}, [@alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:49 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x78, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:05:49 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000380)={0xfffffffffffffffd, 0x0, 0x0}, 0x0) 23:05:49 executing program 1: bpf$BPF_GET_PROG_INFO(0xb, 0x0, 0x0) 23:05:49 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x8, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, &(0x7f00000000c0)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) 23:05:49 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0xf}]}}, &(0x7f0000001380)=""/167, 0x32, 0xa7, 0x1}, 0x20) 23:05:49 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x6, &(0x7f0000000140)=@framed={{}, [@alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000880)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0xa, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x7}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x5f]}}, &(0x7f0000000780)=""/197, 0x3a, 0xc5, 0x1}, 0x20) 23:05:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001380)=""/167, 0x2e, 0xa7, 0x1}, 0x20) 23:05:49 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x8, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={@cgroup, r0, 0x4}, 0x14) 23:05:49 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000001380)=""/167, 0x26, 0xa7, 0x1}, 0x20) 23:05:49 executing program 5: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) 23:05:49 executing program 1: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80034, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:05:49 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:49 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002680)={&(0x7f0000000240)=@nfc, 0x80, &(0x7f0000000340)=[{&(0x7f0000001540)=""/248, 0x777e7c998737}, {0x0, 0x7ffffffff000}], 0x2, &(0x7f0000002640)=""/34, 0x22}, 0x0) sendmsg$inet(r0, &(0x7f0000001500)={0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000380)='U', 0x1}], 0x1}, 0x0) 23:05:49 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r1, &(0x7f00000005c0)={0x0, 0x0, 0x0}, 0x0) recvmsg(r0, &(0x7f0000001ec0)={0x0, 0x0, 0x0}, 0x0) 23:05:49 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x8, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0x1c, &(0x7f0000000240)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) 23:05:49 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000440)={0x0, 0xfffffffffffffd2d, 0x0}, 0x40002142) 23:05:49 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:05:49 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:49 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) 23:05:49 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002680)={&(0x7f0000000240)=@nfc, 0x80, &(0x7f0000000340)=[{&(0x7f0000001540)=""/248, 0xf8}, {0x0, 0x7ffffffff000}], 0x2, &(0x7f0000002640)=""/34, 0x22}, 0x0) sendmsg$inet(r0, &(0x7f0000001500)={0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000380)="5596669184c0a8c93c0fdbc158c9a5d7a399bd17c81a53ecfb687b824277a64f5a58c8377c4c698dce6b966ecd17f96b507d80affda6538ffb1b6a8dd9b15bfc56eb960326915935dd25b1a42a0f6219873447bb590f4dd6bfe0d61735bc89c49f7e60240d436e83e34333fa27d7a59ea5b68ec0313e799d9f17c98cbc349541756b145c2ce3254df10c2f0783dbf6b99ae2add5f6d3ea6842b8c31cbc4265485925ad37759c69a5239e67f940ff9cf3a4aa18b08ffb06d58f805b232279f069bbe39695afee66e6b33876f2d73b3659d490e2e95eb7957dadf0853b003c109b925ba19c5c874e2821af7f177e403c4d9f907d4d0b0b796bb1", 0xf9}], 0x1}, 0x0) 23:05:49 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000002680)={&(0x7f0000000240)=@nfc, 0x80, &(0x7f0000000340)=[{&(0x7f0000001540)=""/248, 0xf8}, {0x0, 0x7ffffffff000}], 0x2, &(0x7f0000002640)=""/34, 0x22}, 0x0) 23:05:49 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:49 executing program 1: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000300)={&(0x7f0000000200)=@id, 0x10, 0x0}, 0x20000040) 23:05:49 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x14, 0x0, 0x8}, 0x48) 23:05:49 executing program 3: perf_event_open$cgroup(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:05:49 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x3, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={0x0, r0}, 0x10) 23:05:49 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, 0x0, 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:49 executing program 5: perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:05:49 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000880)={&(0x7f0000000640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x8, [@struct={0x3, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000780)=""/197, 0x1000000, 0xc5, 0x1}, 0x20) 23:05:49 executing program 3: perf_event_open$cgroup(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:05:50 executing program 2: r0 = perf_event_open$cgroup(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40042408, 0x0) 23:05:50 executing program 5: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000001980)="da0545e1fe4d2a4af2a308259436170783838e9ea0a0104c76e76528362315a2"}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001300)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000040)={&(0x7f0000000080)=@nfc, 0x80, &(0x7f0000001880)=[{&(0x7f0000000140)=""/147}, {&(0x7f0000000480)=""/4096}, {&(0x7f0000001540)=""/194}, {&(0x7f0000001900)=""/95}, {&(0x7f0000000300)=""/72}, {&(0x7f0000001640)=""/254}, {&(0x7f0000001740)=""/190}, {&(0x7f0000001800)=""/109}], 0x307, &(0x7f0000000100)=""/43, 0x2b}, 0x0) 23:05:50 executing program 3: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:05:50 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000002680)={&(0x7f0000000040)=@nfc, 0xffffffffffffff05, &(0x7f0000000340)=[{&(0x7f00000000c0)=""/245, 0xf8}, {0x0}], 0x0, &(0x7f00000001c0)=""/52, 0x22}, 0x0) 23:05:50 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, 0x0, 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:50 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x3, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) 23:05:50 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000001340), 0x12) 23:05:50 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1a, 0x0, 0x0, 0x0, 0x804, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x4}, 0x48) 23:05:50 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, 0x0, 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:50 executing program 1: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000001980)="da0545e1fe4d2a"}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001300)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000040)={&(0x7f0000000080)=@nfc, 0x80, &(0x7f0000001880)=[{&(0x7f0000000140)=""/147}, {&(0x7f0000000480)=""/4096}, {&(0x7f0000001540)=""/194}, {&(0x7f0000001900)=""/95}, {&(0x7f0000000300)=""/72}, {&(0x7f0000001640)=""/254}, {&(0x7f0000001740)=""/190}, {&(0x7f0000001800)=""/109}], 0x307, &(0x7f0000000100)=""/43, 0x2b}, 0x0) 23:05:50 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002680)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000000)=""/252, 0xfc}], 0x1, &(0x7f0000002640)=""/34, 0x22}, 0x0) sendmsg$inet(r0, &(0x7f0000001500)={0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000380)='U', 0x1}], 0x1}, 0x0) 23:05:50 executing program 3: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:05:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000880)={&(0x7f0000000640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x3, 0x0, 0x0, [{}]}]}}, &(0x7f0000000780)=""/197, 0x32, 0xc5, 0x1}, 0x20) 23:05:50 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x0, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:50 executing program 1: r0 = perf_event_open$cgroup(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) 23:05:50 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4405}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:05:50 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000001680)={0x0, 0x0, 0x0}, 0x0) recvmsg(r1, &(0x7f0000002680)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000000)=""/34, 0x22}], 0x1}, 0x48efdf7c) 23:05:50 executing program 5: perf_event_open$cgroup(&(0x7f0000000240)={0x1, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:05:50 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x0, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:50 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000880)={&(0x7f0000000640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@func={0x6, 0x0, 0x0, 0xc, 0x2}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x79]}}, &(0x7f0000000000)=""/211, 0x2c, 0xd3, 0x1}, 0x20) 23:05:50 executing program 0: perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:05:51 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x1, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:51 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000880)={&(0x7f0000000640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0xc}]}}, &(0x7f0000000780)=""/197, 0x26, 0xc5, 0x1}, 0x20) 23:05:51 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x8, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f00000000c0)=[0x0], &(0x7f0000000100)=[0x0], 0x0, 0x8, &(0x7f0000000140)=[{}], 0x8, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) 23:05:51 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x3}}, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001380)=""/167, 0x46, 0xa7, 0x1}, 0x20) 23:05:51 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x0, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:51 executing program 2: perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:05:51 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='tasks\x00', 0x2, 0x0) r2 = gettid() write$cgroup_pid(r1, &(0x7f0000000000)=r2, 0x12) 23:05:51 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002680)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000001540)=""/248, 0xf8}], 0x1}, 0x0) sendmsg$sock(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f00000000c0)=']', 0x1}], 0x1}, 0x0) 23:05:51 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:51 executing program 1: perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x78, 0x92, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:05:51 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@array, @enum]}}, &(0x7f0000001380)=""/167, 0x1001, 0xa7, 0x1}, 0x20) 23:05:51 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x8, 0x78, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:05:51 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:51 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000500)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) 23:05:51 executing program 3: r0 = perf_event_open$cgroup(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}) 23:05:51 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x8, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)=[0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x8) 23:05:51 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffffffffffdef) 23:05:51 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:51 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x1, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:05:51 executing program 3: perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:05:51 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000880)={&(0x7f0000000640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0xd, 0x1}]}}, &(0x7f0000000780)=""/197, 0x26, 0xc5, 0x1}, 0x20) 23:05:51 executing program 1: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002680)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000001540)=""/248, 0xf8}], 0x1}, 0x0) sendmsg$sock(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f00000000c0)="5de9ba409377365d02dd3e20a97b120b95368479eda627266a549278fb1f6557328e2f72fbbdbece30a5b812fb73d335742192723e707d24963cbfe5dbd90036f8488d0f69530b3a7ef24a6e90c120e6884f54c275b96882b2571731a279d201c6a056651894af3106b0587e3a43275a31b0ac23ef0360bbf0f49221697d1116b0aa32a1c76dbb9f83ad89380220e06fab0c6dc47face0784199c79944f8a971e47450daf8337486eef2d25a9ff6359bb054ff59296be1880dd3ada31ef2aa033479f9f1bfa2c8e88d59e5d2ffcd56bb658f8802328d906986ec", 0xda}, {&(0x7f00000003c0)="79ea50c7f808755eaec5e2428c07b6cbfedcfe3b8bebf11b42605ea124e5ffd9e80f524830b0f65065a63730cd84c6f43971bad7069d139882686dd3cda0685ee0d2da02f3c957dd20196228cee1efe0d2f332eed5961126190f922b8d20f64213f3fcfd3fb37c1e11382f168cc2a0e41bb2424ae6ee18fd9a040df41c1af54efb4722371e0eec8f0dcfa7dd1e734b2f1f25080a5909a0c1d2864f75fdecfd2fd88c9c22", 0xa4}, {&(0x7f00000001c0)="d129bf4e07cc0424fcc2ce7eae10f69d1924241c67ffd9aff5a163068cceb9d85a9e618931aa50e1094b1478e902c2fb7c2e4f63030753cf3c5660e9dcd1d7ccd74369682dbf183360f7b8f3b129d20e23d162d3825f881996fcb3d0d42cead32361f996b7ecdaa6b526153b8d38bf141d2d4e4d17d8b4c7d37b28ea091e5dcc", 0x80}, {&(0x7f0000000480)="5a74868b730021d2010160f33aeaa698139a063ea877fbc0ce9488c2dd0c9d809532a7f12655e67110f10175b3a78c3ded3bad44a0e066a95b7ec4a0f68f8905aaf2e3c99e2875de2571bca3ea3cf5085e7c71e3dc9f60f60f2c0526829033f806eb333dc3716007dc", 0x69}, {&(0x7f0000000500)="fb92b73439fb70966f6b9576589639cb055d80a0b6f42e0fe771030d01beb573c9f14e4e568bc7b1e0fdfdf9c7c73b1f5ff1245ea20eb26d6a701687ec55e1902f92c22014e149dbf35adb4ddb194067da8f2b5f56145b868d1263b0919988f4c7cf38ff595dbfe082b1710e689ee4ca997bdf70e6800b978a3a766c5edc42f1698003da3b2f7f851f9f5e97fab0dd12b84791b43d40ea", 0x97}, {&(0x7f0000001640)="0817d93e0977863782c5772e2229aa65aa24077bfa51b2ddb28f266d7fd93d75cdb7265d1d8af56b9c070682b06796a03f373809f976d3616d6e7f7942630f9fbc64e5e76ab6bb39f0e8a7cfd8e3a28737c7265522b2f350e22c392c0037d715111bce16c918bf04f9a1cbd38c9b9ba4443b09d02213751bab195c08dc6077415fc8642d2c4bf21e6d12cb44152452fb64ff0b40723292db2a7d64e24d6896fcb04044aeb5541df9f53253bf29a7bb66b839bf0a63cd203c616afe3254950b1280e3573522e029ac167bd5530059b5669f00d3922509c6f08f87072662e3dd4480f0bc789481e4be9ffbd8e55aba8d2c9d7cf92d961a4b08e18d0be580608e6ab4d780fc72d88ee697f5b74493b96faa1df2f3ab16d54fcaa1eaf236465689a11e9ed6304d0875833f861185f5996f3a289e8b5247f1ad576533bef25d571dbcb57bc470c80d9301b0ba86572e09368bc7a66e04453657f8a24b5d2d5b4be3c35a39c887485c9d9ae9f6c7406ba8afd2d6dfaf56d9a7245c858fd373c5b2f18215542c0b46d5ba015999550a4c7d40ddeabb4729cd23db7c241705af0db34dc8da8a70c7e35c6e88e489fad6c52a07f6f3c06c49d437e451f1fc1e86fcec191c6e95927aa25e5fd7719b656ec9c300a188d87a9001283da94dcc700363e8cab974a0be8806effa143fe512ced843e0db3e47b7f898f473081d420a8a53c42ba3b489d1dabdc5ad0e28f56e55c173bb69b790f0c0634d68b946ed0a13cb21cbd25aae8c7ca0dda488cafb48b117c908fbb0873cbafbe78454f326061d1d80d3e5a7877bce43b171b131a0623e787cf67c54b02ba282805525b5edfa708a82c73fa2a1e5777ccb6ed9bd1a797f5705b18ee761b5c3d8fb39502a0f634719a91e7d89fd3ccde1ce12c1638c1284db5c5230b94d5d26811a372770d813976d5c1cfd42d0a3b1df895ccb64cbe7de92b03b848f01e0927ad7ad50b51db6fa0e9d401912c1d63661943cdef2bdcfaa2298915d577865b48d187a0bf1cea342ce40056069ed06a7dcf447aabc19118528b6e32fb87fe130ba98cb2492a3c860376e3f901b82f56d4cb5ed693b700133320f2be4dd739435a7dd020e782728c3eacc853b4d0ec513a08cfa7e341c400a6c81876bd32d40b18566ce330fd121ab94f40d88ec6d00d03bdfa52350cb0c60d8aaac7161a0b411e98fb9533e3d85e39e06e6ab53d4ac9e7a1067ec1b6d328e29fa2ce431954cfc4ccb960fc4af50c0d6e0a6cf2cbd9202cb4e7e79d63b9559e188e4471b154f84be8f2677f5227e6fdbf81908ac7ebd2633141be8e2f63041a1a4e8e4a4b0d4e8e73782ff17c1f94229757396be588829ef177296477c5d21a3bd6f17f8c117afdd86f0c16dc530955d131ba6b28383ac8a481ad3a446d8f0bf0f1ef01bb016d4cab7706cc2c2c81f39757ebeb92947c58d2821afad8c7a8e8b3f65325188cbcaa43106df6559f6fd204c2b99796fed379407b574aade96f187eb6d0e13c79fc63cde36474ba51fa4f3373afb0b92b646a1807a0d1821a0f9ee75d04bcfa46598c5afe8c2655a565f25044e61fb337b72d7969de249ad9246565a709e3b449510ebe3caaed92581feaff5cc8792bd12ecd9f053600b0d616789dedc575669778dea4fa3729fdc59b2dab46e8bce96e39336304157175760f7ecd2746db8d82040a7893ad1d6dc67bbc468e38a85892750b356103f1990415047db035bf8731b612428679ca5aac476cac23af915358ff97ef048544e7f4a0bf1af44d4f310a904c6c26f8aacb7de464ddc0c61c0be61f65d2683d537a9a05acf74fa0ebf9abcc19c3a79d6cc6487882bcb5877f327be2c5ee10ff89c35041996b1a98211df247b4f0e12a6424d2065328c4bd7fc1a6e7cba8389f3605d2a485ad766f37bedc270df6ca40cb1e082d8682e06eccdc511b24db2182333668e886e50e82bd490692250d9a4160a71717d13dc95bdac0058369de562ffca1a30ed7f3760a0b5d36f9752a82363322cb8f65c9766c9c4563ab36c9073f43eab3d315c8726cf2c83a7cc23ef8380959d3afffdd27dc84265769b510f75553f086b90b5f04d1520d186741c4a65d5ef6a511831eeaa30198a76e7afa3a13dd83a04a5ffaf09550f65b94d89a4683d76cdef25030ab8f153b137dd19e2aa5181dcf97fea35c0b11295a6492ddf269a9730eccad0430ab96647c4abd80fd0c0532a852b459be350390bd79bb34fa27dbecdca612cb1575c06958bafc369e2b6ec1b3ee074517d668712ee38332bef4cb5297c63bdd995201cc2b25099001b52992b6e0d17cd605774988fb5e354927d7d2964aed49aea619bc1c7fd2a054d4ef4a063f86880eba9844cc79415d42cada4eabe2324ba336c326b1a1017ccb63c84d326a66b2de2366d2aefff635553d94e940b6335abe82203a7f57e62c0d2cc2d28e391596d71b80dd875617f1bbd4f7bc1071a868278dfd332bd5f6470aa70e250d1daf70d450199911861375215411a32eddf5a6d3ad8ecf2f8ef7dcafc7f95d7c4dbf8787871c974f2de6653b4802ee998bde8cec0463b3ae65a9f3e1f402bd98133a5d39f022c82a8e8d43fac766b17a150ed7f94f885c805558bfca4f0fd09d8bc1171864b6cb099527132f48e6eca618bbc81b23d25e9084b5fb70127f556834cd7b8e755bad8834f8b12d7e8b620b499d86f45547e32c5ee96f34d2fb28143fa5f7e1cfb40bf3d160c3cab909c14059585b358e7c3f2c882189ec78d0bce3219fb8badae59f5dbfa7cbcd9671d07ab8ed47219b0fb7fdc3db27b798640dd1c79b41dd6bcb26cca465807d7dc3d9fa5f66dee2a1eb9650e1346e11b8769abaf8652e7222db342ca100888d3dd9d9a462e715ed70a58d34585f1ab4754ec57634a66803d675b93bf1bdf014a911dd0d6c1ae7541bad63f0f43eddca9f489997a4dae35e3e018c1ae03a405130faa7cf1b2225004b98da36a588c757c84b170bca0fff6d5a35d3f168efaf3391bbeed2edcc7c962d9fda38eb3351b84766b674a4cc17d32c4d3cc32362b86529858e2215390e2714e9c7e845c5e5cd32a133c4bf935bcbf7e6056ce793e39710cfc7de26facb7da2390cc6f0080eef298acdbf57ae6021adff9b12bfcad07ea7db68832f0f290abca700c4574fb980f73938b14c25c35c98d498b35c09244f9f6b0a48bf0139e7f717e7a69f44ba656cb7ca1970d775898af6a80f923e7738ebf7227cfd44185545599ce53e2dcbec558b0c441b25b5494453447d2a8da448495e8f7bb99f54fa2400f511222dcb2cd78ba00612f2f1f2e4e934ca08e5eab2b24b590b400cf2615b613d62113734f76f55f7b57e9c068519e4aa504a1aba2b696b69f4f170e3acec196562f9459f773cff282c826543f3a2b4eef82f507ea9cb25f0324331a81c46dfeb926d2744bc67d72d916c62730e59ed04567589c0ad23f42b48d3979cab4454766ac5975e22a6f15d539f3e1320247d42a1fe033747d60630d66b2fb99403fc902fd8bb3af2fe0d33ad509a9d9e566a2f45bd087d281c6934725ed31a18a48c00f7accb4df74ab78f39feb6f309ac031bb907630f737f3df82361dc1cf405ba2330211c2ae019a8ea441ca5fee33ae4a74c8d09fb626e25f5c521624740590c41185842453cbc47304716fb7cc0c55acd9976b29b38e0b175ff6cf1e593ee7b3a15fe670793294cf651706e8f254c9f9dde6299b472d1490a6aac8479773aa718f2af54cf2f6a3ee1ae9b6984ba12a5555720f95a388909fc843779c95fa116b5e3270d1b0df264cd950d269fd61dc2eacbdcbd8875a70fa638b38172ce972413a9ef4cd188f84b0ff558c304f6e12855df5a64daffde85c44b100bd440cffeb62de54fcb7ebe8c8ad5a272f2e5d130bfc392811054788c2f58e65ec1a2782e52751b92c5afd9402df415aa9f120eb9e8e89b80526ec71295a634ca249542b8ca0bc1164238fe3ced5fc1d20dbaf390dcd2fb019ac2bb822c095335a0bb8a4ba90e9c369ae29b96d741eaf4cee024e1cf9d217c91d497b69fef5850e363d8acf16cee311807f0bacaf6d6d28b608a867acc5465aff39a4bc9f39588c3c47ed974dc0c2e761a0ddd8d259051ddbdca8f24438043ad088de9baab4de053b8cb07b68784fc1621b439001f77297cae38d5d0bed901bfdd494b601d920f97eb474b250bf311b4f7db9ec514d4ba169ca341745dc499684af4623ff1663c7ff100468b4f24e9dc07ef06a246b0640f8705aee6d58e53e986a4aebece174a8f49c5ccd32cead73d883ba62d8bbb596d1b8f8c74d7fedc4ff9a3f499018ba255e3767514ae8fe9b30950146624e457ea4902956ab81ef86e184f3f13587f8b6601b783c0a59e25f498dfff2f7ca3e0d40715b9915617096ea74bd0093615050d736c25e96c586f73dc9c16f08e964b6a8f76f46608dffdb48735f8de3cc2e3d6812abdc6abe87f55b99c849fd699847bfea92615f1d5f790d4300392be87d7a226ca1b977c95c580695fbe30c196caa1190398a13d3a1024f6e32a287d115ccd5b1972fbdf25d0a4e92a4face08c2124d47ae5298795b7848630d60971994e314133bc4423b293c8c289e610db6aeaf6929665adbc387f126511db8ae9c079b3b09dbb820dd2a961dbeb7233bbf4a720ad0cb098afea735ce487d1eee11d2e17f44fa3366414d0654844a3f9e1c49099370bcc546f135ad9919f146f8630c898ba37b8c34ff7da771ca4ca14b5db7261474277475336ae8a7d150f4805db65935c25782eacf8ecb937f779c42ee0a4270c2d550e74fcbace3aff21cd2548bae0bd483100371f1236b2c42348900ed0aeca21f780b1bd8342013bb88de31c4a30064a5224b23860da3c7b17458da356b7c71889a8c8f927aa282fefad99228a2e89c604f59f7e522825b1be20ff5f9ccd57d1944f5044c5c44f34e44332794fe5a3adffb125b61bc19253bdfb99c376fc0bc0680fc4776f9c46bc34815ebbbe93b19a5ced22a84ea0d69e21eb02133d27fc867e6a5b1f8276bb275b8fd5cb8c9277f831bc9bb19f6b28735ce6b3ab23cabb35c3f0fafd7d1b59ba84a5501e4481a98d970b7948ff62c898416b1fea304f9e592e9e4193e1612bbb53982bf06abc270425a4323a7426b613429b036f388112d8aa402d7948d66d3c807b5fc136979d8142039e6eafc42e5f5556b18d3303f342a2e91f3f8d3a75e1d77bb81b74e2665df2ad2ee7b21c22006b3531d3e05155cfdbb83bbb9718260c844d5a92b0ca23fcf1f601286d04364f106e43e48d09a58e3c0dd58d22e96e1e8feaf3d3262de805984027df9a8f50d3c4cadcc6e54e9ec9c3f1972d56f001a5f66c8371659dc61757e49599f7c8fc04fd0628196cd7a74a4b8a2742dd4593f0c69f0c6ed088416f825d903bc46b90fad44c0bf6e0610d5d21b9425346159c0e8cce7ff1dc64fe7779e7a38eb64fa54fdb50004b14d7180f2b4343f86b647494233b2b999de0ed49eb2c60eaf5cd5c9dff1f9cc32107c8d7acd58ea59758be87f223a831873cc0b60f0e54fdde912b0126624fe06a6da369d5a126e948416332bedb877a15ed4bbc05e2e0f9b699df4ff68d472a8cbc24eda555e3cd723f3121586110a7673c86cdfe88a11874cf0fafc0a33e0eb9bce7790b76e2cbf697f3680c45b6fec54a51d68e732ce7c3d5ad81572fe9c481f05fdf9659fdab21abbb1951b7d726f6fb88e0ee862a07f7837b18fb741fda393ca64fc010ddbd341fe8dba28628a247f6adac4", 0x1000}, {&(0x7f00000005c0)="97af2f74221b5fe992c3869e5aed29265f01390854e06b55bec841efd1e577f6e24e87959fa2691f6fdd82566874e5f032b0cfbd9c13a1bceeec67174ec5deb92a93202a68f254e58b19a775bb4464bf351a0f4b82dd4db2955990ffa8438871e00cfdc1b6eb5cedbfc427284b70a0bd219385bbfb67680946213eb3a755efa164c00d9a49ddeb", 0x87}, {&(0x7f00000026c0)="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", 0xa24}], 0x8}, 0x0) 23:05:51 executing program 5: socketpair(0x10, 0x0, 0x2, &(0x7f0000001bc0)) 23:05:51 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:51 executing program 5: r0 = perf_event_open$cgroup(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x2401, 0x0) 23:05:51 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002680)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000001540)=""/248, 0xf8}], 0x1}, 0x0) recvmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$inet(r0, &(0x7f0000001500)={0x0, 0x0, 0x0}, 0x0) 23:05:51 executing program 2: perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x78, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:05:51 executing program 3: r0 = perf_event_open$cgroup(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x80082407, 0x0) 23:05:51 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:51 executing program 3: perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x78, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:05:51 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x3}}, @enum]}}, &(0x7f0000001380)=""/167, 0x3e, 0xa7, 0x1}, 0x20) 23:05:51 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x3, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_tracing={0x1a, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x80) 23:05:51 executing program 2: perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x78, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:05:51 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001300)={0xffffffffffffffff}) write$cgroup_pressure(r0, 0x0, 0x0) 23:05:51 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000001840)={'virt_wifi0\x00', 0x2}) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) 23:05:51 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:51 executing program 2: perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x78, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:05:52 executing program 0: r0 = perf_event_open$cgroup(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r1, r0, 0x0, 0x0, 0x0}, 0x30) 23:05:52 executing program 5: r0 = perf_event_open$cgroup(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2403, 0x8000000000000001) 23:05:52 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000002680)={0x0, 0x0, 0x0}, 0x0) sendmsg$sock(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f00000000c0)="5de9ba409377365d02dd3e20a97b120b95368479eda627266a54ef56569da4929278fb1f6557328e2f72fbbdbece30a5b812fb73d335742192723e707d24963cbfe5dbd90036f8488d0f69530b3a7ef24a6e90c120e6884f54c275b96882b2571731a279d201c6a0566518af3106b0587e3a43275a31b0ac23ef0360bbf0f49221697d1116b0aa32a1c76dbb9f83ad89380220e06fab0c6dc47face0784199c79944f8a971e47450daf8337486eef2d25a9ff6359bb054ff59296be1880dd3ada31ef2aa033479f9f1bfa2c8e88d59e5d2ffcd56bb658f880200", 0xda}, {&(0x7f0000000ac0)="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", 0x10d}, {&(0x7f00000001c0)="d129bf4e07cc0424fcc2ce7eae10f69d1924241c67ffd9aff5a163068cceb9d85a9e618931aa50e1094b1478e902c2fb7c2e4f63030753cf3c5660e9dcd1d7ccd74369682dbf183360f7b8f3b129d20e23d162d3825f881996fcb3d0d42cead32361f996b7ecdaa6b526153b8d38bf141d2d4e4d17d8b4c7d37b28ea091e5dcc", 0x80}, {&(0x7f0000000980)="5a74868b730021d2010160f33aeaa698139a063ea877fbc0ce9488c2dd0c9d809532a7f12655e67110f10175b3a78c3db94bad44a0e066a95b7ec4a0f68f8905aaf2e3c99e2875f92571bca3ea3cf5085e7c71e3dc9f60f60f2c0526829033f806eb333dc3716007dcddf749d8f4669b838ab842979b4a7606c0ae109c02d8b9b43f0934c5389b207761f9f25a9a9fbdb94fbf0199ec02595af4b8b541920dd1e7b7f0f103e4d230cb84a53dba629c50f5714d0477140c4cdfe97275e4279d5ae2d90e2bc5d79c46dc752d043bde7fd19ea646b6ba3633e1f0d4473699f05794e411278bfd27cafb0c963341d1dc378b46ace8c289c47effa77ff9e0752f5afa4121879a", 0x104}, {&(0x7f00000008c0)="fb92b73439fb70966f6b9576589639cb055d80a0b6f42e0fe771030d01beb573c9f14e4e568bc7b1e0fdfdf9c7c73b1f5ff1245ea20eb26d6a701687ec55e1902f92c22014e149dbf35adb4ddb194067da8f2b5f56145b868d1263b0919988f4c7cf38ff595dbfe082b1710e689ee4ca997bdf70e6800b978a3a766c5edc42f1698003da3b2f7f851f9f5e97fab0dd12b84791b43d40ea", 0x97}, {&(0x7f0000001640)="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", 0x101b}, {&(0x7f0000000680)="97af2f74221b5fe992c3869e5aed29265f01398854e06b55bec841efd1e577f6e24e87959fa2691f6fdd82566874e5f032b0cfbd9c13a1bceeec67174ec5deb92a93202a68f254e58b1a0f4b82dd4db2955990ffa8438871e00cfdc1b6eb5cedbfc427284b70a0bd210900000067680946213eb3a755efa164c00d9a49ddeb0000000000000000", 0x87}, {&(0x7f00000026c0)="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", 0x9dd}], 0x8}, 0x0) 23:05:52 executing program 3: perf_event_open$cgroup(&(0x7f0000000240)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbc43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4080, 0x1000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:05:52 executing program 4: perf_event_open$cgroup(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x186a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:05:52 executing program 2: perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x78, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:05:52 executing program 4: perf_event_open$cgroup(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:05:52 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f00000000c0)=@nfc, 0x80, &(0x7f0000000140), 0x39}, 0x0) 23:05:52 executing program 5: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002680)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000001540)=""/248, 0xf8}], 0x1}, 0x0) recvmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000000480)=""/4096, 0x1000}, {0x0}, {0x0}], 0x3}, 0x0) sendmsg$inet(r0, &(0x7f0000001500)={0x0, 0x0, 0x0}, 0x0) 23:05:52 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x8, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x22}, 0x10) 23:05:52 executing program 2: socketpair(0xf, 0x0, 0x0, &(0x7f0000000280)) 23:05:52 executing program 3: socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000000), 0x6e, 0x0, 0x0, &(0x7f0000000640)=[@cred={{0x1c}}], 0x20}, 0x2040) r0 = perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x78, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r0) 23:05:52 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x78, 0xef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:05:52 executing program 4: perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x78, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:05:52 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000880)={&(0x7f0000000640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x4, [@struct={0x3, 0x1, 0x0, 0x3, 0x0, 0x0, [{}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000780)=""/197, 0x34, 0xc5, 0x1}, 0x20) 23:05:52 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000002680)={&(0x7f0000000140)=@nfc, 0x80, &(0x7f0000000080)=[{&(0x7f0000000300)=""/244, 0xbb657355}, {0x0}, {&(0x7f00000026c0)=""/4106}, {&(0x7f0000000040)=""/2}], 0x2, &(0x7f0000000000)=""/59, 0x34}, 0x0) 23:05:52 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000001640), 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000001680)={[{0x2b, 'hugetlb'}]}, 0x9) 23:05:52 executing program 0: perf_event_open$cgroup(&(0x7f0000000240)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:05:52 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000880)={&(0x7f0000000640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@struct={0x3}]}, {0x0, [0x0, 0x0, 0x5f, 0x25]}}, &(0x7f0000000780)=""/197, 0x2a, 0xc5, 0x1}, 0x20) 23:05:52 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x8, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000100)=[0x0], 0x0, 0x8, &(0x7f0000000140)=[{}], 0x8, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) 23:05:53 executing program 5: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) write$cgroup_subtree(r0, 0x0, 0x0) 23:05:53 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x8, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 23:05:53 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000000)={&(0x7f0000000240)=@nfc, 0xdf, &(0x7f0000000080)=[{&(0x7f0000001540)=""/245, 0xf8}, {0x0}, {&(0x7f0000000040)}], 0x2, &(0x7f0000002640)=""/33, 0x22}, 0x0) 23:05:53 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x2, &(0x7f0000000000)=@raw=[@cb_func], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x16, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:53 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x3}}, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xc}]}]}}, &(0x7f0000001380)=""/167, 0x46, 0xa7, 0x1}, 0x20) 23:05:53 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x3}}, @enum={0x0, 0x0, 0x0, 0x10}]}}, &(0x7f0000001380)=""/167, 0x3e, 0xa7, 0x1}, 0x20) 23:05:53 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0xd}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:05:53 executing program 2: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0xd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:05:53 executing program 4: r0 = perf_event_open$cgroup(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x2405, 0x0) 23:05:53 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x8, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={r0}, 0x10) 23:05:53 executing program 1: r0 = perf_event_open$cgroup(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x5) 23:05:53 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) unlink(&(0x7f0000000040)='./file0\x00') 23:05:53 executing program 4: syz_clone(0x32208180, 0x0, 0x0, 0x0, 0x0, 0x0) 23:05:53 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000002700)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000003680)={0x0, 0x0, 0x0}, 0x0) 23:05:54 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000b40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x4}]}}, &(0x7f0000000bc0)=""/254, 0x26, 0xfe, 0x1}, 0x20) 23:05:54 executing program 0: sendmsg(0xffffffffffffffff, &(0x7f0000007840)={0x0, 0x0, 0x0}, 0x0) 23:05:54 executing program 1: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x421, 0x0, 0x4250a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:05:54 executing program 2: perf_event_open$cgroup(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x31}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:05:54 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000b40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x9, 0x0, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000bc0)=""/254, 0x36, 0xfe, 0x1}, 0x20) 23:05:54 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000000c0), 0x7ffff000}, {&(0x7f0000000100)="048198f30cb2792498ab18db4405a49d11ea5d3c922e5d3a29504c42e8c9166b80b5aef126244682143dd2f1cbfb6b2226438fbfab927d8711b11e932f652b918e9e678c597b9171f7d1f674794f95c883b94b55d6c1ca7b383c5bcfabe3171d102150ad2b3f6761b163e6e230ff700f7f8fa681962d0484a4bc727aa6968f15634c6206f84d47990c1f6706f68c791babed3162fe21680fa187f82c408fdbf60a6eb9eecaca36ce72e0be57fbe7b918cabebb4417676ad5661878b4a9cfd4f26526f8688a3ec4c35f340334b66958", 0xcf}, {&(0x7f0000000200)="93b509d2de12bd1b983513174a90f7f6fbfd06f0ce0a90430b80547651d8004648efa60856bed73f89c45a7ce8c1a3c9d9d896d1dfc95a5d67b27a378ef39b5fbded3430b6c3081c491690e24fbd374eaec2d6003a1585ab8f8b4d0591f46e45c7c426893344bb80878e5f6dbd6c23c753d60341905751fff963a7cd393b2f42c245b361fa709dfb95ca907b803f126224702bd21523a22eb84e8e994df0a61a69e4967f415114685fc3f447fc7c3efbf4959841faee7055945a9a083cc2b165b412269d8e8691f911299e667109f8fe469d576406f580", 0xd7}, {&(0x7f0000000300)="7c28a56f743c2f6d748ed6fd733a1854c63a43e3d639f0edadc7e34cdb287543419007f3ae022ea8873d5fb512e25a319326707588cd62ad4869232ba2ff54f1d68d657feb0d661e98c7db2c53d71c228c5a095614084f563ed1902414a3a8d6b97d3c1df5ff00c1c857e9f1a35419b85671eb2e509117066b627b34c779443983a044b97937c5721092ee83225a14e0dd3aa80973ddfb1f3ecf74f379a4d4c30ef2a1d5150f4196662116786872a8fa27ed9d3dbc", 0xb5}, {&(0x7f00000003c0)="f82d85921cb6d7dad0341992296f9eb79e880c3f73ef71a018a504cea5550c8f08dd02558ee75a2bbe606922c0cdba9f2815c80b9f8fe8c3bfc69acb6118f20d8eb70e8557876d8b79342ff5c343531d5e22df3f32dc2f2a999346b590c5e95aacdbf08760591c4854364ac2737dba861ab24b88084ea21bdad1a66a3f110926f5cfd66cd47ae950bd0c411b63b93061ceb178c4b39a2b9581b28470eea5fb30e9cf964d0c112e18094672d415d04c66bda9a6f63c8d5751a58d6fa143ed688bff8d1a4925a688cf21af53eb06e4", 0xce}, {&(0x7f0000000680)="497539505faf5750cd303bb07435cb63de9d7fc72ddb69572f12a84fbccca228948e4b3202692e3ff6b3449eeee8d76845eb70d5cf252331b6e1399c7ab46affaef08eaf66cd67bc20f250e0d83275b7d99e91ea037abea5a99a72136c1a32193c21bdd61575b9987bcc8dea13a4bde1b86c1a0b99f29091f801c90e235ea56e8828ac81ed52fd07fa734157e7b47fef7446816eeb2abec3e683edd0faa980daed2c04efc01c119051b288bd671353c814a0bcdd9da83d24169457d0f4232fc383556865e6a488b72e163919a95788c5d5a6f9243250a8be", 0xd8}], 0x6, &(0x7f0000000780), 0x48}, 0x0) 23:05:54 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f00000003c0)=""/145, 0x26, 0x91, 0x1}, 0x20) 23:05:54 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000480), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0xc0189436, &(0x7f00000004c0)={'macvlan1\x00'}) 23:05:54 executing program 2: socketpair$unix(0x10, 0x3, 0x14, &(0x7f0000000000)) 23:05:54 executing program 0: bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000100)={0x0, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=r0, 0x4) 23:05:54 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000001ec0)={0x0, 0x0, &(0x7f0000001e00)=[{&(0x7f0000001cc0)=""/128, 0x80}, {&(0x7f0000001d40)=""/171, 0xab}], 0x2}, 0x0) sendmsg$sock(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000040)='0', 0x1}], 0x1}, 0x0) 23:05:54 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_freezer_state(r0, 0x0, 0x4ffe0) 23:05:54 executing program 1: bpf$BPF_BTF_LOAD(0x15, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 23:05:54 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000640)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x0, 0x2}]}}, &(0x7f0000000540)=""/245, 0x26, 0xf5, 0x1}, 0x20) 23:05:54 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000940)=ANY=[], 0xda00) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x23000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0xe7) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) [ 193.997060][ T1237] ieee802154 phy0 wpan0: encryption failed: -22 [ 193.997107][ T1237] ieee802154 phy1 wpan1: encryption failed: -22 23:05:54 executing program 0: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0xd3, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:05:54 executing program 3: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0xd3, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:05:54 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000002a40)={0x0, 0x0, &(0x7f0000002980)=[{0x0}, {0x0}, {&(0x7f0000000940)=""/4096, 0x1000}], 0x3}, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000100)="04", 0x1}], 0x1}, 0x0) 23:05:54 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000b40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x8, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x7, 0x1}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000bc0)=""/254, 0x34, 0xfe, 0x1}, 0x20) 23:05:54 executing program 2: syz_clone(0x88048080, 0x0, 0x0, 0x0, 0x0, 0x0) 23:05:54 executing program 3: socketpair$unix(0x10, 0x3, 0xc, &(0x7f0000000000)) 23:05:54 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4}]}}, &(0x7f0000000280)=""/257, 0x2a, 0x101, 0x1}, 0x20) 23:05:54 executing program 5: socketpair$unix(0x10, 0x3, 0x18d, &(0x7f0000000000)) 23:05:54 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000480), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5452, &(0x7f00000004c0)={'macvlan1\x00'}) 23:05:54 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r1, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) close(r0) 23:05:54 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000b40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x0, [], 0x7a}}, &(0x7f0000000bc0)=""/254, 0x1a, 0xfe, 0x1}, 0x20) 23:05:54 executing program 2: socketpair$unix(0x10, 0x3, 0x10, &(0x7f0000000000)) 23:05:54 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000480), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'macvlan1\x00', 0x7}) 23:05:54 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000480), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x2, &(0x7f00000004c0)={'macvlan1\x00'}) 23:05:54 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000b40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0x4, 0x0, [{}]}]}}, &(0x7f0000000bc0)=""/254, 0x2e, 0xfe, 0x1}, 0x20) 23:05:54 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x1, 0x80, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x61ac0000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:05:54 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000b40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0xc}, {}]}]}}, &(0x7f0000000bc0)=""/254, 0x36, 0xfe, 0x1}, 0x20) 23:05:54 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000640)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f0000000540)=""/245, 0x26, 0xf5, 0x1}, 0x20) 23:05:54 executing program 5: perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0xd3, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:05:54 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000840)={&(0x7f0000000700)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000000780)=""/141, 0x32, 0x8d, 0x1}, 0x20) 23:05:54 executing program 1: bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={0xffffffffffffffff, 0x11, 0x1, 0x0, 0x0}, 0x20) 23:05:54 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x16, 0x3, 0x0, 0x2}, 0x48) 23:05:54 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000b40)={{0xeb9f, 0xd, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000bc0)=""/254, 0x1a, 0xfe, 0x1}, 0x20) 23:05:54 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000480), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5421, &(0x7f00000004c0)={'macvlan1\x00'}) 23:05:54 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000640)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x2, [@enum={0x0, 0x1, 0x2, 0x6, 0x4, [{0xd, 0x3f}]}, @func={0x8, 0x0, 0x0, 0xc, 0x5}, @restrict={0x5, 0x0, 0x0, 0xb, 0x2}]}}, &(0x7f0000000000)=""/249, 0x46, 0xf9, 0x1}, 0x20) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_devices(r0, &(0x7f0000000300)='devices.deny\x00', 0x2, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r1, &(0x7f0000000240)='syz1\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_devices(r2, &(0x7f0000000300)='devices.deny\x00', 0x2, 0x0) openat$cgroup_int(r2, &(0x7f0000000280)='io.bfq.weight\x00', 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000001c0)={r0, 0x24, 0x0, 0x800, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], 0x4}, 0x20) 23:05:54 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x108}, 0x0) write$cgroup_freezer_state(r0, 0x0, 0x3e80) 23:05:54 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000480), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'macvlan1\x00'}) 23:05:55 executing program 4: perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:05:55 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000b40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@volatile]}}, &(0x7f0000000bc0)=""/254, 0x26, 0xfe, 0x1}, 0x20) 23:05:55 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000b40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1e, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000bc0)=""/254, 0x36, 0xfe, 0x1}, 0x20) 23:05:55 executing program 3: perf_event_open$cgroup(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x61ac0000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:05:55 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000600)=[{0x0}, {&(0x7f0000000840)=""/4096, 0x1000}], 0x2}, 0x0) sendmsg(r1, &(0x7f0000002140)={0x0, 0x0, &(0x7f00000020c0)=[{&(0x7f0000001d00)="c4", 0x1}], 0x1}, 0x0) 23:05:55 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x16, 0x0, 0x1f00, 0x2}, 0x48) 23:05:55 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000b40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x10}]}}, &(0x7f0000000bc0)=""/254, 0x26, 0xfe, 0x1}, 0x20) 23:05:55 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000840)={&(0x7f0000000700)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@struct={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e]}}, &(0x7f0000000780)=""/141, 0x2d, 0x8d, 0x1}, 0x20) 23:05:55 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x8, [@var={0x3}]}, {0x0, [0x0, 0x0, 0x2e, 0x5f, 0x2e, 0x30]}}, &(0x7f0000000080)=""/187, 0x30, 0xbb, 0x1}, 0x20) 23:05:55 executing program 0: bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000100)={0x0, 0x0}, 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000002c0)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x80) 23:05:55 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000680)={0x0, 0x0, 0x0}, 0x0) recvmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x47, &(0x7f0000000f00)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0, 0xff21}], 0x9}, 0x0) 23:05:55 executing program 5: unlink(&(0x7f0000000380)='./file0/file0\x00') 23:05:55 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_devices(r0, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.allow\x00', 0x2, 0x0) 23:05:55 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000034c0)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=[{0x10, 0x1, 0x1}], 0x10}, 0x0) 23:05:55 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000b40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@const]}}, &(0x7f0000000000)=""/254, 0x36, 0x129, 0x1}, 0x20) 23:05:55 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) write$cgroup_type(r0, &(0x7f0000000040), 0x9) 23:05:55 executing program 4: socketpair(0x2c, 0x3, 0x5, &(0x7f0000000040)) 23:05:55 executing program 3: bpf$MAP_CREATE(0x7100000000000000, &(0x7f0000001600)=@base={0x5, 0x3, 0x4006, 0x104}, 0x48) 23:05:55 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x14, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='mm_vmscan_node_reclaim_begin\x00', r0}, 0x10) 23:05:55 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000001c0)=@framed={{}, [@generic={0xce}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:05:55 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (fail_nth: 1) 23:05:56 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0400005500810ce00f80ecdb4cb9f207c804a011000000020006fb0a0002000a0ada1b40d805001100c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) (fail_nth: 1) [ 195.667625][ T7955] FAULT_INJECTION: forcing a failure. [ 195.667625][ T7955] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 195.667659][ T7955] CPU: 0 PID: 7955 Comm: syz-executor.5 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 195.667687][ T7955] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 195.667701][ T7955] Call Trace: [ 195.667707][ T7955] [ 195.667716][ T7955] dump_stack_lvl+0xcd/0x134 [ 195.667766][ T7955] should_fail.cold+0x5/0xa [ 195.667802][ T7955] _copy_from_user+0x2a/0x170 [ 195.667831][ T7955] __sys_bpf+0x335/0x5700 [ 195.667865][ T7955] ? bpf_perf_link_attach+0x520/0x520 [ 195.667895][ T7955] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 195.667939][ T7955] ? find_held_lock+0x2d/0x110 [ 195.668001][ T7955] ? trace_hardirqs_on+0x38/0x1c0 [ 195.668032][ T7955] __x64_sys_bpf+0x75/0xb0 [ 195.668061][ T7955] ? syscall_enter_from_user_mode+0x21/0x70 [ 195.668096][ T7955] do_syscall_64+0x35/0xb0 [ 195.668123][ T7955] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 195.668148][ T7955] RIP: 0033:0x7f2e16289109 [ 195.668168][ T7955] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 195.668193][ T7955] RSP: 002b:00007f2e1731f168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 195.668217][ T7955] RAX: ffffffffffffffda RBX: 00007f2e1639bf60 RCX: 00007f2e16289109 [ 195.668233][ T7955] RDX: 0000000000000080 RSI: 00000000200001c0 RDI: 0000000000000005 [ 195.668248][ T7955] RBP: 00007f2e1731f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 195.668266][ T7955] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 195.668281][ T7955] R13: 00007ffde7446a9f R14: 00007f2e1731f300 R15: 0000000000022000 [ 195.668315][ T7955] [ 195.771797][ T7960] FAULT_INJECTION: forcing a failure. [ 195.771797][ T7960] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 195.771833][ T7960] CPU: 0 PID: 7960 Comm: syz-executor.4 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 195.771860][ T7960] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 195.771873][ T7960] Call Trace: [ 195.771880][ T7960] [ 195.771888][ T7960] dump_stack_lvl+0xcd/0x134 [ 195.771919][ T7960] should_fail.cold+0x5/0xa [ 195.771961][ T7960] _copy_from_user+0x2a/0x170 [ 195.771991][ T7960] __copy_msghdr_from_user+0x91/0x4b0 [ 195.772020][ T7960] ? __ia32_sys_shutdown+0x70/0x70 [ 195.772053][ T7960] ? __lock_acquire+0xbca/0x56c0 [ 195.772092][ T7960] sendmsg_copy_msghdr+0xa1/0x160 [ 195.772118][ T7960] ? do_recvmmsg+0x6d0/0x6d0 [ 195.772141][ T7960] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 195.772175][ T7960] ? _parse_integer+0x30/0x30 [ 195.772211][ T7960] ___sys_sendmsg+0xc6/0x170 [ 195.772236][ T7960] ? sendmsg_copy_msghdr+0x160/0x160 [ 195.772264][ T7960] ? __fget_files+0x264/0x470 [ 195.772289][ T7960] ? lock_downgrade+0x6e0/0x6e0 [ 195.772331][ T7960] ? __fget_files+0x286/0x470 [ 195.772365][ T7960] ? __fget_light+0xea/0x270 [ 195.772391][ T7960] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 195.772424][ T7960] __x64_sys_sendmsg+0x132/0x220 [ 195.772448][ T7960] ? __sys_sendmsg+0x1b0/0x1b0 [ 195.772487][ T7960] ? syscall_enter_from_user_mode+0x21/0x70 [ 195.772526][ T7960] do_syscall_64+0x35/0xb0 [ 195.772552][ T7960] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 195.772577][ T7960] RIP: 0033:0x7f7765489109 [ 195.772596][ T7960] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 195.772620][ T7960] RSP: 002b:00007f7766559168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 195.772643][ T7960] RAX: ffffffffffffffda RBX: 00007f776559bf60 RCX: 00007f7765489109 [ 195.772660][ T7960] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 195.772674][ T7960] RBP: 00007f77665591d0 R08: 0000000000000000 R09: 0000000000000000 [ 195.772689][ T7960] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 195.772703][ T7960] R13: 00007ffec1cb653f R14: 00007f7766559300 R15: 0000000000022000 [ 195.772736][ T7960] 23:05:56 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='blkio.bfq.io_wait_time_recursive\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup(r0, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x11, 0x0, 0x0, &(0x7f0000000140)='GPL\x00', 0x2dedde1c, 0x0, &(0x7f00000001c0), 0x40f00, 0xe, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) openat$cgroup_ro(r1, &(0x7f0000001340)='cgroup.events\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000001300)='pids.current\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f00000013c0)='cpuacct.usage_sys\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000300)=0x8, 0xfffffffffffffdba) openat$cgroup(r2, &(0x7f00000001c0)='syz1\x00', 0x200002, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000078000000000000000000000ac0000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, r1, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r3}, 0x10) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0x8, 0xed}, 0x48) 23:05:56 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000000180081064e81f782db4cb904021d080004007c03e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) (fail_nth: 1) 23:05:56 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (fail_nth: 2) 23:05:56 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000000180081064e81f782db4cb9040a1d080004007c09e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) (fail_nth: 1) 23:05:56 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002c000505d25a80308c63940d0c35fc60100006400a13400b053582c137153e37080c188004ac0f00d1bd", 0x33fe0}], 0x1}, 0x0) (fail_nth: 1) 23:05:56 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0400005500810ce00f80ecdb4cb9f207c804a011000000020006fb0a0002000a0ada1b40d805001100c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) (fail_nth: 2) [ 196.453892][ T7966] FAULT_INJECTION: forcing a failure. [ 196.453892][ T7966] name fail_usercopy, interval 1, probability 0, space 0, times 0 23:05:56 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000000180081064e81f782db4cb9040a1d080004007c09e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) (fail_nth: 2) 23:05:56 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002c000505d25a80308c63940d0c35fc60100006400a13400b053582c137153e37080c188004ac0f00d1bd", 0x33fe0}], 0x1}, 0x0) (fail_nth: 2) [ 196.453926][ T7966] CPU: 1 PID: 7966 Comm: syz-executor.0 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 23:05:56 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (fail_nth: 3) 23:05:56 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0400005500810ce00f80ecdb4cb9f207c804a011000000020006fb0a0002000a0ada1b40d805001100c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) (fail_nth: 3) 23:05:56 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000000180081064e81f782db4cb904021d080004007c03e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) (fail_nth: 2) [ 196.453954][ T7966] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 23:05:57 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002c000505d25a80308c63940d0c35fc60100006400a13400b053582c137153e37080c188004ac0f00d1bd", 0x33fe0}], 0x1}, 0x0) (fail_nth: 3) [ 196.453968][ T7966] Call Trace: [ 196.453975][ T7966] 23:05:57 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000000180081064e81f782db4cb9040a1d080004007c09e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) (fail_nth: 3) 23:05:57 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0400005500810ce00f80ecdb4cb9f207c804a011000000020006fb0a0002000a0ada1b40d805001100c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) (fail_nth: 4) 23:05:57 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='blkio.bfq.io_wait_time_recursive\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup(r0, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x11, 0x0, 0x0, &(0x7f0000000140)='GPL\x00', 0x2dedde1c, 0x0, &(0x7f00000001c0), 0x40f00, 0xe, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) openat$cgroup_ro(r1, &(0x7f0000001340)='cgroup.events\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000001300)='pids.current\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f00000013c0)='cpuacct.usage_sys\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000300)=0x8, 0xfffffffffffffdba) openat$cgroup(r2, &(0x7f00000001c0)='syz1\x00', 0x200002, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000078000000000000000000000ac0000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, r1, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r3}, 0x10) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0x8, 0xed}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async) openat$cgroup_ro(r0, &(0x7f0000000040)='blkio.bfq.io_wait_time_recursive\x00', 0x0, 0x0) (async) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) (async) openat$cgroup(r0, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x11, 0x0, 0x0, &(0x7f0000000140)='GPL\x00', 0x2dedde1c, 0x0, &(0x7f00000001c0), 0x40f00, 0xe, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) (async) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) (async) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) (async) openat$cgroup_ro(r1, &(0x7f0000001340)='cgroup.events\x00', 0x0, 0x0) (async) openat$cgroup_ro(r1, &(0x7f0000001300)='pids.current\x00', 0x0, 0x0) (async) openat$cgroup_ro(r1, &(0x7f00000013c0)='cpuacct.usage_sys\x00', 0x0, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) (async) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000300)=0x8, 0xfffffffffffffdba) (async) openat$cgroup(r2, &(0x7f00000001c0)='syz1\x00', 0x200002, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000078000000000000000000000ac0000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, r1, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r3}, 0x10) (async) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0x8, 0xed}, 0x48) (async) 23:05:57 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (fail_nth: 4) 23:05:57 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000000180081064e81f782db4cb904021d080004007c03e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) (fail_nth: 3) [ 196.453984][ T7966] dump_stack_lvl+0xcd/0x134 [ 196.454015][ T7966] should_fail.cold+0x5/0xa 23:05:57 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000000180081064e81f782db4cb9040a1d080004007c09e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) (fail_nth: 4) 23:05:57 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002c000505d25a80308c63940d0c35fc60100006400a13400b053582c137153e37080c188004ac0f00d1bd", 0x33fe0}], 0x1}, 0x0) (fail_nth: 4) [ 196.454050][ T7966] _copy_from_user+0x2a/0x170 [ 196.454080][ T7966] __copy_msghdr_from_user+0x91/0x4b0 [ 196.454110][ T7966] ? __ia32_sys_shutdown+0x70/0x70 23:05:57 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (fail_nth: 5) 23:05:57 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0400005500810ce00f80ecdb4cb9f207c804a011000000020006fb0a0002000a0ada1b40d805001100c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) (fail_nth: 5) [ 196.454142][ T7966] ? __lock_acquire+0xbca/0x56c0 [ 196.454180][ T7966] sendmsg_copy_msghdr+0xa1/0x160 23:05:57 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000000180081064e81f782db4cb904021d080004007c03e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) (fail_nth: 4) 23:05:57 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002c000505d25a80308c63940d0c35fc60100006400a13400b053582c137153e37080c188004ac0f00d1bd", 0x33fe0}], 0x1}, 0x0) (fail_nth: 5) [ 196.454205][ T7966] ? do_recvmmsg+0x6d0/0x6d0 [ 196.454229][ T7966] ? lockdep_hardirqs_on_prepare+0x400/0x400 23:05:57 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000000180081064e81f782db4cb9040a1d080004007c09e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) (fail_nth: 5) 23:05:57 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='blkio.bfq.io_wait_time_recursive\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup(r0, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x11, 0x0, 0x0, &(0x7f0000000140)='GPL\x00', 0x2dedde1c, 0x0, &(0x7f00000001c0), 0x40f00, 0xe, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) openat$cgroup_ro(r1, &(0x7f0000001340)='cgroup.events\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000001300)='pids.current\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f00000013c0)='cpuacct.usage_sys\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000300)=0x8, 0xfffffffffffffdba) openat$cgroup(r2, &(0x7f00000001c0)='syz1\x00', 0x200002, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000078000000000000000000000ac0000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, r1, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r3}, 0x10) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0x8, 0xed}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async) openat$cgroup_ro(r0, &(0x7f0000000040)='blkio.bfq.io_wait_time_recursive\x00', 0x0, 0x0) (async) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) (async) openat$cgroup(r0, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x11, 0x0, 0x0, &(0x7f0000000140)='GPL\x00', 0x2dedde1c, 0x0, &(0x7f00000001c0), 0x40f00, 0xe, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) (async) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) (async) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) (async) openat$cgroup_ro(r1, &(0x7f0000001340)='cgroup.events\x00', 0x0, 0x0) (async) openat$cgroup_ro(r1, &(0x7f0000001300)='pids.current\x00', 0x0, 0x0) (async) openat$cgroup_ro(r1, &(0x7f00000013c0)='cpuacct.usage_sys\x00', 0x0, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) (async) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000300)=0x8, 0xfffffffffffffdba) (async) openat$cgroup(r2, &(0x7f00000001c0)='syz1\x00', 0x200002, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000078000000000000000000000ac0000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, r1, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r3}, 0x10) (async) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0x8, 0xed}, 0x48) (async) [ 196.454262][ T7966] ? _parse_integer+0x30/0x30 [ 196.454298][ T7966] ___sys_sendmsg+0xc6/0x170 [ 196.454324][ T7966] ? sendmsg_copy_msghdr+0x160/0x160 23:05:57 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0400005500810ce00f80ecdb4cb9f207c804a011000000020006fb0a0002000a0ada1b40d805001100c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) (fail_nth: 6) 23:05:57 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000000180081064e81f782db4cb904021d080004007c03e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) (fail_nth: 5) 23:05:57 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (fail_nth: 6) [ 196.454352][ T7966] ? __fget_files+0x264/0x470 [ 196.454396][ T7966] ? lock_downgrade+0x6e0/0x6e0 [ 196.454440][ T7966] ? __fget_files+0x286/0x470 23:05:57 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002c000505d25a80308c63940d0c35fc60100006400a13400b053582c137153e37080c188004ac0f00d1bd", 0x33fe0}], 0x1}, 0x0) (fail_nth: 6) 23:05:57 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000000180081064e81f782db4cb9040a1d080004007c09e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) (fail_nth: 6) [ 196.454482][ T7966] ? __fget_light+0xea/0x270 [ 196.454509][ T7966] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 196.454541][ T7966] __x64_sys_sendmsg+0x132/0x220 23:05:57 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000000180081064e81f782db4cb904021d080004007c03e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) (fail_nth: 6) 23:05:57 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0400005500810ce00f80ecdb4cb9f207c804a011000000020006fb0a0002000a0ada1b40d805001100c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) (fail_nth: 7) [ 196.454565][ T7966] ? __sys_sendmsg+0x1b0/0x1b0 [ 196.454602][ T7966] ? syscall_enter_from_user_mode+0x21/0x70 [ 196.454639][ T7966] do_syscall_64+0x35/0xb0 23:05:57 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002c000505d25a80308c63940d0c35fc60100006400a13400b053582c137153e37080c188004ac0f00d1bd", 0x33fe0}], 0x1}, 0x0) (fail_nth: 7) 23:05:57 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000000180081064e81f782db4cb9040a1d080004007c09e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) (fail_nth: 7) 23:05:57 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (fail_nth: 7) [ 196.454665][ T7966] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 196.454691][ T7966] RIP: 0033:0x7fd77c489109 23:05:57 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0400005500810ce00f80ecdb4cb9f207c804a011000000020006fb0a0002000a0ada1b40d805001100c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) (fail_nth: 8) 23:05:57 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) perf_event_open(&(0x7f0000000d00)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x552d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge_slave_0\x00', 0x1}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8937, &(0x7f0000000080)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x5450, 0x0) r2 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x9, 0x0, 0x4, 0x6, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x200, 0x80000001}, 0x10000, 0xc202, 0x8, 0x4, 0x80, 0x88, 0x0, 0x0, 0x80000001, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x37, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0xd72d, 0x5}, 0x1200, 0x57, 0xfffffff8, 0x0, 0x8000000000000001, 0x34, 0x0, 0x0, 0x7fffffff, 0x0, 0x401}, 0xffffffffffffffff, 0x9, r2, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)=0xc9ae) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r3 = perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, 0x0, 0x0) getpid() r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000240)='fsi_master_acf_cmd_abs_addr\x00', r0}, 0x10) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x4, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xfffffffffffffffd}, 0x43ca0, 0x80000000, 0x1, 0x6, 0x8000000000000000, 0x59e8, 0x7, 0x0, 0x3, 0x0, 0x5}, 0xffffffffffffffff, 0x10, r3, 0xb) perf_event_open(0x0, 0x0, 0xb, r4, 0xa) 23:05:57 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000000180081064e81f782db4cb904021d080004007c03e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) (fail_nth: 7) [ 196.454710][ T7966] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 23:05:57 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002c000505d25a80308c63940d0c35fc60100006400a13400b053582c137153e37080c188004ac0f00d1bd", 0x33fe0}], 0x1}, 0x0) (fail_nth: 8) 23:05:57 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (fail_nth: 8) 23:05:57 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000000180081064e81f782db4cb9040a1d080004007c09e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) (fail_nth: 8) [ 196.454733][ T7966] RSP: 002b:00007fd77d667168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 196.454757][ T7966] RAX: ffffffffffffffda RBX: 00007fd77c59bf60 RCX: 00007fd77c489109 [ 196.454774][ T7966] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 23:05:57 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000000180081064e81f782db4cb904021d080004007c03e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) (fail_nth: 8) 23:05:57 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000d00)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x552d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge_slave_0\x00', 0x1}) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8937, &(0x7f0000000080)) (async) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x5450, 0x0) (async) r2 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x9, 0x0, 0x4, 0x6, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x200, 0x80000001}, 0x10000, 0xc202, 0x8, 0x4, 0x80, 0x88, 0x0, 0x0, 0x80000001, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x37, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0xd72d, 0x5}, 0x1200, 0x57, 0xfffffff8, 0x0, 0x8000000000000001, 0x34, 0x0, 0x0, 0x7fffffff, 0x0, 0x401}, 0xffffffffffffffff, 0x9, r2, 0x2) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)=0xc9ae) (async) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) (async) r3 = perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, 0x0, 0x0) getpid() (async) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000240)='fsi_master_acf_cmd_abs_addr\x00', r0}, 0x10) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x4, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xfffffffffffffffd}, 0x43ca0, 0x80000000, 0x1, 0x6, 0x8000000000000000, 0x59e8, 0x7, 0x0, 0x3, 0x0, 0x5}, 0xffffffffffffffff, 0x10, r3, 0xb) (async) perf_event_open(0x0, 0x0, 0xb, r4, 0xa) 23:05:57 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0400005500810ce00f80ecdb4cb9f207c804a011000000020006fb0a0002000a0ada1b40d805001100c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) (fail_nth: 9) 23:05:58 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000000180081064e81f782db4cb9040a1d080004007c09e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) (fail_nth: 9) [ 196.454789][ T7966] RBP: 00007fd77d6671d0 R08: 0000000000000000 R09: 0000000000000000 23:05:58 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (fail_nth: 9) 23:05:58 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002c000505d25a80308c63940d0c35fc60100006400a13400b053582c137153e37080c188004ac0f00d1bd", 0x33fe0}], 0x1}, 0x0) (fail_nth: 9) [ 196.454803][ T7966] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 23:05:58 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000d00)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x552d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge_slave_0\x00', 0x1}) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8937, &(0x7f0000000080)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x5450, 0x0) (async) r2 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x9, 0x0, 0x4, 0x6, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x200, 0x80000001}, 0x10000, 0xc202, 0x8, 0x4, 0x80, 0x88, 0x0, 0x0, 0x80000001, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x37, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0xd72d, 0x5}, 0x1200, 0x57, 0xfffffff8, 0x0, 0x8000000000000001, 0x34, 0x0, 0x0, 0x7fffffff, 0x0, 0x401}, 0xffffffffffffffff, 0x9, r2, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)=0xc9ae) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) (async) r3 = perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x8) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) getpid() (async) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000240)='fsi_master_acf_cmd_abs_addr\x00', r0}, 0x10) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x4, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xfffffffffffffffd}, 0x43ca0, 0x80000000, 0x1, 0x6, 0x8000000000000000, 0x59e8, 0x7, 0x0, 0x3, 0x0, 0x5}, 0xffffffffffffffff, 0x10, r3, 0xb) (async) perf_event_open(0x0, 0x0, 0xb, r4, 0xa) 23:05:58 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000000180081064e81f782db4cb904021d080004007c03e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) (fail_nth: 9) [ 196.454817][ T7966] R13: 00007ffed904c37f R14: 00007fd77d667300 R15: 0000000000022000 23:05:58 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002c000505d25a80308c63940d0c35fc60100006400a13400b053582c137153e37080c188004ac0f00d1bd", 0x33fe0}], 0x1}, 0x0) (fail_nth: 10) 23:05:58 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0400005500810ce00f80ecdb4cb9f207c804a011000000020006fb0a0002000a0ada1b40d805001100c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) (fail_nth: 10) 23:05:58 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000000180081064e81f782db4cb9040a1d080004007c09e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) (fail_nth: 10) 23:05:58 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (fail_nth: 10) [ 196.454851][ T7966] [ 196.464182][ T7968] FAULT_INJECTION: forcing a failure. [ 196.464182][ T7968] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 196.464211][ T7968] CPU: 0 PID: 7968 Comm: syz-executor.3 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 23:05:58 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0400005500810ce00f80ecdb4cb9f207c804a011000000020006fb0a0002000a0ada1b40d805001100c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) (fail_nth: 11) 23:05:58 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002c000505d25a80308c63940d0c35fc60100006400a13400b053582c137153e37080c188004ac0f00d1bd", 0x33fe0}], 0x1}, 0x0) (fail_nth: 11) [ 196.464236][ T7968] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 23:05:58 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000000180081064e81f782db4cb904021d080004007c03e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) (fail_nth: 10) [ 196.464249][ T7968] Call Trace: 23:05:58 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000000180081064e81f782db4cb9040a1d080004007c09e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) 23:05:58 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (fail_nth: 11) [ 196.464254][ T7968] [ 196.464261][ T7968] dump_stack_lvl+0xcd/0x134 23:05:58 executing program 2: syz_clone(0xc2840280, 0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000001c0)="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") 23:05:58 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0400005500810ce00f80ecdb4cb9f207c804a011000000020006fb0a0002000a0ada1b40d805001100c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) (fail_nth: 12) 23:05:58 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002c000505d25a80308c63940d0c35fc60100006400a13400b053582c137153e37080c188004ac0f00d1bd", 0x33fe0}], 0x1}, 0x0) (fail_nth: 12) [ 196.464291][ T7968] should_fail.cold+0x5/0xa [ 196.464325][ T7968] _copy_from_user+0x2a/0x170 23:05:58 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="0f000000180081064e81f782db4cb9040a1d080004007c09e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) 23:05:58 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000000180081064e81f782db4cb904021d080004007c03e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) 23:05:58 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (fail_nth: 12) [ 196.464354][ T7968] __copy_msghdr_from_user+0x91/0x4b0 [ 196.464381][ T7968] ? __ia32_sys_shutdown+0x70/0x70 [ 196.464410][ T7968] ? __lock_acquire+0xbca/0x56c0 [ 196.464447][ T7968] sendmsg_copy_msghdr+0xa1/0x160 23:05:58 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="10000000180081064e81f782db4cb9040a1d080004007c09e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) [ 196.464471][ T7968] ? do_recvmmsg+0x6d0/0x6d0 23:05:58 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0400005500810ce00f80ecdb4cb9f207c804a011000000020006fb0a0002000a0ada1b40d805001100c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) (fail_nth: 13) 23:05:58 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002c000505d25a80308c63940d0c35fc60100006400a13400b053582c137153e37080c188004ac0f00d1bd", 0x33fe0}], 0x1}, 0x0) (fail_nth: 13) 23:05:58 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="0f000000180081064e81f782db4cb904021d080004007c03e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) [ 196.464494][ T7968] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 196.464526][ T7968] ? _parse_integer+0x30/0x30 23:05:58 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (fail_nth: 13) [ 196.464560][ T7968] ___sys_sendmsg+0xc6/0x170 [ 196.464585][ T7968] ? sendmsg_copy_msghdr+0x160/0x160 23:05:58 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="1b000000180081064e81f782db4cb9040a1d080004007c09e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) [ 196.464611][ T7968] ? __fget_files+0x264/0x470 [ 196.464635][ T7968] ? lock_downgrade+0x6e0/0x6e0 [ 196.464676][ T7968] ? __fget_files+0x286/0x470 [ 196.464708][ T7968] ? __fget_light+0xea/0x270 [ 196.464732][ T7968] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 23:05:58 executing program 2: syz_clone(0xc2840280, 0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000001c0)="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") 23:05:58 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0400005500810ce00f80ecdb4cb9f207c804a011000000020006fb0a0002000a0ada1b40d805001100c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) (fail_nth: 14) 23:05:58 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="10000000180081064e81f782db4cb904021d080004007c03e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) 23:05:58 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (fail_nth: 14) 23:05:58 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002c000505d25a80308c63940d0c35fc60100006400a13400b053582c137153e37080c188004ac0f00d1bd", 0x33fe0}], 0x1}, 0x0) (fail_nth: 14) 23:05:58 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="c0020000180081064e81f782db4cb9040a1d080004007c09e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) [ 196.464764][ T7968] __x64_sys_sendmsg+0x132/0x220 [ 196.464787][ T7968] ? __sys_sendmsg+0x1b0/0x1b0 [ 196.464824][ T7968] ? syscall_enter_from_user_mode+0x21/0x70 [ 196.464861][ T7968] do_syscall_64+0x35/0xb0 [ 196.464885][ T7968] entry_SYSCALL_64_after_hwframe+0x46/0xb0 23:05:58 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="1b000000180081064e81f782db4cb904021d080004007c03e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) 23:05:58 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (fail_nth: 15) 23:05:58 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="c00e0000180081064e81f782db4cb9040a1d080004007c09e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) [ 196.464910][ T7968] RIP: 0033:0x7f21c7e89109 [ 196.464928][ T7968] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 23:05:59 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0400005500810ce00f80ecdb4cb9f207c804a011000000020006fb0a0002000a0ada1b40d805001100c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) (fail_nth: 15) 23:05:59 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002c000505d25a80308c63940d0c35fc60100006400a13400b053582c137153e37080c188004ac0f00d1bd", 0x33fe0}], 0x1}, 0x0) (fail_nth: 15) 23:05:59 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="c0020000180081064e81f782db4cb904021d080004007c03e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) [ 196.464957][ T7968] RSP: 002b:00007f21c8f89168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 196.464980][ T7968] RAX: ffffffffffffffda RBX: 00007f21c7f9bf60 RCX: 00007f21c7e89109 [ 196.464997][ T7968] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 196.465011][ T7968] RBP: 00007f21c8f891d0 R08: 0000000000000000 R09: 0000000000000000 [ 196.465027][ T7968] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 196.465041][ T7968] R13: 00007ffca6ce140f R14: 00007f21c8f89300 R15: 0000000000022000 [ 196.465074][ T7968] [ 196.467087][ T7969] FAULT_INJECTION: forcing a failure. [ 196.467087][ T7969] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 196.467115][ T7969] CPU: 0 PID: 7969 Comm: syz-executor.4 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 196.467140][ T7969] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 196.467152][ T7969] Call Trace: [ 196.467157][ T7969] [ 196.467164][ T7969] dump_stack_lvl+0xcd/0x134 [ 196.467193][ T7969] should_fail.cold+0x5/0xa 23:05:59 executing program 2: syz_clone(0xc2840280, 0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000001c0)="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") 23:05:59 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (fail_nth: 16) 23:05:59 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="e03f0300180081064e81f782db4cb9040a1d080004007c09e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) 23:05:59 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0400005500810ce00f80ecdb4cb9f207c804a011000000020006fb0a0002000a0ada1b40d805001100c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) (fail_nth: 16) 23:05:59 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="c00e0000180081064e81f782db4cb904021d080004007c03e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) 23:05:59 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002c000505d25a80308c63940d0c35fc60100006400a13400b053582c137153e37080c188004ac0f00d1bd", 0x33fe0}], 0x1}, 0x0) (fail_nth: 16) [ 196.467226][ T7969] _copy_from_user+0x2a/0x170 [ 196.467254][ T7969] iovec_from_user+0x149/0x3a0 [ 196.467282][ T7969] ? _copy_from_user+0xf9/0x170 [ 196.467313][ T7969] __import_iovec+0x65/0x5d0 [ 196.467345][ T7969] import_iovec+0x10c/0x150 [ 196.467375][ T7969] sendmsg_copy_msghdr+0x12d/0x160 23:05:59 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0400005500810ce00f80ecdb4cb9f207c804a011000000020006fb0a0002000a0ada1b40d805001100c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) (fail_nth: 17) 23:05:59 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="e03f0300180081064e81f782db4cb904021d080004007c03e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) 23:05:59 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="00f0ff7f180081064e81f782db4cb9040a1d080004007c09e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) 23:05:59 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002c000505d25a80308c63940d0c35fc60100006400a13400b053582c137153e37080c188004ac0f00d1bd", 0x33fe0}], 0x1}, 0x0) (fail_nth: 17) 23:05:59 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (fail_nth: 17) [ 196.467400][ T7969] ? do_recvmmsg+0x6d0/0x6d0 [ 196.467422][ T7969] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 196.467454][ T7969] ? _parse_integer+0x30/0x30 [ 196.467489][ T7969] ___sys_sendmsg+0xc6/0x170 [ 196.467513][ T7969] ? sendmsg_copy_msghdr+0x160/0x160 23:05:59 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="effdffff180081064e81f782db4cb9040a1d080004007c09e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) [ 196.467539][ T7969] ? __fget_files+0x264/0x470 [ 196.467563][ T7969] ? lock_downgrade+0x6e0/0x6e0 [ 196.467602][ T7969] ? __fget_files+0x286/0x470 [ 196.467634][ T7969] ? __fget_light+0xea/0x270 [ 196.467658][ T7969] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 196.467689][ T7969] __x64_sys_sendmsg+0x132/0x220 [ 196.467712][ T7969] ? __sys_sendmsg+0x1b0/0x1b0 [ 196.467749][ T7969] ? syscall_enter_from_user_mode+0x21/0x70 [ 196.467784][ T7969] do_syscall_64+0x35/0xb0 [ 196.467809][ T7969] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 196.467832][ T7969] RIP: 0033:0x7f7765489109 [ 196.467849][ T7969] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 196.467871][ T7969] RSP: 002b:00007f7766559168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 196.467893][ T7969] RAX: ffffffffffffffda RBX: 00007f776559bf60 RCX: 00007f7765489109 [ 196.467909][ T7969] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 196.467923][ T7969] RBP: 00007f77665591d0 R08: 0000000000000000 R09: 0000000000000000 [ 196.467937][ T7969] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 196.467956][ T7969] R13: 00007ffec1cb653f R14: 00007f7766559300 R15: 0000000000022000 [ 196.467987][ T7969] [ 196.468699][ T7967] FAULT_INJECTION: forcing a failure. [ 196.468699][ T7967] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 196.468726][ T7967] CPU: 0 PID: 7967 Comm: syz-executor.5 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 196.468752][ T7967] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 196.468766][ T7967] Call Trace: 23:05:59 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, &(0x7f0000000040), 0x52d) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}, 0x80, 0x0, 0x0, 0x0, 0x1340}, 0x0) close(r0) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x16, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000c40000738e000000000000000095000000000000003ed285e88036122a75adf637b9cf4d032bef603e4dfa2f82b67a9081be0588fd9f137085f02ffa80b6f1de635a4ca41e7d9999662ff08b400ae89aa599bbe8ad275b372f7af7e5d59735326ab7a30152cd1e3582640461"], &(0x7f00000005c0)='syzkaller\x00', 0x9, 0x1c, &(0x7f0000000600)=""/28, 0x41000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x4, 0x5}, 0x8, 0x10, 0x0}, 0x80) socketpair(0xa, 0x1, 0x106, &(0x7f0000000040)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, 0x0}, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x16bac469e758a2df, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x7fffffff, 0x100}, 0x1b30, 0x8, 0x0, 0x3059503d9c403bef, 0x2, 0x800, 0x9, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x507000000000000, 0xffffffffffffffff, 0x3) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xf, r1, 0x6) sendmsg$kcm(r0, &(0x7f0000000b40)={&(0x7f00000004c0)=@nl=@unspec, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000780)="ae35ed33b876acf883b61fb145a6028a34fad87e3bf6feeb1af2357cedd36939d7d576211fe75985cbc92130c994f44be4bc72cf03045a8b1d519fa60f32a9667268afd9c32668bb5ca99c1b34faece04af34bf487ee9293ec9d6d882d321703e1d77aff2caf4bc386a62f0ef1f16b05d633e2350af6b4ef2fac7638b5671594759c69a7505a27e175c0b2b929d5c372c5d859b96a068e1a41c85ce43bc998a976171b4ee696d13d1f5568db08d07cc4af1f0fc33c7848afca0f254c6cde28906e6746d06a149097ae89c4d10c4f342eb26848efa2344d3fa25abeabc653795c197ad6be1c99", 0xe6}, {&(0x7f0000000880)="4e049d4029e0f9e0ebda432c207fc4b7c3891302257b4b88dae6ea127f576c27ec7c9becf79b4aaac075b9cfe530deae78e5c2ee7161fce850fcb4d55bedb16799f47c2a01c93ac0f90c14", 0x4b}, {&(0x7f0000000400)="febe60d76d60387ab6b6727b9452c3517b29d20ce2d04dee0968058119d278", 0x1f}, {&(0x7f0000000680)="585e0381ab2a2838c2694fc9f83d7608ad0b20870035821a8bb28ab4d3609b0bfd9e012f749b4a8787379348f1e881fb7f7d74f69eb168669922", 0x3a}, {&(0x7f0000000900)="488696585e4336f29af4a50dbe76bf020f0799873cd6368ef95fac4c2d0ca2137f277f2d389ebbbf4d38ef2930e1698f1845e6a696c2ebc002749f27707c742c4315f79045ae7d091d6982610fcac5e98891de63c33e72dc", 0x58}, {&(0x7f0000000980)="77cb957d892909856850b862893803091a7d55747f79f5f63464cd0ccf77e8b8b20a30c84b3929372f250ff8eb105b7742c74cc2e5ab13f1cd0e8d5bf097bf6806077ab533270846c4ab466e929c93", 0x4f}], 0x6, &(0x7f0000000a80)=[{0x90, 0x0, 0xc5f, "21f786e9caaab10f5397c0ec453f82339d3f55393a907f71847e5a09a4a984365f221040a546c8e357693d2af8f3f13a0d5890acd1720d592b652c2d679524c08006fa573a97a27d05d39b268da79f0524d11673e59cbf14a42f3274933e23d2e5e8f10245645196fba4071069094e91db37274c59bceed706"}], 0x90}, 0x20000000) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000480)="2e00000011008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000001201", 0x2e}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0xb9efff7f}, 0x4000) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380)=@l2tp6={0xa, 0x0, 0x7f, @loopback}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000540)="1c86badd8fb3d1e76eba9c9d56577e181fa985dd7ad87d", 0x17}], 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="2ee8c9b6edc7f2d11e48b9eb9fa4f3da9b2083f42a83a1e08825b7a56930568d7f421554b9eddf9fb7142a9d776261a8f3fac8373d0e3bc298a39a72259b1be786baae27f99a3824c492d5ecb6f027ae1fd698", @ANYRESOCT], 0x668}, 0x4000000) 23:05:59 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="00f0ff7f180081064e81f782db4cb904021d080004007c03e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) 23:05:59 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002c000505d25a80308c63940d0c35fc60100006400a13400b053582c137153e37080c188004ac0f00d1bd", 0x33fe0}], 0x1}, 0x0) (fail_nth: 18) 23:05:59 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0400005500810ce00f80ecdb4cb9f207c804a011000000020006fb0a0002000a0ada1b40d805001100c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) (fail_nth: 18) 23:05:59 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (fail_nth: 18) 23:05:59 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d80000000b0081064e81f782db4cb9040a1d080004007c09e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) [ 196.468771][ T7967] [ 196.468779][ T7967] dump_stack_lvl+0xcd/0x134 [ 196.468805][ T7967] should_fail.cold+0x5/0xa [ 196.468836][ T7967] strncpy_from_user+0x34/0x3c0 [ 196.468869][ T7967] bpf_prog_load+0x5a0/0x2250 23:06:00 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (fail_nth: 19) 23:06:00 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d80000000f0081064e81f782db4cb9040a1d080004007c09e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) 23:06:00 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="effdffff180081064e81f782db4cb904021d080004007c03e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) 23:06:00 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002c000505d25a80308c63940d0c35fc60100006400a13400b053582c137153e37080c188004ac0f00d1bd", 0x33fe0}], 0x1}, 0x0) (fail_nth: 19) 23:06:00 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0400005500810ce00f80ecdb4cb9f207c804a011000000020006fb0a0002000a0ada1b40d805001100c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) (fail_nth: 19) [ 196.468903][ T7967] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 196.468931][ T7967] ? find_held_lock+0x2d/0x110 [ 196.468971][ T7967] ? __might_fault+0xd1/0x170 23:06:00 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8020000180081064e81f782db4cb9040a1d080004007c09e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) [ 196.468999][ T7967] ? lock_downgrade+0x6e0/0x6e0 [ 196.469045][ T7967] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 196.469080][ T7967] __sys_bpf+0x11a1/0x5700 [ 196.469115][ T7967] ? bpf_perf_link_attach+0x520/0x520 [ 196.469146][ T7967] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 196.469189][ T7967] ? find_held_lock+0x2d/0x110 [ 196.469246][ T7967] ? trace_hardirqs_on+0x38/0x1c0 [ 196.469276][ T7967] __x64_sys_bpf+0x75/0xb0 [ 196.469305][ T7967] ? syscall_enter_from_user_mode+0x21/0x70 [ 196.469337][ T7967] do_syscall_64+0x35/0xb0 [ 196.469364][ T7967] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 196.469390][ T7967] RIP: 0033:0x7f2e16289109 [ 196.469409][ T7967] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 196.469432][ T7967] RSP: 002b:00007f2e1731f168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 196.469455][ T7967] RAX: ffffffffffffffda RBX: 00007f2e1639bf60 RCX: 00007f2e16289109 [ 196.469472][ T7967] RDX: 0000000000000080 RSI: 00000000200001c0 RDI: 0000000000000005 [ 196.469488][ T7967] RBP: 00007f2e1731f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 196.469503][ T7967] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 196.469518][ T7967] R13: 00007ffde7446a9f R14: 00007f2e1731f300 R15: 0000000000022000 [ 196.469553][ T7967] [ 196.496936][ T7970] FAULT_INJECTION: forcing a failure. [ 196.496936][ T7970] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 196.496975][ T7970] CPU: 0 PID: 7970 Comm: syz-executor.1 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 196.497001][ T7970] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 196.497014][ T7970] Call Trace: [ 196.497020][ T7970] [ 196.497028][ T7970] dump_stack_lvl+0xcd/0x134 [ 196.497060][ T7970] should_fail.cold+0x5/0xa [ 196.497094][ T7970] _copy_from_user+0x2a/0x170 [ 196.497123][ T7970] __copy_msghdr_from_user+0x91/0x4b0 [ 196.497151][ T7970] ? __ia32_sys_shutdown+0x70/0x70 [ 196.497183][ T7970] ? __lock_acquire+0xbca/0x56c0 23:06:00 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, &(0x7f0000000040), 0x52d) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}, 0x80, 0x0, 0x0, 0x0, 0x1340}, 0x0) close(r0) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x16, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000c40000738e000000000000000095000000000000003ed285e88036122a75adf637b9cf4d032bef603e4dfa2f82b67a9081be0588fd9f137085f02ffa80b6f1de635a4ca41e7d9999662ff08b400ae89aa599bbe8ad275b372f7af7e5d59735326ab7a30152cd1e3582640461"], &(0x7f00000005c0)='syzkaller\x00', 0x9, 0x1c, &(0x7f0000000600)=""/28, 0x41000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x4, 0x5}, 0x8, 0x10, 0x0}, 0x80) socketpair(0xa, 0x1, 0x106, &(0x7f0000000040)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, 0x0}, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x16bac469e758a2df, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x7fffffff, 0x100}, 0x1b30, 0x8, 0x0, 0x3059503d9c403bef, 0x2, 0x800, 0x9, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x507000000000000, 0xffffffffffffffff, 0x3) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xf, r1, 0x6) sendmsg$kcm(r0, &(0x7f0000000b40)={&(0x7f00000004c0)=@nl=@unspec, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000780)="ae35ed33b876acf883b61fb145a6028a34fad87e3bf6feeb1af2357cedd36939d7d576211fe75985cbc92130c994f44be4bc72cf03045a8b1d519fa60f32a9667268afd9c32668bb5ca99c1b34faece04af34bf487ee9293ec9d6d882d321703e1d77aff2caf4bc386a62f0ef1f16b05d633e2350af6b4ef2fac7638b5671594759c69a7505a27e175c0b2b929d5c372c5d859b96a068e1a41c85ce43bc998a976171b4ee696d13d1f5568db08d07cc4af1f0fc33c7848afca0f254c6cde28906e6746d06a149097ae89c4d10c4f342eb26848efa2344d3fa25abeabc653795c197ad6be1c99", 0xe6}, {&(0x7f0000000880)="4e049d4029e0f9e0ebda432c207fc4b7c3891302257b4b88dae6ea127f576c27ec7c9becf79b4aaac075b9cfe530deae78e5c2ee7161fce850fcb4d55bedb16799f47c2a01c93ac0f90c14", 0x4b}, {&(0x7f0000000400)="febe60d76d60387ab6b6727b9452c3517b29d20ce2d04dee0968058119d278", 0x1f}, {&(0x7f0000000680)="585e0381ab2a2838c2694fc9f83d7608ad0b20870035821a8bb28ab4d3609b0bfd9e012f749b4a8787379348f1e881fb7f7d74f69eb168669922", 0x3a}, {&(0x7f0000000900)="488696585e4336f29af4a50dbe76bf020f0799873cd6368ef95fac4c2d0ca2137f277f2d389ebbbf4d38ef2930e1698f1845e6a696c2ebc002749f27707c742c4315f79045ae7d091d6982610fcac5e98891de63c33e72dc", 0x58}, {&(0x7f0000000980)="77cb957d892909856850b862893803091a7d55747f79f5f63464cd0ccf77e8b8b20a30c84b3929372f250ff8eb105b7742c74cc2e5ab13f1cd0e8d5bf097bf6806077ab533270846c4ab466e929c93", 0x4f}], 0x6, &(0x7f0000000a80)=[{0x90, 0x0, 0xc5f, "21f786e9caaab10f5397c0ec453f82339d3f55393a907f71847e5a09a4a984365f221040a546c8e357693d2af8f3f13a0d5890acd1720d592b652c2d679524c08006fa573a97a27d05d39b268da79f0524d11673e59cbf14a42f3274933e23d2e5e8f10245645196fba4071069094e91db37274c59bceed706"}], 0x90}, 0x20000000) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000480)="2e00000011008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000001201", 0x2e}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0xb9efff7f}, 0x4000) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380)=@l2tp6={0xa, 0x0, 0x7f, @loopback}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000540)="1c86badd8fb3d1e76eba9c9d56577e181fa985dd7ad87d", 0x17}], 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="2ee8c9b6edc7f2d11e48b9eb9fa4f3da9b2083f42a83a1e08825b7a56930568d7f421554b9eddf9fb7142a9d776261a8f3fac8373d0e3bc298a39a72259b1be786baae27f99a3824c492d5ecb6f027ae1fd698", @ANYRESOCT], 0x668}, 0x4000000) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) (async) socket$kcm(0xa, 0x2, 0x11) (async) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, &(0x7f0000000040), 0x52d) (async) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) (async) sendmsg(0xffffffffffffffff, 0x0, 0x0) (async) socket$kcm(0x21, 0x2, 0x2) (async) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}, 0x80, 0x0, 0x0, 0x0, 0x1340}, 0x0) (async) close(r0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x16, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000c40000738e000000000000000095000000000000003ed285e88036122a75adf637b9cf4d032bef603e4dfa2f82b67a9081be0588fd9f137085f02ffa80b6f1de635a4ca41e7d9999662ff08b400ae89aa599bbe8ad275b372f7af7e5d59735326ab7a30152cd1e3582640461"], &(0x7f00000005c0)='syzkaller\x00', 0x9, 0x1c, &(0x7f0000000600)=""/28, 0x41000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x4, 0x5}, 0x8, 0x10, 0x0}, 0x80) (async) socketpair(0xa, 0x1, 0x106, &(0x7f0000000040)) (async) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, 0x0}, 0x0) (async) perf_event_open(&(0x7f0000000300)={0x16bac469e758a2df, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x7fffffff, 0x100}, 0x1b30, 0x8, 0x0, 0x3059503d9c403bef, 0x2, 0x800, 0x9, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x507000000000000, 0xffffffffffffffff, 0x3) (async) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xf, r1, 0x6) (async) sendmsg$kcm(r0, &(0x7f0000000b40)={&(0x7f00000004c0)=@nl=@unspec, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000780)="ae35ed33b876acf883b61fb145a6028a34fad87e3bf6feeb1af2357cedd36939d7d576211fe75985cbc92130c994f44be4bc72cf03045a8b1d519fa60f32a9667268afd9c32668bb5ca99c1b34faece04af34bf487ee9293ec9d6d882d321703e1d77aff2caf4bc386a62f0ef1f16b05d633e2350af6b4ef2fac7638b5671594759c69a7505a27e175c0b2b929d5c372c5d859b96a068e1a41c85ce43bc998a976171b4ee696d13d1f5568db08d07cc4af1f0fc33c7848afca0f254c6cde28906e6746d06a149097ae89c4d10c4f342eb26848efa2344d3fa25abeabc653795c197ad6be1c99", 0xe6}, {&(0x7f0000000880)="4e049d4029e0f9e0ebda432c207fc4b7c3891302257b4b88dae6ea127f576c27ec7c9becf79b4aaac075b9cfe530deae78e5c2ee7161fce850fcb4d55bedb16799f47c2a01c93ac0f90c14", 0x4b}, {&(0x7f0000000400)="febe60d76d60387ab6b6727b9452c3517b29d20ce2d04dee0968058119d278", 0x1f}, {&(0x7f0000000680)="585e0381ab2a2838c2694fc9f83d7608ad0b20870035821a8bb28ab4d3609b0bfd9e012f749b4a8787379348f1e881fb7f7d74f69eb168669922", 0x3a}, {&(0x7f0000000900)="488696585e4336f29af4a50dbe76bf020f0799873cd6368ef95fac4c2d0ca2137f277f2d389ebbbf4d38ef2930e1698f1845e6a696c2ebc002749f27707c742c4315f79045ae7d091d6982610fcac5e98891de63c33e72dc", 0x58}, {&(0x7f0000000980)="77cb957d892909856850b862893803091a7d55747f79f5f63464cd0ccf77e8b8b20a30c84b3929372f250ff8eb105b7742c74cc2e5ab13f1cd0e8d5bf097bf6806077ab533270846c4ab466e929c93", 0x4f}], 0x6, &(0x7f0000000a80)=[{0x90, 0x0, 0xc5f, "21f786e9caaab10f5397c0ec453f82339d3f55393a907f71847e5a09a4a984365f221040a546c8e357693d2af8f3f13a0d5890acd1720d592b652c2d679524c08006fa573a97a27d05d39b268da79f0524d11673e59cbf14a42f3274933e23d2e5e8f10245645196fba4071069094e91db37274c59bceed706"}], 0x90}, 0x20000000) (async) socket$kcm(0x10, 0x2, 0x0) (async) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000480)="2e00000011008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000001201", 0x2e}], 0x1}, 0x0) (async) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0xb9efff7f}, 0x4000) (async) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380)=@l2tp6={0xa, 0x0, 0x7f, @loopback}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000540)="1c86badd8fb3d1e76eba9c9d56577e181fa985dd7ad87d", 0x17}], 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="2ee8c9b6edc7f2d11e48b9eb9fa4f3da9b2083f42a83a1e08825b7a56930568d7f421554b9eddf9fb7142a9d776261a8f3fac8373d0e3bc298a39a72259b1be786baae27f99a3824c492d5ecb6f027ae1fd698", @ANYRESOCT], 0x668}, 0x4000000) (async) 23:06:00 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002c000505d25a80308c63940d0c35fc60100006400a13400b053582c137153e37080c188004ac0f00d1bd", 0x33fe0}], 0x1}, 0x0) (fail_nth: 20) 23:06:00 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d80000000b0081064e81f782db4cb904021d080004007c03e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) 23:06:00 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (fail_nth: 20) 23:06:00 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0400005500810ce00f80ecdb4cb9f207c804a011000000020006fb0a0002000a0ada1b40d805001100c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) (fail_nth: 20) 23:06:00 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8030000180081064e81f782db4cb9040a1d080004007c09e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) 23:06:00 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d80000000f0081064e81f782db4cb904021d080004007c03e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) [ 196.497221][ T7970] sendmsg_copy_msghdr+0xa1/0x160 23:06:01 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8040000180081064e81f782db4cb9040a1d080004007c09e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) 23:06:01 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (fail_nth: 21) [ 196.497249][ T7970] ? do_recvmmsg+0x6d0/0x6d0 23:06:01 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002c000505d25a80308c63940d0c35fc60100006400a13400b053582c137153e37080c188004ac0f00d1bd", 0x33fe0}], 0x1}, 0x0) (fail_nth: 21) 23:06:01 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0400005500810ce00f80ecdb4cb9f207c804a011000000020006fb0a0002000a0ada1b40d805001100c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) (fail_nth: 21) [ 196.497274][ T7970] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 196.497307][ T7970] ? _parse_integer+0x30/0x30 [ 196.497345][ T7970] ___sys_sendmsg+0xc6/0x170 23:06:01 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8050000180081064e81f782db4cb9040a1d080004007c09e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) [ 196.497371][ T7970] ? sendmsg_copy_msghdr+0x160/0x160 [ 196.497399][ T7970] ? __fget_files+0x264/0x470 [ 196.497425][ T7970] ? lock_downgrade+0x6e0/0x6e0 [ 196.497467][ T7970] ? __fget_files+0x286/0x470 [ 196.497503][ T7970] ? __fget_light+0xea/0x270 [ 196.497529][ T7970] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 196.497562][ T7970] __x64_sys_sendmsg+0x132/0x220 [ 196.497588][ T7970] ? __sys_sendmsg+0x1b0/0x1b0 23:06:01 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, &(0x7f0000000040), 0x52d) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) (async) sendmsg(0xffffffffffffffff, 0x0, 0x0) (async) socket$kcm(0x21, 0x2, 0x2) (async) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}, 0x80, 0x0, 0x0, 0x0, 0x1340}, 0x0) (async) close(r0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x16, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000c40000738e000000000000000095000000000000003ed285e88036122a75adf637b9cf4d032bef603e4dfa2f82b67a9081be0588fd9f137085f02ffa80b6f1de635a4ca41e7d9999662ff08b400ae89aa599bbe8ad275b372f7af7e5d59735326ab7a30152cd1e3582640461"], &(0x7f00000005c0)='syzkaller\x00', 0x9, 0x1c, &(0x7f0000000600)=""/28, 0x41000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x4, 0x5}, 0x8, 0x10, 0x0}, 0x80) socketpair(0xa, 0x1, 0x106, &(0x7f0000000040)) (async) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, 0x0}, 0x0) (async) r1 = perf_event_open(&(0x7f0000000300)={0x16bac469e758a2df, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x7fffffff, 0x100}, 0x1b30, 0x8, 0x0, 0x3059503d9c403bef, 0x2, 0x800, 0x9, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x507000000000000, 0xffffffffffffffff, 0x3) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xf, r1, 0x6) (async, rerun: 64) sendmsg$kcm(r0, &(0x7f0000000b40)={&(0x7f00000004c0)=@nl=@unspec, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000780)="ae35ed33b876acf883b61fb145a6028a34fad87e3bf6feeb1af2357cedd36939d7d576211fe75985cbc92130c994f44be4bc72cf03045a8b1d519fa60f32a9667268afd9c32668bb5ca99c1b34faece04af34bf487ee9293ec9d6d882d321703e1d77aff2caf4bc386a62f0ef1f16b05d633e2350af6b4ef2fac7638b5671594759c69a7505a27e175c0b2b929d5c372c5d859b96a068e1a41c85ce43bc998a976171b4ee696d13d1f5568db08d07cc4af1f0fc33c7848afca0f254c6cde28906e6746d06a149097ae89c4d10c4f342eb26848efa2344d3fa25abeabc653795c197ad6be1c99", 0xe6}, {&(0x7f0000000880)="4e049d4029e0f9e0ebda432c207fc4b7c3891302257b4b88dae6ea127f576c27ec7c9becf79b4aaac075b9cfe530deae78e5c2ee7161fce850fcb4d55bedb16799f47c2a01c93ac0f90c14", 0x4b}, {&(0x7f0000000400)="febe60d76d60387ab6b6727b9452c3517b29d20ce2d04dee0968058119d278", 0x1f}, {&(0x7f0000000680)="585e0381ab2a2838c2694fc9f83d7608ad0b20870035821a8bb28ab4d3609b0bfd9e012f749b4a8787379348f1e881fb7f7d74f69eb168669922", 0x3a}, {&(0x7f0000000900)="488696585e4336f29af4a50dbe76bf020f0799873cd6368ef95fac4c2d0ca2137f277f2d389ebbbf4d38ef2930e1698f1845e6a696c2ebc002749f27707c742c4315f79045ae7d091d6982610fcac5e98891de63c33e72dc", 0x58}, {&(0x7f0000000980)="77cb957d892909856850b862893803091a7d55747f79f5f63464cd0ccf77e8b8b20a30c84b3929372f250ff8eb105b7742c74cc2e5ab13f1cd0e8d5bf097bf6806077ab533270846c4ab466e929c93", 0x4f}], 0x6, &(0x7f0000000a80)=[{0x90, 0x0, 0xc5f, "21f786e9caaab10f5397c0ec453f82339d3f55393a907f71847e5a09a4a984365f221040a546c8e357693d2af8f3f13a0d5890acd1720d592b652c2d679524c08006fa573a97a27d05d39b268da79f0524d11673e59cbf14a42f3274933e23d2e5e8f10245645196fba4071069094e91db37274c59bceed706"}], 0x90}, 0x20000000) (async, rerun: 64) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000480)="2e00000011008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000001201", 0x2e}], 0x1}, 0x0) (async) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0xb9efff7f}, 0x4000) (async) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380)=@l2tp6={0xa, 0x0, 0x7f, @loopback}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000540)="1c86badd8fb3d1e76eba9c9d56577e181fa985dd7ad87d", 0x17}], 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="2ee8c9b6edc7f2d11e48b9eb9fa4f3da9b2083f42a83a1e08825b7a56930568d7f421554b9eddf9fb7142a9d776261a8f3fac8373d0e3bc298a39a72259b1be786baae27f99a3824c492d5ecb6f027ae1fd698", @ANYRESOCT], 0x668}, 0x4000000) 23:06:01 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002c000505d25a80308c63940d0c35fc60100006400a13400b053582c137153e37080c188004ac0f00d1bd", 0x33fe0}], 0x1}, 0x0) (fail_nth: 22) 23:06:01 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8020000180081064e81f782db4cb904021d080004007c03e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) 23:06:01 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (fail_nth: 22) 23:06:01 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0400005500810ce00f80ecdb4cb9f207c804a011000000020006fb0a0002000a0ada1b40d805001100c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) (fail_nth: 22) 23:06:01 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8060000180081064e81f782db4cb9040a1d080004007c09e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) 23:06:01 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8030000180081064e81f782db4cb904021d080004007c03e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) 23:06:01 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002c000505d25a80308c63940d0c35fc60100006400a13400b053582c137153e37080c188004ac0f00d1bd", 0x33fe0}], 0x1}, 0x0) (fail_nth: 23) [ 196.497628][ T7970] ? syscall_enter_from_user_mode+0x21/0x70 23:06:01 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0400005500810ce00f80ecdb4cb9f207c804a011000000020006fb0a0002000a0ada1b40d805001100c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) (fail_nth: 23) 23:06:01 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (fail_nth: 23) [ 196.497667][ T7970] do_syscall_64+0x35/0xb0 [ 196.497693][ T7970] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 196.497718][ T7970] RIP: 0033:0x7f55bba89109 23:06:01 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8070000180081064e81f782db4cb9040a1d080004007c09e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) 23:06:01 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x1b, &(0x7f0000000040), 0x52d) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}, 0x80, 0x0, 0x0, 0x0, 0x1340}, 0x0) close(r0) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x16, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000c40000738e000000000000000095000000000000003ed285e88036122a75adf637b9cf4d032bef603e4dfa2f82b67a9081be0588fd9f137085f02ffa80b6f1de635a4ca41e7d9999662ff08b400ae89aa599bbe8ad275b372f7af7e5d59735326ab7a30152cd1e3582640461"], &(0x7f00000005c0)='syzkaller\x00', 0x9, 0x1c, &(0x7f0000000600)=""/28, 0x41000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000640)={0x4, 0x5}, 0x8, 0x10, 0x0}, 0x80) socketpair(0xa, 0x1, 0x106, &(0x7f0000000040)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, 0x0}, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x16bac469e758a2df, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x7fffffff, 0x100}, 0x1b30, 0x8, 0x0, 0x3059503d9c403bef, 0x2, 0x800, 0x9, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x507000000000000, 0xffffffffffffffff, 0x3) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xf, r1, 0x6) sendmsg$kcm(r0, &(0x7f0000000b40)={&(0x7f00000004c0)=@nl=@unspec, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000780)="ae35ed33b876acf883b61fb145a6028a34fad87e3bf6feeb1af2357cedd36939d7d576211fe75985cbc92130c994f44be4bc72cf03045a8b1d519fa60f32a9667268afd9c32668bb5ca99c1b34faece04af34bf487ee9293ec9d6d882d321703e1d77aff2caf4bc386a62f0ef1f16b05d633e2350af6b4ef2fac7638b5671594759c69a7505a27e175c0b2b929d5c372c5d859b96a068e1a41c85ce43bc998a976171b4ee696d13d1f5568db08d07cc4af1f0fc33c7848afca0f254c6cde28906e6746d06a149097ae89c4d10c4f342eb26848efa2344d3fa25abeabc653795c197ad6be1c99", 0xe6}, {&(0x7f0000000880)="4e049d4029e0f9e0ebda432c207fc4b7c3891302257b4b88dae6ea127f576c27ec7c9becf79b4aaac075b9cfe530deae78e5c2ee7161fce850fcb4d55bedb16799f47c2a01c93ac0f90c14", 0x4b}, {&(0x7f0000000400)="febe60d76d60387ab6b6727b9452c3517b29d20ce2d04dee0968058119d278", 0x1f}, {&(0x7f0000000680)="585e0381ab2a2838c2694fc9f83d7608ad0b20870035821a8bb28ab4d3609b0bfd9e012f749b4a8787379348f1e881fb7f7d74f69eb168669922", 0x3a}, {&(0x7f0000000900)="488696585e4336f29af4a50dbe76bf020f0799873cd6368ef95fac4c2d0ca2137f277f2d389ebbbf4d38ef2930e1698f1845e6a696c2ebc002749f27707c742c4315f79045ae7d091d6982610fcac5e98891de63c33e72dc", 0x58}, {&(0x7f0000000980)="77cb957d892909856850b862893803091a7d55747f79f5f63464cd0ccf77e8b8b20a30c84b3929372f250ff8eb105b7742c74cc2e5ab13f1cd0e8d5bf097bf6806077ab533270846c4ab466e929c93", 0x4f}], 0x6, &(0x7f0000000a80)=[{0x90, 0x0, 0xc5f, "21f786e9caaab10f5397c0ec453f82339d3f55393a907f71847e5a09a4a984365f221040a546c8e357693d2af8f3f13a0d5890acd1720d592b652c2d679524c08006fa573a97a27d05d39b268da79f0524d11673e59cbf14a42f3274933e23d2e5e8f10245645196fba4071069094e91db37274c59bceed706"}], 0x90}, 0x20000000) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000480)="2e00000011008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000001201", 0x2e}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0xb9efff7f}, 0x4000) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380)=@l2tp6={0xa, 0x0, 0x7f, @loopback}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000540)="1c86badd8fb3d1e76eba9c9d56577e181fa985dd7ad87d", 0x17}], 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="2ee8c9b6edc7f2d11e48b9eb9fa4f3da9b2083f42a83a1e08825b7a56930568d7f421554b9eddf9fb7142a9d776261a8f3fac8373d0e3bc298a39a72259b1be786baae27f99a3824c492d5ecb6f027ae1fd698", @ANYRESOCT], 0x668}, 0x4000000) 23:06:01 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8040000180081064e81f782db4cb904021d080004007c03e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) 23:06:01 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002c000505d25a80308c63940d0c35fc60100006400a13400b053582c137153e37080c188004ac0f00d1bd", 0x33fe0}], 0x1}, 0x0) (fail_nth: 24) 23:06:01 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (fail_nth: 24) 23:06:01 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0400005500810ce00f80ecdb4cb9f207c804a011000000020006fb0a0002000a0ada1b40d805001100c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) (fail_nth: 24) [ 196.497737][ T7970] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 23:06:01 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8080000180081064e81f782db4cb9040a1d080004007c09e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) 23:06:01 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002c000505d25a80308c63940d0c35fc60100006400a13400b053582c137153e37080c188004ac0f00d1bd", 0x33fe0}], 0x1}, 0x0) (fail_nth: 25) [ 196.497761][ T7970] RSP: 002b:00007f55bcbef168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 23:06:01 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8050000180081064e81f782db4cb904021d080004007c03e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) 23:06:01 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (fail_nth: 25) 23:06:01 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0400005500810ce00f80ecdb4cb9f207c804a011000000020006fb0a0002000a0ada1b40d805001100c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) (fail_nth: 25) [ 196.497784][ T7970] RAX: ffffffffffffffda RBX: 00007f55bbb9bf60 RCX: 00007f55bba89109 [ 196.497801][ T7970] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 23:06:01 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002c000505d25a80308c63940d0c35fc60100006400a13400b053582c137153e37080c188004ac0f00d1bd", 0x33fe0}], 0x1}, 0x0) (fail_nth: 26) 23:06:01 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8090000180081064e81f782db4cb9040a1d080004007c09e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) [ 196.497816][ T7970] RBP: 00007f55bcbef1d0 R08: 0000000000000000 R09: 0000000000000000 23:06:01 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0400005500810ce00f80ecdb4cb9f207c804a011000000020006fb0a0002000a0ada1b40d805001100c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) (fail_nth: 26) 23:06:01 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8060000180081064e81f782db4cb904021d080004007c03e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) 23:06:01 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000200)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000340)=""/188, 0x1a, 0xbc, 0x1}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x8, 0x100000, 0x3, 0x2, 0x20, 0xffffffffffffffff, 0x2, '\x00', 0x0, r0, 0x5, 0x2, 0x2}, 0x48) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000500)={r0, 0x20, &(0x7f00000001c0)={&(0x7f0000000240)=""/204, 0xcc, 0x0, &(0x7f0000000440)=""/162, 0xa2}}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0xa, 0x92, 0x4, 0x1, 0x0, 0xffffffffffffffff, 0xadb5, '\x00', 0x0, r0, 0x4, 0x3, 0x4}, 0xfffffffffffffeba) r4 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000cc0)={r4, 0xe0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000840)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x64, 0x4, &(0x7f0000000880)=[0x0], &(0x7f00000008c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000b00)=[{}, {}, {}, {}, {}], 0x8, 0x10, &(0x7f0000000940), &(0x7f0000000980), 0x8, 0x10, 0x8, 0x8, &(0x7f00000009c0)}}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r6, &(0x7f0000000200)=ANY=[], 0x4ea00) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000c80)={[{0x2d, 'devices'}, {0x2d, 'net_cls'}, {0x2d, 'perf_event'}]}, 0x1e) bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0xb, 0x4, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}, [@ldst={0x3, 0x2, 0x1, 0x1, 0x9, 0xfffffffffffffffe, 0xfffffffffffffff0}]}, &(0x7f0000000700)='GPL\x00', 0x1, 0xef, &(0x7f0000000740)=""/239, 0x41100, 0x5, '\x00', r5, 0x0, r0, 0x8, &(0x7f0000000b40)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000b80)={0x0, 0xc, 0xff, 0x5}, 0x10, r2, r4, 0x0, &(0x7f0000000bc0)=[r6, 0xffffffffffffffff, r3]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x3, 0x6, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x260dc751, 0x0, 0x0, 0x0, 0x9}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @map_val={0x18, 0x8, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x1}]}, &(0x7f00000000c0)='GPL\x00', 0x1, 0x37, &(0x7f0000000100)=""/55, 0x41100, 0x5, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000180)={0x1, 0xc, 0x610, 0x5}, 0x10, r2, 0xffffffffffffffff, 0x0, &(0x7f0000000600)=[0xffffffffffffffff, 0xffffffffffffffff, r3, r4]}, 0x80) 23:06:01 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (fail_nth: 26) [ 196.497830][ T7970] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 196.497850][ T7970] R13: 00007ffd14a51aef R14: 00007f55bcbef300 R15: 0000000000022000 23:06:02 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002c000505d25a80308c63940d0c35fc60100006400a13400b053582c137153e37080c188004ac0f00d1bd", 0x33fe0}], 0x1}, 0x0) (fail_nth: 27) [ 196.497883][ T7970] 23:06:02 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8070000180081064e81f782db4cb904021d080004007c03e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) 23:06:02 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d80a0000180081064e81f782db4cb9040a1d080004007c09e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) [ 196.580708][ T7975] FAULT_INJECTION: forcing a failure. [ 196.580708][ T7975] name fail_usercopy, interval 1, probability 0, space 0, times 0 23:06:02 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (fail_nth: 27) 23:06:02 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0400005500810ce00f80ecdb4cb9f207c804a011000000020006fb0a0002000a0ada1b40d805001100c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) (fail_nth: 27) 23:06:02 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000200)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000340)=""/188, 0x1a, 0xbc, 0x1}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x8, 0x100000, 0x3, 0x2, 0x20, 0xffffffffffffffff, 0x2, '\x00', 0x0, r0, 0x5, 0x2, 0x2}, 0x48) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000500)={r0, 0x20, &(0x7f00000001c0)={&(0x7f0000000240)=""/204, 0xcc, 0x0, &(0x7f0000000440)=""/162, 0xa2}}, 0x10) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0xa, 0x92, 0x4, 0x1, 0x0, 0xffffffffffffffff, 0xadb5, '\x00', 0x0, r0, 0x4, 0x3, 0x4}, 0xfffffffffffffeba) (async) r4 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000cc0)={r4, 0xe0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000840)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x64, 0x4, &(0x7f0000000880)=[0x0], &(0x7f00000008c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000b00)=[{}, {}, {}, {}, {}], 0x8, 0x10, &(0x7f0000000940), &(0x7f0000000980), 0x8, 0x10, 0x8, 0x8, &(0x7f00000009c0)}}, 0x10) (async) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r6, &(0x7f0000000200)=ANY=[], 0x4ea00) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000c80)={[{0x2d, 'devices'}, {0x2d, 'net_cls'}, {0x2d, 'perf_event'}]}, 0x1e) bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0xb, 0x4, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}, [@ldst={0x3, 0x2, 0x1, 0x1, 0x9, 0xfffffffffffffffe, 0xfffffffffffffff0}]}, &(0x7f0000000700)='GPL\x00', 0x1, 0xef, &(0x7f0000000740)=""/239, 0x41100, 0x5, '\x00', r5, 0x0, r0, 0x8, &(0x7f0000000b40)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000b80)={0x0, 0xc, 0xff, 0x5}, 0x10, r2, r4, 0x0, &(0x7f0000000bc0)=[r6, 0xffffffffffffffff, r3]}, 0x80) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x3, 0x6, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x260dc751, 0x0, 0x0, 0x0, 0x9}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @map_val={0x18, 0x8, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x1}]}, &(0x7f00000000c0)='GPL\x00', 0x1, 0x37, &(0x7f0000000100)=""/55, 0x41100, 0x5, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000180)={0x1, 0xc, 0x610, 0x5}, 0x10, r2, 0xffffffffffffffff, 0x0, &(0x7f0000000600)=[0xffffffffffffffff, 0xffffffffffffffff, r3, r4]}, 0x80) ** 77 printk messages dropped ** [ 196.619850][ T7978] entry_SYSCALL_64_after_hwframe+0x46/0xb0 23:06:02 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d80c0000180081064e81f782db4cb9040a1d080004007c09e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) 23:06:02 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002c000505d25a80308c63940d0c35fc60100006400a13400b053582c137153e37080c188004ac0f00d1bd", 0x33fe0}], 0x1}, 0x0) (fail_nth: 28) ** 43 printk messages dropped ** [ 196.622043][ T7977] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 23:06:02 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8080000180081064e81f782db4cb904021d080004007c03e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) ** 66 printk messages dropped ** 23:06:02 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (fail_nth: 28) 23:06:02 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000200)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000340)=""/188, 0x1a, 0xbc, 0x1}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x8, 0x100000, 0x3, 0x2, 0x20, 0xffffffffffffffff, 0x2, '\x00', 0x0, r0, 0x5, 0x2, 0x2}, 0x48) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000500)={r0, 0x20, &(0x7f00000001c0)={&(0x7f0000000240)=""/204, 0xcc, 0x0, &(0x7f0000000440)=""/162, 0xa2}}, 0x10) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0xa, 0x92, 0x4, 0x1, 0x0, 0xffffffffffffffff, 0xadb5, '\x00', 0x0, r0, 0x4, 0x3, 0x4}, 0xfffffffffffffeba) (async) r4 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000cc0)={r4, 0xe0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000840)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x64, 0x4, &(0x7f0000000880)=[0x0], &(0x7f00000008c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000b00)=[{}, {}, {}, {}, {}], 0x8, 0x10, &(0x7f0000000940), &(0x7f0000000980), 0x8, 0x10, 0x8, 0x8, &(0x7f00000009c0)}}, 0x10) (async) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r6, &(0x7f0000000200)=ANY=[], 0x4ea00) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000c80)={[{0x2d, 'devices'}, {0x2d, 'net_cls'}, {0x2d, 'perf_event'}]}, 0x1e) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0xb, 0x4, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}, [@ldst={0x3, 0x2, 0x1, 0x1, 0x9, 0xfffffffffffffffe, 0xfffffffffffffff0}]}, &(0x7f0000000700)='GPL\x00', 0x1, 0xef, &(0x7f0000000740)=""/239, 0x41100, 0x5, '\x00', r5, 0x0, r0, 0x8, &(0x7f0000000b40)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000b80)={0x0, 0xc, 0xff, 0x5}, 0x10, r2, r4, 0x0, &(0x7f0000000bc0)=[r6, 0xffffffffffffffff, r3]}, 0x80) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x3, 0x6, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x260dc751, 0x0, 0x0, 0x0, 0x9}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @map_val={0x18, 0x8, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x1}]}, &(0x7f00000000c0)='GPL\x00', 0x1, 0x37, &(0x7f0000000100)=""/55, 0x41100, 0x5, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000180)={0x1, 0xc, 0x610, 0x5}, 0x10, r2, 0xffffffffffffffff, 0x0, &(0x7f0000000600)=[0xffffffffffffffff, 0xffffffffffffffff, r3, r4]}, 0x80) [ 196.655363][ T7980] CPU: 1 PID: 7980 Comm: syz-executor.5 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 23:06:02 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0400005500810ce00f80ecdb4cb9f207c804a011000000020006fb0a0002000a0ada1b40d805001100c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) (fail_nth: 28) 23:06:02 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d80e0000180081064e81f782db4cb9040a1d080004007c09e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) ** 48 printk messages dropped ** 23:06:02 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002c000505d25a80308c63940d0c35fc60100006400a13400b053582c137153e37080c188004ac0f00d1bd", 0x33fe0}], 0x1}, 0x0) (fail_nth: 29) 23:06:02 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8090000180081064e81f782db4cb904021d080004007c03e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) [ 196.656695][ T7980] R13: 00007ffde7446a9f R14: 00007f2e1731f300 R15: 0000000000022000 ** 48 printk messages dropped ** 23:06:02 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (fail_nth: 29) 23:06:02 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d80f0000180081064e81f782db4cb9040a1d080004007c09e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) [ 196.690795][ T7982] RSP: 002b:00007f21c8f89168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 23:06:02 executing program 2: perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x87, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000004c0)={r3}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x3b6af0}], 0xa, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x17, &(0x7f0000000400)=[{&(0x7f0000000340)="4f15a39a2df43b14ed5f2c578d4db055ee07f5a3d802cf8b50b4e7df21e18cb5fc59569f9e048c6343d4d93a8de61654aea60f37d00726bbbaf8413fa35f711e8ebd6b86b0d049ac43de63ad10d251b4fdb14d20706d042b10384fce5ec562f80eea2946c9cfc7f1078325732582af6da35442dfadaacf63643c41a7e5f882e09016d46b27739751f7cb3c9747d087919a9ce3b13b0c9a2774a54d8d5a2c5053ac2eebb14cad"}, {&(0x7f0000000240)="ae61a8d192171409dc2c19809ce70f90c61b402d89906f876fbb89196fa57c9dd7ed6fe73d4a9a050d32416a7e622c1c9943ab04d4e7db1546fab943d95d0a7057459e2d58c83e7f97ddda17b3aff67efc92f873b90a00b5d3c8226357fc7dce76f9ccb0c757e1f3f3d77ab2c382b1f474dbfc9f"}], 0x47, &(0x7f0000000000), 0x0, 0xb9efff7f}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000180), 0x4) 23:06:02 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0400005500810ce00f80ecdb4cb9f207c804a011000000020006fb0a0002000a0ada1b40d805001100c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) (fail_nth: 29) 23:06:02 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002c000505d25a80308c63940d0c35fc60100006400a13400b053582c137153e37080c188004ac0f00d1bd", 0x33fe0}], 0x1}, 0x0) (fail_nth: 30) ** 100 printk messages dropped ** [ 196.812040][ T7990] CPU: 1 PID: 7990 Comm: syz-executor.4 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 23:06:02 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d80a0000180081064e81f782db4cb904021d080004007c03e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) 23:06:02 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8100000180081064e81f782db4cb9040a1d080004007c09e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) [ 196.812066][ T7990] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 23:06:02 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (fail_nth: 30) 23:06:02 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002c000505d25a80308c63940d0c35fc60100006400a13400b053582c137153e37080c188004ac0f00d1bd", 0x33fe0}], 0x1}, 0x0) (fail_nth: 31) ** 155 printk messages dropped ** [ 196.897138][ T7997] 23:06:02 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0400005500810ce00f80ecdb4cb9f207c804a011000000020006fb0a0002000a0ada1b40d805001100c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) (fail_nth: 30) 23:06:02 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d80c0000180081064e81f782db4cb904021d080004007c03e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) [ 196.897146][ T7997] dump_stack_lvl+0xcd/0x134 [ 196.897176][ T7997] should_fail.cold+0x5/0xa [ 196.897210][ T7997] should_failslab+0x5/0x10 [ 196.897236][ T7997] kmem_cache_alloc_node+0x65/0x3f0 23:06:02 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8600000180081064e81f782db4cb9040a1d080004007c09e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) 23:06:02 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (fail_nth: 31) ** 50 printk messages dropped ** [ 196.919568][ T8004] Call Trace: [ 196.919574][ T8004] 23:06:02 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d80e0000180081064e81f782db4cb904021d080004007c03e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) ** 104 printk messages dropped ** [ 197.002093][ T8010] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 197.002125][ T8010] netlink_sendmsg+0x9a2/0xe10 [ 197.002155][ T8010] ? netlink_unicast+0x7f0/0x7f0 [ 197.002184][ T8010] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 ** 49 printk messages dropped ** [ 197.015382][ T8009] ? netlink_sendmsg+0x690/0xe10 [ 197.015412][ T8009] ? __rhashtable_lookup.constprop.0+0x317/0x5e0 [ 197.015452][ T8009] ? netlink_sendmsg+0x690/0xe10 [ 197.015481][ T8009] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 197.015506][ T8009] ? vfree_atomic+0xe0/0xe0 [ 197.015533][ T8009] ? __netlink_dump_start+0x900/0x900 [ 197.015556][ T8009] ? netlink_sendmsg+0x690/0xe10 [ 197.015579][ T8009] vmalloc+0x67/0x80 [ 197.015604][ T8009] ? netlink_sendmsg+0x690/0xe10 [ 197.015626][ T8009] netlink_sendmsg+0x690/0xe10 [ 197.015657][ T8009] ? netlink_unicast+0x7f0/0x7f0 [ 197.015687][ T8009] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 197.015717][ T8009] ? netlink_unicast+0x7f0/0x7f0 [ 197.015739][ T8009] sock_sendmsg+0xcf/0x120 [ 197.015768][ T8009] ____sys_sendmsg+0x6eb/0x810 [ 197.015800][ T8009] ? kernel_sendmsg+0x50/0x50 [ 197.015828][ T8009] ? do_recvmmsg+0x6d0/0x6d0 [ 197.015858][ T8009] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 197.015895][ T8009] ? _parse_integer+0x30/0x30 [ 197.015932][ T8009] ___sys_sendmsg+0xf3/0x170 [ 197.015957][ T8009] ? sendmsg_copy_msghdr+0x160/0x160 [ 197.015986][ T8009] ? lock_downgrade+0x6e0/0x6e0 [ 197.016028][ T8009] ? __fget_files+0x286/0x470 [ 197.016064][ T8009] ? __fget_light+0xea/0x270 [ 197.016090][ T8009] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 197.016124][ T8009] __x64_sys_sendmsg+0x132/0x220 [ 197.016150][ T8009] ? __sys_sendmsg+0x1b0/0x1b0 [ 197.016199][ T8009] ? syscall_enter_from_user_mode+0x21/0x70 [ 197.016241][ T8009] do_syscall_64+0x35/0xb0 [ 197.016267][ T8009] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 197.016294][ T8009] RIP: 0033:0x7f7765489109 [ 197.016314][ T8009] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 23:06:03 executing program 2: perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x87, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) (async) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000004c0)={r3}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x3b6af0}], 0xa, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x17, &(0x7f0000000400)=[{&(0x7f0000000340)="4f15a39a2df43b14ed5f2c578d4db055ee07f5a3d802cf8b50b4e7df21e18cb5fc59569f9e048c6343d4d93a8de61654aea60f37d00726bbbaf8413fa35f711e8ebd6b86b0d049ac43de63ad10d251b4fdb14d20706d042b10384fce5ec562f80eea2946c9cfc7f1078325732582af6da35442dfadaacf63643c41a7e5f882e09016d46b27739751f7cb3c9747d087919a9ce3b13b0c9a2774a54d8d5a2c5053ac2eebb14cad"}, {&(0x7f0000000240)="ae61a8d192171409dc2c19809ce70f90c61b402d89906f876fbb89196fa57c9dd7ed6fe73d4a9a050d32416a7e622c1c9943ab04d4e7db1546fab943d95d0a7057459e2d58c83e7f97ddda17b3aff67efc92f873b90a00b5d3c8226357fc7dce76f9ccb0c757e1f3f3d77ab2c382b1f474dbfc9f"}], 0x47, &(0x7f0000000000), 0x0, 0xb9efff7f}, 0x0) (async) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000180), 0x4) 23:06:03 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0400005500810ce00f80ecdb4cb9f207c804a011000000020006fb0a0002000a0ada1b40d805001100c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) (fail_nth: 31) 23:06:03 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002c000505d25a80308c63940d0c35fc60100006400a13400b053582c137153e37080c188004ac0f00d1bd", 0x33fe0}], 0x1}, 0x0) (fail_nth: 32) 23:06:03 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8f00000180081064e81f782db4cb9040a1d080004007c09e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) 23:06:03 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d80f0000180081064e81f782db4cb904021d080004007c03e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) 23:06:03 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (fail_nth: 32) 23:06:03 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8d40200180081064e81f782db4cb9040a1d080004007c09e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) 23:06:03 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002c000505d25a80308c63940d0c35fc60100006400a13400b053582c137153e37080c188004ac0f00d1bd", 0x33fe0}], 0x1}, 0x0) (fail_nth: 33) 23:06:03 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (fail_nth: 33) 23:06:03 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8100000180081064e81f782db4cb904021d080004007c03e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) 23:06:03 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0400005500810ce00f80ecdb4cb9f207c804a011000000020006fb0a0002000a0ada1b40d805001100c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) (fail_nth: 32) ** 128 printk messages dropped ** [ 197.153518][ T8019] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 197.153545][ T8019] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 23:06:03 executing program 2: perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x87, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000004c0)={r3}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x3b6af0}], 0xa, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x17, &(0x7f0000000400)=[{&(0x7f0000000340)="4f15a39a2df43b14ed5f2c578d4db055ee07f5a3d802cf8b50b4e7df21e18cb5fc59569f9e048c6343d4d93a8de61654aea60f37d00726bbbaf8413fa35f711e8ebd6b86b0d049ac43de63ad10d251b4fdb14d20706d042b10384fce5ec562f80eea2946c9cfc7f1078325732582af6da35442dfadaacf63643c41a7e5f882e09016d46b27739751f7cb3c9747d087919a9ce3b13b0c9a2774a54d8d5a2c5053ac2eebb14cad"}, {&(0x7f0000000240)="ae61a8d192171409dc2c19809ce70f90c61b402d89906f876fbb89196fa57c9dd7ed6fe73d4a9a050d32416a7e622c1c9943ab04d4e7db1546fab943d95d0a7057459e2d58c83e7f97ddda17b3aff67efc92f873b90a00b5d3c8226357fc7dce76f9ccb0c757e1f3f3d77ab2c382b1f474dbfc9f"}], 0x47, &(0x7f0000000000), 0x0, 0xb9efff7f}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000180), 0x4) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x87, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) (async) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) (async) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) (async) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000440)) (async) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000004c0)={r3}) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x3b6af0}], 0xa, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) (async) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x17, &(0x7f0000000400)=[{&(0x7f0000000340)="4f15a39a2df43b14ed5f2c578d4db055ee07f5a3d802cf8b50b4e7df21e18cb5fc59569f9e048c6343d4d93a8de61654aea60f37d00726bbbaf8413fa35f711e8ebd6b86b0d049ac43de63ad10d251b4fdb14d20706d042b10384fce5ec562f80eea2946c9cfc7f1078325732582af6da35442dfadaacf63643c41a7e5f882e09016d46b27739751f7cb3c9747d087919a9ce3b13b0c9a2774a54d8d5a2c5053ac2eebb14cad"}, {&(0x7f0000000240)="ae61a8d192171409dc2c19809ce70f90c61b402d89906f876fbb89196fa57c9dd7ed6fe73d4a9a050d32416a7e622c1c9943ab04d4e7db1546fab943d95d0a7057459e2d58c83e7f97ddda17b3aff67efc92f873b90a00b5d3c8226357fc7dce76f9ccb0c757e1f3f3d77ab2c382b1f474dbfc9f"}], 0x47, &(0x7f0000000000), 0x0, 0xb9efff7f}, 0x0) (async) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000180), 0x4) (async) ** 110 printk messages dropped ** [ 197.207817][ T8025] ? stack_trace_save+0x8c/0xc0 23:06:03 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002c000505d25a80308c63940d0c35fc60100006400a13400b053582c137153e37080c188004ac0f00d1bd", 0x33fe0}], 0x1}, 0x0) (fail_nth: 34) 23:06:03 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000300180081064e81f782db4cb9040a1d080004007c09e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) 23:06:03 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (fail_nth: 34) ** 52 printk messages dropped ** 23:06:03 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0400005500810ce00f80ecdb4cb9f207c804a011000000020006fb0a0002000a0ada1b40d805001100c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) (fail_nth: 33) 23:06:03 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8600000180081064e81f782db4cb904021d080004007c03e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) [ 197.232659][ T8024] dump_stack_lvl+0xcd/0x134 [ 197.232691][ T8024] should_fail.cold+0x5/0xa [ 197.232728][ T8024] prepare_alloc_pages+0x17b/0x570 ** 54 printk messages dropped ** 23:06:04 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (fail_nth: 35) [ 197.234400][ T8024] [ 197.236928][ T8026] FAULT_INJECTION: forcing a failure. [ 197.236928][ T8026] name failslab, interval 1, probability 0, space 0, times 0 23:06:04 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8f00000180081064e81f782db4cb904021d080004007c03e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) 23:06:04 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000500180081064e81f782db4cb9040a1d080004007c09e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) ** 88 printk messages dropped ** 23:06:04 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002c000505d25a80308c63940d0c35fc60100006400a13400b053582c137153e37080c188004ac0f00d1bd", 0x33fe0}], 0x1}, 0x0) (fail_nth: 35) 23:06:04 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0400005500810ce00f80ecdb4cb9f207c804a011000000020006fb0a0002000a0ada1b40d805001100c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) [ 197.325544][ T8041] RIP: 0033:0x7f7765489109 23:06:04 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8c00200180081064e81f782db4cb904021d080004007c03e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) [ 197.325571][ T8041] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 ** 103 printk messages dropped ** [ 197.387603][ T8048] ? __fget_files+0x286/0x470 [ 197.387635][ T8048] ? __fget_light+0xea/0x270 [ 197.387659][ T8048] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 197.387689][ T8048] __x64_sys_sendmsg+0x132/0x220 [ 197.387713][ T8048] ? __sys_sendmsg+0x1b0/0x1b0 [ 197.387749][ T8048] ? syscall_enter_from_user_mode+0x21/0x70 [ 197.387787][ T8048] do_syscall_64+0x35/0xb0 [ 197.387811][ T8048] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 197.387836][ T8048] RIP: 0033:0x7f55bba89109 [ 197.387854][ T8048] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 197.387879][ T8048] RSP: 002b:00007f55bcbef168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 197.387904][ T8048] RAX: ffffffffffffffda RBX: 00007f55bbb9bf60 RCX: 00007f55bba89109 [ 197.387921][ T8048] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 197.387936][ T8048] RBP: 00007f55bcbef1d0 R08: 0000000000000000 R09: 0000000000000000 [ 197.387951][ T8048] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 197.387965][ T8048] R13: 00007ffd14a51aef R14: 00007f55bcbef300 R15: 0000000000022000 [ 197.387997][ T8048] [ 197.390111][ T8047] netlink: 'syz-executor.0': attribute type 21 has an invalid length. [ 197.390138][ T8047] FAULT_INJECTION: forcing a failure. [ 197.390138][ T8047] name failslab, interval 1, probability 0, space 0, times 0 [ 197.390166][ T8047] CPU: 1 PID: 8047 Comm: syz-executor.0 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 197.390194][ T8047] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 197.390208][ T8047] Call Trace: [ 197.390214][ T8047] [ 197.390222][ T8047] dump_stack_lvl+0xcd/0x134 [ 197.390252][ T8047] should_fail.cold+0x5/0xa [ 197.390287][ T8047] should_failslab+0x5/0x10 [ 197.390314][ T8047] kmem_cache_alloc_node+0x65/0x3f0 [ 197.390341][ T8047] ? __alloc_skb+0x215/0x340 [ 197.390375][ T8047] __alloc_skb+0x215/0x340 [ 197.390410][ T8047] netlink_ack+0x1f0/0xa80 [ 197.390439][ T8047] ? netlink_sendmsg+0xe10/0xe10 [ 197.390465][ T8047] ? ref_tracker_dir_exit+0x3e0/0x3e0 [ 197.390503][ T8047] netlink_rcv_skb+0x33d/0x420 [ 197.390528][ T8047] ? rtnl_fdb_dump+0x9a0/0x9a0 [ 197.390560][ T8047] ? netlink_ack+0xa80/0xa80 [ 197.390581][ T8047] ? netlink_deliver_tap+0x1a2/0xc40 [ 197.390619][ T8047] ? netlink_deliver_tap+0x1b1/0xc40 [ 197.390658][ T8047] netlink_unicast+0x543/0x7f0 [ 197.390688][ T8047] ? netlink_attachskb+0x880/0x880 [ 197.390711][ T8047] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 197.390739][ T8047] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 197.390766][ T8047] ? __phys_addr_symbol+0x2c/0x70 [ 197.390795][ T8047] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 197.390821][ T8047] ? __check_object_size+0x353/0x7a0 [ 197.390867][ T8047] netlink_sendmsg+0x917/0xe10 [ 197.390898][ T8047] ? netlink_unicast+0x7f0/0x7f0 [ 197.390931][ T8047] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 197.390962][ T8047] ? netlink_unicast+0x7f0/0x7f0 [ 197.390987][ T8047] sock_sendmsg+0xcf/0x120 [ 197.391019][ T8047] ____sys_sendmsg+0x6eb/0x810 [ 197.391053][ T8047] ? kernel_sendmsg+0x50/0x50 [ 197.391079][ T8047] ? do_recvmmsg+0x6d0/0x6d0 [ 197.391103][ T8047] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 197.391138][ T8047] ? _parse_integer+0x30/0x30 [ 197.391175][ T8047] ___sys_sendmsg+0xf3/0x170 [ 197.391202][ T8047] ? sendmsg_copy_msghdr+0x160/0x160 [ 197.391233][ T8047] ? lock_downgrade+0x6e0/0x6e0 [ 197.391277][ T8047] ? __fget_files+0x286/0x470 [ 197.391314][ T8047] ? __fget_light+0xea/0x270 [ 197.391339][ T8047] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 197.391372][ T8047] __x64_sys_sendmsg+0x132/0x220 [ 197.391398][ T8047] ? __sys_sendmsg+0x1b0/0x1b0 [ 197.391438][ T8047] ? syscall_enter_from_user_mode+0x21/0x70 [ 197.391478][ T8047] do_syscall_64+0x35/0xb0 [ 197.391504][ T8047] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 197.391530][ T8047] RIP: 0033:0x7fd77c489109 [ 197.391550][ T8047] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 197.391575][ T8047] RSP: 002b:00007fd77d667168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 197.391599][ T8047] RAX: ffffffffffffffda RBX: 00007fd77c59bf60 RCX: 00007fd77c489109 [ 197.391616][ T8047] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 197.391632][ T8047] RBP: 00007fd77d6671d0 R08: 0000000000000000 R09: 0000000000000000 [ 197.391648][ T8047] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 197.391664][ T8047] R13: 00007ffed904c37f R14: 00007fd77d667300 R15: 0000000000022000 [ 197.391700][ T8047] [ 197.393635][ T8050] FAULT_INJECTION: forcing a failure. [ 197.393635][ T8050] name failslab, interval 1, probability 0, space 0, times 0 [ 197.393665][ T8050] CPU: 1 PID: 8050 Comm: syz-executor.5 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 197.393692][ T8050] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 197.393707][ T8050] Call Trace: [ 197.393713][ T8050] [ 197.393721][ T8050] dump_stack_lvl+0xcd/0x134 [ 197.393750][ T8050] should_fail.cold+0x5/0xa [ 197.393786][ T8050] should_failslab+0x5/0x10 [ 197.393813][ T8050] kmem_cache_alloc_trace+0x60/0x3f0 [ 197.393849][ T8050] ? bpf_prog_alloc_no_stats+0xd5/0x470 [ 197.393883][ T8050] bpf_prog_alloc_no_stats+0xd5/0x470 [ 197.393915][ T8050] bpf_prog_alloc+0x28/0x1a0 [ 197.393938][ T8050] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 197.393970][ T8050] bpf_prog_load+0x749/0x2250 [ 197.394007][ T8050] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 197.394039][ T8050] ? find_held_lock+0x2d/0x110 [ 197.394072][ T8050] ? __might_fault+0xd1/0x170 [ 197.394097][ T8050] ? lock_downgrade+0x6e0/0x6e0 [ 197.394142][ T8050] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 197.394175][ T8050] __sys_bpf+0x11a1/0x5700 [ 197.394209][ T8050] ? bpf_perf_link_attach+0x520/0x520 [ 197.394239][ T8050] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 197.394282][ T8050] ? find_held_lock+0x2d/0x110 [ 197.394367][ T8050] ? trace_hardirqs_on+0x38/0x1c0 [ 197.394399][ T8050] __x64_sys_bpf+0x75/0xb0 [ 197.394428][ T8050] ? syscall_enter_from_user_mode+0x21/0x70 [ 197.394461][ T8050] do_syscall_64+0x35/0xb0 [ 197.394487][ T8050] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 197.394513][ T8050] RIP: 0033:0x7f2e16289109 [ 197.394531][ T8050] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 197.394554][ T8050] RSP: 002b:00007f2e1731f168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 197.394577][ T8050] RAX: ffffffffffffffda RBX: 00007f2e1639bf60 RCX: 00007f2e16289109 [ 197.394594][ T8050] RDX: 0000000000000080 RSI: 00000000200001c0 RDI: 0000000000000005 [ 197.394609][ T8050] RBP: 00007f2e1731f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 197.394625][ T8050] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 197.394639][ T8050] R13: 00007ffde7446a9f R14: 00007f2e1731f300 R15: 0000000000022000 [ 197.394674][ T8050] [ 197.487453][ T8055] netlink: 'syz-executor.3': attribute type 21 has an invalid length. [ 197.487520][ T8055] FAULT_INJECTION: forcing a failure. [ 197.487520][ T8055] name failslab, interval 1, probability 0, space 0, times 0 [ 197.487549][ T8055] CPU: 1 PID: 8055 Comm: syz-executor.3 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 197.487576][ T8055] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 197.487590][ T8055] Call Trace: [ 197.487597][ T8055] [ 197.487605][ T8055] dump_stack_lvl+0xcd/0x134 [ 197.487637][ T8055] should_fail.cold+0x5/0xa [ 197.487672][ T8055] should_failslab+0x5/0x10 [ 197.487696][ T8055] kmem_cache_alloc_node+0x65/0x3f0 [ 197.487724][ T8055] ? __alloc_skb+0x215/0x340 [ 197.487758][ T8055] __alloc_skb+0x215/0x340 [ 197.487790][ T8055] netlink_ack+0x1f0/0xa80 [ 197.487827][ T8055] ? netlink_sendmsg+0xe10/0xe10 [ 197.487852][ T8055] ? ref_tracker_dir_exit+0x3e0/0x3e0 [ 197.487889][ T8055] netlink_rcv_skb+0x33d/0x420 [ 197.487914][ T8055] ? rtnl_fdb_dump+0x9a0/0x9a0 [ 197.487945][ T8055] ? netlink_ack+0xa80/0xa80 [ 197.487965][ T8055] ? netlink_deliver_tap+0x1a2/0xc40 [ 197.488001][ T8055] ? netlink_deliver_tap+0x1b1/0xc40 [ 197.488040][ T8055] netlink_unicast+0x543/0x7f0 [ 197.488068][ T8055] ? netlink_attachskb+0x880/0x880 [ 197.488090][ T8055] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 197.488118][ T8055] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 197.488145][ T8055] ? __phys_addr_symbol+0x2c/0x70 [ 197.488171][ T8055] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 197.488196][ T8055] ? __check_object_size+0x353/0x7a0 [ 197.488231][ T8055] netlink_sendmsg+0x917/0xe10 [ 197.488261][ T8055] ? netlink_unicast+0x7f0/0x7f0 [ 197.488290][ T8055] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 197.488318][ T8055] ? netlink_unicast+0x7f0/0x7f0 [ 197.488341][ T8055] sock_sendmsg+0xcf/0x120 [ 197.488371][ T8055] ____sys_sendmsg+0x6eb/0x810 [ 197.488403][ T8055] ? kernel_sendmsg+0x50/0x50 [ 197.488429][ T8055] ? do_recvmmsg+0x6d0/0x6d0 [ 197.488452][ T8055] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 197.488487][ T8055] ? _parse_integer+0x30/0x30 [ 197.488523][ T8055] ___sys_sendmsg+0xf3/0x170 [ 197.488551][ T8055] ? sendmsg_copy_msghdr+0x160/0x160 [ 197.488583][ T8055] ? lock_downgrade+0x6e0/0x6e0 [ 197.488628][ T8055] ? __fget_files+0x286/0x470 [ 197.488665][ T8055] ? __fget_light+0xea/0x270 [ 197.488692][ T8055] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 197.488725][ T8055] __x64_sys_sendmsg+0x132/0x220 [ 197.488751][ T8055] ? __sys_sendmsg+0x1b0/0x1b0 [ 197.488791][ T8055] ? syscall_enter_from_user_mode+0x21/0x70 [ 197.488838][ T8055] do_syscall_64+0x35/0xb0 [ 197.488864][ T8055] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 197.488889][ T8055] RIP: 0033:0x7f21c7e89109 [ 197.488908][ T8055] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 197.488934][ T8055] RSP: 002b:00007f21c8f89168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 197.488959][ T8055] RAX: ffffffffffffffda RBX: 00007f21c7f9bf60 RCX: 00007f21c7e89109 [ 197.488975][ T8055] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 197.488990][ T8055] RBP: 00007f21c8f891d0 R08: 0000000000000000 R09: 0000000000000000 [ 197.489005][ T8055] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 197.489020][ T8055] R13: 00007ffca6ce140f R14: 00007f21c8f89300 R15: 0000000000022000 [ 197.489055][ T8055] [ 197.489880][ T8054] FAULT_INJECTION: forcing a failure. [ 197.489880][ T8054] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 197.489911][ T8054] CPU: 1 PID: 8054 Comm: syz-executor.4 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 197.489937][ T8054] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 197.489951][ T8054] Call Trace: [ 197.489956][ T8054] [ 197.489963][ T8054] dump_stack_lvl+0xcd/0x134 [ 197.489992][ T8054] should_fail.cold+0x5/0xa [ 197.490029][ T8054] prepare_alloc_pages+0x17b/0x570 [ 197.490064][ T8054] __alloc_pages+0x12f/0x500 [ 197.490088][ T8054] ? __alloc_pages_slowpath.constprop.0+0x20e0/0x20e0 [ 197.490117][ T8054] ? __kmalloc_node+0x62/0x390 [ 197.490163][ T8054] alloc_pages+0x1aa/0x310 [ 197.490194][ T8054] __vmalloc_node_range+0x735/0x13e0 [ 197.490238][ T8054] ? netlink_sendmsg+0x690/0xe10 [ 197.490266][ T8054] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 197.490293][ T8054] ? vfree_atomic+0xe0/0xe0 [ 197.490320][ T8054] ? __netlink_dump_start+0x900/0x900 [ 197.490342][ T8054] ? netlink_sendmsg+0x690/0xe10 [ 197.490366][ T8054] vmalloc+0x67/0x80 [ 197.490392][ T8054] ? netlink_sendmsg+0x690/0xe10 [ 197.490415][ T8054] netlink_sendmsg+0x690/0xe10 [ 197.490447][ T8054] ? netlink_unicast+0x7f0/0x7f0 [ 197.490481][ T8054] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 197.490513][ T8054] ? netlink_unicast+0x7f0/0x7f0 [ 197.490540][ T8054] sock_sendmsg+0xcf/0x120 [ 197.490574][ T8054] ____sys_sendmsg+0x6eb/0x810 [ 197.490610][ T8054] ? kernel_sendmsg+0x50/0x50 [ 197.490640][ T8054] ? do_recvmmsg+0x6d0/0x6d0 [ 197.490662][ T8054] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 197.490694][ T8054] ? _parse_integer+0x30/0x30 [ 197.490728][ T8054] ___sys_sendmsg+0xf3/0x170 [ 197.490753][ T8054] ? sendmsg_copy_msghdr+0x160/0x160 [ 197.490783][ T8054] ? lock_downgrade+0x6e0/0x6e0 [ 197.490836][ T8054] ? __fget_files+0x286/0x470 [ 197.490872][ T8054] ? __fget_light+0xea/0x270 [ 197.490897][ T8054] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 197.490929][ T8054] __x64_sys_sendmsg+0x132/0x220 [ 197.490954][ T8054] ? __sys_sendmsg+0x1b0/0x1b0 [ 197.490992][ T8054] ? syscall_enter_from_user_mode+0x21/0x70 [ 197.491029][ T8054] do_syscall_64+0x35/0xb0 [ 197.491055][ T8054] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 197.491080][ T8054] RIP: 0033:0x7f7765489109 [ 197.491099][ T8054] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 197.491126][ T8054] RSP: 002b:00007f7766559168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 197.491150][ T8054] RAX: ffffffffffffffda RBX: 00007f776559bf60 RCX: 00007f7765489109 [ 197.491168][ T8054] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 197.491183][ T8054] RBP: 00007f77665591d0 R08: 0000000000000000 R09: 0000000000000000 [ 197.491198][ T8054] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 197.491214][ T8054] R13: 00007ffec1cb653f R14: 00007f7766559300 R15: 0000000000022000 [ 197.491247][ T8054] [ 197.546449][ T8058] FAULT_INJECTION: forcing a failure. [ 197.546449][ T8058] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 197.546484][ T8058] CPU: 1 PID: 8058 Comm: syz-executor.1 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 197.546514][ T8058] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 197.546530][ T8058] Call Trace: [ 197.546537][ T8058] [ 197.546545][ T8058] dump_stack_lvl+0xcd/0x134 [ 197.546576][ T8058] should_fail.cold+0x5/0xa [ 197.546613][ T8058] prepare_alloc_pages+0x17b/0x570 [ 197.546647][ T8058] __alloc_pages+0x12f/0x500 [ 197.546674][ T8058] ? __alloc_pages_slowpath.constprop.0+0x20e0/0x20e0 [ 197.546704][ T8058] ? find_held_lock+0x2d/0x110 [ 197.546742][ T8058] ? lock_downgrade+0x6e0/0x6e0 [ 197.546771][ T8058] ? do_raw_spin_lock+0x120/0x2a0 [ 197.546816][ T8058] alloc_pages+0x1aa/0x310 [ 197.546850][ T8058] __get_free_pages+0x8/0x40 [ 197.546878][ T8058] kasan_populate_vmalloc_pte+0x25/0x160 [ 197.546907][ T8058] __apply_to_page_range+0x686/0x1030 [ 197.546936][ T8058] ? kasan_poison+0x60/0x60 [ 197.546974][ T8058] alloc_vmap_area+0xb0f/0x1f00 [ 197.547017][ T8058] ? free_vmap_area+0x1ac0/0x1ac0 [ 197.547046][ T8058] ? rcu_read_lock_sched_held+0x3a/0x70 [ 197.547076][ T8058] ? trace_kmalloc_node+0x32/0x100 [ 197.547110][ T8058] __get_vm_area_node+0x142/0x3f0 [ 197.547143][ T8058] __vmalloc_node_range+0x250/0x13e0 [ 197.547174][ T8058] ? netlink_sendmsg+0x690/0xe10 [ 197.547203][ T8058] ? __rhashtable_lookup.constprop.0+0x317/0x5e0 [ 197.547245][ T8058] ? netlink_sendmsg+0x690/0xe10 [ 197.547271][ T8058] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 197.547300][ T8058] ? vfree_atomic+0xe0/0xe0 [ 197.547329][ T8058] ? __netlink_dump_start+0x900/0x900 [ 197.547353][ T8058] ? netlink_sendmsg+0x690/0xe10 [ 197.547380][ T8058] vmalloc+0x67/0x80 [ 197.547406][ T8058] ? netlink_sendmsg+0x690/0xe10 [ 197.547429][ T8058] netlink_sendmsg+0x690/0xe10 [ 197.547457][ T8058] ? netlink_unicast+0x7f0/0x7f0 [ 197.547489][ T8058] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 197.547520][ T8058] ? netlink_unicast+0x7f0/0x7f0 [ 197.547545][ T8058] sock_sendmsg+0xcf/0x120 [ 197.547577][ T8058] ____sys_sendmsg+0x6eb/0x810 [ 197.547611][ T8058] ? kernel_sendmsg+0x50/0x50 [ 197.547639][ T8058] ? do_recvmmsg+0x6d0/0x6d0 [ 197.547663][ T8058] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 197.547698][ T8058] ? _parse_integer+0x30/0x30 [ 197.547736][ T8058] ___sys_sendmsg+0xf3/0x170 [ 197.547763][ T8058] ? sendmsg_copy_msghdr+0x160/0x160 [ 197.547795][ T8058] ? lock_downgrade+0x6e0/0x6e0 [ 197.547847][ T8058] ? __fget_files+0x286/0x470 [ 197.547884][ T8058] ? __fget_light+0xea/0x270 [ 197.547912][ T8058] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 197.547946][ T8058] __x64_sys_sendmsg+0x132/0x220 [ 197.547971][ T8058] ? __sys_sendmsg+0x1b0/0x1b0 [ 197.548009][ T8058] ? syscall_enter_from_user_mode+0x21/0x70 [ 197.548046][ T8058] do_syscall_64+0x35/0xb0 [ 197.548071][ T8058] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 197.548096][ T8058] RIP: 0033:0x7f55bba89109 [ 197.548116][ T8058] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 197.548142][ T8058] RSP: 002b:00007f55bcbef168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 197.548165][ T8058] RAX: ffffffffffffffda RBX: 00007f55bbb9bf60 RCX: 00007f55bba89109 [ 197.548182][ T8058] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 197.548197][ T8058] RBP: 00007f55bcbef1d0 R08: 0000000000000000 R09: 0000000000000000 [ 197.548211][ T8058] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 197.548225][ T8058] R13: 00007ffd14a51aef R14: 00007f55bcbef300 R15: 0000000000022000 [ 197.548258][ T8058] [ 197.556617][ T8060] netlink: 'syz-executor.0': attribute type 21 has an invalid length. [ 197.556657][ T8060] FAULT_INJECTION: forcing a failure. [ 197.556657][ T8060] name failslab, interval 1, probability 0, space 0, times 0 [ 197.556687][ T8060] CPU: 0 PID: 8060 Comm: syz-executor.0 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 197.556717][ T8060] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 197.556732][ T8060] Call Trace: [ 197.556739][ T8060] [ 197.556747][ T8060] dump_stack_lvl+0xcd/0x134 [ 197.556780][ T8060] should_fail.cold+0x5/0xa [ 197.556815][ T8060] should_failslab+0x5/0x10 [ 197.556843][ T8060] __kmalloc_node_track_caller+0x7d/0x360 [ 197.556872][ T8060] ? netlink_ack+0x1f0/0xa80 [ 197.556902][ T8060] __alloc_skb+0xde/0x340 [ 197.556937][ T8060] netlink_ack+0x1f0/0xa80 [ 197.556966][ T8060] ? netlink_sendmsg+0xe10/0xe10 [ 197.556992][ T8060] ? ref_tracker_dir_exit+0x3e0/0x3e0 [ 197.557031][ T8060] netlink_rcv_skb+0x33d/0x420 [ 197.557055][ T8060] ? rtnl_fdb_dump+0x9a0/0x9a0 [ 197.557084][ T8060] ? netlink_ack+0xa80/0xa80 [ 197.557103][ T8060] ? netlink_deliver_tap+0x1a2/0xc40 [ 197.557136][ T8060] ? netlink_deliver_tap+0x1b1/0xc40 [ 197.557172][ T8060] netlink_unicast+0x543/0x7f0 [ 197.557201][ T8060] ? netlink_attachskb+0x880/0x880 [ 197.557224][ T8060] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 197.557253][ T8060] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 197.557280][ T8060] ? __phys_addr_symbol+0x2c/0x70 [ 197.557317][ T8060] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 197.557344][ T8060] ? __check_object_size+0x353/0x7a0 [ 197.557383][ T8060] netlink_sendmsg+0x917/0xe10 [ 197.557414][ T8060] ? netlink_unicast+0x7f0/0x7f0 [ 197.557446][ T8060] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 197.557476][ T8060] ? netlink_unicast+0x7f0/0x7f0 [ 197.557501][ T8060] sock_sendmsg+0xcf/0x120 [ 197.557533][ T8060] ____sys_sendmsg+0x6eb/0x810 [ 197.557567][ T8060] ? kernel_sendmsg+0x50/0x50 [ 197.557598][ T8060] ? do_recvmmsg+0x6d0/0x6d0 [ 197.557622][ T8060] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 197.557656][ T8060] ? _parse_integer+0x30/0x30 [ 197.557692][ T8060] ___sys_sendmsg+0xf3/0x170 [ 197.557717][ T8060] ? sendmsg_copy_msghdr+0x160/0x160 [ 197.557744][ T8060] ? lock_downgrade+0x6e0/0x6e0 [ 197.557786][ T8060] ? __fget_files+0x286/0x470 [ 197.557821][ T8060] ? __fget_light+0xea/0x270 [ 197.557846][ T8060] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 197.557880][ T8060] __x64_sys_sendmsg+0x132/0x220 [ 197.557906][ T8060] ? __sys_sendmsg+0x1b0/0x1b0 [ 197.557947][ T8060] ? syscall_enter_from_user_mode+0x21/0x70 [ 197.557987][ T8060] do_syscall_64+0x35/0xb0 [ 197.558014][ T8060] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 197.558041][ T8060] RIP: 0033:0x7fd77c489109 [ 197.558061][ T8060] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 197.558086][ T8060] RSP: 002b:00007fd77d667168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 197.558110][ T8060] RAX: ffffffffffffffda RBX: 00007fd77c59bf60 RCX: 00007fd77c489109 [ 197.558128][ T8060] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 197.558145][ T8060] RBP: 00007fd77d6671d0 R08: 0000000000000000 R09: 0000000000000000 [ 197.558162][ T8060] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 197.558175][ T8060] R13: 00007ffed904c37f R14: 00007fd77d667300 R15: 0000000000022000 [ 197.558209][ T8060] [ 197.568021][ T8061] FAULT_INJECTION: forcing a failure. [ 197.568021][ T8061] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 197.568054][ T8061] CPU: 0 PID: 8061 Comm: syz-executor.5 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 197.568084][ T8061] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 197.568099][ T8061] Call Trace: [ 197.568106][ T8061] [ 197.568115][ T8061] dump_stack_lvl+0xcd/0x134 [ 197.568147][ T8061] should_fail.cold+0x5/0xa [ 197.568185][ T8061] _copy_from_user+0x2a/0x170 [ 197.568214][ T8061] bpf_prog_load+0x13e1/0x2250 [ 197.568251][ T8061] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 197.568283][ T8061] ? find_held_lock+0x2d/0x110 [ 197.568328][ T8061] ? __might_fault+0xd1/0x170 [ 197.568355][ T8061] ? lock_downgrade+0x6e0/0x6e0 [ 197.568402][ T8061] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 197.568438][ T8061] __sys_bpf+0x11a1/0x5700 [ 197.568472][ T8061] ? bpf_perf_link_attach+0x520/0x520 [ 197.568502][ T8061] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 197.568547][ T8061] ? find_held_lock+0x2d/0x110 [ 197.568602][ T8061] ? trace_hardirqs_on+0x38/0x1c0 [ 197.568632][ T8061] __x64_sys_bpf+0x75/0xb0 [ 197.568661][ T8061] ? syscall_enter_from_user_mode+0x21/0x70 [ 197.568694][ T8061] do_syscall_64+0x35/0xb0 [ 197.568720][ T8061] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 197.568748][ T8061] RIP: 0033:0x7f2e16289109 [ 197.568770][ T8061] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 197.568796][ T8061] RSP: 002b:00007f2e1731f168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 197.568820][ T8061] RAX: ffffffffffffffda RBX: 00007f2e1639bf60 RCX: 00007f2e16289109 [ 197.568839][ T8061] RDX: 0000000000000080 RSI: 00000000200001c0 RDI: 0000000000000005 [ 197.568854][ T8061] RBP: 00007f2e1731f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 197.568870][ T8061] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 197.568886][ T8061] R13: 00007ffde7446a9f R14: 00007f2e1731f300 R15: 0000000000022000 [ 197.568919][ T8061] [ 197.676327][ T8069] FAULT_INJECTION: forcing a failure. [ 197.676327][ T8069] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 197.676364][ T8069] CPU: 1 PID: 8069 Comm: syz-executor.4 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 197.676392][ T8069] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 197.676406][ T8069] Call Trace: [ 197.676413][ T8069] [ 197.676421][ T8069] dump_stack_lvl+0xcd/0x134 [ 197.676452][ T8069] should_fail.cold+0x5/0xa [ 197.676487][ T8069] prepare_alloc_pages+0x17b/0x570 [ 197.676519][ T8069] __alloc_pages+0x12f/0x500 [ 197.676545][ T8069] ? __alloc_pages_slowpath.constprop.0+0x20e0/0x20e0 [ 197.676573][ T8069] ? __kmalloc_node+0x62/0x390 [ 197.676618][ T8069] alloc_pages+0x1aa/0x310 [ 197.676651][ T8069] __vmalloc_node_range+0x735/0x13e0 [ 197.676695][ T8069] ? netlink_sendmsg+0x690/0xe10 [ 197.676724][ T8069] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 197.676753][ T8069] ? vfree_atomic+0xe0/0xe0 [ 197.676783][ T8069] ? __netlink_dump_start+0x900/0x900 [ 197.676809][ T8069] ? netlink_sendmsg+0x690/0xe10 [ 197.676834][ T8069] vmalloc+0x67/0x80 [ 197.676871][ T8069] ? netlink_sendmsg+0x690/0xe10 [ 197.676900][ T8069] netlink_sendmsg+0x690/0xe10 [ 197.676931][ T8069] ? netlink_unicast+0x7f0/0x7f0 [ 197.676961][ T8069] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 197.676990][ T8069] ? netlink_unicast+0x7f0/0x7f0 [ 197.677014][ T8069] sock_sendmsg+0xcf/0x120 [ 197.677045][ T8069] ____sys_sendmsg+0x6eb/0x810 [ 197.677077][ T8069] ? kernel_sendmsg+0x50/0x50 [ 197.677103][ T8069] ? do_recvmmsg+0x6d0/0x6d0 [ 197.677126][ T8069] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 197.677159][ T8069] ? _parse_integer+0x30/0x30 [ 197.677195][ T8069] ___sys_sendmsg+0xf3/0x170 [ 197.677220][ T8069] ? sendmsg_copy_msghdr+0x160/0x160 [ 197.677251][ T8069] ? lock_downgrade+0x6e0/0x6e0 [ 197.677292][ T8069] ? __fget_files+0x286/0x470 [ 197.677328][ T8069] ? __fget_light+0xea/0x270 [ 197.677353][ T8069] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 197.677385][ T8069] __x64_sys_sendmsg+0x132/0x220 [ 197.677410][ T8069] ? __sys_sendmsg+0x1b0/0x1b0 [ 197.677450][ T8069] ? syscall_enter_from_user_mode+0x21/0x70 [ 197.677489][ T8069] do_syscall_64+0x35/0xb0 [ 197.677517][ T8069] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 197.677542][ T8069] RIP: 0033:0x7f7765489109 [ 197.677561][ T8069] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 197.677586][ T8069] RSP: 002b:00007f7766559168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 197.677612][ T8069] RAX: ffffffffffffffda RBX: 00007f776559bf60 RCX: 00007f7765489109 [ 197.677629][ T8069] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 197.677645][ T8069] RBP: 00007f77665591d0 R08: 0000000000000000 R09: 0000000000000000 [ 197.677660][ T8069] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 197.677674][ T8069] R13: 00007ffec1cb653f R14: 00007f7766559300 R15: 0000000000022000 [ 197.677707][ T8069] [ 197.677819][ T8070] netlink: 'syz-executor.3': attribute type 21 has an invalid length. [ 197.677853][ T8070] FAULT_INJECTION: forcing a failure. [ 197.677853][ T8070] name failslab, interval 1, probability 0, space 0, times 0 [ 197.677876][ T8070] CPU: 0 PID: 8070 Comm: syz-executor.3 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 197.677901][ T8070] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 197.677915][ T8070] Call Trace: [ 197.677921][ T8070] [ 197.677928][ T8070] dump_stack_lvl+0xcd/0x134 [ 197.677956][ T8070] should_fail.cold+0x5/0xa [ 197.677990][ T8070] should_failslab+0x5/0x10 [ 197.678015][ T8070] __kmalloc_node_track_caller+0x7d/0x360 [ 197.678042][ T8070] ? netlink_ack+0x1f0/0xa80 [ 197.678070][ T8070] __alloc_skb+0xde/0x340 [ 197.678103][ T8070] netlink_ack+0x1f0/0xa80 [ 197.678131][ T8070] ? netlink_sendmsg+0xe10/0xe10 [ 197.678156][ T8070] ? ref_tracker_dir_exit+0x3e0/0x3e0 [ 197.678193][ T8070] netlink_rcv_skb+0x33d/0x420 [ 197.678217][ T8070] ? rtnl_fdb_dump+0x9a0/0x9a0 [ 197.678247][ T8070] ? netlink_ack+0xa80/0xa80 [ 197.678268][ T8070] ? netlink_deliver_tap+0x1a2/0xc40 [ 197.678303][ T8070] ? netlink_deliver_tap+0x1b1/0xc40 [ 197.678339][ T8070] netlink_unicast+0x543/0x7f0 [ 197.678376][ T8070] ? netlink_attachskb+0x880/0x880 [ 197.678398][ T8070] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 197.678427][ T8070] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 197.678453][ T8070] ? __phys_addr_symbol+0x2c/0x70 [ 197.678480][ T8070] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 197.678505][ T8070] ? __check_object_size+0x353/0x7a0 [ 197.678540][ T8070] netlink_sendmsg+0x917/0xe10 [ 197.678568][ T8070] ? netlink_unicast+0x7f0/0x7f0 [ 197.678598][ T8070] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 197.678625][ T8070] ? netlink_unicast+0x7f0/0x7f0 [ 197.678652][ T8070] sock_sendmsg+0xcf/0x120 [ 197.678684][ T8070] ____sys_sendmsg+0x6eb/0x810 [ 197.678715][ T8070] ? kernel_sendmsg+0x50/0x50 [ 197.678741][ T8070] ? do_recvmmsg+0x6d0/0x6d0 [ 197.678763][ T8070] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 197.678796][ T8070] ? _parse_integer+0x30/0x30 [ 197.678830][ T8070] ___sys_sendmsg+0xf3/0x170 [ 197.678855][ T8070] ? sendmsg_copy_msghdr+0x160/0x160 [ 197.678884][ T8070] ? lock_downgrade+0x6e0/0x6e0 [ 197.678924][ T8070] ? __fget_files+0x286/0x470 [ 197.678957][ T8070] ? __fget_light+0xea/0x270 [ 197.678982][ T8070] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 197.679013][ T8070] __x64_sys_sendmsg+0x132/0x220 [ 197.679036][ T8070] ? __sys_sendmsg+0x1b0/0x1b0 [ 197.679072][ T8070] ? syscall_enter_from_user_mode+0x21/0x70 [ 197.679109][ T8070] do_syscall_64+0x35/0xb0 [ 197.679133][ T8070] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 197.679157][ T8070] RIP: 0033:0x7f21c7e89109 [ 197.679175][ T8070] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 197.679198][ T8070] RSP: 002b:00007f21c8f89168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 197.679220][ T8070] RAX: ffffffffffffffda RBX: 00007f21c7f9bf60 RCX: 00007f21c7e89109 [ 197.679236][ T8070] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 197.679251][ T8070] RBP: 00007f21c8f891d0 R08: 0000000000000000 R09: 0000000000000000 [ 197.679266][ T8070] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 197.679280][ T8070] R13: 00007ffca6ce140f R14: 00007f21c8f89300 R15: 0000000000022000 [ 197.679311][ T8070] [ 197.710788][ T8073] netlink: 'syz-executor.0': attribute type 21 has an invalid length. [ 197.710844][ T8073] FAULT_INJECTION: forcing a failure. [ 197.710844][ T8073] name failslab, interval 1, probability 0, space 0, times 0 [ 197.710871][ T8073] CPU: 0 PID: 8073 Comm: syz-executor.0 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 197.710898][ T8073] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 197.710912][ T8073] Call Trace: [ 197.710918][ T8073] [ 197.710927][ T8073] dump_stack_lvl+0xcd/0x134 [ 197.710959][ T8073] should_fail.cold+0x5/0xa [ 197.710990][ T8073] ? skb_clone+0x170/0x3c0 [ 197.711013][ T8073] should_failslab+0x5/0x10 [ 197.711039][ T8073] kmem_cache_alloc+0x5e/0x3b0 [ 197.711072][ T8073] skb_clone+0x170/0x3c0 [ 197.711098][ T8073] netlink_deliver_tap+0xa8a/0xc40 [ 197.711138][ T8073] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 197.711173][ T8073] netlink_unicast+0x6ac/0x7f0 [ 197.711202][ T8073] ? netlink_attachskb+0x880/0x880 [ 197.711223][ T8073] ? __sanitizer_cov_trace_cmp4+0x1c/0x70 [ 197.711249][ T8073] ? memset+0x20/0x40 [ 197.711270][ T8073] ? __nlmsg_put+0x155/0x1c0 [ 197.711302][ T8073] netlink_ack+0x5cd/0xa80 [ 197.711328][ T8073] ? netlink_sendmsg+0xe10/0xe10 [ 197.711362][ T8073] ? ref_tracker_dir_exit+0x3e0/0x3e0 [ 197.711402][ T8073] netlink_rcv_skb+0x33d/0x420 [ 197.711429][ T8073] ? rtnl_fdb_dump+0x9a0/0x9a0 [ 197.711463][ T8073] ? netlink_ack+0xa80/0xa80 [ 197.711484][ T8073] ? netlink_deliver_tap+0x1a2/0xc40 [ 197.711519][ T8073] ? netlink_deliver_tap+0x1b1/0xc40 [ 197.711557][ T8073] netlink_unicast+0x543/0x7f0 [ 197.711586][ T8073] ? netlink_attachskb+0x880/0x880 [ 197.711608][ T8073] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 197.711636][ T8073] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 197.711661][ T8073] ? __phys_addr_symbol+0x2c/0x70 [ 197.711689][ T8073] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 197.711715][ T8073] ? __check_object_size+0x353/0x7a0 [ 197.711753][ T8073] netlink_sendmsg+0x917/0xe10 [ 197.711783][ T8073] ? netlink_unicast+0x7f0/0x7f0 [ 197.711814][ T8073] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 197.711841][ T8073] ? netlink_unicast+0x7f0/0x7f0 [ 197.711865][ T8073] sock_sendmsg+0xcf/0x120 [ 197.711896][ T8073] ____sys_sendmsg+0x6eb/0x810 [ 197.711926][ T8073] ? kernel_sendmsg+0x50/0x50 [ 197.711952][ T8073] ? do_recvmmsg+0x6d0/0x6d0 [ 197.711975][ T8073] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 197.712010][ T8073] ? _parse_integer+0x30/0x30 [ 197.712048][ T8073] ___sys_sendmsg+0xf3/0x170 [ 197.712074][ T8073] ? sendmsg_copy_msghdr+0x160/0x160 [ 197.712106][ T8073] ? lock_downgrade+0x6e0/0x6e0 [ 197.712150][ T8073] ? __fget_files+0x286/0x470 [ 197.712186][ T8073] ? __fget_light+0xea/0x270 [ 197.712213][ T8073] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 197.712244][ T8073] __x64_sys_sendmsg+0x132/0x220 [ 197.712269][ T8073] ? __sys_sendmsg+0x1b0/0x1b0 [ 197.712309][ T8073] ? syscall_enter_from_user_mode+0x21/0x70 [ 197.712358][ T8073] do_syscall_64+0x35/0xb0 [ 197.712385][ T8073] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 197.712410][ T8073] RIP: 0033:0x7fd77c489109 [ 197.712431][ T8073] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 197.712457][ T8073] RSP: 002b:00007fd77d667168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 197.712482][ T8073] RAX: ffffffffffffffda RBX: 00007fd77c59bf60 RCX: 00007fd77c489109 [ 197.712500][ T8073] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 197.712515][ T8073] RBP: 00007fd77d6671d0 R08: 0000000000000000 R09: 0000000000000000 [ 197.712531][ T8073] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 197.712546][ T8073] R13: 00007ffed904c37f R14: 00007fd77d667300 R15: 0000000000022000 [ 197.712583][ T8073] [ 197.714461][ T8075] FAULT_INJECTION: forcing a failure. [ 197.714461][ T8075] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 197.714491][ T8075] CPU: 0 PID: 8075 Comm: syz-executor.1 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 197.714517][ T8075] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 197.714531][ T8075] Call Trace: [ 197.714537][ T8075] [ 197.714544][ T8075] dump_stack_lvl+0xcd/0x134 [ 197.714576][ T8075] should_fail.cold+0x5/0xa [ 197.714613][ T8075] prepare_alloc_pages+0x17b/0x570 [ 197.714645][ T8075] __alloc_pages+0x12f/0x500 [ 197.714669][ T8075] ? __alloc_pages_slowpath.constprop.0+0x20e0/0x20e0 [ 197.714698][ T8075] ? find_held_lock+0x2d/0x110 [ 197.714733][ T8075] ? lock_downgrade+0x6e0/0x6e0 [ 197.714760][ T8075] ? do_raw_spin_lock+0x120/0x2a0 [ 197.714794][ T8075] alloc_pages+0x1aa/0x310 [ 197.714826][ T8075] __get_free_pages+0x8/0x40 [ 197.714852][ T8075] kasan_populate_vmalloc_pte+0x25/0x160 [ 197.714880][ T8075] __apply_to_page_range+0x686/0x1030 [ 197.714909][ T8075] ? kasan_poison+0x60/0x60 [ 197.714945][ T8075] alloc_vmap_area+0xb0f/0x1f00 [ 197.714986][ T8075] ? free_vmap_area+0x1ac0/0x1ac0 [ 197.715013][ T8075] ? rcu_read_lock_sched_held+0x3a/0x70 [ 197.715042][ T8075] ? trace_kmalloc_node+0x32/0x100 [ 197.715075][ T8075] __get_vm_area_node+0x142/0x3f0 [ 197.715107][ T8075] __vmalloc_node_range+0x250/0x13e0 [ 197.715136][ T8075] ? netlink_sendmsg+0x690/0xe10 [ 197.715164][ T8075] ? __rhashtable_lookup.constprop.0+0x317/0x5e0 [ 197.715203][ T8075] ? netlink_sendmsg+0x690/0xe10 [ 197.715230][ T8075] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 197.715259][ T8075] ? vfree_atomic+0xe0/0xe0 [ 197.715287][ T8075] ? __netlink_dump_start+0x900/0x900 [ 197.715312][ T8075] ? netlink_sendmsg+0x690/0xe10 [ 197.715338][ T8075] vmalloc+0x67/0x80 [ 197.715374][ T8075] ? netlink_sendmsg+0x690/0xe10 [ 197.715398][ T8075] netlink_sendmsg+0x690/0xe10 [ 197.715428][ T8075] ? netlink_unicast+0x7f0/0x7f0 [ 197.715459][ T8075] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 197.715489][ T8075] ? netlink_unicast+0x7f0/0x7f0 [ 197.715511][ T8075] sock_sendmsg+0xcf/0x120 [ 197.715546][ T8075] ____sys_sendmsg+0x6eb/0x810 [ 197.715582][ T8075] ? kernel_sendmsg+0x50/0x50 [ 197.715609][ T8075] ? do_recvmmsg+0x6d0/0x6d0 [ 197.715631][ T8075] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 197.715661][ T8075] ? _parse_integer+0x30/0x30 [ 197.715697][ T8075] ___sys_sendmsg+0xf3/0x170 [ 197.715724][ T8075] ? sendmsg_copy_msghdr+0x160/0x160 [ 197.715757][ T8075] ? lock_downgrade+0x6e0/0x6e0 [ 197.715803][ T8075] ? __fget_files+0x286/0x470 [ 197.715839][ T8075] ? __fget_light+0xea/0x270 [ 197.715865][ T8075] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 197.715898][ T8075] __x64_sys_sendmsg+0x132/0x220 [ 197.715924][ T8075] ? __sys_sendmsg+0x1b0/0x1b0 [ 197.715963][ T8075] ? syscall_enter_from_user_mode+0x21/0x70 [ 197.716003][ T8075] do_syscall_64+0x35/0xb0 [ 197.716029][ T8075] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 197.716055][ T8075] RIP: 0033:0x7f55bba89109 [ 197.716075][ T8075] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 197.716100][ T8075] RSP: 002b:00007f55bcbef168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 197.716124][ T8075] RAX: ffffffffffffffda RBX: 00007f55bbb9bf60 RCX: 00007f55bba89109 [ 197.716143][ T8075] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 197.716159][ T8075] RBP: 00007f55bcbef1d0 R08: 0000000000000000 R09: 0000000000000000 [ 197.716175][ T8075] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 197.716191][ T8075] R13: 00007ffd14a51aef R14: 00007f55bcbef300 R15: 0000000000022000 [ 197.716227][ T8075] [ 197.721008][ T8076] FAULT_INJECTION: forcing a failure. [ 197.721008][ T8076] name failslab, interval 1, probability 0, space 0, times 0 [ 197.721042][ T8076] CPU: 0 PID: 8076 Comm: syz-executor.5 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 197.721069][ T8076] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 197.721083][ T8076] Call Trace: [ 197.721088][ T8076] [ 197.721096][ T8076] dump_stack_lvl+0xcd/0x134 [ 197.721124][ T8076] should_fail.cold+0x5/0xa [ 197.721158][ T8076] should_failslab+0x5/0x10 [ 197.721183][ T8076] kmem_cache_alloc_trace+0x60/0x3f0 [ 197.721213][ T8076] ? bpf_check+0x137/0xbbc0 [ 197.721244][ T8076] bpf_check+0x137/0xbbc0 [ 197.721275][ T8076] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 197.721308][ T8076] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 197.721359][ T8076] ? bpf_get_btf_vmlinux+0x10/0x10 [ 197.721393][ T8076] ? lock_downgrade+0x6e0/0x6e0 [ 197.721423][ T8076] ? __might_fault+0xd1/0x170 [ 197.721450][ T8076] ? lock_downgrade+0x6e0/0x6e0 [ 197.721483][ T8076] ? ktime_get_with_offset+0x3f2/0x500 [ 197.721525][ T8076] ? memset+0x20/0x40 [ 197.721558][ T8076] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 197.721589][ T8076] ? bpf_obj_name_cpy+0x144/0x1a0 [ 197.721620][ T8076] ? bpf_prog_load+0xf71/0x2250 [ 197.721652][ T8076] bpf_prog_load+0xfb2/0x2250 [ 197.721688][ T8076] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 197.721719][ T8076] ? find_held_lock+0x2d/0x110 [ 197.721749][ T8076] ? __might_fault+0xd1/0x170 [ 197.721774][ T8076] ? lock_downgrade+0x6e0/0x6e0 [ 197.721817][ T8076] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 197.721850][ T8076] __sys_bpf+0x11a1/0x5700 [ 197.721883][ T8076] ? bpf_perf_link_attach+0x520/0x520 [ 197.721913][ T8076] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 197.721955][ T8076] ? find_held_lock+0x2d/0x110 [ 197.722015][ T8076] ? trace_hardirqs_on+0x38/0x1c0 [ 197.722046][ T8076] __x64_sys_bpf+0x75/0xb0 [ 197.722074][ T8076] ? syscall_enter_from_user_mode+0x21/0x70 [ 197.722107][ T8076] do_syscall_64+0x35/0xb0 [ 197.722133][ T8076] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 197.722159][ T8076] RIP: 0033:0x7f2e16289109 [ 197.722180][ T8076] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 197.722204][ T8076] RSP: 002b:00007f2e1731f168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 197.722229][ T8076] RAX: ffffffffffffffda RBX: 00007f2e1639bf60 RCX: 00007f2e16289109 [ 197.722247][ T8076] RDX: 0000000000000080 RSI: 00000000200001c0 RDI: 0000000000000005 [ 197.722264][ T8076] RBP: 00007f2e1731f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 197.722280][ T8076] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 197.722297][ T8076] R13: 00007ffde7446a9f R14: 00007f2e1731f300 R15: 0000000000022000 [ 197.722332][ T8076] [ 197.820955][ T8088] netlink: 'syz-executor.3': attribute type 21 has an invalid length. [ 197.821002][ T8088] FAULT_INJECTION: forcing a failure. [ 197.821002][ T8088] name failslab, interval 1, probability 0, space 0, times 0 [ 197.821031][ T8088] CPU: 0 PID: 8088 Comm: syz-executor.3 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 197.821059][ T8088] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 197.821074][ T8088] Call Trace: [ 197.821080][ T8088] [ 197.821088][ T8088] dump_stack_lvl+0xcd/0x134 [ 197.821121][ T8088] should_fail.cold+0x5/0xa [ 197.821155][ T8088] ? skb_clone+0x170/0x3c0 [ 197.821180][ T8088] should_failslab+0x5/0x10 [ 197.821206][ T8088] kmem_cache_alloc+0x5e/0x3b0 [ 197.821240][ T8088] skb_clone+0x170/0x3c0 [ 197.821267][ T8088] netlink_deliver_tap+0xa8a/0xc40 [ 197.821302][ T8088] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 197.821342][ T8088] netlink_unicast+0x6ac/0x7f0 [ 197.821373][ T8088] ? netlink_attachskb+0x880/0x880 [ 197.821397][ T8088] ? __sanitizer_cov_trace_cmp4+0x1c/0x70 [ 197.821426][ T8088] ? memset+0x20/0x40 [ 197.821450][ T8088] ? __nlmsg_put+0x155/0x1c0 [ 197.821485][ T8088] netlink_ack+0x5cd/0xa80 [ 197.821513][ T8088] ? netlink_sendmsg+0xe10/0xe10 [ 197.821539][ T8088] ? ref_tracker_dir_exit+0x3e0/0x3e0 [ 197.821578][ T8088] netlink_rcv_skb+0x33d/0x420 [ 197.821604][ T8088] ? rtnl_fdb_dump+0x9a0/0x9a0 [ 197.821636][ T8088] ? netlink_ack+0xa80/0xa80 [ 197.821657][ T8088] ? netlink_deliver_tap+0x1a2/0xc40 [ 197.821696][ T8088] ? netlink_deliver_tap+0x1b1/0xc40 [ 197.821737][ T8088] netlink_unicast+0x543/0x7f0 [ 197.821766][ T8088] ? netlink_attachskb+0x880/0x880 [ 197.821789][ T8088] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 197.821817][ T8088] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 197.821843][ T8088] ? __phys_addr_symbol+0x2c/0x70 [ 197.821876][ T8088] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 197.821901][ T8088] ? __check_object_size+0x353/0x7a0 [ 197.821939][ T8088] netlink_sendmsg+0x917/0xe10 [ 197.821971][ T8088] ? netlink_unicast+0x7f0/0x7f0 [ 197.822004][ T8088] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 197.822034][ T8088] ? netlink_unicast+0x7f0/0x7f0 [ 197.822058][ T8088] sock_sendmsg+0xcf/0x120 [ 197.822091][ T8088] ____sys_sendmsg+0x6eb/0x810 [ 197.822125][ T8088] ? kernel_sendmsg+0x50/0x50 [ 197.822152][ T8088] ? do_recvmmsg+0x6d0/0x6d0 [ 197.822177][ T8088] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 197.822211][ T8088] ? _parse_integer+0x30/0x30 [ 197.822250][ T8088] ___sys_sendmsg+0xf3/0x170 [ 197.822277][ T8088] ? sendmsg_copy_msghdr+0x160/0x160 [ 197.822309][ T8088] ? lock_downgrade+0x6e0/0x6e0 [ 197.822359][ T8088] ? __fget_files+0x286/0x470 [ 197.822397][ T8088] ? __fget_light+0xea/0x270 [ 197.822423][ T8088] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 197.822456][ T8088] __x64_sys_sendmsg+0x132/0x220 [ 197.822482][ T8088] ? __sys_sendmsg+0x1b0/0x1b0 [ 197.822507][ T8088] ? restore_fpregs_from_fpstate+0xcc/0x1e0 [ 197.822551][ T8088] ? syscall_enter_from_user_mode+0x21/0x70 [ 197.822591][ T8088] do_syscall_64+0x35/0xb0 [ 197.822617][ T8088] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 197.822643][ T8088] RIP: 0033:0x7f21c7e89109 [ 197.822664][ T8088] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 197.822688][ T8088] RSP: 002b:00007f21c8f89168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 197.822713][ T8088] RAX: ffffffffffffffda RBX: 00007f21c7f9bf60 RCX: 00007f21c7e89109 [ 197.822730][ T8088] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 197.822746][ T8088] RBP: 00007f21c8f891d0 R08: 0000000000000000 R09: 0000000000000000 [ 197.822762][ T8088] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 197.822777][ T8088] R13: 00007ffca6ce140f R14: 00007f21c8f89300 R15: 0000000000022000 [ 197.822813][ T8088] [ 197.841851][ T8092] FAULT_INJECTION: forcing a failure. [ 197.841851][ T8092] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 197.841885][ T8092] CPU: 0 PID: 8092 Comm: syz-executor.1 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 197.841912][ T8092] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 197.841925][ T8092] Call Trace: [ 197.841931][ T8092] [ 197.841940][ T8092] dump_stack_lvl+0xcd/0x134 [ 197.841972][ T8092] should_fail.cold+0x5/0xa [ 197.842009][ T8092] prepare_alloc_pages+0x17b/0x570 [ 197.842043][ T8092] __alloc_pages+0x12f/0x500 [ 197.842070][ T8092] ? __alloc_pages_slowpath.constprop.0+0x20e0/0x20e0 [ 197.842100][ T8092] ? find_held_lock+0x2d/0x110 [ 197.842135][ T8092] ? lock_downgrade+0x6e0/0x6e0 [ 197.842164][ T8092] ? do_raw_spin_lock+0x120/0x2a0 [ 197.842201][ T8092] alloc_pages+0x1aa/0x310 [ 197.842239][ T8092] __get_free_pages+0x8/0x40 [ 197.842268][ T8092] kasan_populate_vmalloc_pte+0x25/0x160 [ 197.842296][ T8092] __apply_to_page_range+0x686/0x1030 [ 197.842324][ T8092] ? kasan_poison+0x60/0x60 [ 197.842368][ T8092] alloc_vmap_area+0xb0f/0x1f00 [ 197.842413][ T8092] ? free_vmap_area+0x1ac0/0x1ac0 [ 197.842440][ T8092] ? rcu_read_lock_sched_held+0x3a/0x70 [ 197.842468][ T8092] ? trace_kmalloc_node+0x32/0x100 [ 197.842499][ T8092] __get_vm_area_node+0x142/0x3f0 [ 197.842532][ T8092] __vmalloc_node_range+0x250/0x13e0 [ 197.842562][ T8092] ? netlink_sendmsg+0x690/0xe10 [ 197.842590][ T8092] ? __rhashtable_lookup.constprop.0+0x317/0x5e0 [ 197.842631][ T8092] ? netlink_sendmsg+0x690/0xe10 [ 197.842660][ T8092] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 197.842688][ T8092] ? vfree_atomic+0xe0/0xe0 [ 197.842719][ T8092] ? __netlink_dump_start+0x900/0x900 [ 197.842744][ T8092] ? netlink_sendmsg+0x690/0xe10 [ 197.842770][ T8092] vmalloc+0x67/0x80 [ 197.842796][ T8092] ? netlink_sendmsg+0x690/0xe10 [ 197.842821][ T8092] netlink_sendmsg+0x690/0xe10 [ 197.842850][ T8092] ? netlink_unicast+0x7f0/0x7f0 [ 197.842879][ T8092] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 197.842907][ T8092] ? netlink_unicast+0x7f0/0x7f0 [ 197.842931][ T8092] sock_sendmsg+0xcf/0x120 [ 197.842964][ T8092] ____sys_sendmsg+0x6eb/0x810 [ 197.842995][ T8092] ? kernel_sendmsg+0x50/0x50 [ 197.843021][ T8092] ? do_recvmmsg+0x6d0/0x6d0 [ 197.843044][ T8092] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 197.843077][ T8092] ? _parse_integer+0x30/0x30 [ 197.843112][ T8092] ___sys_sendmsg+0xf3/0x170 [ 197.843138][ T8092] ? sendmsg_copy_msghdr+0x160/0x160 [ 197.843169][ T8092] ? lock_downgrade+0x6e0/0x6e0 [ 197.843211][ T8092] ? __fget_files+0x286/0x470 [ 197.843245][ T8092] ? __fget_light+0xea/0x270 [ 197.843271][ T8092] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 197.843303][ T8092] __x64_sys_sendmsg+0x132/0x220 [ 197.843327][ T8092] ? __sys_sendmsg+0x1b0/0x1b0 [ 197.843370][ T8092] ? syscall_enter_from_user_mode+0x21/0x70 [ 197.843409][ T8092] do_syscall_64+0x35/0xb0 [ 197.843435][ T8092] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 197.843458][ T8092] RIP: 0033:0x7f55bba89109 [ 197.843475][ T8092] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 197.843499][ T8092] RSP: 002b:00007f55bcbef168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 197.843523][ T8092] RAX: ffffffffffffffda RBX: 00007f55bbb9bf60 RCX: 00007f55bba89109 [ 197.843541][ T8092] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 197.843556][ T8092] RBP: 00007f55bcbef1d0 R08: 0000000000000000 R09: 0000000000000000 [ 197.843571][ T8092] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 197.843586][ T8092] R13: 00007ffd14a51aef R14: 00007f55bcbef300 R15: 0000000000022000 [ 197.843619][ T8092] [ 197.864112][ T8093] FAULT_INJECTION: forcing a failure. [ 197.864112][ T8093] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 197.864145][ T8093] CPU: 1 PID: 8093 Comm: syz-executor.4 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 197.864171][ T8093] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 197.864186][ T8093] Call Trace: [ 197.864192][ T8093] [ 197.864199][ T8093] dump_stack_lvl+0xcd/0x134 [ 197.864231][ T8093] should_fail.cold+0x5/0xa [ 197.864266][ T8093] prepare_alloc_pages+0x17b/0x570 [ 197.864300][ T8093] __alloc_pages+0x12f/0x500 [ 197.864326][ T8093] ? __alloc_pages_slowpath.constprop.0+0x20e0/0x20e0 [ 197.864355][ T8093] ? __kmalloc_node+0x62/0x390 [ 197.864401][ T8093] alloc_pages+0x1aa/0x310 [ 197.864437][ T8093] __vmalloc_node_range+0x735/0x13e0 [ 197.864481][ T8093] ? netlink_sendmsg+0x690/0xe10 [ 197.864511][ T8093] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 197.864540][ T8093] ? vfree_atomic+0xe0/0xe0 [ 197.864570][ T8093] ? __netlink_dump_start+0x900/0x900 [ 197.864594][ T8093] ? netlink_sendmsg+0x690/0xe10 [ 197.864620][ T8093] vmalloc+0x67/0x80 [ 197.864645][ T8093] ? netlink_sendmsg+0x690/0xe10 [ 197.864668][ T8093] netlink_sendmsg+0x690/0xe10 [ 197.864697][ T8093] ? netlink_unicast+0x7f0/0x7f0 [ 197.864728][ T8093] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 197.864758][ T8093] ? netlink_unicast+0x7f0/0x7f0 [ 197.864782][ T8093] sock_sendmsg+0xcf/0x120 [ 197.864814][ T8093] ____sys_sendmsg+0x6eb/0x810 [ 197.864855][ T8093] ? kernel_sendmsg+0x50/0x50 [ 197.864884][ T8093] ? do_recvmmsg+0x6d0/0x6d0 [ 197.864909][ T8093] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 197.864946][ T8093] ? _parse_integer+0x30/0x30 [ 197.864984][ T8093] ___sys_sendmsg+0xf3/0x170 [ 197.865011][ T8093] ? sendmsg_copy_msghdr+0x160/0x160 [ 197.865042][ T8093] ? lock_downgrade+0x6e0/0x6e0 [ 197.865085][ T8093] ? __fget_files+0x286/0x470 [ 197.865121][ T8093] ? __fget_light+0xea/0x270 [ 197.865147][ T8093] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 197.865180][ T8093] __x64_sys_sendmsg+0x132/0x220 [ 197.865206][ T8093] ? __sys_sendmsg+0x1b0/0x1b0 [ 197.865245][ T8093] ? syscall_enter_from_user_mode+0x21/0x70 [ 197.865284][ T8093] do_syscall_64+0x35/0xb0 [ 197.865311][ T8093] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 197.865336][ T8093] RIP: 0033:0x7f7765489109 [ 197.865357][ T8093] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 197.865382][ T8093] RSP: 002b:00007f7766559168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 197.865407][ T8093] RAX: ffffffffffffffda RBX: 00007f776559bf60 RCX: 00007f7765489109 [ 197.865424][ T8093] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 197.865439][ T8093] RBP: 00007f77665591d0 R08: 0000000000000000 R09: 0000000000000000 [ 197.865455][ T8093] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 197.865470][ T8093] R13: 00007ffec1cb653f R14: 00007f7766559300 R15: 0000000000022000 [ 197.865501][ T8093] [ 197.879380][ T8094] netlink: 'syz-executor.0': attribute type 21 has an invalid length. [ 197.879488][ T8094] FAULT_INJECTION: forcing a failure. [ 197.879488][ T8094] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 197.879517][ T8094] CPU: 0 PID: 8094 Comm: syz-executor.0 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 197.879545][ T8094] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 197.879559][ T8094] Call Trace: [ 197.879565][ T8094] [ 197.879573][ T8094] dump_stack_lvl+0xcd/0x134 [ 197.879606][ T8094] should_fail.cold+0x5/0xa [ 197.879642][ T8094] _copy_to_user+0x2a/0x140 [ 197.879671][ T8094] simple_read_from_buffer+0xcc/0x160 [ 197.879706][ T8094] proc_fail_nth_read+0x187/0x220 [ 197.879737][ T8094] ? proc_exe_link+0x1d0/0x1d0 [ 197.879766][ T8094] ? security_file_permission+0xab/0xd0 [ 197.879797][ T8094] ? proc_exe_link+0x1d0/0x1d0 [ 197.879824][ T8094] vfs_read+0x1ef/0x5d0 [ 197.879855][ T8094] ksys_read+0x127/0x250 [ 197.879881][ T8094] ? vfs_write+0xac0/0xac0 [ 197.879910][ T8094] ? syscall_enter_from_user_mode+0x21/0x70 [ 197.879947][ T8094] do_syscall_64+0x35/0xb0 [ 197.879973][ T8094] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 197.879999][ T8094] RIP: 0033:0x7fd77c43bcbc [ 197.880018][ T8094] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 197.880042][ T8094] RSP: 002b:00007fd77d667160 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 197.880066][ T8094] RAX: ffffffffffffffda RBX: 00007fd77c59bf60 RCX: 00007fd77c43bcbc [ 197.880084][ T8094] RDX: 000000000000000f RSI: 00007fd77d6671e0 RDI: 0000000000000004 [ 197.880100][ T8094] RBP: 00007fd77d6671d0 R08: 0000000000000000 R09: 0000000000000000 [ 197.880119][ T8094] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 197.880136][ T8094] R13: 00007ffed904c37f R14: 00007fd77d667300 R15: 0000000000022000 [ 197.880172][ T8094] [ 197.886422][ T8091] FAULT_INJECTION: forcing a failure. [ 197.886422][ T8091] name failslab, interval 1, probability 0, space 0, times 0 [ 197.886456][ T8091] CPU: 0 PID: 8091 Comm: syz-executor.5 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 197.886484][ T8091] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 197.886500][ T8091] Call Trace: [ 197.886507][ T8091] [ 197.886515][ T8091] dump_stack_lvl+0xcd/0x134 [ 197.886547][ T8091] should_fail.cold+0x5/0xa [ 197.886583][ T8091] ? __get_vm_area_node+0xed/0x3f0 [ 197.886613][ T8091] should_failslab+0x5/0x10 [ 197.886643][ T8091] kmem_cache_alloc_node_trace+0x59/0x420 [ 197.886674][ T8091] ? kasan_save_stack+0x2e/0x40 [ 197.886708][ T8091] __get_vm_area_node+0xed/0x3f0 [ 197.886742][ T8091] __vmalloc_node_range+0x250/0x13e0 [ 197.886770][ T8091] ? bpf_check+0x1e1/0xbbc0 [ 197.886806][ T8091] ? bpf_check+0x1e1/0xbbc0 [ 197.886833][ T8091] ? vfree_atomic+0xe0/0xe0 [ 197.886863][ T8091] ? bpf_check+0x1e1/0xbbc0 [ 197.886889][ T8091] vzalloc+0x67/0x80 [ 197.886917][ T8091] ? bpf_check+0x1e1/0xbbc0 [ 197.886941][ T8091] bpf_check+0x1e1/0xbbc0 [ 197.886974][ T8091] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 197.887009][ T8091] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 197.887053][ T8091] ? bpf_get_btf_vmlinux+0x10/0x10 [ 197.887084][ T8091] ? lock_downgrade+0x6e0/0x6e0 [ 197.887111][ T8091] ? __might_fault+0xd1/0x170 [ 197.887136][ T8091] ? lock_downgrade+0x6e0/0x6e0 [ 197.887170][ T8091] ? ktime_get_with_offset+0x3f2/0x500 [ 197.887205][ T8091] ? memset+0x20/0x40 [ 197.887227][ T8091] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 197.887255][ T8091] ? bpf_obj_name_cpy+0x144/0x1a0 [ 197.887285][ T8091] ? bpf_prog_load+0xf71/0x2250 [ 197.887316][ T8091] bpf_prog_load+0xfb2/0x2250 [ 197.887363][ T8091] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 197.887396][ T8091] ? find_held_lock+0x2d/0x110 [ 197.887428][ T8091] ? __might_fault+0xd1/0x170 [ 197.887452][ T8091] ? lock_downgrade+0x6e0/0x6e0 [ 197.887492][ T8091] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 197.887525][ T8091] __sys_bpf+0x11a1/0x5700 [ 197.887559][ T8091] ? bpf_perf_link_attach+0x520/0x520 [ 197.887589][ T8091] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 197.887632][ T8091] ? find_held_lock+0x2d/0x110 [ 197.887689][ T8091] ? trace_hardirqs_on+0x38/0x1c0 [ 197.887720][ T8091] __x64_sys_bpf+0x75/0xb0 [ 197.887749][ T8091] ? syscall_enter_from_user_mode+0x21/0x70 [ 197.887782][ T8091] do_syscall_64+0x35/0xb0 [ 197.887808][ T8091] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 197.887834][ T8091] RIP: 0033:0x7f2e16289109 [ 197.887854][ T8091] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 197.887879][ T8091] RSP: 002b:00007f2e1731f168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 197.887902][ T8091] RAX: ffffffffffffffda RBX: 00007f2e1639bf60 RCX: 00007f2e16289109 [ 197.887920][ T8091] RDX: 0000000000000080 RSI: 00000000200001c0 RDI: 0000000000000005 [ 197.887935][ T8091] RBP: 00007f2e1731f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 197.887950][ T8091] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 197.887965][ T8091] R13: 00007ffde7446a9f R14: 00007f2e1731f300 R15: 0000000000022000 [ 197.887998][ T8091] [ 197.990704][ T8098] FAULT_INJECTION: forcing a failure. [ 197.990704][ T8098] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 197.990738][ T8098] CPU: 1 PID: 8098 Comm: syz-executor.1 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 197.990766][ T8098] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 197.990780][ T8098] Call Trace: [ 197.990786][ T8098] [ 197.990794][ T8098] dump_stack_lvl+0xcd/0x134 [ 197.990832][ T8098] should_fail.cold+0x5/0xa [ 197.990870][ T8098] prepare_alloc_pages+0x17b/0x570 [ 197.990904][ T8098] __alloc_pages+0x12f/0x500 [ 197.990929][ T8098] ? __alloc_pages_slowpath.constprop.0+0x20e0/0x20e0 [ 197.990959][ T8098] ? __kmalloc_node+0x62/0x390 [ 197.991005][ T8098] alloc_pages+0x1aa/0x310 [ 197.991038][ T8098] __vmalloc_node_range+0x735/0x13e0 [ 197.991082][ T8098] ? netlink_sendmsg+0x690/0xe10 [ 197.991111][ T8098] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 197.991144][ T8098] ? vfree_atomic+0xe0/0xe0 [ 197.991174][ T8098] ? __netlink_dump_start+0x900/0x900 [ 197.991200][ T8098] ? netlink_sendmsg+0x690/0xe10 [ 197.991226][ T8098] vmalloc+0x67/0x80 [ 197.991252][ T8098] ? netlink_sendmsg+0x690/0xe10 [ 197.991276][ T8098] netlink_sendmsg+0x690/0xe10 [ 197.991305][ T8098] ? netlink_unicast+0x7f0/0x7f0 [ 197.991335][ T8098] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 197.991364][ T8098] ? netlink_unicast+0x7f0/0x7f0 [ 197.991397][ T8098] sock_sendmsg+0xcf/0x120 [ 197.991430][ T8098] ____sys_sendmsg+0x6eb/0x810 [ 197.991466][ T8098] ? kernel_sendmsg+0x50/0x50 [ 197.991493][ T8098] ? do_recvmmsg+0x6d0/0x6d0 [ 197.991517][ T8098] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 197.991552][ T8098] ? _parse_integer+0x30/0x30 [ 197.991590][ T8098] ___sys_sendmsg+0xf3/0x170 [ 197.991617][ T8098] ? sendmsg_copy_msghdr+0x160/0x160 [ 197.991648][ T8098] ? lock_downgrade+0x6e0/0x6e0 [ 197.991691][ T8098] ? __fget_files+0x286/0x470 [ 197.991726][ T8098] ? __fget_light+0xea/0x270 [ 197.991753][ T8098] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 197.991785][ T8098] __x64_sys_sendmsg+0x132/0x220 [ 197.991811][ T8098] ? __sys_sendmsg+0x1b0/0x1b0 [ 197.991855][ T8098] ? syscall_enter_from_user_mode+0x21/0x70 [ 197.991896][ T8098] do_syscall_64+0x35/0xb0 [ 197.991923][ T8098] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 197.991949][ T8098] RIP: 0033:0x7f55bba89109 [ 197.991969][ T8098] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 197.991994][ T8098] RSP: 002b:00007f55bcbef168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 197.992018][ T8098] RAX: ffffffffffffffda RBX: 00007f55bbb9bf60 RCX: 00007f55bba89109 [ 197.992035][ T8098] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 197.992051][ T8098] RBP: 00007f55bcbef1d0 R08: 0000000000000000 R09: 0000000000000000 [ 197.992066][ T8098] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 197.992082][ T8098] R13: 00007ffd14a51aef R14: 00007f55bcbef300 R15: 0000000000022000 [ 197.992116][ T8098] [ 198.006557][ T8096] FAULT_INJECTION: forcing a failure. [ 198.006557][ T8096] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 198.006591][ T8096] CPU: 1 PID: 8096 Comm: syz-executor.4 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 198.006623][ T8096] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 198.006639][ T8096] Call Trace: [ 198.006645][ T8096] [ 198.006654][ T8096] dump_stack_lvl+0xcd/0x134 [ 198.006687][ T8096] should_fail.cold+0x5/0xa [ 198.006724][ T8096] prepare_alloc_pages+0x17b/0x570 [ 198.006757][ T8096] __alloc_pages+0x12f/0x500 [ 198.006783][ T8096] ? __alloc_pages_slowpath.constprop.0+0x20e0/0x20e0 [ 198.006813][ T8096] ? __kmalloc_node+0x62/0x390 [ 198.006865][ T8096] alloc_pages+0x1aa/0x310 [ 198.006900][ T8096] __vmalloc_node_range+0x735/0x13e0 [ 198.006945][ T8096] ? netlink_sendmsg+0x690/0xe10 [ 198.006977][ T8096] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 198.007008][ T8096] ? vfree_atomic+0xe0/0xe0 [ 198.007038][ T8096] ? __netlink_dump_start+0x900/0x900 [ 198.007064][ T8096] ? netlink_sendmsg+0x690/0xe10 [ 198.007091][ T8096] vmalloc+0x67/0x80 [ 198.007118][ T8096] ? netlink_sendmsg+0x690/0xe10 [ 198.007142][ T8096] netlink_sendmsg+0x690/0xe10 [ 198.007172][ T8096] ? netlink_unicast+0x7f0/0x7f0 [ 198.007203][ T8096] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 198.007233][ T8096] ? netlink_unicast+0x7f0/0x7f0 [ 198.007257][ T8096] sock_sendmsg+0xcf/0x120 [ 198.007288][ T8096] ____sys_sendmsg+0x6eb/0x810 [ 198.007321][ T8096] ? kernel_sendmsg+0x50/0x50 [ 198.007348][ T8096] ? do_recvmmsg+0x6d0/0x6d0 [ 198.007372][ T8096] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 198.007406][ T8096] ? _parse_integer+0x30/0x30 [ 198.007444][ T8096] ___sys_sendmsg+0xf3/0x170 [ 198.007470][ T8096] ? sendmsg_copy_msghdr+0x160/0x160 [ 198.007501][ T8096] ? lock_downgrade+0x6e0/0x6e0 [ 198.007544][ T8096] ? __fget_files+0x286/0x470 [ 198.007580][ T8096] ? __fget_light+0xea/0x270 [ 198.007606][ T8096] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 198.007638][ T8096] __x64_sys_sendmsg+0x132/0x220 [ 198.007664][ T8096] ? __sys_sendmsg+0x1b0/0x1b0 [ 198.007704][ T8096] ? syscall_enter_from_user_mode+0x21/0x70 [ 198.007742][ T8096] do_syscall_64+0x35/0xb0 [ 198.007768][ T8096] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 198.007795][ T8096] RIP: 0033:0x7f7765489109 [ 198.007815][ T8096] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 198.007849][ T8096] RSP: 002b:00007f7766559168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 198.007875][ T8096] RAX: ffffffffffffffda RBX: 00007f776559bf60 RCX: 00007f7765489109 [ 198.007893][ T8096] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 198.007910][ T8096] RBP: 00007f77665591d0 R08: 0000000000000000 R09: 0000000000000000 [ 198.007926][ T8096] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 198.007942][ T8096] R13: 00007ffec1cb653f R14: 00007f7766559300 R15: 0000000000022000 [ 198.007978][ T8096] [ 198.060871][ T8102] FAULT_INJECTION: forcing a failure. [ 198.060871][ T8102] name failslab, interval 1, probability 0, space 0, times 0 [ 198.060905][ T8102] CPU: 1 PID: 8102 Comm: syz-executor.5 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 198.060934][ T8102] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 198.060950][ T8102] Call Trace: [ 198.060957][ T8102] [ 198.060966][ T8102] dump_stack_lvl+0xcd/0x134 [ 198.060999][ T8102] should_fail.cold+0x5/0xa [ 198.061036][ T8102] ? __get_vm_area_node+0xed/0x3f0 [ 198.061066][ T8102] should_failslab+0x5/0x10 [ 198.061094][ T8102] kmem_cache_alloc_node_trace+0x59/0x420 [ 198.061125][ T8102] ? kasan_save_stack+0x2e/0x40 [ 198.061159][ T8102] __get_vm_area_node+0xed/0x3f0 [ 198.061191][ T8102] __vmalloc_node_range+0x250/0x13e0 [ 198.061221][ T8102] ? bpf_check+0x1e1/0xbbc0 [ 198.061258][ T8102] ? bpf_check+0x1e1/0xbbc0 [ 198.061287][ T8102] ? vfree_atomic+0xe0/0xe0 [ 198.061319][ T8102] ? bpf_check+0x1e1/0xbbc0 [ 198.061345][ T8102] vzalloc+0x67/0x80 [ 198.061371][ T8102] ? bpf_check+0x1e1/0xbbc0 [ 198.061394][ T8102] bpf_check+0x1e1/0xbbc0 [ 198.061422][ T8102] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 198.061456][ T8102] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 198.061499][ T8102] ? bpf_get_btf_vmlinux+0x10/0x10 [ 198.061531][ T8102] ? lock_downgrade+0x6e0/0x6e0 [ 198.061557][ T8102] ? __might_fault+0xd1/0x170 [ 198.061581][ T8102] ? lock_downgrade+0x6e0/0x6e0 [ 198.061612][ T8102] ? ktime_get_with_offset+0x3f2/0x500 [ 198.061647][ T8102] ? memset+0x20/0x40 [ 198.061667][ T8102] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 198.061695][ T8102] ? bpf_obj_name_cpy+0x144/0x1a0 [ 198.061724][ T8102] ? bpf_prog_load+0xf71/0x2250 [ 198.061755][ T8102] bpf_prog_load+0xfb2/0x2250 [ 198.061791][ T8102] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 198.061831][ T8102] ? find_held_lock+0x2d/0x110 [ 198.061866][ T8102] ? __might_fault+0xd1/0x170 [ 198.061892][ T8102] ? lock_downgrade+0x6e0/0x6e0 [ 198.061939][ T8102] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 198.061973][ T8102] __sys_bpf+0x11a1/0x5700 [ 198.062007][ T8102] ? bpf_perf_link_attach+0x520/0x520 [ 198.062037][ T8102] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 198.062079][ T8102] ? find_held_lock+0x2d/0x110 [ 198.062133][ T8102] ? trace_hardirqs_on+0x38/0x1c0 [ 198.062164][ T8102] __x64_sys_bpf+0x75/0xb0 [ 198.062192][ T8102] ? syscall_enter_from_user_mode+0x21/0x70 [ 198.062225][ T8102] do_syscall_64+0x35/0xb0 [ 198.062251][ T8102] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 198.062277][ T8102] RIP: 0033:0x7f2e16289109 [ 198.062297][ T8102] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 198.062323][ T8102] RSP: 002b:00007f2e1731f168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 198.062349][ T8102] RAX: ffffffffffffffda RBX: 00007f2e1639bf60 RCX: 00007f2e16289109 [ 198.062365][ T8102] RDX: 0000000000000080 RSI: 00000000200001c0 RDI: 0000000000000005 [ 198.062381][ T8102] RBP: 00007f2e1731f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 198.062396][ T8102] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 198.062410][ T8102] R13: 00007ffde7446a9f R14: 00007f2e1731f300 R15: 0000000000022000 [ 198.062444][ T8102] [ 198.075288][ T8103] netlink: 'syz-executor.3': attribute type 21 has an invalid length. [ 198.075441][ T8103] FAULT_INJECTION: forcing a failure. [ 198.075441][ T8103] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 198.075628][ T8103] CPU: 0 PID: 8103 Comm: syz-executor.3 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 198.075658][ T8103] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 198.075672][ T8103] Call Trace: [ 198.075679][ T8103] [ 198.075687][ T8103] dump_stack_lvl+0xcd/0x134 [ 198.075722][ T8103] should_fail.cold+0x5/0xa [ 198.075760][ T8103] _copy_to_user+0x2a/0x140 [ 198.075790][ T8103] simple_read_from_buffer+0xcc/0x160 [ 198.075822][ T8103] proc_fail_nth_read+0x187/0x220 [ 198.075854][ T8103] ? proc_exe_link+0x1d0/0x1d0 [ 198.075883][ T8103] ? security_file_permission+0xab/0xd0 [ 198.075915][ T8103] ? proc_exe_link+0x1d0/0x1d0 [ 198.075944][ T8103] vfs_read+0x1ef/0x5d0 [ 198.075975][ T8103] ksys_read+0x127/0x250 [ 198.076003][ T8103] ? vfs_write+0xac0/0xac0 [ 198.076032][ T8103] ? syscall_enter_from_user_mode+0x21/0x70 [ 198.076073][ T8103] do_syscall_64+0x35/0xb0 [ 198.076100][ T8103] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 198.076126][ T8103] RIP: 0033:0x7f21c7e3bcbc [ 198.076145][ T8103] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 198.076168][ T8103] RSP: 002b:00007f21c8f89160 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 198.076192][ T8103] RAX: ffffffffffffffda RBX: 00007f21c7f9bf60 RCX: 00007f21c7e3bcbc [ 198.076208][ T8103] RDX: 000000000000000f RSI: 00007f21c8f891e0 RDI: 0000000000000004 [ 198.076224][ T8103] RBP: 00007f21c8f891d0 R08: 0000000000000000 R09: 0000000000000000 [ 198.076240][ T8103] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 198.076256][ T8103] R13: 00007ffca6ce140f R14: 00007f21c8f89300 R15: 0000000000022000 [ 198.076294][ T8103] [ 198.163545][ T8111] FAULT_INJECTION: forcing a failure. [ 198.163545][ T8111] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 198.163578][ T8111] CPU: 1 PID: 8111 Comm: syz-executor.4 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 198.163606][ T8111] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 198.163620][ T8111] Call Trace: [ 198.163626][ T8111] [ 198.163634][ T8111] dump_stack_lvl+0xcd/0x134 [ 198.163667][ T8111] should_fail.cold+0x5/0xa [ 198.163704][ T8111] prepare_alloc_pages+0x17b/0x570 [ 198.163739][ T8111] __alloc_pages+0x12f/0x500 [ 198.163772][ T8111] ? __alloc_pages_slowpath.constprop.0+0x20e0/0x20e0 [ 198.163802][ T8111] ? __kmalloc_node+0x62/0x390 [ 198.163851][ T8111] alloc_pages+0x1aa/0x310 [ 198.163888][ T8111] __vmalloc_node_range+0x735/0x13e0 [ 198.163935][ T8111] ? netlink_sendmsg+0x690/0xe10 [ 198.163964][ T8111] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 198.163994][ T8111] ? vfree_atomic+0xe0/0xe0 [ 198.164024][ T8111] ? __netlink_dump_start+0x900/0x900 [ 198.164050][ T8111] ? netlink_sendmsg+0x690/0xe10 [ 198.164077][ T8111] vmalloc+0x67/0x80 [ 198.164104][ T8111] ? netlink_sendmsg+0x690/0xe10 [ 198.164128][ T8111] netlink_sendmsg+0x690/0xe10 [ 198.164159][ T8111] ? netlink_unicast+0x7f0/0x7f0 [ 198.164188][ T8111] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 198.164216][ T8111] ? netlink_unicast+0x7f0/0x7f0 [ 198.164240][ T8111] sock_sendmsg+0xcf/0x120 [ 198.164268][ T8111] ____sys_sendmsg+0x6eb/0x810 [ 198.164298][ T8111] ? kernel_sendmsg+0x50/0x50 [ 198.164323][ T8111] ? do_recvmmsg+0x6d0/0x6d0 [ 198.164346][ T8111] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 198.164379][ T8111] ? _parse_integer+0x30/0x30 [ 198.164416][ T8111] ___sys_sendmsg+0xf3/0x170 [ 198.164442][ T8111] ? sendmsg_copy_msghdr+0x160/0x160 [ 198.164472][ T8111] ? lock_downgrade+0x6e0/0x6e0 [ 198.164512][ T8111] ? __fget_files+0x286/0x470 [ 198.164546][ T8111] ? __fget_light+0xea/0x270 [ 198.164572][ T8111] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 198.164604][ T8111] __x64_sys_sendmsg+0x132/0x220 [ 198.164630][ T8111] ? __sys_sendmsg+0x1b0/0x1b0 [ 198.164667][ T8111] ? syscall_enter_from_user_mode+0x21/0x70 [ 198.164706][ T8111] do_syscall_64+0x35/0xb0 [ 198.164731][ T8111] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 198.164763][ T8111] RIP: 0033:0x7f7765489109 [ 198.164783][ T8111] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 198.164810][ T8111] RSP: 002b:00007f7766559168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 198.164834][ T8111] RAX: ffffffffffffffda RBX: 00007f776559bf60 RCX: 00007f7765489109 [ 198.164852][ T8111] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 198.164867][ T8111] RBP: 00007f77665591d0 R08: 0000000000000000 R09: 0000000000000000 [ 198.164881][ T8111] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 198.164895][ T8111] R13: 00007ffec1cb653f R14: 00007f7766559300 R15: 0000000000022000 [ 198.164928][ T8111] [ 198.177353][ T8112] FAULT_INJECTION: forcing a failure. [ 198.177353][ T8112] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 198.177388][ T8112] CPU: 1 PID: 8112 Comm: syz-executor.1 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 198.177415][ T8112] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 198.177429][ T8112] Call Trace: [ 198.177434][ T8112] [ 198.177442][ T8112] dump_stack_lvl+0xcd/0x134 [ 198.177474][ T8112] should_fail.cold+0x5/0xa [ 198.177510][ T8112] prepare_alloc_pages+0x17b/0x570 [ 198.177537][ T8112] ? arch_stack_walk+0x93/0xe0 [ 198.177572][ T8112] __alloc_pages+0x12f/0x500 [ 198.177598][ T8112] ? __alloc_pages_slowpath.constprop.0+0x20e0/0x20e0 [ 198.177630][ T8112] ? stack_trace_save+0x8c/0xc0 [ 198.177675][ T8112] __alloc_pages_bulk+0xbf3/0x1a10 [ 198.177701][ T8112] ? sock_sendmsg+0xcf/0x120 [ 198.177732][ T8112] ? ____sys_sendmsg+0x6eb/0x810 [ 198.177770][ T8112] ? do_syscall_64+0x35/0xb0 [ 198.177796][ T8112] ? entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 198.177834][ T8112] ? __alloc_pages+0x500/0x500 [ 198.177856][ T8112] ? find_held_lock+0x2d/0x110 [ 198.177887][ T8112] ? __kmalloc_node+0x62/0x390 [ 198.177926][ T8112] alloc_pages_bulk_array_mempolicy+0x1c3/0x4d0 [ 198.177960][ T8112] ? rcu_read_lock_sched_held+0x3a/0x70 [ 198.177991][ T8112] ? trace_kmalloc_node+0x32/0x100 [ 198.178022][ T8112] __vmalloc_node_range+0x576/0x13e0 [ 198.178064][ T8112] ? netlink_sendmsg+0x690/0xe10 [ 198.178091][ T8112] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 198.178117][ T8112] ? vfree_atomic+0xe0/0xe0 [ 198.178147][ T8112] ? __netlink_dump_start+0x900/0x900 [ 198.178170][ T8112] ? netlink_sendmsg+0x690/0xe10 [ 198.178197][ T8112] vmalloc+0x67/0x80 [ 198.178221][ T8112] ? netlink_sendmsg+0x690/0xe10 [ 198.178243][ T8112] netlink_sendmsg+0x690/0xe10 23:06:12 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={@cgroup=r0, 0xffffffffffffffff, 0x21, 0x4}, 0x14) r1 = openat$cgroup_ro(r0, &(0x7f0000000080)='blkio.bfq.io_service_time\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f00000000c0)='io.stat\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000100)='blkio.bfq.avg_queue_size\x00', 0x0, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000140)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) r4 = openat$cgroup_ro(r0, &(0x7f0000000180)='cpuset.memory_pressure\x00', 0x0, 0x0) r5 = openat$cgroup(r4, &(0x7f00000001c0)='syz0\x00', 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) r7 = openat$cgroup_ro(r0, &(0x7f0000000240)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) r8 = openat$cgroup_ro(r7, &(0x7f0000000280)='blkio.bfq.io_service_time\x00', 0x0, 0x0) r9 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={0x0, 0x9, 0x8}, 0xc) r10 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)={&(0x7f0000000480)='./file0\x00', 0x0, 0x18}, 0x10) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000500)={r3}, 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000580)=@bpf_tracing={0x1a, 0xb, &(0x7f0000000300)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x4}, @map_val={0x18, 0x1, 0x2, 0x0, r9}, @map_idx={0x18, 0x5, 0x5, 0x0, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @ldst={0x1, 0x2, 0x6, 0x4, 0xa, 0xffffffffffffffae, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0xaf4, 0x0, 0x0, 0x0, 0x5}, @map_idx={0x18, 0x2, 0x5, 0x0, 0x1}], &(0x7f0000000380)='syzkaller\x00', 0x2, 0xa, &(0x7f00000003c0)=""/10, 0x41100, 0x1, '\x00', 0x0, 0x19, r8, 0x8, &(0x7f0000000400)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0xd, 0x800, 0x6}, 0x10, 0x1a233, r10, 0x0, &(0x7f0000000540)=[r11, r4, r1, r6]}, 0x80) r12 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r12, &(0x7f0000000640)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ID(r8, 0x80082407, &(0x7f0000000680)) r13 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000006c0)={0xffffffffffffffff}, 0x4) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f0000000700)=r13, 0x4) 23:06:12 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (fail_nth: 36) 23:06:12 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000600180081064e81f782db4cb9040a1d080004007c09e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) 23:06:12 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0400005500810ce00f80ecdb4cb9f207c804a011000000020006fb0a0002000a0ada1b40d805001100c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) 23:06:12 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002c000505d25a80308c63940d0c35fc60100006400a13400b053582c137153e37080c188004ac0f00d1bd", 0x33fe0}], 0x1}, 0x0) (fail_nth: 36) 23:06:12 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000300180081064e81f782db4cb904021d080004007c03e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) [ 198.178271][ T8112] ? netlink_unicast+0x7f0/0x7f0 [ 198.178299][ T8112] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 198.178326][ T8112] ? netlink_unicast+0x7f0/0x7f0 [ 198.178349][ T8112] sock_sendmsg+0xcf/0x120 23:06:12 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0400005500810ce00f80ecdb4cb9f207c804a011000000020006fb0a0002000a0ada1b40d805001100c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) [ 198.178379][ T8112] ____sys_sendmsg+0x6eb/0x810 23:06:12 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000500180081064e81f782db4cb904021d080004007c03e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) 23:06:12 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000700180081064e81f782db4cb9040a1d080004007c09e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) [ 198.178412][ T8112] ? kernel_sendmsg+0x50/0x50 [ 198.178439][ T8112] ? do_recvmmsg+0x6d0/0x6d0 23:06:12 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (fail_nth: 37) 23:06:12 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002c000505d25a80308c63940d0c35fc60100006400a13400b053582c137153e37080c188004ac0f00d1bd", 0x33fe0}], 0x1}, 0x0) (fail_nth: 37) [ 198.178462][ T8112] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 198.178496][ T8112] ? _parse_integer+0x30/0x30 23:06:12 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={@cgroup=r0, 0xffffffffffffffff, 0x21, 0x4}, 0x14) (async) r1 = openat$cgroup_ro(r0, &(0x7f0000000080)='blkio.bfq.io_service_time\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f00000000c0)='io.stat\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000100)='blkio.bfq.avg_queue_size\x00', 0x0, 0x0) (async) r3 = openat$cgroup_ro(r2, &(0x7f0000000140)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) (async) r4 = openat$cgroup_ro(r0, &(0x7f0000000180)='cpuset.memory_pressure\x00', 0x0, 0x0) r5 = openat$cgroup(r4, &(0x7f00000001c0)='syz0\x00', 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) (async, rerun: 32) r7 = openat$cgroup_ro(r0, &(0x7f0000000240)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) (rerun: 32) r8 = openat$cgroup_ro(r7, &(0x7f0000000280)='blkio.bfq.io_service_time\x00', 0x0, 0x0) r9 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={0x0, 0x9, 0x8}, 0xc) r10 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)={&(0x7f0000000480)='./file0\x00', 0x0, 0x18}, 0x10) (async) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000500)={r3}, 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000580)=@bpf_tracing={0x1a, 0xb, &(0x7f0000000300)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x4}, @map_val={0x18, 0x1, 0x2, 0x0, r9}, @map_idx={0x18, 0x5, 0x5, 0x0, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @ldst={0x1, 0x2, 0x6, 0x4, 0xa, 0xffffffffffffffae, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0xaf4, 0x0, 0x0, 0x0, 0x5}, @map_idx={0x18, 0x2, 0x5, 0x0, 0x1}], &(0x7f0000000380)='syzkaller\x00', 0x2, 0xa, &(0x7f00000003c0)=""/10, 0x41100, 0x1, '\x00', 0x0, 0x19, r8, 0x8, &(0x7f0000000400)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0xd, 0x800, 0x6}, 0x10, 0x1a233, r10, 0x0, &(0x7f0000000540)=[r11, r4, r1, r6]}, 0x80) (async) r12 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r12, &(0x7f0000000640)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_ID(r8, 0x80082407, &(0x7f0000000680)) (async) r13 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000006c0)={0xffffffffffffffff}, 0x4) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f0000000700)=r13, 0x4) [ 198.178534][ T8112] ___sys_sendmsg+0xf3/0x170 23:06:12 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x5, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0400005500810ce00f80ecdb4cb9f207c804a011000000020006fb0a0002000a0ada1b40d805001100c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) [ 198.178560][ T8112] ? sendmsg_copy_msghdr+0x160/0x160 23:06:12 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000600180081064e81f782db4cb904021d080004007c03e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) 23:06:12 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000900180081064e81f782db4cb9040a1d080004007c09e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) [ 198.178594][ T8112] ? lock_downgrade+0x6e0/0x6e0 23:06:12 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002c000505d25a80308c63940d0c35fc60100006400a13400b053582c137153e37080c188004ac0f00d1bd", 0x33fe0}], 0x1}, 0x0) (fail_nth: 38) 23:06:12 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (fail_nth: 38) [ 198.178636][ T8112] ? __fget_files+0x286/0x470 [ 198.178673][ T8112] ? __fget_light+0xea/0x270 23:06:12 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={@cgroup=r0, 0xffffffffffffffff, 0x21, 0x4}, 0x14) (async) r1 = openat$cgroup_ro(r0, &(0x7f0000000080)='blkio.bfq.io_service_time\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f00000000c0)='io.stat\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000100)='blkio.bfq.avg_queue_size\x00', 0x0, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000140)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) r4 = openat$cgroup_ro(r0, &(0x7f0000000180)='cpuset.memory_pressure\x00', 0x0, 0x0) r5 = openat$cgroup(r4, &(0x7f00000001c0)='syz0\x00', 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) (async) r7 = openat$cgroup_ro(r0, &(0x7f0000000240)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) r8 = openat$cgroup_ro(r7, &(0x7f0000000280)='blkio.bfq.io_service_time\x00', 0x0, 0x0) (async) r9 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={0x0, 0x9, 0x8}, 0xc) (async) r10 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)={&(0x7f0000000480)='./file0\x00', 0x0, 0x18}, 0x10) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000500)={r3}, 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000580)=@bpf_tracing={0x1a, 0xb, &(0x7f0000000300)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x4}, @map_val={0x18, 0x1, 0x2, 0x0, r9}, @map_idx={0x18, 0x5, 0x5, 0x0, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @ldst={0x1, 0x2, 0x6, 0x4, 0xa, 0xffffffffffffffae, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0xaf4, 0x0, 0x0, 0x0, 0x5}, @map_idx={0x18, 0x2, 0x5, 0x0, 0x1}], &(0x7f0000000380)='syzkaller\x00', 0x2, 0xa, &(0x7f00000003c0)=""/10, 0x41100, 0x1, '\x00', 0x0, 0x19, r8, 0x8, &(0x7f0000000400)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000440)={0x5, 0xd, 0x800, 0x6}, 0x10, 0x1a233, r10, 0x0, &(0x7f0000000540)=[r11, r4, r1, r6]}, 0x80) r12 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r12, &(0x7f0000000640)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_ID(r8, 0x80082407, &(0x7f0000000680)) (async) r13 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000006c0)={0xffffffffffffffff}, 0x4) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f0000000700)=r13, 0x4) 23:06:12 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x6, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0400005500810ce00f80ecdb4cb9f207c804a011000000020006fb0a0002000a0ada1b40d805001100c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) 23:06:12 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000700180081064e81f782db4cb904021d080004007c03e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) 23:06:12 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000a00180081064e81f782db4cb9040a1d080004007c09e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) [ 198.178699][ T8112] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 198.178732][ T8112] __x64_sys_sendmsg+0x132/0x220 23:06:12 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002c000505d25a80308c63940d0c35fc60100006400a13400b053582c137153e37080c188004ac0f00d1bd", 0x33fe0}], 0x1}, 0x0) (fail_nth: 39) 23:06:12 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (fail_nth: 39) [ 198.178765][ T8112] ? __sys_sendmsg+0x1b0/0x1b0 [ 198.178805][ T8112] ? syscall_enter_from_user_mode+0x21/0x70 [ 198.178845][ T8112] do_syscall_64+0x35/0xb0 23:06:12 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xa, 0x16, &(0x7f0000000780)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150700000fff07003506000002ffffffb70600000ee50000bf250000000000001f650000000000006507f5ff02008400070700004c0001000f75000000000000bf54000000000000070400000400f9ff3d3501000000000095000000000000000500000000000000950007000000000001722fabb733a0c857c7c45402000000a2d23da04d1ffc187fa1a2ba7ba030c7287c2de00435fd233cc0f0d9b2c3127c46b0f408398d09ee4dc258d726eae098804de25df627a64ac7efde50fd7f1dd5b17ed764c33b06598bae66ea38541a7cd29032de94983dfab0e5043daf1b46bef5135c65377bdbe65d525743d88ef4b2ee62652b07f8a4b6e6155cecc13a5ddfab726eca91bd5fecb254ab358488c400330171128be291297947d474c570a3850547a28156f9921f7edc99e0a0a15ce4506a923e31cc2397409650ce29da803267f7ab546e40a2ab9192d47f64605afc9c97dd0000000000e1ff00000000909500000000000000"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1, 0x10, &(0x7f0000000000), 0x19f}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x6) 23:06:12 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0400005500810ce00f80ecdb4cb9f207c804a011000000020006fb0a0002000a0ada1b40d805001100c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) 23:06:12 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000c00180081064e81f782db4cb9040a1d080004007c09e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) 23:06:12 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000900180081064e81f782db4cb904021d080004007c03e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) [ 198.178872][ T8112] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 198.178898][ T8112] RIP: 0033:0x7f55bba89109 [ 198.178917][ T8112] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 23:06:12 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (fail_nth: 40) 23:06:12 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000e00180081064e81f782db4cb9040a1d080004007c09e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) 23:06:12 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000a00180081064e81f782db4cb904021d080004007c03e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) 23:06:13 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002c000505d25a80308c63940d0c35fc60100006400a13400b053582c137153e37080c188004ac0f00d1bd", 0x33fe0}], 0x1}, 0x0) (fail_nth: 40) 23:06:13 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xa, 0x16, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1, 0x10, &(0x7f0000000000), 0x19f}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x6) 23:06:13 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x11, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0400005500810ce00f80ecdb4cb9f207c804a011000000020006fb0a0002000a0ada1b40d805001100c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) [ 198.178945][ T8112] RSP: 002b:00007f55bcbef168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 198.178969][ T8112] RAX: ffffffffffffffda RBX: 00007f55bbb9bf60 RCX: 00007f55bba89109 [ 198.178985][ T8112] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 23:06:13 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xa, 0x16, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1, 0x10, &(0x7f0000000000), 0x19f}, 0x48) (async, rerun: 64) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x6) (rerun: 64) 23:06:13 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000f00180081064e81f782db4cb9040a1d080004007c09e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) 23:06:13 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000c00180081064e81f782db4cb904021d080004007c03e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) 23:06:13 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002c000505d25a80308c63940d0c35fc60100006400a13400b053582c137153e37080c188004ac0f00d1bd", 0x33fe0}], 0x1}, 0x0) (fail_nth: 41) [ 198.178999][ T8112] RBP: 00007f55bcbef1d0 R08: 0000000000000000 R09: 0000000000000000 23:06:13 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7ffff, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0400005500810ce00f80ecdb4cb9f207c804a011000000020006fb0a0002000a0ada1b40d805001100c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) 23:06:13 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (fail_nth: 41) [ 198.179014][ T8112] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 198.179028][ T8112] R13: 00007ffd14a51aef R14: 00007f55bcbef300 R15: 0000000000022000 23:06:13 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000e00180081064e81f782db4cb904021d080004007c03e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) 23:06:13 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8655800180081064e81f782db4cb9040a1d080004007c09e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) 23:06:13 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="0f0000005500810ce00f80ecdb4cb9f207c804a011000000020006fb0a0002000a0ada1b40d805001100c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) [ 198.179062][ T8112] [ 198.199234][ T8112] __nla_validate_parse: 2 callbacks suppressed 23:06:13 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002c000505d25a80308c63940d0c35fc60100006400a13400b053582c137153e37080c188004ac0f00d1bd", 0x33fe0}], 0x1}, 0x0) (fail_nth: 42) 23:06:13 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (fail_nth: 42) [ 198.199254][ T8112] netlink: 209844 bytes leftover after parsing attributes in process `syz-executor.1'. [ 198.234053][ T8116] FAULT_INJECTION: forcing a failure. [ 198.234053][ T8116] name failslab, interval 1, probability 0, space 0, times 0 23:06:13 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000f00180081064e81f782db4cb904021d080004007c03e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) [ 198.234086][ T8116] CPU: 0 PID: 8116 Comm: syz-executor.5 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 198.234114][ T8116] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 198.234128][ T8116] Call Trace: [ 198.234134][ T8116] [ 198.234142][ T8116] dump_stack_lvl+0xcd/0x134 [ 198.234173][ T8116] should_fail.cold+0x5/0xa [ 198.234210][ T8116] should_failslab+0x5/0x10 [ 198.234237][ T8116] kmem_cache_alloc_node+0x65/0x3f0 [ 198.234288][ T8116] ? alloc_vmap_area+0x16f/0x1f00 [ 198.234322][ T8116] alloc_vmap_area+0x16f/0x1f00 [ 198.234364][ T8116] ? free_vmap_area+0x1ac0/0x1ac0 [ 198.234392][ T8116] ? rcu_read_lock_sched_held+0x3a/0x70 [ 198.234421][ T8116] ? trace_kmalloc_node+0x32/0x100 [ 198.234452][ T8116] __get_vm_area_node+0x142/0x3f0 [ 198.234485][ T8116] __vmalloc_node_range+0x250/0x13e0 [ 198.234513][ T8116] ? bpf_check+0x1e1/0xbbc0 [ 198.234546][ T8116] ? bpf_check+0x137/0xbbc0 [ 198.234569][ T8116] ? bpf_check+0x1e1/0xbbc0 [ 198.234598][ T8116] ? vfree_atomic+0xe0/0xe0 [ 198.234630][ T8116] ? bpf_check+0x1e1/0xbbc0 [ 198.234656][ T8116] vzalloc+0x67/0x80 [ 198.234681][ T8116] ? bpf_check+0x1e1/0xbbc0 [ 198.234704][ T8116] bpf_check+0x1e1/0xbbc0 [ 198.234734][ T8116] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 198.234769][ T8116] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 198.234812][ T8116] ? bpf_get_btf_vmlinux+0x10/0x10 [ 198.234842][ T8116] ? lock_downgrade+0x6e0/0x6e0 [ 198.234869][ T8116] ? __might_fault+0xd1/0x170 [ 198.234893][ T8116] ? lock_downgrade+0x6e0/0x6e0 [ 198.234924][ T8116] ? ktime_get_with_offset+0x3f2/0x500 [ 198.234958][ T8116] ? memset+0x20/0x40 23:06:13 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="100000005500810ce00f80ecdb4cb9f207c804a011000000020006fb0a0002000a0ada1b40d805001100c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) 23:06:13 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8006000180081064e81f782db4cb9040a1d080004007c09e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) 23:06:13 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002c000505d25a80308c63940d0c35fc60100006400a13400b053582c137153e37080c188004ac0f00d1bd", 0x33fe0}], 0x1}, 0x0) (fail_nth: 43) 23:06:13 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8655800180081064e81f782db4cb904021d080004007c03e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) 23:06:13 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (fail_nth: 43) 23:06:13 executing program 2: perf_event_open(&(0x7f0000000640)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x0, 0x4}, 0x8, 0x10, 0x0}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x7200, 0x0, 0x0, 0x900, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x2, 0x25300ed6, 0x3, 0x4, 0x2, 0xffffffffffffffff, 0x831f, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x4}, 0x48) r0 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) r2 = openat$cgroup_ro(r0, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x26e1, 0x0) r3 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={r3, r2, 0x0, 0x3, &(0x7f00000001c0)='+$\x00'}, 0x30) r4 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x1f, 0x4, 0x9, 0x2, 0x0, 0x1, 0x4000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x8001, 0x4}, 0x800, 0xffffffffffffffff, 0x20, 0xc, 0xfffffffffffffffb, 0x8, 0x7, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0xb, r1, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x3f, 0xdf, 0xbb, 0xff, 0x0, 0x4, 0x4408, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x2}, 0x10003, 0x1, 0x1f, 0x5, 0x1, 0xffffffff, 0x30, 0x0, 0x7, 0x0, 0xff}, r3, 0xa, r4, 0x0) syz_clone(0x50000000, 0x0, 0x2a452cb9d000, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000005c0)=ANY=[@ANYBLOB="2c050000000000c9e800000000003ba717a2e2a44f23e4406bb0bfaa30f47d5d1a4903f57f9d3fcd2774ba97000cbc2167f37870e1c1e6436045d4e5da41001c44f38fe833000000000000004ba8"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000380)={0x8cdd9bd5e899cade, 0x80, 0x3, 0x3, 0x0, 0x0, 0x0, 0x3f727d1d, 0x41dc, 0xa, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000280), 0x7}, 0x8020, 0x8000, 0x9, 0x9, 0x7, 0x6bb, 0x5, 0x0, 0x3, 0x0, 0x1}, 0x0, 0x8, 0xffffffffffffffff, 0xa) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000840)}, 0x4f) [ 198.234978][ T8116] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 198.235005][ T8116] ? bpf_obj_name_cpy+0x144/0x1a0 [ 198.235033][ T8116] ? bpf_prog_load+0xf71/0x2250 [ 198.235062][ T8116] bpf_prog_load+0xfb2/0x2250 [ 198.235096][ T8116] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 198.235125][ T8116] ? find_held_lock+0x2d/0x110 23:06:13 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8006000180081064e81f782db4cb904021d080004007c03e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) 23:06:13 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="170000005500810ce00f80ecdb4cb9f207c804a011000000020006fb0a0002000a0ada1b40d805001100c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) 23:06:13 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8586500180081064e81f782db4cb9040a1d080004007c09e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) 23:06:13 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002c000505d25a80308c63940d0c35fc60100006400a13400b053582c137153e37080c188004ac0f00d1bd", 0x33fe0}], 0x1}, 0x0) (fail_nth: 44) [ 198.235156][ T8116] ? __might_fault+0xd1/0x170 [ 198.235180][ T8116] ? lock_downgrade+0x6e0/0x6e0 23:06:13 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (fail_nth: 44) [ 198.235222][ T8116] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 198.235257][ T8116] __sys_bpf+0x11a1/0x5700 [ 198.235288][ T8116] ? bpf_perf_link_attach+0x520/0x520 23:06:13 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8008100180081064e81f782db4cb9040a1d080004007c09e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) 23:06:13 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8586500180081064e81f782db4cb904021d080004007c03e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) [ 198.235318][ T8116] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 198.235359][ T8116] ? find_held_lock+0x2d/0x110 23:06:14 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002c000505d25a80308c63940d0c35fc60100006400a13400b053582c137153e37080c188004ac0f00d1bd", 0x33fe0}], 0x1}, 0x0) (fail_nth: 45) 23:06:14 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="250400005500810ce00f80ecdb4cb9f207c804a011000000020006fb0a0002000a0ada1b40d805001100c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) 23:06:14 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (fail_nth: 45) [ 198.235411][ T8116] ? trace_hardirqs_on+0x38/0x1c0 23:06:14 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8008100180081064e81f782db4cb904021d080004007c03e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) [ 198.235439][ T8116] __x64_sys_bpf+0x75/0xb0 [ 198.235466][ T8116] ? syscall_enter_from_user_mode+0x21/0x70 ** 30 printk messages dropped ** [ 198.311914][ T8119] ? netlink_sendmsg+0x690/0xe10 ** 2 printk messages dropped ** [ 198.312000][ T8119] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 198.312030][ T8119] ? netlink_unicast+0x7f0/0x7f0 [ 198.312055][ T8119] sock_sendmsg+0xcf/0x120 [ 198.312087][ T8119] ____sys_sendmsg+0x6eb/0x810 [ 198.312119][ T8119] ? kernel_sendmsg+0x50/0x50 [ 198.312145][ T8119] ? do_recvmmsg+0x6d0/0x6d0 [ 198.312169][ T8119] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 198.312204][ T8119] ? _parse_integer+0x30/0x30 [ 198.312241][ T8119] ___sys_sendmsg+0xf3/0x170 [ 198.312267][ T8119] ? sendmsg_copy_msghdr+0x160/0x160 [ 198.312299][ T8119] ? lock_downgrade+0x6e0/0x6e0 [ 198.312346][ T8119] ? __fget_files+0x286/0x470 [ 198.312382][ T8119] ? __fget_light+0xea/0x270 [ 198.312409][ T8119] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 198.312443][ T8119] __x64_sys_sendmsg+0x132/0x220 [ 198.312469][ T8119] ? __sys_sendmsg+0x1b0/0x1b0 [ 198.312508][ T8119] ? syscall_enter_from_user_mode+0x21/0x70 [ 198.312547][ T8119] do_syscall_64+0x35/0xb0 [ 198.312574][ T8119] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 198.312600][ T8119] RIP: 0033:0x7f7765489109 [ 198.312621][ T8119] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 198.312645][ T8119] RSP: 002b:00007f7766559168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 198.312670][ T8119] RAX: ffffffffffffffda RBX: 00007f776559bf60 RCX: 00007f7765489109 [ 198.312687][ T8119] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 198.312703][ T8119] RBP: 00007f77665591d0 R08: 0000000000000000 R09: 0000000000000000 [ 198.312719][ T8119] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 198.312734][ T8119] R13: 00007ffec1cb653f R14: 00007f7766559300 R15: 0000000000022000 [ 198.312774][ T8119] [ 198.361389][ T8125] FAULT_INJECTION: forcing a failure. [ 198.361389][ T8125] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 198.361423][ T8125] CPU: 1 PID: 8125 Comm: syz-executor.1 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 198.361449][ T8125] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 198.361464][ T8125] Call Trace: [ 198.361470][ T8125] [ 198.361478][ T8125] dump_stack_lvl+0xcd/0x134 [ 198.361510][ T8125] should_fail.cold+0x5/0xa [ 198.361546][ T8125] prepare_alloc_pages+0x17b/0x570 [ 198.361574][ T8125] ? arch_stack_walk+0x93/0xe0 [ 198.361606][ T8125] __alloc_pages+0x12f/0x500 [ 198.361631][ T8125] ? __alloc_pages_slowpath.constprop.0+0x20e0/0x20e0 [ 198.361663][ T8125] ? stack_trace_save+0x8c/0xc0 [ 198.361702][ T8125] __alloc_pages_bulk+0xbf3/0x1a10 [ 198.361725][ T8125] ? sock_sendmsg+0xcf/0x120 [ 198.361762][ T8125] ? ____sys_sendmsg+0x6eb/0x810 [ 198.361792][ T8125] ? do_syscall_64+0x35/0xb0 [ 198.361818][ T8125] ? entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 198.361855][ T8125] ? __alloc_pages+0x500/0x500 [ 198.361877][ T8125] ? find_held_lock+0x2d/0x110 [ 198.361909][ T8125] ? __kmalloc_node+0x62/0x390 [ 198.361948][ T8125] alloc_pages_bulk_array_mempolicy+0x1c3/0x4d0 [ 198.361981][ T8125] ? rcu_read_lock_sched_held+0x3a/0x70 [ 198.362012][ T8125] ? trace_kmalloc_node+0x32/0x100 [ 198.362045][ T8125] __vmalloc_node_range+0x576/0x13e0 [ 198.362089][ T8125] ? netlink_sendmsg+0x690/0xe10 [ 198.362118][ T8125] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 198.362147][ T8125] ? vfree_atomic+0xe0/0xe0 [ 198.362177][ T8125] ? __netlink_dump_start+0x900/0x900 [ 198.362203][ T8125] ? netlink_sendmsg+0x690/0xe10 [ 198.362229][ T8125] vmalloc+0x67/0x80 [ 198.362256][ T8125] ? netlink_sendmsg+0x690/0xe10 [ 198.362279][ T8125] netlink_sendmsg+0x690/0xe10 [ 198.362310][ T8125] ? netlink_unicast+0x7f0/0x7f0 [ 198.362340][ T8125] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 198.362370][ T8125] ? netlink_unicast+0x7f0/0x7f0 [ 198.362395][ T8125] sock_sendmsg+0xcf/0x120 [ 198.362425][ T8125] ____sys_sendmsg+0x6eb/0x810 [ 198.362460][ T8125] ? kernel_sendmsg+0x50/0x50 [ 198.362487][ T8125] ? do_recvmmsg+0x6d0/0x6d0 [ 198.362511][ T8125] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 198.362544][ T8125] ? _parse_integer+0x30/0x30 [ 198.362582][ T8125] ___sys_sendmsg+0xf3/0x170 [ 198.362609][ T8125] ? sendmsg_copy_msghdr+0x160/0x160 [ 198.362640][ T8125] ? lock_downgrade+0x6e0/0x6e0 [ 198.362683][ T8125] ? __fget_files+0x286/0x470 [ 198.362719][ T8125] ? __fget_light+0xea/0x270 [ 198.362753][ T8125] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 198.362787][ T8125] __x64_sys_sendmsg+0x132/0x220 [ 198.362813][ T8125] ? __sys_sendmsg+0x1b0/0x1b0 [ 198.362852][ T8125] ? syscall_enter_from_user_mode+0x21/0x70 [ 198.362892][ T8125] do_syscall_64+0x35/0xb0 [ 198.362917][ T8125] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 198.362943][ T8125] RIP: 0033:0x7f55bba89109 [ 198.362963][ T8125] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 198.362987][ T8125] RSP: 002b:00007f55bcbef168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 198.363012][ T8125] RAX: ffffffffffffffda RBX: 00007f55bbb9bf60 RCX: 00007f55bba89109 [ 198.363029][ T8125] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 198.363045][ T8125] RBP: 00007f55bcbef1d0 R08: 0000000000000000 R09: 0000000000000000 [ 198.363061][ T8125] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 198.363076][ T8125] R13: 00007ffd14a51aef R14: 00007f55bcbef300 R15: 0000000000022000 [ 198.363112][ T8125] [ 198.364358][ T8125] netlink: 209844 bytes leftover after parsing attributes in process `syz-executor.1'. [ 198.386381][ T8126] FAULT_INJECTION: forcing a failure. [ 198.386381][ T8126] name failslab, interval 1, probability 0, space 0, times 0 [ 198.386502][ T8126] CPU: 0 PID: 8126 Comm: syz-executor.5 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 198.386533][ T8126] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 198.386548][ T8126] Call Trace: [ 198.386554][ T8126] [ 198.386562][ T8126] dump_stack_lvl+0xcd/0x134 [ 198.386595][ T8126] should_fail.cold+0x5/0xa [ 198.386631][ T8126] ? __vmalloc_node_range+0xa40/0x13e0 [ 198.386662][ T8126] should_failslab+0x5/0x10 [ 198.386689][ T8126] __kmalloc_node+0x75/0x390 [ 198.386722][ T8126] __vmalloc_node_range+0xa40/0x13e0 [ 198.386765][ T8126] ? bpf_check+0x1e1/0xbbc0 [ 198.386797][ T8126] ? vfree_atomic+0xe0/0xe0 [ 198.386830][ T8126] ? bpf_check+0x1e1/0xbbc0 [ 198.386857][ T8126] vzalloc+0x67/0x80 [ 198.386884][ T8126] ? bpf_check+0x1e1/0xbbc0 [ 198.386909][ T8126] bpf_check+0x1e1/0xbbc0 [ 198.386941][ T8126] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 198.386975][ T8126] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 198.387021][ T8126] ? bpf_get_btf_vmlinux+0x10/0x10 [ 198.387054][ T8126] ? lock_downgrade+0x6e0/0x6e0 [ 198.387082][ T8126] ? __might_fault+0xd1/0x170 [ 198.387108][ T8126] ? lock_downgrade+0x6e0/0x6e0 [ 198.387141][ T8126] ? ktime_get_with_offset+0x3f2/0x500 [ 198.387176][ T8126] ? memset+0x20/0x40 [ 198.387197][ T8126] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 198.387227][ T8126] ? bpf_obj_name_cpy+0x144/0x1a0 [ 198.387266][ T8126] ? bpf_prog_load+0xf71/0x2250 [ 198.387298][ T8126] bpf_prog_load+0xfb2/0x2250 [ 198.387337][ T8126] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 198.387369][ T8126] ? find_held_lock+0x2d/0x110 [ 198.387402][ T8126] ? __might_fault+0xd1/0x170 [ 198.387427][ T8126] ? lock_downgrade+0x6e0/0x6e0 [ 198.387471][ T8126] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 198.387505][ T8126] __sys_bpf+0x11a1/0x5700 [ 198.387541][ T8126] ? bpf_perf_link_attach+0x520/0x520 [ 198.387572][ T8126] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 198.387615][ T8126] ? find_held_lock+0x2d/0x110 [ 198.387671][ T8126] ? trace_hardirqs_on+0x38/0x1c0 [ 198.387702][ T8126] __x64_sys_bpf+0x75/0xb0 [ 198.387729][ T8126] ? syscall_enter_from_user_mode+0x21/0x70 [ 198.387764][ T8126] do_syscall_64+0x35/0xb0 [ 198.387792][ T8126] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 198.387819][ T8126] RIP: 0033:0x7f2e16289109 [ 198.387839][ T8126] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 198.387865][ T8126] RSP: 002b:00007f2e1731f168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 198.387889][ T8126] RAX: ffffffffffffffda RBX: 00007f2e1639bf60 RCX: 00007f2e16289109 [ 198.387905][ T8126] RDX: 0000000000000080 RSI: 00000000200001c0 RDI: 0000000000000005 [ 198.387920][ T8126] RBP: 00007f2e1731f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 198.387936][ T8126] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 198.387951][ T8126] R13: 00007ffde7446a9f R14: 00007f2e1731f300 R15: 0000000000022000 [ 198.387985][ T8126] [ 198.514486][ T8135] FAULT_INJECTION: forcing a failure. [ 198.514486][ T8135] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 198.514519][ T8135] CPU: 1 PID: 8135 Comm: syz-executor.4 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 23:06:16 executing program 2: perf_event_open(&(0x7f0000000640)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async, rerun: 64) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0}, 0x10) (rerun: 64) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x0, 0x4}, 0x8, 0x10, 0x0}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x7200, 0x0, 0x0, 0x900, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) (async, rerun: 32) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x2, 0x25300ed6, 0x3, 0x4, 0x2, 0xffffffffffffffff, 0x831f, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x4}, 0x48) (async, rerun: 32) r0 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) (async) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) r2 = openat$cgroup_ro(r0, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x26e1, 0x0) r3 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={r3, r2, 0x0, 0x3, &(0x7f00000001c0)='+$\x00'}, 0x30) r4 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x1f, 0x4, 0x9, 0x2, 0x0, 0x1, 0x4000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x8001, 0x4}, 0x800, 0xffffffffffffffff, 0x20, 0xc, 0xfffffffffffffffb, 0x8, 0x7, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0xb, r1, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x3f, 0xdf, 0xbb, 0xff, 0x0, 0x4, 0x4408, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x2}, 0x10003, 0x1, 0x1f, 0x5, 0x1, 0xffffffff, 0x30, 0x0, 0x7, 0x0, 0xff}, r3, 0xa, r4, 0x0) syz_clone(0x50000000, 0x0, 0x2a452cb9d000, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000005c0)=ANY=[@ANYBLOB="2c050000000000c9e800000000003ba717a2e2a44f23e4406bb0bfaa30f47d5d1a4903f57f9d3fcd2774ba97000cbc2167f37870e1c1e6436045d4e5da41001c44f38fe833000000000000004ba8"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000380)={0x8cdd9bd5e899cade, 0x80, 0x3, 0x3, 0x0, 0x0, 0x0, 0x3f727d1d, 0x41dc, 0xa, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000280), 0x7}, 0x8020, 0x8000, 0x9, 0x9, 0x7, 0x6bb, 0x5, 0x0, 0x3, 0x0, 0x1}, 0x0, 0x8, 0xffffffffffffffff, 0xa) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000840)}, 0x4f) 23:06:16 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d802d400180081064e81f782db4cb9040a1d080004007c09e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) 23:06:16 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d802c000180081064e81f782db4cb904021d080004007c03e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) 23:06:16 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002c000505d25a80308c63940d0c35fc60100006400a13400b053582c137153e37080c188004ac0f00d1bd", 0x33fe0}], 0x1}, 0x0) (fail_nth: 46) 23:06:16 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="c9fe00005500810ce00f80ecdb4cb9f207c804a011000000020006fb0a0002000a0ada1b40d805001100c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) 23:06:16 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (fail_nth: 46) [ 198.514545][ T8135] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 198.514558][ T8135] Call Trace: [ 198.514563][ T8135] [ 198.514571][ T8135] dump_stack_lvl+0xcd/0x134 [ 198.514602][ T8135] should_fail.cold+0x5/0xa [ 198.514640][ T8135] prepare_alloc_pages+0x17b/0x570 [ 198.514671][ T8135] __alloc_pages+0x12f/0x500 [ 198.514696][ T8135] ? __alloc_pages_slowpath.constprop.0+0x20e0/0x20e0 [ 198.514727][ T8135] ? __kmalloc_node+0x62/0x390 [ 198.514783][ T8135] alloc_pages+0x1aa/0x310 [ 198.514814][ T8135] __vmalloc_node_range+0x735/0x13e0 [ 198.514858][ T8135] ? netlink_sendmsg+0x690/0xe10 [ 198.514887][ T8135] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 23:06:16 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d800f000180081064e81f782db4cb9040a1d080004007c09e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) 23:06:16 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (fail_nth: 47) 23:06:16 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002c000505d25a80308c63940d0c35fc60100006400a13400b053582c137153e37080c188004ac0f00d1bd", 0x33fe0}], 0x1}, 0x0) (fail_nth: 47) [ 198.514917][ T8135] ? vfree_atomic+0xe0/0xe0 [ 198.514947][ T8135] ? __netlink_dump_start+0x900/0x900 [ 198.514973][ T8135] ? netlink_sendmsg+0x690/0xe10 23:06:16 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d800f000180081064e81f782db4cb904021d080004007c03e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) 23:06:16 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0200005500810ce00f80ecdb4cb9f207c804a011000000020006fb0a0002000a0ada1b40d805001100c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) [ 198.514999][ T8135] vmalloc+0x67/0x80 23:06:16 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d80000007b0081064e81f782db4cb9040a1d080004007c09e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) 23:06:16 executing program 2: perf_event_open(&(0x7f0000000640)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x0, 0x4}, 0x8, 0x10, 0x0}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x7200, 0x0, 0x0, 0x900, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x2, 0x25300ed6, 0x3, 0x4, 0x2, 0xffffffffffffffff, 0x831f, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x4}, 0x48) (async) r0 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) (async) r2 = openat$cgroup_ro(r0, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x26e1, 0x0) (async) r3 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={r3, r2, 0x0, 0x3, &(0x7f00000001c0)='+$\x00'}, 0x30) r4 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x1f, 0x4, 0x9, 0x2, 0x0, 0x1, 0x4000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x8001, 0x4}, 0x800, 0xffffffffffffffff, 0x20, 0xc, 0xfffffffffffffffb, 0x8, 0x7, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0xb, r1, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x3f, 0xdf, 0xbb, 0xff, 0x0, 0x4, 0x4408, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, @perf_config_ext={0x2, 0x2}, 0x10003, 0x1, 0x1f, 0x5, 0x1, 0xffffffff, 0x30, 0x0, 0x7, 0x0, 0xff}, r3, 0xa, r4, 0x0) (async) syz_clone(0x50000000, 0x0, 0x2a452cb9d000, 0x0, 0x0, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000005c0)=ANY=[@ANYBLOB="2c050000000000c9e800000000003ba717a2e2a44f23e4406bb0bfaa30f47d5d1a4903f57f9d3fcd2774ba97000cbc2167f37870e1c1e6436045d4e5da41001c44f38fe833000000000000004ba8"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000380)={0x8cdd9bd5e899cade, 0x80, 0x3, 0x3, 0x0, 0x0, 0x0, 0x3f727d1d, 0x41dc, 0xa, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000280), 0x7}, 0x8020, 0x8000, 0x9, 0x9, 0x7, 0x6bb, 0x5, 0x0, 0x3, 0x0, 0x1}, 0x0, 0x8, 0xffffffffffffffff, 0xa) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f0000000840)}, 0x4f) [ 198.515026][ T8135] ? netlink_sendmsg+0x690/0xe10 [ 198.515051][ T8135] netlink_sendmsg+0x690/0xe10 23:06:16 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0300005500810ce00f80ecdb4cb9f207c804a011000000020006fb0a0002000a0ada1b40d805001100c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) [ 198.515082][ T8135] ? netlink_unicast+0x7f0/0x7f0 [ 198.515113][ T8135] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 23:06:16 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d80000007b0081064e81f782db4cb904021d080004007c03e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) 23:06:16 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002c000505d25a80308c63940d0c35fc60100006400a13400b053582c137153e37080c188004ac0f00d1bd", 0x33fe0}], 0x1}, 0x0) (fail_nth: 48) 23:06:16 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (fail_nth: 48) ** 81 printk messages dropped ** [ 198.526988][ T8137] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 198.527012][ T8137] RIP: 0033:0x7f2e16289109 23:06:16 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0500005500810ce00f80ecdb4cb9f207c804a011000000020006fb0a0002000a0ada1b40d805001100c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) 23:06:16 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}}, 0x0, 0x6, 0xffffffffffffffff, 0x0) r1 = gettid() r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x10001}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x9, 0x0, 0x0, 0xfffffffc}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(r0, &(0x7f0000000300)='blkio.bfq.io_serviced\x00', 0x0, 0x0) r4 = openat$cgroup(r3, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000200), 0x1}, 0x0, 0x1000, 0x7, 0x3, 0x0, 0xfffffffe, 0x5, 0x0, 0x8, 0x0, 0xfffffffffffffff7}, r4, 0x0, r2, 0x0) r5 = perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6098}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r2) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0xff, 0x1f, 0x5, 0x7, 0x0, 0x7, 0x1a19, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x233a, 0x0, @perf_bp={&(0x7f0000000040), 0x4}, 0x5a420, 0x13b8, 0x9, 0x2, 0x7f, 0x2, 0x5, 0x0, 0x6, 0x0, 0x80000000}, r1, 0xc, r5, 0x8) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) openat$cgroup_ro(r6, &(0x7f00000004c0)='blkio.bfq.io_service_time\x00', 0x0, 0x0) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) perf_event_open(&(0x7f0000000580)={0x0, 0x80, 0x5, 0xff, 0x1, 0xfa, 0x0, 0x8, 0xc0020, 0x4, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x2, @perf_bp={&(0x7f0000000400), 0xc0df755a24f2547b}, 0x10, 0x3, 0x80000000, 0x9, 0x8001, 0x7ff, 0x9, 0x0, 0x0, 0x0, 0x7fffffff}, r1, 0x6, r6, 0x7) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000004c0)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.swap.events\x00', 0x0, 0x0) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x39) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000003c0)={@map=r8, r9, 0x1b, 0x1, r8}, 0x14) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x44100000, 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:16 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000200180081064e81f782db4cb9040a1d080004007c09e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) [ 198.527031][ T8137] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 23:06:16 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000200180081064e81f782db4cb904021d080004007c03e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) 23:06:16 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (fail_nth: 49) 23:06:16 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002c000505d25a80308c63940d0c35fc60100006400a13400b053582c137153e37080c188004ac0f00d1bd", 0x33fe0}], 0x1}, 0x0) (fail_nth: 49) ** 95 printk messages dropped ** 23:06:16 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0600005500810ce00f80ecdb4cb9f207c804a011000000020006fb0a0002000a0ada1b40d805001100c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) [ 198.675201][ T8147] RIP: 0033:0x7f2e16289109 23:06:16 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000300180081064e81f782db4cb9040a1d080004007c09e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) [ 198.675222][ T8147] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 23:06:16 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000300180081064e81f782db4cb904021d080004007c03e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) 23:06:16 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (fail_nth: 50) 23:06:16 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000400180081064e81f782db4cb9040a1d080004007c09e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) 23:06:16 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0700005500810ce00f80ecdb4cb9f207c804a011000000020006fb0a0002000a0ada1b40d805001100c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) ** 100 printk messages dropped ** [ 198.732422][ T8153] RSP: 002b:00007f55bcbef168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 23:06:16 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002c000505d25a80308c63940d0c35fc60100006400a13400b053582c137153e37080c188004ac0f00d1bd", 0x33fe0}], 0x1}, 0x0) (fail_nth: 50) [ 198.732447][ T8153] RAX: ffffffffffffffda RBX: 00007f55bbb9bf60 RCX: 00007f55bba89109 ** 40 printk messages dropped ** [ 198.988139][ T8160] ? __fget_light+0xea/0x270 [ 198.988162][ T8160] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 ** 50 printk messages dropped ** [ 198.989510][ T8161] ? __sys_sendmsg+0x1b0/0x1b0 [ 198.989548][ T8161] ? syscall_enter_from_user_mode+0x21/0x70 [ 198.989586][ T8161] do_syscall_64+0x35/0xb0 [ 198.989612][ T8161] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 198.989638][ T8161] RIP: 0033:0x7f55bba89109 [ 198.989657][ T8161] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 198.989681][ T8161] RSP: 002b:00007f55bcbef168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 198.989715][ T8161] RAX: ffffffffffffffda RBX: 00007f55bbb9bf60 RCX: 00007f55bba89109 [ 198.989733][ T8161] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 198.989749][ T8161] RBP: 00007f55bcbef1d0 R08: 0000000000000000 R09: 0000000000000000 [ 198.989764][ T8161] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 198.989779][ T8161] R13: 00007ffd14a51aef R14: 00007f55bcbef300 R15: 0000000000022000 [ 198.989811][ T8161] [ 198.990093][ T8164] FAULT_INJECTION: forcing a failure. [ 198.990093][ T8164] name failslab, interval 1, probability 0, space 0, times 0 [ 198.990122][ T8164] CPU: 0 PID: 8164 Comm: syz-executor.5 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 198.990149][ T8164] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 198.990163][ T8164] Call Trace: [ 198.990169][ T8164] [ 198.990177][ T8164] dump_stack_lvl+0xcd/0x134 [ 198.990217][ T8164] should_fail.cold+0x5/0xa [ 198.990250][ T8164] should_failslab+0x5/0x10 [ 198.990275][ T8164] kmem_cache_alloc_node+0x65/0x3f0 [ 198.990303][ T8164] ? alloc_vmap_area+0x16f/0x1f00 [ 198.990335][ T8164] alloc_vmap_area+0x16f/0x1f00 [ 198.990363][ T8164] ? kmem_cache_alloc_node_trace+0x46/0x420 [ 198.990404][ T8164] ? free_vmap_area+0x1ac0/0x1ac0 [ 198.990432][ T8164] ? rcu_read_lock_sched_held+0x3a/0x70 [ 198.990460][ T8164] ? trace_kmalloc_node+0x32/0x100 [ 198.990493][ T8164] __get_vm_area_node+0x142/0x3f0 [ 198.990526][ T8164] __vmalloc_node_range+0x250/0x13e0 [ 198.990556][ T8164] ? bpf_prog_calc_tag+0xc9/0x6c0 [ 198.990579][ T8164] ? __stack_depot_save+0x35/0x500 [ 198.990618][ T8164] ? kasan_save_stack+0x2e/0x40 [ 198.990646][ T8164] ? bpf_prog_calc_tag+0xc9/0x6c0 [ 198.990670][ T8164] ? __sys_bpf+0x11a1/0x5700 [ 198.990696][ T8164] ? __x64_sys_bpf+0x75/0xb0 [ 198.990722][ T8164] ? do_syscall_64+0x35/0xb0 [ 198.990750][ T8164] ? vfree_atomic+0xe0/0xe0 [ 198.990775][ T8164] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 198.990805][ T8164] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 198.990831][ T8164] ? sort_r+0x295/0x420 [ 198.990855][ T8164] ? bpf_prog_calc_tag+0xc9/0x6c0 [ 198.990882][ T8164] vmalloc+0x67/0x80 [ 198.990908][ T8164] ? bpf_prog_calc_tag+0xc9/0x6c0 [ 198.990932][ T8164] bpf_prog_calc_tag+0xc9/0x6c0 [ 198.990960][ T8164] ? sort+0x92/0xc0 [ 198.990986][ T8164] ? __reg64_deduce_bounds+0x160/0x160 [ 198.991017][ T8164] ? __bpf_prog_free+0x190/0x190 [ 198.991040][ T8164] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 198.991068][ T8164] ? bsearch+0x9b/0xb0 [ 198.991093][ T8164] ? add_subprog+0x273/0x380 [ 198.991116][ T8164] ? __mark_chain_precision+0x1a50/0x1a50 [ 198.991136][ T8164] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 198.991161][ T8164] ? __sanitizer_cov_trace_cmp4+0x1c/0x70 [ 198.991185][ T8164] ? check_subprogs+0x511/0x5f0 [ 198.991234][ T8164] bpf_check+0x28ac/0xbbc0 [ 198.991265][ T8164] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 198.991312][ T8164] ? bpf_get_btf_vmlinux+0x10/0x10 [ 198.991349][ T8164] ? lock_downgrade+0x6e0/0x6e0 [ 198.991379][ T8164] ? __might_fault+0xd1/0x170 [ 198.991407][ T8164] ? lock_downgrade+0x6e0/0x6e0 [ 198.991449][ T8164] ? memset+0x20/0x40 [ 198.991473][ T8164] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 198.991503][ T8164] ? bpf_obj_name_cpy+0x144/0x1a0 [ 198.991534][ T8164] ? bpf_prog_load+0xf71/0x2250 [ 198.991562][ T8164] bpf_prog_load+0xfb2/0x2250 [ 198.991595][ T8164] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 198.991622][ T8164] ? find_held_lock+0x2d/0x110 [ 198.991654][ T8164] ? __might_fault+0xd1/0x170 [ 198.991679][ T8164] ? lock_downgrade+0x6e0/0x6e0 [ 198.991723][ T8164] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 198.991757][ T8164] __sys_bpf+0x11a1/0x5700 [ 198.991788][ T8164] ? bpf_perf_link_attach+0x520/0x520 [ 198.991816][ T8164] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 198.991857][ T8164] ? find_held_lock+0x2d/0x110 [ 198.991904][ T8164] ? trace_hardirqs_on+0x38/0x1c0 [ 198.991932][ T8164] __x64_sys_bpf+0x75/0xb0 [ 198.991961][ T8164] ? syscall_enter_from_user_mode+0x21/0x70 [ 198.991995][ T8164] do_syscall_64+0x35/0xb0 [ 198.992021][ T8164] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 198.992046][ T8164] RIP: 0033:0x7f2e16289109 [ 198.992065][ T8164] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 198.992090][ T8164] RSP: 002b:00007f2e1731f168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 198.992113][ T8164] RAX: ffffffffffffffda RBX: 00007f2e1639bf60 RCX: 00007f2e16289109 [ 198.992131][ T8164] RDX: 0000000000000080 RSI: 00000000200001c0 RDI: 0000000000000005 [ 198.992147][ T8164] RBP: 00007f2e1731f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 198.992162][ T8164] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 198.992176][ T8164] R13: 00007ffde7446a9f R14: 00007f2e1731f300 R15: 0000000000022000 [ 198.992218][ T8164] [ 199.139167][ T8174] FAULT_INJECTION: forcing a failure. [ 199.139167][ T8174] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 199.139201][ T8174] CPU: 1 PID: 8174 Comm: syz-executor.1 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 199.139226][ T8174] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 199.139241][ T8174] Call Trace: [ 199.139247][ T8174] [ 199.139255][ T8174] dump_stack_lvl+0xcd/0x134 [ 199.139287][ T8174] should_fail.cold+0x5/0xa [ 199.139328][ T8174] prepare_alloc_pages+0x17b/0x570 [ 199.139363][ T8174] __alloc_pages+0x12f/0x500 [ 199.139389][ T8174] ? __alloc_pages_slowpath.constprop.0+0x20e0/0x20e0 [ 199.139417][ T8174] ? __kmalloc_node+0x62/0x390 [ 199.139462][ T8174] alloc_pages+0x1aa/0x310 [ 199.139496][ T8174] __vmalloc_node_range+0x735/0x13e0 [ 199.139536][ T8174] ? netlink_sendmsg+0x690/0xe10 [ 199.139563][ T8174] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 199.139593][ T8174] ? vfree_atomic+0xe0/0xe0 23:06:19 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}}, 0x0, 0x6, 0xffffffffffffffff, 0x0) r1 = gettid() r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x10001}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x9, 0x0, 0x0, 0xfffffffc}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(r0, &(0x7f0000000300)='blkio.bfq.io_serviced\x00', 0x0, 0x0) r4 = openat$cgroup(r3, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000200), 0x1}, 0x0, 0x1000, 0x7, 0x3, 0x0, 0xfffffffe, 0x5, 0x0, 0x8, 0x0, 0xfffffffffffffff7}, r4, 0x0, r2, 0x0) r5 = perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6098}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r2) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0xff, 0x1f, 0x5, 0x7, 0x0, 0x7, 0x1a19, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x233a, 0x0, @perf_bp={&(0x7f0000000040), 0x4}, 0x5a420, 0x13b8, 0x9, 0x2, 0x7f, 0x2, 0x5, 0x0, 0x6, 0x0, 0x80000000}, r1, 0xc, r5, 0x8) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) openat$cgroup_ro(r6, &(0x7f00000004c0)='blkio.bfq.io_service_time\x00', 0x0, 0x0) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) perf_event_open(&(0x7f0000000580)={0x0, 0x80, 0x5, 0xff, 0x1, 0xfa, 0x0, 0x8, 0xc0020, 0x4, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x2, @perf_bp={&(0x7f0000000400), 0xc0df755a24f2547b}, 0x10, 0x3, 0x80000000, 0x9, 0x8001, 0x7ff, 0x9, 0x0, 0x0, 0x0, 0x7fffffff}, r1, 0x6, r6, 0x7) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000004c0)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.swap.events\x00', 0x0, 0x0) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x39) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000003c0)={@map=r8, r9, 0x1b, 0x1, r8}, 0x14) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x44100000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}}, 0x0, 0x6, 0xffffffffffffffff, 0x0) (async) gettid() (async) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x10001}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x9, 0x0, 0x0, 0xfffffffc}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(r0, &(0x7f0000000300)='blkio.bfq.io_serviced\x00', 0x0, 0x0) (async) openat$cgroup(r3, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) (async) perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000200), 0x1}, 0x0, 0x1000, 0x7, 0x3, 0x0, 0xfffffffe, 0x5, 0x0, 0x8, 0x0, 0xfffffffffffffff7}, r4, 0x0, r2, 0x0) (async) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6098}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r2) (async) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0xff, 0x1f, 0x5, 0x7, 0x0, 0x7, 0x1a19, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x233a, 0x0, @perf_bp={&(0x7f0000000040), 0x4}, 0x5a420, 0x13b8, 0x9, 0x2, 0x7f, 0x2, 0x5, 0x0, 0x6, 0x0, 0x80000000}, r1, 0xc, r5, 0x8) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) (async) openat$cgroup_ro(r6, &(0x7f00000004c0)='blkio.bfq.io_service_time\x00', 0x0, 0x0) (async) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) (async) perf_event_open(&(0x7f0000000580)={0x0, 0x80, 0x5, 0xff, 0x1, 0xfa, 0x0, 0x8, 0xc0020, 0x4, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x2, @perf_bp={&(0x7f0000000400), 0xc0df755a24f2547b}, 0x10, 0x3, 0x80000000, 0x9, 0x8001, 0x7ff, 0x9, 0x0, 0x0, 0x0, 0x7fffffff}, r1, 0x6, r6, 0x7) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000004c0)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.swap.events\x00', 0x0, 0x0) (async) bpf$ITER_CREATE(0x21, 0x0, 0x39) (async) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000003c0)={@map=r8, r9, 0x1b, 0x1, r8}, 0x14) (async) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) syz_clone(0x44100000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) 23:06:19 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="2e1100005500810ce00f80ecdb4cb9f207c804a011000000020006fb0a0002000a0ada1b40d805001100c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) 23:06:19 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000400180081064e81f782db4cb904021d080004007c03e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) 23:06:19 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (fail_nth: 51) 23:06:19 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000500180081064e81f782db4cb9040a1d080004007c09e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) 23:06:19 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002c000505d25a80308c63940d0c35fc60100006400a13400b053582c137153e37080c188004ac0f00d1bd", 0x33fe0}], 0x1}, 0x0) (fail_nth: 51) [ 199.139619][ T8174] ? __netlink_dump_start+0x900/0x900 [ 199.139644][ T8174] ? netlink_sendmsg+0x690/0xe10 23:06:19 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000500180081064e81f782db4cb904021d080004007c03e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) 23:06:19 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0402005500810ce00f80ecdb4cb9f207c804a011000000020006fb0a0002000a0ada1b40d805001100c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) 23:06:19 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (fail_nth: 52) 23:06:19 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000600180081064e81f782db4cb9040a1d080004007c09e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) 23:06:19 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002c000505d25a80308c63940d0c35fc60100006400a13400b053582c137153e37080c188004ac0f00d1bd", 0x33fe0}], 0x1}, 0x0) (fail_nth: 52) ** 6 printk messages dropped ** [ 199.139847][ T8174] sock_sendmsg+0xcf/0x120 23:06:19 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000700180081064e81f782db4cb9040a1d080004007c09e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) [ 199.139878][ T8174] ____sys_sendmsg+0x6eb/0x810 ** 114 printk messages dropped ** [ 199.149631][ T8168] ? check_subprogs+0x511/0x5f0 [ 199.149663][ T8168] bpf_check+0x28ac/0xbbc0 [ 199.149694][ T8168] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 199.149743][ T8168] ? bpf_get_btf_vmlinux+0x10/0x10 [ 199.149774][ T8168] ? lock_downgrade+0x6e0/0x6e0 [ 199.149803][ T8168] ? __might_fault+0xd1/0x170 [ 199.149826][ T8168] ? lock_downgrade+0x6e0/0x6e0 [ 199.149863][ T8168] ? memset+0x20/0x40 [ 199.149883][ T8168] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 199.149911][ T8168] ? bpf_obj_name_cpy+0x144/0x1a0 [ 199.149941][ T8168] ? bpf_prog_load+0xf71/0x2250 [ 199.149971][ T8168] bpf_prog_load+0xfb2/0x2250 [ 199.150009][ T8168] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 199.150041][ T8168] ? find_held_lock+0x2d/0x110 [ 199.150074][ T8168] ? __might_fault+0xd1/0x170 [ 199.150100][ T8168] ? lock_downgrade+0x6e0/0x6e0 [ 199.150144][ T8168] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 199.150177][ T8168] __sys_bpf+0x11a1/0x5700 [ 199.150218][ T8168] ? bpf_perf_link_attach+0x520/0x520 [ 199.150250][ T8168] ? lockdep_hardirqs_on_prepare+0x400/0x400 23:06:19 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}}, 0x0, 0x6, 0xffffffffffffffff, 0x0) r1 = gettid() (async) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x10001}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x9, 0x0, 0x0, 0xfffffffc}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(r0, &(0x7f0000000300)='blkio.bfq.io_serviced\x00', 0x0, 0x0) r4 = openat$cgroup(r3, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000200), 0x1}, 0x0, 0x1000, 0x7, 0x3, 0x0, 0xfffffffe, 0x5, 0x0, 0x8, 0x0, 0xfffffffffffffff7}, r4, 0x0, r2, 0x0) r5 = perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6098}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r2) (async) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0xff, 0x1f, 0x5, 0x7, 0x0, 0x7, 0x1a19, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x233a, 0x0, @perf_bp={&(0x7f0000000040), 0x4}, 0x5a420, 0x13b8, 0x9, 0x2, 0x7f, 0x2, 0x5, 0x0, 0x6, 0x0, 0x80000000}, r1, 0xc, r5, 0x8) (async) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) openat$cgroup_ro(r6, &(0x7f00000004c0)='blkio.bfq.io_service_time\x00', 0x0, 0x0) (async) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) perf_event_open(&(0x7f0000000580)={0x0, 0x80, 0x5, 0xff, 0x1, 0xfa, 0x0, 0x8, 0xc0020, 0x4, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x2, @perf_bp={&(0x7f0000000400), 0xc0df755a24f2547b}, 0x10, 0x3, 0x80000000, 0x9, 0x8001, 0x7ff, 0x9, 0x0, 0x0, 0x0, 0x7fffffff}, r1, 0x6, r6, 0x7) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000004c0)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) (async) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.swap.events\x00', 0x0, 0x0) (async) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x39) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000003c0)={@map=r8, r9, 0x1b, 0x1, r8}, 0x14) (async) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x44100000, 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:19 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0403005500810ce00f80ecdb4cb9f207c804a011000000020006fb0a0002000a0ada1b40d805001100c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) 23:06:19 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000600180081064e81f782db4cb904021d080004007c03e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) 23:06:19 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002c000505d25a80308c63940d0c35fc60100006400a13400b053582c137153e37080c188004ac0f00d1bd", 0x33fe0}], 0x1}, 0x0) (fail_nth: 53) 23:06:19 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (fail_nth: 53) 23:06:19 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000800180081064e81f782db4cb9040a1d080004007c09e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) [ 199.150294][ T8168] ? find_held_lock+0x2d/0x110 [ 199.150353][ T8168] ? trace_hardirqs_on+0x38/0x1c0 [ 199.150385][ T8168] __x64_sys_bpf+0x75/0xb0 [ 199.150414][ T8168] ? syscall_enter_from_user_mode+0x21/0x70 [ 199.150446][ T8168] do_syscall_64+0x35/0xb0 [ 199.150472][ T8168] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 199.150498][ T8168] RIP: 0033:0x7f2e16289109 ** 82 printk messages dropped ** 23:06:20 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000900180081064e81f782db4cb9040a1d080004007c09e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) 23:06:20 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000700180081064e81f782db4cb904021d080004007c03e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) 23:06:20 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0404005500810ce00f80ecdb4cb9f207c804a011000000020006fb0a0002000a0ada1b40d805001100c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) 23:06:20 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (fail_nth: 54) [ 199.580325][ T8184] RBP: 00007f2e1731f1d0 R08: 0000000000000000 R09: 0000000000000000 23:06:20 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002c000505d25a80308c63940d0c35fc60100006400a13400b053582c137153e37080c188004ac0f00d1bd", 0x33fe0}], 0x1}, 0x0) (fail_nth: 54) [ 199.580340][ T8184] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 199.580354][ T8184] R13: 00007ffde7446a9f R14: 00007f2e1731f300 R15: 0000000000022000 23:06:20 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000a00180081064e81f782db4cb9040a1d080004007c09e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) [ 199.580387][ T8184] ** 64 printk messages dropped ** [ 199.614456][ T8188] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 ** 46 printk messages dropped ** [ 199.730782][ T8195] ? stack_trace_save+0x8c/0xc0 [ 199.730823][ T8195] __alloc_pages_bulk+0xbf3/0x1a10 [ 199.730847][ T8195] ? bpf_check+0x28ac/0xbbc0 [ 199.730870][ T8195] ? bpf_prog_load+0xfb2/0x2250 [ 199.730898][ T8195] ? do_syscall_64+0x35/0xb0 [ 199.730923][ T8195] ? entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 199.730963][ T8195] ? __alloc_pages+0x500/0x500 [ 199.730985][ T8195] ? find_held_lock+0x2d/0x110 [ 199.731018][ T8195] ? __kmalloc_node+0x62/0x390 [ 199.731058][ T8195] alloc_pages_bulk_array_mempolicy+0x1c3/0x4d0 [ 199.731091][ T8195] ? rcu_read_lock_sched_held+0x3a/0x70 [ 199.731120][ T8195] ? trace_kmalloc_node+0x32/0x100 [ 199.731154][ T8195] __vmalloc_node_range+0x576/0x13e0 [ 199.731197][ T8195] ? bpf_prog_calc_tag+0xc9/0x6c0 [ 199.731224][ T8195] ? __x64_sys_bpf+0x75/0xb0 [ 199.731255][ T8195] ? vfree_atomic+0xe0/0xe0 [ 199.731281][ T8195] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 199.731313][ T8195] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 199.731339][ T8195] ? sort_r+0x295/0x420 [ 199.731363][ T8195] ? bpf_prog_calc_tag+0xc9/0x6c0 [ 199.731391][ T8195] vmalloc+0x67/0x80 [ 199.731418][ T8195] ? bpf_prog_calc_tag+0xc9/0x6c0 [ 199.731442][ T8195] bpf_prog_calc_tag+0xc9/0x6c0 [ 199.731465][ T8195] ? sort+0x92/0xc0 [ 199.731491][ T8195] ? __reg64_deduce_bounds+0x160/0x160 [ 199.731522][ T8195] ? __bpf_prog_free+0x190/0x190 [ 199.731545][ T8195] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 199.731572][ T8195] ? bsearch+0x9b/0xb0 [ 199.731598][ T8195] ? add_subprog+0x273/0x380 [ 199.731623][ T8195] ? __mark_chain_precision+0x1a50/0x1a50 [ 199.731646][ T8195] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 199.731681][ T8195] ? __sanitizer_cov_trace_cmp4+0x1c/0x70 [ 199.731707][ T8195] ? check_subprogs+0x511/0x5f0 [ 199.731741][ T8195] bpf_check+0x28ac/0xbbc0 [ 199.731773][ T8195] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 199.731822][ T8195] ? bpf_get_btf_vmlinux+0x10/0x10 [ 199.731856][ T8195] ? lock_downgrade+0x6e0/0x6e0 [ 199.731885][ T8195] ? __might_fault+0xd1/0x170 [ 199.731910][ T8195] ? lock_downgrade+0x6e0/0x6e0 [ 199.731950][ T8195] ? memset+0x20/0x40 [ 199.731971][ T8195] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 199.731999][ T8195] ? bpf_obj_name_cpy+0x144/0x1a0 [ 199.732029][ T8195] ? bpf_prog_load+0xf71/0x2250 [ 199.732060][ T8195] bpf_prog_load+0xfb2/0x2250 [ 199.732097][ T8195] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 199.732128][ T8195] ? find_held_lock+0x2d/0x110 [ 199.732160][ T8195] ? __might_fault+0xd1/0x170 [ 199.732186][ T8195] ? lock_downgrade+0x6e0/0x6e0 [ 199.732229][ T8195] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 199.732263][ T8195] __sys_bpf+0x11a1/0x5700 [ 199.732296][ T8195] ? bpf_perf_link_attach+0x520/0x520 [ 199.732326][ T8195] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 199.732369][ T8195] ? find_held_lock+0x2d/0x110 [ 199.732425][ T8195] ? trace_hardirqs_on+0x38/0x1c0 [ 199.732455][ T8195] __x64_sys_bpf+0x75/0xb0 [ 199.732483][ T8195] ? syscall_enter_from_user_mode+0x21/0x70 [ 199.732516][ T8195] do_syscall_64+0x35/0xb0 [ 199.732541][ T8195] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 199.732565][ T8195] RIP: 0033:0x7f2e16289109 [ 199.732584][ T8195] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 199.732609][ T8195] RSP: 002b:00007f2e1731f168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 199.732632][ T8195] RAX: ffffffffffffffda RBX: 00007f2e1639bf60 RCX: 00007f2e16289109 [ 199.732648][ T8195] RDX: 0000000000000080 RSI: 00000000200001c0 RDI: 0000000000000005 [ 199.732669][ T8195] RBP: 00007f2e1731f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 199.732684][ T8195] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 199.732699][ T8195] R13: 00007ffde7446a9f R14: 00007f2e1731f300 R15: 0000000000022000 [ 199.732731][ T8195] [ 199.786897][ T8199] FAULT_INJECTION: forcing a failure. [ 199.786897][ T8199] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 199.786933][ T8199] CPU: 1 PID: 8199 Comm: syz-executor.1 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 199.786961][ T8199] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 199.786975][ T8199] Call Trace: [ 199.786981][ T8199] [ 199.786990][ T8199] dump_stack_lvl+0xcd/0x134 [ 199.787021][ T8199] should_fail.cold+0x5/0xa [ 199.787058][ T8199] prepare_alloc_pages+0x17b/0x570 [ 199.787090][ T8199] __alloc_pages+0x12f/0x500 [ 199.787117][ T8199] ? __alloc_pages_slowpath.constprop.0+0x20e0/0x20e0 [ 199.787146][ T8199] ? __kmalloc_node+0x62/0x390 [ 199.787208][ T8199] alloc_pages+0x1aa/0x310 [ 199.787242][ T8199] __vmalloc_node_range+0x735/0x13e0 [ 199.787288][ T8199] ? netlink_sendmsg+0x690/0xe10 [ 199.787317][ T8199] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 199.787347][ T8199] ? vfree_atomic+0xe0/0xe0 [ 199.787377][ T8199] ? __netlink_dump_start+0x900/0x900 [ 199.787402][ T8199] ? netlink_sendmsg+0x690/0xe10 [ 199.787428][ T8199] vmalloc+0x67/0x80 [ 199.787455][ T8199] ? netlink_sendmsg+0x690/0xe10 [ 199.787479][ T8199] netlink_sendmsg+0x690/0xe10 [ 199.787512][ T8199] ? netlink_unicast+0x7f0/0x7f0 [ 199.787544][ T8199] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 199.787573][ T8199] ? netlink_unicast+0x7f0/0x7f0 [ 199.787598][ T8199] sock_sendmsg+0xcf/0x120 [ 199.787629][ T8199] ____sys_sendmsg+0x6eb/0x810 [ 199.787662][ T8199] ? kernel_sendmsg+0x50/0x50 [ 199.787690][ T8199] ? do_recvmmsg+0x6d0/0x6d0 [ 199.787714][ T8199] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 199.787748][ T8199] ? _parse_integer+0x30/0x30 [ 199.787786][ T8199] ___sys_sendmsg+0xf3/0x170 [ 199.787812][ T8199] ? sendmsg_copy_msghdr+0x160/0x160 [ 199.787843][ T8199] ? lock_downgrade+0x6e0/0x6e0 [ 199.787886][ T8199] ? __fget_files+0x286/0x470 [ 199.787921][ T8199] ? __fget_light+0xea/0x270 [ 199.787948][ T8199] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 199.787980][ T8199] __x64_sys_sendmsg+0x132/0x220 [ 199.788005][ T8199] ? __sys_sendmsg+0x1b0/0x1b0 [ 199.788044][ T8199] ? syscall_enter_from_user_mode+0x21/0x70 [ 199.788083][ T8199] do_syscall_64+0x35/0xb0 [ 199.788108][ T8199] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 199.788134][ T8199] RIP: 0033:0x7f55bba89109 [ 199.788162][ T8199] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 199.788190][ T8199] RSP: 002b:00007f55bcbef168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 199.788214][ T8199] RAX: ffffffffffffffda RBX: 00007f55bbb9bf60 RCX: 00007f55bba89109 [ 199.788232][ T8199] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 199.788248][ T8199] RBP: 00007f55bcbef1d0 R08: 0000000000000000 R09: 0000000000000000 [ 199.788264][ T8199] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 199.788280][ T8199] R13: 00007ffd14a51aef R14: 00007f55bcbef300 R15: 0000000000022000 [ 199.788315][ T8199] [ 199.805878][ T8200] FAULT_INJECTION: forcing a failure. [ 199.805878][ T8200] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 199.805912][ T8200] CPU: 1 PID: 8200 Comm: syz-executor.4 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 199.805940][ T8200] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 199.805956][ T8200] Call Trace: [ 199.805962][ T8200] [ 199.805970][ T8200] dump_stack_lvl+0xcd/0x134 [ 199.806005][ T8200] should_fail.cold+0x5/0xa [ 199.806040][ T8200] prepare_alloc_pages+0x17b/0x570 [ 199.806073][ T8200] __alloc_pages+0x12f/0x500 [ 199.806100][ T8200] ? __alloc_pages_slowpath.constprop.0+0x20e0/0x20e0 [ 199.806131][ T8200] ? __kmalloc_node+0x62/0x390 [ 199.806185][ T8200] alloc_pages+0x1aa/0x310 [ 199.806219][ T8200] __vmalloc_node_range+0x735/0x13e0 [ 199.806265][ T8200] ? netlink_sendmsg+0x690/0xe10 [ 199.806296][ T8200] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 199.806325][ T8200] ? vfree_atomic+0xe0/0xe0 [ 199.806355][ T8200] ? __netlink_dump_start+0x900/0x900 [ 199.806381][ T8200] ? netlink_sendmsg+0x690/0xe10 [ 199.806408][ T8200] vmalloc+0x67/0x80 [ 199.806434][ T8200] ? netlink_sendmsg+0x690/0xe10 [ 199.806458][ T8200] netlink_sendmsg+0x690/0xe10 [ 199.806490][ T8200] ? netlink_unicast+0x7f0/0x7f0 [ 199.806520][ T8200] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 199.806550][ T8200] ? netlink_unicast+0x7f0/0x7f0 [ 199.806575][ T8200] sock_sendmsg+0xcf/0x120 [ 199.806607][ T8200] ____sys_sendmsg+0x6eb/0x810 [ 199.806641][ T8200] ? kernel_sendmsg+0x50/0x50 [ 199.806668][ T8200] ? do_recvmmsg+0x6d0/0x6d0 [ 199.806692][ T8200] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 199.806726][ T8200] ? _parse_integer+0x30/0x30 [ 199.806764][ T8200] ___sys_sendmsg+0xf3/0x170 [ 199.806790][ T8200] ? sendmsg_copy_msghdr+0x160/0x160 [ 199.806821][ T8200] ? lock_downgrade+0x6e0/0x6e0 [ 199.806865][ T8200] ? __fget_files+0x286/0x470 [ 199.806901][ T8200] ? __fget_light+0xea/0x270 [ 199.806928][ T8200] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 199.806961][ T8200] __x64_sys_sendmsg+0x132/0x220 [ 199.806986][ T8200] ? __sys_sendmsg+0x1b0/0x1b0 [ 199.807026][ T8200] ? syscall_enter_from_user_mode+0x21/0x70 [ 199.807065][ T8200] do_syscall_64+0x35/0xb0 [ 199.807092][ T8200] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 199.807125][ T8200] RIP: 0033:0x7f7765489109 [ 199.807146][ T8200] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 199.807179][ T8200] RSP: 002b:00007f7766559168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 199.807203][ T8200] RAX: ffffffffffffffda RBX: 00007f776559bf60 RCX: 00007f7765489109 [ 199.807221][ T8200] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 199.807238][ T8200] RBP: 00007f77665591d0 R08: 0000000000000000 R09: 0000000000000000 [ 199.807254][ T8200] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 199.807269][ T8200] R13: 00007ffec1cb653f R14: 00007f7766559300 R15: 0000000000022000 [ 199.807305][ T8200] [ 200.587924][ T8212] FAULT_INJECTION: forcing a failure. [ 200.587924][ T8212] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 200.587957][ T8212] CPU: 1 PID: 8212 Comm: syz-executor.1 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 200.587985][ T8212] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 200.587998][ T8212] Call Trace: [ 200.588005][ T8212] [ 200.588013][ T8212] dump_stack_lvl+0xcd/0x134 [ 200.588044][ T8212] should_fail.cold+0x5/0xa [ 200.588079][ T8212] prepare_alloc_pages+0x17b/0x570 [ 200.588113][ T8212] __alloc_pages+0x12f/0x500 [ 200.588138][ T8212] ? __alloc_pages_slowpath.constprop.0+0x20e0/0x20e0 [ 200.588164][ T8212] ? __kmalloc_node+0x62/0x390 [ 200.588207][ T8212] alloc_pages+0x1aa/0x310 [ 200.588243][ T8212] __vmalloc_node_range+0x735/0x13e0 [ 200.588286][ T8212] ? netlink_sendmsg+0x690/0xe10 [ 200.588316][ T8212] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 200.588345][ T8212] ? vfree_atomic+0xe0/0xe0 [ 200.588374][ T8212] ? __netlink_dump_start+0x900/0x900 [ 200.588398][ T8212] ? netlink_sendmsg+0x690/0xe10 [ 200.588423][ T8212] vmalloc+0x67/0x80 [ 200.588465][ T8212] ? netlink_sendmsg+0x690/0xe10 [ 200.588490][ T8212] netlink_sendmsg+0x690/0xe10 [ 200.588521][ T8212] ? netlink_unicast+0x7f0/0x7f0 [ 200.588551][ T8212] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 200.588581][ T8212] ? netlink_unicast+0x7f0/0x7f0 [ 200.588615][ T8212] sock_sendmsg+0xcf/0x120 [ 200.588646][ T8212] ____sys_sendmsg+0x6eb/0x810 [ 200.588687][ T8212] ? kernel_sendmsg+0x50/0x50 [ 200.588714][ T8212] ? do_recvmmsg+0x6d0/0x6d0 [ 200.588738][ T8212] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 200.588780][ T8212] ? _parse_integer+0x30/0x30 [ 200.588818][ T8212] ___sys_sendmsg+0xf3/0x170 [ 200.588845][ T8212] ? sendmsg_copy_msghdr+0x160/0x160 [ 200.588875][ T8212] ? lock_downgrade+0x6e0/0x6e0 [ 200.588918][ T8212] ? __fget_files+0x286/0x470 [ 200.588959][ T8212] ? __fget_light+0xea/0x270 [ 200.588986][ T8212] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 200.589020][ T8212] __x64_sys_sendmsg+0x132/0x220 [ 200.589045][ T8212] ? __sys_sendmsg+0x1b0/0x1b0 [ 200.589082][ T8212] ? syscall_enter_from_user_mode+0x21/0x70 [ 200.589128][ T8212] do_syscall_64+0x35/0xb0 [ 200.589154][ T8212] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 200.589178][ T8212] RIP: 0033:0x7f55bba89109 [ 200.589197][ T8212] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 200.589223][ T8212] RSP: 002b:00007f55bcbef168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 200.589247][ T8212] RAX: ffffffffffffffda RBX: 00007f55bbb9bf60 RCX: 00007f55bba89109 [ 200.589271][ T8212] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 200.589286][ T8212] RBP: 00007f55bcbef1d0 R08: 0000000000000000 R09: 0000000000000000 [ 200.589302][ T8212] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 200.589317][ T8212] R13: 00007ffd14a51aef R14: 00007f55bcbef300 R15: 0000000000022000 [ 200.589351][ T8212] [ 200.589370][ T8214] FAULT_INJECTION: forcing a failure. [ 200.589370][ T8214] name failslab, interval 1, probability 0, space 0, times 0 [ 200.589398][ T8214] CPU: 0 PID: 8214 Comm: syz-executor.5 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 200.589425][ T8214] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 200.589440][ T8214] Call Trace: [ 200.589446][ T8214] [ 200.589453][ T8214] dump_stack_lvl+0xcd/0x134 [ 200.589481][ T8214] should_fail.cold+0x5/0xa [ 200.589514][ T8214] ? kvmalloc_node+0x3e/0x190 [ 200.589542][ T8214] should_failslab+0x5/0x10 [ 200.589569][ T8214] __kmalloc_node+0x75/0x390 [ 200.589594][ T8214] ? check_subprogs+0x511/0x5f0 [ 200.589623][ T8214] kvmalloc_node+0x3e/0x190 [ 200.589648][ T8214] bpf_check+0x5618/0xbbc0 [ 200.589696][ T8214] ? bpf_get_btf_vmlinux+0x10/0x10 [ 200.589726][ T8214] ? lock_downgrade+0x6e0/0x6e0 [ 200.589754][ T8214] ? __might_fault+0xd1/0x170 [ 200.589778][ T8214] ? lock_downgrade+0x6e0/0x6e0 [ 200.589817][ T8214] ? memset+0x20/0x40 [ 200.589838][ T8214] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 200.589866][ T8214] ? bpf_obj_name_cpy+0x144/0x1a0 [ 200.589894][ T8214] ? bpf_prog_load+0xf71/0x2250 [ 200.589924][ T8214] bpf_prog_load+0xfb2/0x2250 [ 200.589958][ T8214] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 200.589987][ T8214] ? find_held_lock+0x2d/0x110 [ 200.590020][ T8214] ? __might_fault+0xd1/0x170 [ 200.590045][ T8214] ? lock_downgrade+0x6e0/0x6e0 [ 200.590089][ T8214] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 200.590122][ T8214] __sys_bpf+0x11a1/0x5700 [ 200.590169][ T8214] ? bpf_perf_link_attach+0x520/0x520 [ 200.590200][ T8214] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 200.590242][ T8214] ? find_held_lock+0x2d/0x110 [ 200.590296][ T8214] ? trace_hardirqs_on+0x38/0x1c0 [ 200.590324][ T8214] __x64_sys_bpf+0x75/0xb0 [ 200.590351][ T8214] ? syscall_enter_from_user_mode+0x21/0x70 [ 200.590383][ T8214] do_syscall_64+0x35/0xb0 [ 200.590411][ T8214] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 200.590436][ T8214] RIP: 0033:0x7f2e16289109 [ 200.590453][ T8214] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 200.590478][ T8214] RSP: 002b:00007f2e1731f168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 200.590500][ T8214] RAX: ffffffffffffffda RBX: 00007f2e1639bf60 RCX: 00007f2e16289109 [ 200.590518][ T8214] RDX: 0000000000000080 RSI: 00000000200001c0 RDI: 0000000000000005 [ 200.590533][ T8214] RBP: 00007f2e1731f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 200.590548][ T8214] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 200.590563][ T8214] R13: 00007ffde7446a9f R14: 00007f2e1731f300 R15: 0000000000022000 [ 200.590596][ T8214] [ 200.591017][ T8213] FAULT_INJECTION: forcing a failure. [ 200.591017][ T8213] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 200.591047][ T8213] CPU: 1 PID: 8213 Comm: syz-executor.4 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 200.591075][ T8213] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 200.591096][ T8213] Call Trace: [ 200.591102][ T8213] [ 200.591110][ T8213] dump_stack_lvl+0xcd/0x134 [ 200.591138][ T8213] should_fail.cold+0x5/0xa [ 200.591174][ T8213] prepare_alloc_pages+0x17b/0x570 [ 200.591205][ T8213] __alloc_pages+0x12f/0x500 [ 200.591233][ T8213] ? __alloc_pages_slowpath.constprop.0+0x20e0/0x20e0 [ 200.591264][ T8213] ? __kmalloc_node+0x62/0x390 [ 200.591321][ T8213] alloc_pages+0x1aa/0x310 [ 200.591355][ T8213] __vmalloc_node_range+0x735/0x13e0 [ 200.591401][ T8213] ? netlink_sendmsg+0x690/0xe10 [ 200.591430][ T8213] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 200.591460][ T8213] ? vfree_atomic+0xe0/0xe0 [ 200.591490][ T8213] ? __netlink_dump_start+0x900/0x900 [ 200.591516][ T8213] ? netlink_sendmsg+0x690/0xe10 [ 200.591543][ T8213] vmalloc+0x67/0x80 [ 200.591571][ T8213] ? netlink_sendmsg+0x690/0xe10 [ 200.591595][ T8213] netlink_sendmsg+0x690/0xe10 [ 200.591628][ T8213] ? netlink_unicast+0x7f0/0x7f0 [ 200.591664][ T8213] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 200.591695][ T8213] ? netlink_unicast+0x7f0/0x7f0 [ 200.591721][ T8213] sock_sendmsg+0xcf/0x120 [ 200.591749][ T8213] ____sys_sendmsg+0x6eb/0x810 [ 200.591782][ T8213] ? kernel_sendmsg+0x50/0x50 [ 200.591810][ T8213] ? do_recvmmsg+0x6d0/0x6d0 [ 200.591833][ T8213] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 200.591865][ T8213] ? _parse_integer+0x30/0x30 [ 200.591900][ T8213] ___sys_sendmsg+0xf3/0x170 [ 200.591926][ T8213] ? sendmsg_copy_msghdr+0x160/0x160 [ 200.591956][ T8213] ? lock_downgrade+0x6e0/0x6e0 [ 200.591998][ T8213] ? __fget_files+0x286/0x470 [ 200.592031][ T8213] ? __fget_light+0xea/0x270 [ 200.592057][ T8213] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 200.592090][ T8213] __x64_sys_sendmsg+0x132/0x220 [ 200.592115][ T8213] ? __sys_sendmsg+0x1b0/0x1b0 [ 200.592151][ T8213] ? syscall_enter_from_user_mode+0x21/0x70 [ 200.592190][ T8213] do_syscall_64+0x35/0xb0 [ 200.592215][ T8213] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 200.592241][ T8213] RIP: 0033:0x7f7765489109 [ 200.592260][ T8213] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 200.592286][ T8213] RSP: 002b:00007f7766559168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 200.592317][ T8213] RAX: ffffffffffffffda RBX: 00007f776559bf60 RCX: 00007f7765489109 [ 200.592335][ T8213] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 200.592351][ T8213] RBP: 00007f77665591d0 R08: 0000000000000000 R09: 0000000000000000 [ 200.592367][ T8213] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 200.592382][ T8213] R13: 00007ffec1cb653f R14: 00007f7766559300 R15: 0000000000022000 [ 200.592418][ T8213] [ 200.738938][ T8220] FAULT_INJECTION: forcing a failure. [ 200.738938][ T8220] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 200.738971][ T8220] CPU: 1 PID: 8220 Comm: syz-executor.1 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 200.738997][ T8220] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 200.739010][ T8220] Call Trace: [ 200.739017][ T8220] [ 200.739025][ T8220] dump_stack_lvl+0xcd/0x134 [ 200.739055][ T8220] should_fail.cold+0x5/0xa [ 200.739090][ T8220] prepare_alloc_pages+0x17b/0x570 [ 200.739122][ T8220] __alloc_pages+0x12f/0x500 [ 200.739146][ T8220] ? __alloc_pages_slowpath.constprop.0+0x20e0/0x20e0 [ 200.739174][ T8220] ? __kmalloc_node+0x62/0x390 [ 200.739217][ T8220] alloc_pages+0x1aa/0x310 [ 200.739248][ T8220] __vmalloc_node_range+0x735/0x13e0 [ 200.739289][ T8220] ? netlink_sendmsg+0x690/0xe10 [ 200.739315][ T8220] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 200.739343][ T8220] ? vfree_atomic+0xe0/0xe0 [ 200.739371][ T8220] ? __netlink_dump_start+0x900/0x900 [ 200.739395][ T8220] ? netlink_sendmsg+0x690/0xe10 [ 200.739420][ T8220] vmalloc+0x67/0x80 [ 200.739445][ T8220] ? netlink_sendmsg+0x690/0xe10 [ 200.739468][ T8220] netlink_sendmsg+0x690/0xe10 [ 200.739496][ T8220] ? netlink_unicast+0x7f0/0x7f0 [ 200.739525][ T8220] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 200.739553][ T8220] ? netlink_unicast+0x7f0/0x7f0 [ 200.739576][ T8220] sock_sendmsg+0xcf/0x120 [ 200.739606][ T8220] ____sys_sendmsg+0x6eb/0x810 [ 200.739637][ T8220] ? kernel_sendmsg+0x50/0x50 [ 200.739663][ T8220] ? do_recvmmsg+0x6d0/0x6d0 [ 200.739695][ T8220] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 200.739730][ T8220] ? _parse_integer+0x30/0x30 [ 200.739767][ T8220] ___sys_sendmsg+0xf3/0x170 [ 200.739794][ T8220] ? sendmsg_copy_msghdr+0x160/0x160 [ 200.739823][ T8220] ? lock_downgrade+0x6e0/0x6e0 [ 200.739863][ T8220] ? __fget_files+0x286/0x470 [ 200.739898][ T8220] ? __fget_light+0xea/0x270 [ 200.739925][ T8220] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 200.739957][ T8220] __x64_sys_sendmsg+0x132/0x220 [ 200.739997][ T8220] ? __sys_sendmsg+0x1b0/0x1b0 [ 200.740035][ T8220] ? syscall_enter_from_user_mode+0x21/0x70 [ 200.740074][ T8220] do_syscall_64+0x35/0xb0 [ 200.740100][ T8220] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 200.740138][ T8220] RIP: 0033:0x7f55bba89109 [ 200.740158][ T8220] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 200.740181][ T8220] RSP: 002b:00007f55bcbef168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 200.740205][ T8220] RAX: ffffffffffffffda RBX: 00007f55bbb9bf60 RCX: 00007f55bba89109 [ 200.740221][ T8220] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 200.740236][ T8220] RBP: 00007f55bcbef1d0 R08: 0000000000000000 R09: 0000000000000000 [ 200.740251][ T8220] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 200.740270][ T8220] R13: 00007ffd14a51aef R14: 00007f55bcbef300 R15: 0000000000022000 [ 200.740303][ T8220] [ 200.792045][ T8225] FAULT_INJECTION: forcing a failure. [ 200.792045][ T8225] name failslab, interval 1, probability 0, space 0, times 0 [ 200.792080][ T8225] CPU: 0 PID: 8225 Comm: syz-executor.5 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 200.792109][ T8225] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 200.792124][ T8225] Call Trace: [ 200.792130][ T8225] [ 200.792138][ T8225] dump_stack_lvl+0xcd/0x134 [ 200.792171][ T8225] should_fail.cold+0x5/0xa [ 200.792214][ T8225] ? kvmalloc_node+0x3e/0x190 [ 200.792240][ T8225] should_failslab+0x5/0x10 [ 200.792268][ T8225] __kmalloc_node+0x75/0x390 [ 200.792295][ T8225] ? check_subprogs+0x511/0x5f0 [ 200.792325][ T8225] kvmalloc_node+0x3e/0x190 [ 200.792352][ T8225] bpf_check+0x5618/0xbbc0 [ 200.792403][ T8225] ? bpf_get_btf_vmlinux+0x10/0x10 [ 200.792437][ T8225] ? lock_downgrade+0x6e0/0x6e0 [ 200.792465][ T8225] ? __might_fault+0xd1/0x170 [ 200.792491][ T8225] ? lock_downgrade+0x6e0/0x6e0 [ 200.792530][ T8225] ? memset+0x20/0x40 [ 200.792551][ T8225] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 200.792580][ T8225] ? bpf_obj_name_cpy+0x144/0x1a0 [ 200.792610][ T8225] ? bpf_prog_load+0xf71/0x2250 [ 200.792640][ T8225] bpf_prog_load+0xfb2/0x2250 [ 200.792677][ T8225] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 200.792708][ T8225] ? find_held_lock+0x2d/0x110 [ 200.792741][ T8225] ? __might_fault+0xd1/0x170 [ 200.792767][ T8225] ? lock_downgrade+0x6e0/0x6e0 [ 200.792811][ T8225] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 200.792845][ T8225] __sys_bpf+0x11a1/0x5700 [ 200.792877][ T8225] ? bpf_perf_link_attach+0x520/0x520 [ 200.792907][ T8225] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 200.792949][ T8225] ? find_held_lock+0x2d/0x110 [ 200.793003][ T8225] ? trace_hardirqs_on+0x38/0x1c0 [ 200.793038][ T8225] __x64_sys_bpf+0x75/0xb0 [ 200.793066][ T8225] ? syscall_enter_from_user_mode+0x21/0x70 [ 200.793100][ T8225] do_syscall_64+0x35/0xb0 [ 200.793126][ T8225] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 200.793153][ T8225] RIP: 0033:0x7f2e16289109 [ 200.793179][ T8225] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 200.793205][ T8225] RSP: 002b:00007f2e1731f168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 200.793230][ T8225] RAX: ffffffffffffffda RBX: 00007f2e1639bf60 RCX: 00007f2e16289109 [ 200.793248][ T8225] RDX: 0000000000000080 RSI: 00000000200001c0 RDI: 0000000000000005 [ 200.793264][ T8225] RBP: 00007f2e1731f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 200.793278][ T8225] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 200.793291][ T8225] R13: 00007ffde7446a9f R14: 00007f2e1731f300 R15: 0000000000022000 [ 200.793326][ T8225] [ 200.814581][ T8228] FAULT_INJECTION: forcing a failure. [ 200.814581][ T8228] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 200.814615][ T8228] CPU: 0 PID: 8228 Comm: syz-executor.4 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 200.814644][ T8228] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 200.814658][ T8228] Call Trace: [ 200.814665][ T8228] [ 200.814673][ T8228] dump_stack_lvl+0xcd/0x134 [ 200.814703][ T8228] should_fail.cold+0x5/0xa [ 200.814741][ T8228] prepare_alloc_pages+0x17b/0x570 [ 200.814775][ T8228] __alloc_pages+0x12f/0x500 [ 200.814801][ T8228] ? __alloc_pages_slowpath.constprop.0+0x20e0/0x20e0 [ 200.814832][ T8228] ? __kmalloc_node+0x62/0x390 [ 200.814881][ T8228] alloc_pages+0x1aa/0x310 [ 200.814914][ T8228] __vmalloc_node_range+0x735/0x13e0 [ 200.814959][ T8228] ? netlink_sendmsg+0x690/0xe10 [ 200.814988][ T8228] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 200.815017][ T8228] ? vfree_atomic+0xe0/0xe0 [ 200.815048][ T8228] ? __netlink_dump_start+0x900/0x900 [ 200.815073][ T8228] ? netlink_sendmsg+0x690/0xe10 [ 200.815100][ T8228] vmalloc+0x67/0x80 [ 200.815127][ T8228] ? netlink_sendmsg+0x690/0xe10 [ 200.815151][ T8228] netlink_sendmsg+0x690/0xe10 [ 200.815188][ T8228] ? netlink_unicast+0x7f0/0x7f0 [ 200.815222][ T8228] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 200.815252][ T8228] ? netlink_unicast+0x7f0/0x7f0 [ 200.815276][ T8228] sock_sendmsg+0xcf/0x120 [ 200.815310][ T8228] ____sys_sendmsg+0x6eb/0x810 [ 200.815344][ T8228] ? kernel_sendmsg+0x50/0x50 [ 200.815373][ T8228] ? do_recvmmsg+0x6d0/0x6d0 [ 200.815398][ T8228] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 200.815434][ T8228] ? _parse_integer+0x30/0x30 [ 200.815471][ T8228] ___sys_sendmsg+0xf3/0x170 [ 200.815494][ T8228] ? sendmsg_copy_msghdr+0x160/0x160 [ 200.815526][ T8228] ? lock_downgrade+0x6e0/0x6e0 [ 200.815567][ T8228] ? __fget_files+0x286/0x470 [ 200.815601][ T8228] ? __fget_light+0xea/0x270 [ 200.815625][ T8228] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 200.815653][ T8228] __x64_sys_sendmsg+0x132/0x220 [ 200.815679][ T8228] ? __sys_sendmsg+0x1b0/0x1b0 [ 200.815716][ T8228] ? syscall_enter_from_user_mode+0x21/0x70 [ 200.815756][ T8228] do_syscall_64+0x35/0xb0 [ 200.815782][ T8228] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 200.815809][ T8228] RIP: 0033:0x7f7765489109 [ 200.815829][ T8228] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 200.815854][ T8228] RSP: 002b:00007f7766559168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 200.815879][ T8228] RAX: ffffffffffffffda RBX: 00007f776559bf60 RCX: 00007f7765489109 [ 200.815897][ T8228] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 200.815913][ T8228] RBP: 00007f77665591d0 R08: 0000000000000000 R09: 0000000000000000 [ 200.815930][ T8228] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 200.815946][ T8228] R13: 00007ffec1cb653f R14: 00007f7766559300 R15: 0000000000022000 [ 200.815981][ T8228] [ 200.974342][ T8249] FAULT_INJECTION: forcing a failure. [ 200.974342][ T8249] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 200.974376][ T8249] CPU: 1 PID: 8249 Comm: syz-executor.1 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 200.974404][ T8249] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 200.974419][ T8249] Call Trace: [ 200.974425][ T8249] [ 200.974434][ T8249] dump_stack_lvl+0xcd/0x134 [ 200.974465][ T8249] should_fail.cold+0x5/0xa [ 200.974502][ T8249] prepare_alloc_pages+0x17b/0x570 [ 200.974535][ T8249] __alloc_pages+0x12f/0x500 [ 200.974560][ T8249] ? __alloc_pages_slowpath.constprop.0+0x20e0/0x20e0 [ 200.974591][ T8249] ? __kmalloc_node+0x62/0x390 [ 200.974638][ T8249] alloc_pages+0x1aa/0x310 [ 200.974679][ T8249] __vmalloc_node_range+0x735/0x13e0 [ 200.974726][ T8249] ? netlink_sendmsg+0x690/0xe10 [ 200.974757][ T8249] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 200.974786][ T8249] ? vfree_atomic+0xe0/0xe0 [ 200.974814][ T8249] ? __netlink_dump_start+0x900/0x900 [ 200.974838][ T8249] ? netlink_sendmsg+0x690/0xe10 [ 200.974863][ T8249] vmalloc+0x67/0x80 [ 200.974889][ T8249] ? netlink_sendmsg+0x690/0xe10 [ 200.974912][ T8249] netlink_sendmsg+0x690/0xe10 [ 200.974941][ T8249] ? netlink_unicast+0x7f0/0x7f0 [ 200.974971][ T8249] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 200.975000][ T8249] ? netlink_unicast+0x7f0/0x7f0 [ 200.975024][ T8249] sock_sendmsg+0xcf/0x120 [ 200.975054][ T8249] ____sys_sendmsg+0x6eb/0x810 [ 200.975086][ T8249] ? kernel_sendmsg+0x50/0x50 [ 200.975109][ T8249] ? do_recvmmsg+0x6d0/0x6d0 [ 200.975132][ T8249] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 200.975164][ T8249] ? _parse_integer+0x30/0x30 [ 200.975200][ T8249] ___sys_sendmsg+0xf3/0x170 [ 200.975226][ T8249] ? sendmsg_copy_msghdr+0x160/0x160 [ 200.975258][ T8249] ? lock_downgrade+0x6e0/0x6e0 [ 200.975299][ T8249] ? __fget_files+0x286/0x470 [ 200.975334][ T8249] ? __fget_light+0xea/0x270 [ 200.975361][ T8249] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 200.975394][ T8249] __x64_sys_sendmsg+0x132/0x220 [ 200.975421][ T8249] ? __sys_sendmsg+0x1b0/0x1b0 [ 200.975464][ T8249] ? syscall_enter_from_user_mode+0x21/0x70 [ 200.975501][ T8249] do_syscall_64+0x35/0xb0 [ 200.975524][ T8249] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 200.975548][ T8249] RIP: 0033:0x7f55bba89109 [ 200.975567][ T8249] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 200.975593][ T8249] RSP: 002b:00007f55bcbef168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 200.975618][ T8249] RAX: ffffffffffffffda RBX: 00007f55bbb9bf60 RCX: 00007f55bba89109 [ 200.975635][ T8249] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 200.975651][ T8249] RBP: 00007f55bcbef1d0 R08: 0000000000000000 R09: 0000000000000000 [ 200.975674][ T8249] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 200.975688][ T8249] R13: 00007ffd14a51aef R14: 00007f55bcbef300 R15: 0000000000022000 [ 200.975722][ T8249] [ 200.991626][ T8253] FAULT_INJECTION: forcing a failure. [ 200.991626][ T8253] name failslab, interval 1, probability 0, space 0, times 0 [ 200.991660][ T8253] CPU: 0 PID: 8253 Comm: syz-executor.5 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 200.991690][ T8253] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 200.991705][ T8253] Call Trace: [ 200.991711][ T8253] [ 200.991720][ T8253] dump_stack_lvl+0xcd/0x134 [ 200.991751][ T8253] should_fail.cold+0x5/0xa [ 200.991788][ T8253] should_failslab+0x5/0x10 [ 200.991815][ T8253] kmem_cache_alloc_trace+0x60/0x3f0 [ 200.991842][ T8253] ? do_check_common+0x183/0xcfe0 [ 200.991873][ T8253] do_check_common+0x183/0xcfe0 [ 200.991898][ T8253] ? find_held_lock+0x2d/0x110 [ 200.991932][ T8253] ? debug_check_no_obj_freed+0x20c/0x420 [ 200.991961][ T8253] ? lock_downgrade+0x6e0/0x6e0 [ 200.991999][ T8253] ? _raw_spin_unlock_irqrestore+0x50/0x70 [ 200.992034][ T8253] ? lockdep_hardirqs_on+0x79/0x100 [ 200.992064][ T8253] ? _raw_spin_unlock_irqrestore+0x3d/0x70 [ 200.992101][ T8253] ? check_helper_call+0x8620/0x8620 [ 200.992128][ T8253] ? lockdep_hardirqs_on+0x79/0x100 [ 200.992167][ T8253] ? slab_free_freelist_hook+0x8b/0x1c0 [ 200.992198][ T8253] ? kvfree+0x42/0x50 [ 200.992222][ T8253] ? kfree+0xd6/0x4d0 [ 200.992242][ T8253] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 200.992267][ T8253] ? push_insn+0x220/0x530 [ 200.992297][ T8253] ? trace_hardirqs_on+0x38/0x1c0 [ 200.992325][ T8253] bpf_check+0x88a4/0xbbc0 [ 200.992374][ T8253] ? bpf_get_btf_vmlinux+0x10/0x10 [ 200.992407][ T8253] ? lock_downgrade+0x6e0/0x6e0 [ 200.992434][ T8253] ? __might_fault+0xd1/0x170 [ 200.992457][ T8253] ? lock_downgrade+0x6e0/0x6e0 [ 200.992495][ T8253] ? memset+0x20/0x40 [ 200.992515][ T8253] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 200.992541][ T8253] ? bpf_obj_name_cpy+0x144/0x1a0 [ 200.992567][ T8253] ? bpf_prog_load+0xf71/0x2250 [ 200.992595][ T8253] bpf_prog_load+0xfb2/0x2250 [ 200.992631][ T8253] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 200.992660][ T8253] ? find_held_lock+0x2d/0x110 [ 200.992692][ T8253] ? __might_fault+0xd1/0x170 [ 200.992717][ T8253] ? lock_downgrade+0x6e0/0x6e0 [ 200.992761][ T8253] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 200.992794][ T8253] __sys_bpf+0x11a1/0x5700 [ 200.992827][ T8253] ? bpf_perf_link_attach+0x520/0x520 [ 200.992856][ T8253] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 200.992898][ T8253] ? find_held_lock+0x2d/0x110 [ 200.992954][ T8253] ? trace_hardirqs_on+0x38/0x1c0 [ 200.992983][ T8253] __x64_sys_bpf+0x75/0xb0 [ 200.993010][ T8253] ? syscall_enter_from_user_mode+0x21/0x70 [ 200.993042][ T8253] do_syscall_64+0x35/0xb0 [ 200.993068][ T8253] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 200.993093][ T8253] RIP: 0033:0x7f2e16289109 [ 200.993113][ T8253] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 200.993138][ T8253] RSP: 002b:00007f2e1731f168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 200.993170][ T8253] RAX: ffffffffffffffda RBX: 00007f2e1639bf60 RCX: 00007f2e16289109 [ 200.993188][ T8253] RDX: 0000000000000080 RSI: 00000000200001c0 RDI: 0000000000000005 [ 200.993204][ T8253] RBP: 00007f2e1731f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 200.993220][ T8253] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 200.993235][ T8253] R13: 00007ffde7446a9f R14: 00007f2e1731f300 R15: 0000000000022000 [ 200.993268][ T8253] [ 201.006884][ T8252] FAULT_INJECTION: forcing a failure. [ 201.006884][ T8252] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 201.006917][ T8252] CPU: 0 PID: 8252 Comm: syz-executor.4 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 201.006943][ T8252] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 201.006958][ T8252] Call Trace: [ 201.006964][ T8252] [ 201.006973][ T8252] dump_stack_lvl+0xcd/0x134 [ 201.007005][ T8252] should_fail.cold+0x5/0xa [ 201.007040][ T8252] prepare_alloc_pages+0x17b/0x570 [ 201.007078][ T8252] __alloc_pages+0x12f/0x500 [ 201.007106][ T8252] ? __alloc_pages_slowpath.constprop.0+0x20e0/0x20e0 [ 201.007136][ T8252] ? __kmalloc_node+0x62/0x390 [ 201.007190][ T8252] alloc_pages+0x1aa/0x310 [ 201.007223][ T8252] __vmalloc_node_range+0x735/0x13e0 [ 201.007267][ T8252] ? netlink_sendmsg+0x690/0xe10 [ 201.007294][ T8252] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 201.007322][ T8252] ? vfree_atomic+0xe0/0xe0 [ 201.007350][ T8252] ? __netlink_dump_start+0x900/0x900 [ 201.007374][ T8252] ? netlink_sendmsg+0x690/0xe10 [ 201.007398][ T8252] vmalloc+0x67/0x80 [ 201.007423][ T8252] ? netlink_sendmsg+0x690/0xe10 [ 201.007446][ T8252] netlink_sendmsg+0x690/0xe10 [ 201.007475][ T8252] ? netlink_unicast+0x7f0/0x7f0 [ 201.007506][ T8252] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 201.007536][ T8252] ? netlink_unicast+0x7f0/0x7f0 [ 201.007561][ T8252] sock_sendmsg+0xcf/0x120 [ 201.007593][ T8252] ____sys_sendmsg+0x6eb/0x810 [ 201.007626][ T8252] ? kernel_sendmsg+0x50/0x50 [ 201.007654][ T8252] ? do_recvmmsg+0x6d0/0x6d0 [ 201.007677][ T8252] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 201.007712][ T8252] ? _parse_integer+0x30/0x30 [ 201.007750][ T8252] ___sys_sendmsg+0xf3/0x170 [ 201.007776][ T8252] ? sendmsg_copy_msghdr+0x160/0x160 [ 201.007807][ T8252] ? lock_downgrade+0x6e0/0x6e0 [ 201.007851][ T8252] ? __fget_files+0x286/0x470 [ 201.007887][ T8252] ? __fget_light+0xea/0x270 [ 201.007913][ T8252] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 201.007947][ T8252] __x64_sys_sendmsg+0x132/0x220 [ 201.007972][ T8252] ? __sys_sendmsg+0x1b0/0x1b0 [ 201.008012][ T8252] ? syscall_enter_from_user_mode+0x21/0x70 [ 201.008051][ T8252] do_syscall_64+0x35/0xb0 [ 201.008078][ T8252] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 201.008103][ T8252] RIP: 0033:0x7f7765489109 [ 201.008124][ T8252] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 201.008148][ T8252] RSP: 002b:00007f7766559168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 201.008180][ T8252] RAX: ffffffffffffffda RBX: 00007f776559bf60 RCX: 00007f7765489109 [ 201.008198][ T8252] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 201.008215][ T8252] RBP: 00007f77665591d0 R08: 0000000000000000 R09: 0000000000000000 [ 201.008231][ T8252] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 201.008247][ T8252] R13: 00007ffec1cb653f R14: 00007f7766559300 R15: 0000000000022000 [ 201.008283][ T8252] [ 201.130917][ T8266] FAULT_INJECTION: forcing a failure. [ 201.130917][ T8266] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 201.130952][ T8266] CPU: 1 PID: 8266 Comm: syz-executor.1 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 201.130979][ T8266] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 201.130994][ T8266] Call Trace: [ 201.131000][ T8266] [ 201.131008][ T8266] dump_stack_lvl+0xcd/0x134 [ 201.131040][ T8266] should_fail.cold+0x5/0xa [ 201.131077][ T8266] prepare_alloc_pages+0x17b/0x570 [ 201.131110][ T8266] __alloc_pages+0x12f/0x500 [ 201.131136][ T8266] ? __alloc_pages_slowpath.constprop.0+0x20e0/0x20e0 [ 201.131166][ T8266] ? __kmalloc_node+0x62/0x390 [ 201.131211][ T8266] alloc_pages+0x1aa/0x310 [ 201.131245][ T8266] __vmalloc_node_range+0x735/0x13e0 [ 201.131290][ T8266] ? netlink_sendmsg+0x690/0xe10 [ 201.131319][ T8266] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 201.131349][ T8266] ? vfree_atomic+0xe0/0xe0 [ 201.131379][ T8266] ? __netlink_dump_start+0x900/0x900 [ 201.131405][ T8266] ? netlink_sendmsg+0x690/0xe10 [ 201.131432][ T8266] vmalloc+0x67/0x80 [ 201.131459][ T8266] ? netlink_sendmsg+0x690/0xe10 [ 201.131483][ T8266] netlink_sendmsg+0x690/0xe10 [ 201.131514][ T8266] ? netlink_unicast+0x7f0/0x7f0 [ 201.131544][ T8266] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 201.131574][ T8266] ? netlink_unicast+0x7f0/0x7f0 [ 201.131603][ T8266] sock_sendmsg+0xcf/0x120 [ 201.131635][ T8266] ____sys_sendmsg+0x6eb/0x810 [ 201.131680][ T8266] ? kernel_sendmsg+0x50/0x50 [ 201.131709][ T8266] ? do_recvmmsg+0x6d0/0x6d0 [ 201.131734][ T8266] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 201.131768][ T8266] ? _parse_integer+0x30/0x30 [ 201.131806][ T8266] ___sys_sendmsg+0xf3/0x170 [ 201.131833][ T8266] ? sendmsg_copy_msghdr+0x160/0x160 [ 201.131865][ T8266] ? lock_downgrade+0x6e0/0x6e0 [ 201.131908][ T8266] ? __fget_files+0x286/0x470 [ 201.131944][ T8266] ? __fget_light+0xea/0x270 [ 201.131970][ T8266] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 201.132002][ T8266] __x64_sys_sendmsg+0x132/0x220 [ 201.132029][ T8266] ? __sys_sendmsg+0x1b0/0x1b0 [ 201.132068][ T8266] ? syscall_enter_from_user_mode+0x21/0x70 [ 201.132108][ T8266] do_syscall_64+0x35/0xb0 [ 201.132134][ T8266] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 201.132158][ T8266] RIP: 0033:0x7f55bba89109 [ 201.132178][ T8266] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 201.132204][ T8266] RSP: 002b:00007f55bcbef168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 201.132229][ T8266] RAX: ffffffffffffffda RBX: 00007f55bbb9bf60 RCX: 00007f55bba89109 [ 201.132246][ T8266] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 201.132261][ T8266] RBP: 00007f55bcbef1d0 R08: 0000000000000000 R09: 0000000000000000 [ 201.132277][ T8266] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 201.132291][ T8266] R13: 00007ffd14a51aef R14: 00007f55bcbef300 R15: 0000000000022000 [ 201.132326][ T8266] [ 201.202820][ T8270] FAULT_INJECTION: forcing a failure. [ 201.202820][ T8270] name failslab, interval 1, probability 0, space 0, times 0 [ 201.202855][ T8270] CPU: 0 PID: 8270 Comm: syz-executor.5 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 201.202884][ T8270] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 201.202898][ T8270] Call Trace: [ 201.202905][ T8270] [ 201.202913][ T8270] dump_stack_lvl+0xcd/0x134 [ 201.202945][ T8270] should_fail.cold+0x5/0xa [ 201.202982][ T8270] should_failslab+0x5/0x10 [ 201.203009][ T8270] kmem_cache_alloc_trace+0x60/0x3f0 [ 201.203037][ T8270] ? do_check_common+0x183/0xcfe0 [ 201.203069][ T8270] do_check_common+0x183/0xcfe0 [ 201.203093][ T8270] ? find_held_lock+0x2d/0x110 [ 201.203125][ T8270] ? debug_check_no_obj_freed+0x20c/0x420 [ 201.203163][ T8270] ? lock_downgrade+0x6e0/0x6e0 [ 201.203201][ T8270] ? _raw_spin_unlock_irqrestore+0x50/0x70 [ 201.203238][ T8270] ? lockdep_hardirqs_on+0x79/0x100 [ 201.203270][ T8270] ? _raw_spin_unlock_irqrestore+0x3d/0x70 [ 201.203308][ T8270] ? check_helper_call+0x8620/0x8620 [ 201.203336][ T8270] ? lockdep_hardirqs_on+0x79/0x100 [ 201.203373][ T8270] ? slab_free_freelist_hook+0x8b/0x1c0 [ 201.203403][ T8270] ? kvfree+0x42/0x50 [ 201.203427][ T8270] ? kfree+0xd6/0x4d0 [ 201.203450][ T8270] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 201.203477][ T8270] ? push_insn+0x220/0x530 [ 201.203509][ T8270] ? trace_hardirqs_on+0x38/0x1c0 [ 201.203539][ T8270] bpf_check+0x88a4/0xbbc0 [ 201.203591][ T8270] ? bpf_get_btf_vmlinux+0x10/0x10 [ 201.203624][ T8270] ? lock_downgrade+0x6e0/0x6e0 [ 201.203652][ T8270] ? __might_fault+0xd1/0x170 [ 201.203677][ T8270] ? lock_downgrade+0x6e0/0x6e0 [ 201.203717][ T8270] ? memset+0x20/0x40 [ 201.203741][ T8270] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 201.203769][ T8270] ? bpf_obj_name_cpy+0x144/0x1a0 [ 201.203799][ T8270] ? bpf_prog_load+0xf71/0x2250 [ 201.203830][ T8270] bpf_prog_load+0xfb2/0x2250 [ 201.203867][ T8270] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 201.203898][ T8270] ? find_held_lock+0x2d/0x110 [ 201.203932][ T8270] ? __might_fault+0xd1/0x170 [ 201.203957][ T8270] ? lock_downgrade+0x6e0/0x6e0 [ 201.204002][ T8270] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 201.204035][ T8270] __sys_bpf+0x11a1/0x5700 [ 201.204069][ T8270] ? bpf_perf_link_attach+0x520/0x520 [ 201.204099][ T8270] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 201.204146][ T8270] ? find_held_lock+0x2d/0x110 [ 201.204203][ T8270] ? trace_hardirqs_on+0x38/0x1c0 [ 201.204233][ T8270] __x64_sys_bpf+0x75/0xb0 [ 201.204261][ T8270] ? syscall_enter_from_user_mode+0x21/0x70 [ 201.204292][ T8270] do_syscall_64+0x35/0xb0 [ 201.204316][ T8270] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 201.204342][ T8270] RIP: 0033:0x7f2e16289109 [ 201.204362][ T8270] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 201.204387][ T8270] RSP: 002b:00007f2e1731f168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 201.204412][ T8270] RAX: ffffffffffffffda RBX: 00007f2e1639bf60 RCX: 00007f2e16289109 [ 201.204429][ T8270] RDX: 0000000000000080 RSI: 00000000200001c0 RDI: 0000000000000005 [ 201.204445][ T8270] RBP: 00007f2e1731f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 201.204459][ T8270] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 201.204473][ T8270] R13: 00007ffde7446a9f R14: 00007f2e1731f300 R15: 0000000000022000 [ 201.204505][ T8270] [ 201.217154][ T8269] FAULT_INJECTION: forcing a failure. [ 201.217154][ T8269] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 201.217189][ T8269] CPU: 0 PID: 8269 Comm: syz-executor.4 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 201.217216][ T8269] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 201.217230][ T8269] Call Trace: [ 201.217236][ T8269] [ 201.217245][ T8269] dump_stack_lvl+0xcd/0x134 [ 201.217277][ T8269] should_fail.cold+0x5/0xa [ 201.217314][ T8269] prepare_alloc_pages+0x17b/0x570 [ 201.217347][ T8269] __alloc_pages+0x12f/0x500 [ 201.217373][ T8269] ? __alloc_pages_slowpath.constprop.0+0x20e0/0x20e0 [ 201.217402][ T8269] ? __kmalloc_node+0x62/0x390 [ 201.217447][ T8269] alloc_pages+0x1aa/0x310 [ 201.217480][ T8269] __vmalloc_node_range+0x735/0x13e0 [ 201.217524][ T8269] ? netlink_sendmsg+0x690/0xe10 [ 201.217553][ T8269] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 201.217582][ T8269] ? vfree_atomic+0xe0/0xe0 [ 201.217612][ T8269] ? __netlink_dump_start+0x900/0x900 [ 201.217638][ T8269] ? netlink_sendmsg+0x690/0xe10 [ 201.217662][ T8269] vmalloc+0x67/0x80 [ 201.217690][ T8269] ? netlink_sendmsg+0x690/0xe10 [ 201.217714][ T8269] netlink_sendmsg+0x690/0xe10 [ 201.217744][ T8269] ? netlink_unicast+0x7f0/0x7f0 [ 201.217776][ T8269] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 201.217806][ T8269] ? netlink_unicast+0x7f0/0x7f0 [ 201.217831][ T8269] sock_sendmsg+0xcf/0x120 [ 201.217861][ T8269] ____sys_sendmsg+0x6eb/0x810 [ 201.217893][ T8269] ? kernel_sendmsg+0x50/0x50 [ 201.217921][ T8269] ? do_recvmmsg+0x6d0/0x6d0 [ 201.217944][ T8269] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 201.217978][ T8269] ? _parse_integer+0x30/0x30 [ 201.218021][ T8269] ___sys_sendmsg+0xf3/0x170 [ 201.218048][ T8269] ? sendmsg_copy_msghdr+0x160/0x160 [ 201.218080][ T8269] ? lock_downgrade+0x6e0/0x6e0 [ 201.218122][ T8269] ? __fget_files+0x286/0x470 [ 201.218165][ T8269] ? __fget_light+0xea/0x270 [ 201.218192][ T8269] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 201.218226][ T8269] __x64_sys_sendmsg+0x132/0x220 [ 201.218251][ T8269] ? __sys_sendmsg+0x1b0/0x1b0 [ 201.218289][ T8269] ? syscall_enter_from_user_mode+0x21/0x70 [ 201.218325][ T8269] do_syscall_64+0x35/0xb0 [ 201.218350][ T8269] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 201.218374][ T8269] RIP: 0033:0x7f7765489109 [ 201.218393][ T8269] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 201.218417][ T8269] RSP: 002b:00007f7766559168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 201.218441][ T8269] RAX: ffffffffffffffda RBX: 00007f776559bf60 RCX: 00007f7765489109 [ 201.218459][ T8269] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 201.218475][ T8269] RBP: 00007f77665591d0 R08: 0000000000000000 R09: 0000000000000000 [ 201.218491][ T8269] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 201.218506][ T8269] R13: 00007ffec1cb653f R14: 00007f7766559300 R15: 0000000000022000 [ 201.218539][ T8269] [ 201.307798][ T8274] FAULT_INJECTION: forcing a failure. [ 201.307798][ T8274] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 201.307832][ T8274] CPU: 0 PID: 8274 Comm: syz-executor.1 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 201.307859][ T8274] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 201.307873][ T8274] Call Trace: [ 201.307880][ T8274] [ 201.307888][ T8274] dump_stack_lvl+0xcd/0x134 [ 201.307920][ T8274] should_fail.cold+0x5/0xa [ 201.307957][ T8274] prepare_alloc_pages+0x17b/0x570 [ 201.307992][ T8274] __alloc_pages+0x12f/0x500 [ 201.308017][ T8274] ? __alloc_pages_slowpath.constprop.0+0x20e0/0x20e0 [ 201.308048][ T8274] ? __kmalloc_node+0x62/0x390 [ 201.308097][ T8274] alloc_pages+0x1aa/0x310 [ 201.308130][ T8274] __vmalloc_node_range+0x735/0x13e0 [ 201.308183][ T8274] ? netlink_sendmsg+0x690/0xe10 [ 201.308213][ T8274] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 201.308245][ T8274] ? vfree_atomic+0xe0/0xe0 [ 201.308275][ T8274] ? __netlink_dump_start+0x900/0x900 [ 201.308300][ T8274] ? netlink_sendmsg+0x690/0xe10 [ 201.308325][ T8274] vmalloc+0x67/0x80 [ 201.308349][ T8274] ? netlink_sendmsg+0x690/0xe10 [ 201.308372][ T8274] netlink_sendmsg+0x690/0xe10 [ 201.308401][ T8274] ? netlink_unicast+0x7f0/0x7f0 [ 201.308432][ T8274] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 201.308462][ T8274] ? netlink_unicast+0x7f0/0x7f0 [ 201.308487][ T8274] sock_sendmsg+0xcf/0x120 [ 201.308519][ T8274] ____sys_sendmsg+0x6eb/0x810 [ 201.308553][ T8274] ? kernel_sendmsg+0x50/0x50 [ 201.308581][ T8274] ? do_recvmmsg+0x6d0/0x6d0 [ 201.308605][ T8274] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 201.308639][ T8274] ? _parse_integer+0x30/0x30 [ 201.308677][ T8274] ___sys_sendmsg+0xf3/0x170 [ 201.308703][ T8274] ? sendmsg_copy_msghdr+0x160/0x160 [ 201.308735][ T8274] ? lock_downgrade+0x6e0/0x6e0 [ 201.308779][ T8274] ? __fget_files+0x286/0x470 [ 201.308815][ T8274] ? __fget_light+0xea/0x270 [ 201.308841][ T8274] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 201.308876][ T8274] __x64_sys_sendmsg+0x132/0x220 [ 201.308902][ T8274] ? __sys_sendmsg+0x1b0/0x1b0 [ 201.308943][ T8274] ? syscall_enter_from_user_mode+0x21/0x70 [ 201.308983][ T8274] do_syscall_64+0x35/0xb0 [ 201.309009][ T8274] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 201.309035][ T8274] RIP: 0033:0x7f55bba89109 [ 201.309054][ T8274] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 201.309079][ T8274] RSP: 002b:00007f55bcbef168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 201.309103][ T8274] RAX: ffffffffffffffda RBX: 00007f55bbb9bf60 RCX: 00007f55bba89109 [ 201.309121][ T8274] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 201.309142][ T8274] RBP: 00007f55bcbef1d0 R08: 0000000000000000 R09: 0000000000000000 [ 201.309160][ T8274] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 201.309175][ T8274] R13: 00007ffd14a51aef R14: 00007f55bcbef300 R15: 0000000000022000 [ 201.309211][ T8274] [ 201.340859][ T8281] FAULT_INJECTION: forcing a failure. [ 201.340859][ T8281] name failslab, interval 1, probability 0, space 0, times 0 [ 201.340895][ T8281] CPU: 0 PID: 8281 Comm: syz-executor.5 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 201.340925][ T8281] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 201.340941][ T8281] Call Trace: [ 201.340948][ T8281] [ 201.340958][ T8281] dump_stack_lvl+0xcd/0x134 [ 201.340992][ T8281] should_fail.cold+0x5/0xa [ 201.341030][ T8281] should_failslab+0x5/0x10 [ 201.341059][ T8281] kmem_cache_alloc_trace+0x60/0x3f0 [ 201.341092][ T8281] ? copy_verifier_state+0x827/0xb80 [ 201.341144][ T8281] copy_verifier_state+0x827/0xb80 [ 201.341187][ T8281] do_check_common+0x1c48/0xcfe0 [ 201.341217][ T8281] ? find_held_lock+0x2d/0x110 [ 201.341253][ T8281] ? debug_check_no_obj_freed+0x20c/0x420 [ 201.341300][ T8281] ? lockdep_hardirqs_on+0x79/0x100 [ 201.341338][ T8281] ? check_helper_call+0x8620/0x8620 [ 201.341365][ T8281] ? lockdep_hardirqs_on+0x79/0x100 [ 201.341398][ T8281] ? slab_free_freelist_hook+0x8b/0x1c0 [ 201.341429][ T8281] ? kvfree+0x42/0x50 [ 201.341453][ T8281] ? kfree+0xd6/0x4d0 [ 201.341476][ T8281] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 201.341501][ T8281] ? push_insn+0x220/0x530 [ 201.341532][ T8281] ? trace_hardirqs_on+0x38/0x1c0 [ 201.341562][ T8281] bpf_check+0x88a4/0xbbc0 [ 201.341613][ T8281] ? bpf_get_btf_vmlinux+0x10/0x10 [ 201.341645][ T8281] ? lock_downgrade+0x6e0/0x6e0 [ 201.341674][ T8281] ? __might_fault+0xd1/0x170 [ 201.341699][ T8281] ? lock_downgrade+0x6e0/0x6e0 [ 201.341739][ T8281] ? memset+0x20/0x40 [ 201.341760][ T8281] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 201.341787][ T8281] ? bpf_obj_name_cpy+0x144/0x1a0 [ 201.341817][ T8281] ? bpf_prog_load+0xf71/0x2250 [ 201.341847][ T8281] bpf_prog_load+0xfb2/0x2250 [ 201.341882][ T8281] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 201.341913][ T8281] ? find_held_lock+0x2d/0x110 [ 201.341945][ T8281] ? __might_fault+0xd1/0x170 [ 201.341969][ T8281] ? lock_downgrade+0x6e0/0x6e0 [ 201.342012][ T8281] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 201.342044][ T8281] __sys_bpf+0x11a1/0x5700 [ 201.342074][ T8281] ? bpf_perf_link_attach+0x520/0x520 [ 201.342103][ T8281] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 201.342149][ T8281] ? find_held_lock+0x2d/0x110 [ 201.342199][ T8281] ? trace_hardirqs_on+0x38/0x1c0 [ 201.342230][ T8281] __x64_sys_bpf+0x75/0xb0 [ 201.342258][ T8281] ? syscall_enter_from_user_mode+0x21/0x70 [ 201.342290][ T8281] do_syscall_64+0x35/0xb0 [ 201.342316][ T8281] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 201.342339][ T8281] RIP: 0033:0x7f2e16289109 [ 201.342360][ T8281] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 201.342384][ T8281] RSP: 002b:00007f2e1731f168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 201.342409][ T8281] RAX: ffffffffffffffda RBX: 00007f2e1639bf60 RCX: 00007f2e16289109 [ 201.342427][ T8281] RDX: 0000000000000080 RSI: 00000000200001c0 RDI: 0000000000000005 [ 201.342444][ T8281] RBP: 00007f2e1731f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 201.342463][ T8281] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 201.342479][ T8281] R13: 00007ffde7446a9f R14: 00007f2e1731f300 R15: 0000000000022000 [ 201.342516][ T8281] [ 201.379412][ T8282] FAULT_INJECTION: forcing a failure. [ 201.379412][ T8282] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 201.379447][ T8282] CPU: 0 PID: 8282 Comm: syz-executor.4 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 201.379476][ T8282] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 201.379491][ T8282] Call Trace: [ 201.379497][ T8282] [ 201.379506][ T8282] dump_stack_lvl+0xcd/0x134 [ 201.379540][ T8282] should_fail.cold+0x5/0xa [ 201.379577][ T8282] prepare_alloc_pages+0x17b/0x570 [ 201.379610][ T8282] __alloc_pages+0x12f/0x500 [ 201.379636][ T8282] ? __alloc_pages_slowpath.constprop.0+0x20e0/0x20e0 [ 201.379666][ T8282] ? lockdep_hardirqs_on+0x79/0x100 [ 201.379698][ T8282] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 201.379732][ T8282] ? alloc_pages+0x39/0x310 [ 201.379761][ T8282] ? alloc_pages+0x46/0x310 [ 201.379795][ T8282] alloc_pages+0x1aa/0x310 [ 201.379827][ T8282] __vmalloc_node_range+0x735/0x13e0 [ 201.379871][ T8282] ? netlink_sendmsg+0x690/0xe10 [ 201.379900][ T8282] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 201.379930][ T8282] ? vfree_atomic+0xe0/0xe0 [ 201.379960][ T8282] ? __netlink_dump_start+0x900/0x900 [ 201.379985][ T8282] ? netlink_sendmsg+0x690/0xe10 [ 201.380012][ T8282] vmalloc+0x67/0x80 [ 201.380039][ T8282] ? netlink_sendmsg+0x690/0xe10 [ 201.380063][ T8282] netlink_sendmsg+0x690/0xe10 [ 201.380094][ T8282] ? netlink_unicast+0x7f0/0x7f0 [ 201.380125][ T8282] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 201.380164][ T8282] ? netlink_unicast+0x7f0/0x7f0 [ 201.380190][ T8282] sock_sendmsg+0xcf/0x120 [ 201.380220][ T8282] ____sys_sendmsg+0x6eb/0x810 [ 201.380253][ T8282] ? kernel_sendmsg+0x50/0x50 [ 201.380280][ T8282] ? do_recvmmsg+0x6d0/0x6d0 [ 201.380304][ T8282] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 201.380339][ T8282] ? _parse_integer+0x30/0x30 [ 201.380375][ T8282] ___sys_sendmsg+0xf3/0x170 [ 201.380401][ T8282] ? sendmsg_copy_msghdr+0x160/0x160 [ 201.380432][ T8282] ? lock_downgrade+0x6e0/0x6e0 [ 201.380479][ T8282] ? __fget_files+0x286/0x470 [ 201.380521][ T8282] ? __fget_light+0xea/0x270 [ 201.380547][ T8282] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 201.380581][ T8282] __x64_sys_sendmsg+0x132/0x220 [ 201.380608][ T8282] ? __sys_sendmsg+0x1b0/0x1b0 [ 201.380646][ T8282] ? syscall_enter_from_user_mode+0x21/0x70 [ 201.380684][ T8282] do_syscall_64+0x35/0xb0 [ 201.380710][ T8282] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 201.380735][ T8282] RIP: 0033:0x7f7765489109 [ 201.380756][ T8282] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 201.380781][ T8282] RSP: 002b:00007f7766559168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 201.380805][ T8282] RAX: ffffffffffffffda RBX: 00007f776559bf60 RCX: 00007f7765489109 [ 201.380824][ T8282] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 201.380840][ T8282] RBP: 00007f77665591d0 R08: 0000000000000000 R09: 0000000000000000 [ 201.380857][ T8282] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 201.380872][ T8282] R13: 00007ffec1cb653f R14: 00007f7766559300 R15: 0000000000022000 [ 201.380907][ T8282] [ 201.440402][ T8284] FAULT_INJECTION: forcing a failure. [ 201.440402][ T8284] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 201.440436][ T8284] CPU: 0 PID: 8284 Comm: syz-executor.1 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 201.440464][ T8284] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 201.440478][ T8284] Call Trace: [ 201.440485][ T8284] [ 201.440494][ T8284] dump_stack_lvl+0xcd/0x134 [ 201.440526][ T8284] should_fail.cold+0x5/0xa [ 201.440560][ T8284] prepare_alloc_pages+0x17b/0x570 [ 201.440592][ T8284] __alloc_pages+0x12f/0x500 [ 201.440618][ T8284] ? __alloc_pages_slowpath.constprop.0+0x20e0/0x20e0 [ 201.440647][ T8284] ? __kmalloc_node+0x62/0x390 [ 201.440697][ T8284] alloc_pages+0x1aa/0x310 [ 201.440731][ T8284] __vmalloc_node_range+0x735/0x13e0 [ 201.440777][ T8284] ? netlink_sendmsg+0x690/0xe10 [ 201.440807][ T8284] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 201.440836][ T8284] ? vfree_atomic+0xe0/0xe0 [ 201.440866][ T8284] ? __netlink_dump_start+0x900/0x900 [ 201.440892][ T8284] ? netlink_sendmsg+0x690/0xe10 [ 201.440919][ T8284] vmalloc+0x67/0x80 [ 201.440946][ T8284] ? netlink_sendmsg+0x690/0xe10 [ 201.440970][ T8284] netlink_sendmsg+0x690/0xe10 [ 201.441001][ T8284] ? netlink_unicast+0x7f0/0x7f0 [ 201.441033][ T8284] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 201.441071][ T8284] ? netlink_unicast+0x7f0/0x7f0 [ 201.441097][ T8284] sock_sendmsg+0xcf/0x120 [ 201.441128][ T8284] ____sys_sendmsg+0x6eb/0x810 [ 201.441161][ T8284] ? kernel_sendmsg+0x50/0x50 [ 201.441189][ T8284] ? do_recvmmsg+0x6d0/0x6d0 [ 201.441214][ T8284] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 201.441248][ T8284] ? _parse_integer+0x30/0x30 [ 201.441284][ T8284] ___sys_sendmsg+0xf3/0x170 [ 201.441310][ T8284] ? sendmsg_copy_msghdr+0x160/0x160 [ 201.441340][ T8284] ? lock_downgrade+0x6e0/0x6e0 [ 201.441385][ T8284] ? __fget_files+0x286/0x470 [ 201.441420][ T8284] ? __fget_light+0xea/0x270 [ 201.441446][ T8284] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 201.441480][ T8284] __x64_sys_sendmsg+0x132/0x220 [ 201.441506][ T8284] ? __sys_sendmsg+0x1b0/0x1b0 [ 201.441544][ T8284] ? syscall_enter_from_user_mode+0x21/0x70 [ 201.441583][ T8284] do_syscall_64+0x35/0xb0 [ 201.441610][ T8284] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 201.441635][ T8284] RIP: 0033:0x7f55bba89109 [ 201.441655][ T8284] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 201.441680][ T8284] RSP: 002b:00007f55bcbef168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 201.441705][ T8284] RAX: ffffffffffffffda RBX: 00007f55bbb9bf60 RCX: 00007f55bba89109 [ 201.441723][ T8284] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 201.441739][ T8284] RBP: 00007f55bcbef1d0 R08: 0000000000000000 R09: 0000000000000000 [ 201.441755][ T8284] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 201.441770][ T8284] R13: 00007ffd14a51aef R14: 00007f55bcbef300 R15: 0000000000022000 [ 201.441805][ T8284] [ 201.514510][ T8291] FAULT_INJECTION: forcing a failure. [ 201.514510][ T8291] name failslab, interval 1, probability 0, space 0, times 0 [ 201.514547][ T8291] CPU: 0 PID: 8291 Comm: syz-executor.5 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 201.514575][ T8291] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 201.514590][ T8291] Call Trace: [ 201.514597][ T8291] [ 201.514604][ T8291] dump_stack_lvl+0xcd/0x134 [ 201.514637][ T8291] should_fail.cold+0x5/0xa [ 201.514674][ T8291] should_failslab+0x5/0x10 [ 201.514702][ T8291] kmem_cache_alloc_trace+0x60/0x3f0 [ 201.514732][ T8291] ? copy_verifier_state+0x827/0xb80 [ 201.514769][ T8291] copy_verifier_state+0x827/0xb80 [ 201.514814][ T8291] do_check_common+0x1c48/0xcfe0 [ 201.514839][ T8291] ? find_held_lock+0x2d/0x110 [ 201.514874][ T8291] ? debug_check_no_obj_freed+0x20c/0x420 [ 201.514917][ T8291] ? lockdep_hardirqs_on+0x79/0x100 [ 201.514954][ T8291] ? check_helper_call+0x8620/0x8620 [ 201.514981][ T8291] ? lockdep_hardirqs_on+0x79/0x100 [ 201.515016][ T8291] ? slab_free_freelist_hook+0x8b/0x1c0 [ 201.515055][ T8291] ? kvfree+0x42/0x50 [ 201.515081][ T8291] ? kfree+0xd6/0x4d0 [ 201.515105][ T8291] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 201.515132][ T8291] ? push_insn+0x220/0x530 [ 201.515163][ T8291] ? trace_hardirqs_on+0x38/0x1c0 [ 201.515195][ T8291] bpf_check+0x88a4/0xbbc0 [ 201.515246][ T8291] ? bpf_get_btf_vmlinux+0x10/0x10 [ 201.515280][ T8291] ? lock_downgrade+0x6e0/0x6e0 [ 201.515309][ T8291] ? __might_fault+0xd1/0x170 [ 201.515334][ T8291] ? lock_downgrade+0x6e0/0x6e0 [ 201.515374][ T8291] ? memset+0x20/0x40 [ 201.515396][ T8291] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 201.515424][ T8291] ? bpf_obj_name_cpy+0x144/0x1a0 [ 201.515454][ T8291] ? bpf_prog_load+0xf71/0x2250 [ 201.515482][ T8291] bpf_prog_load+0xfb2/0x2250 [ 201.515520][ T8291] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 201.515550][ T8291] ? find_held_lock+0x2d/0x110 [ 201.515581][ T8291] ? __might_fault+0xd1/0x170 [ 201.515605][ T8291] ? lock_downgrade+0x6e0/0x6e0 [ 201.515650][ T8291] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 201.515683][ T8291] __sys_bpf+0x11a1/0x5700 [ 201.515716][ T8291] ? bpf_perf_link_attach+0x520/0x520 [ 201.515746][ T8291] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 201.515789][ T8291] ? find_held_lock+0x2d/0x110 [ 201.515844][ T8291] ? trace_hardirqs_on+0x38/0x1c0 [ 201.515873][ T8291] __x64_sys_bpf+0x75/0xb0 [ 201.515901][ T8291] ? syscall_enter_from_user_mode+0x21/0x70 [ 201.515932][ T8291] do_syscall_64+0x35/0xb0 [ 201.515957][ T8291] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 201.515982][ T8291] RIP: 0033:0x7f2e16289109 [ 201.516001][ T8291] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 201.516028][ T8291] RSP: 002b:00007f2e1731f168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 201.516060][ T8291] RAX: ffffffffffffffda RBX: 00007f2e1639bf60 RCX: 00007f2e16289109 [ 201.516078][ T8291] RDX: 0000000000000080 RSI: 00000000200001c0 RDI: 0000000000000005 [ 201.516094][ T8291] RBP: 00007f2e1731f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 201.516110][ T8291] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 201.516125][ T8291] R13: 00007ffde7446a9f R14: 00007f2e1731f300 R15: 0000000000022000 [ 201.516159][ T8291] [ 201.534565][ T8292] FAULT_INJECTION: forcing a failure. [ 201.534565][ T8292] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 201.534597][ T8292] CPU: 0 PID: 8292 Comm: syz-executor.4 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 201.534625][ T8292] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 201.534640][ T8292] Call Trace: [ 201.534646][ T8292] [ 201.534655][ T8292] dump_stack_lvl+0xcd/0x134 [ 201.534688][ T8292] should_fail.cold+0x5/0xa [ 201.534725][ T8292] prepare_alloc_pages+0x17b/0x570 [ 201.534759][ T8292] __alloc_pages+0x12f/0x500 [ 201.534785][ T8292] ? __alloc_pages_slowpath.constprop.0+0x20e0/0x20e0 [ 201.534839][ T8292] alloc_pages+0x1aa/0x310 [ 201.534873][ T8292] __vmalloc_node_range+0x735/0x13e0 [ 201.534918][ T8292] ? netlink_sendmsg+0x690/0xe10 [ 201.534947][ T8292] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 201.534977][ T8292] ? vfree_atomic+0xe0/0xe0 [ 201.535008][ T8292] ? __netlink_dump_start+0x900/0x900 [ 201.535041][ T8292] ? netlink_sendmsg+0x690/0xe10 [ 201.535067][ T8292] vmalloc+0x67/0x80 [ 201.535092][ T8292] ? netlink_sendmsg+0x690/0xe10 [ 201.535114][ T8292] netlink_sendmsg+0x690/0xe10 [ 201.535144][ T8292] ? netlink_unicast+0x7f0/0x7f0 [ 201.535172][ T8292] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 201.535199][ T8292] ? netlink_unicast+0x7f0/0x7f0 [ 201.535222][ T8292] sock_sendmsg+0xcf/0x120 [ 201.535251][ T8292] ____sys_sendmsg+0x6eb/0x810 [ 201.535283][ T8292] ? kernel_sendmsg+0x50/0x50 [ 201.535308][ T8292] ? do_recvmmsg+0x6d0/0x6d0 [ 201.535330][ T8292] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 201.535362][ T8292] ? _parse_integer+0x30/0x30 [ 201.535397][ T8292] ___sys_sendmsg+0xf3/0x170 [ 201.535424][ T8292] ? sendmsg_copy_msghdr+0x160/0x160 [ 201.535452][ T8292] ? lock_downgrade+0x6e0/0x6e0 [ 201.535491][ T8292] ? __fget_files+0x286/0x470 [ 201.535529][ T8292] ? __fget_light+0xea/0x270 [ 201.535556][ T8292] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 201.535591][ T8292] __x64_sys_sendmsg+0x132/0x220 [ 201.535615][ T8292] ? __sys_sendmsg+0x1b0/0x1b0 [ 201.535653][ T8292] ? syscall_enter_from_user_mode+0x21/0x70 [ 201.535693][ T8292] do_syscall_64+0x35/0xb0 [ 201.535717][ T8292] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 201.535743][ T8292] RIP: 0033:0x7f7765489109 [ 201.535762][ T8292] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 201.535787][ T8292] RSP: 002b:00007f7766559168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 201.535811][ T8292] RAX: ffffffffffffffda RBX: 00007f776559bf60 RCX: 00007f7765489109 [ 201.535828][ T8292] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 201.535843][ T8292] RBP: 00007f77665591d0 R08: 0000000000000000 R09: 0000000000000000 [ 201.535859][ T8292] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 201.535874][ T8292] R13: 00007ffec1cb653f R14: 00007f7766559300 R15: 0000000000022000 [ 201.535908][ T8292] [ 201.627139][ T8296] FAULT_INJECTION: forcing a failure. [ 201.627139][ T8296] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 201.627172][ T8296] CPU: 0 PID: 8296 Comm: syz-executor.1 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 201.627200][ T8296] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 201.627215][ T8296] Call Trace: [ 201.627221][ T8296] [ 201.627230][ T8296] dump_stack_lvl+0xcd/0x134 [ 201.627262][ T8296] should_fail.cold+0x5/0xa [ 201.627299][ T8296] prepare_alloc_pages+0x17b/0x570 [ 201.627330][ T8296] __alloc_pages+0x12f/0x500 [ 201.627355][ T8296] ? __alloc_pages_slowpath.constprop.0+0x20e0/0x20e0 [ 201.627385][ T8296] ? __kmalloc_node+0x62/0x390 [ 201.627446][ T8296] alloc_pages+0x1aa/0x310 [ 201.627480][ T8296] __vmalloc_node_range+0x735/0x13e0 [ 201.627532][ T8296] ? netlink_sendmsg+0x690/0xe10 [ 201.627561][ T8296] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 201.627591][ T8296] ? vfree_atomic+0xe0/0xe0 [ 201.627623][ T8296] ? __netlink_dump_start+0x900/0x900 [ 201.627649][ T8296] ? netlink_sendmsg+0x690/0xe10 [ 201.627677][ T8296] vmalloc+0x67/0x80 [ 201.627705][ T8296] ? netlink_sendmsg+0x690/0xe10 [ 201.627730][ T8296] netlink_sendmsg+0x690/0xe10 [ 201.627762][ T8296] ? netlink_unicast+0x7f0/0x7f0 [ 201.627793][ T8296] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 201.627822][ T8296] ? netlink_unicast+0x7f0/0x7f0 [ 201.627847][ T8296] sock_sendmsg+0xcf/0x120 [ 201.627879][ T8296] ____sys_sendmsg+0x6eb/0x810 [ 201.627912][ T8296] ? kernel_sendmsg+0x50/0x50 [ 201.627940][ T8296] ? do_recvmmsg+0x6d0/0x6d0 [ 201.627963][ T8296] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 201.627999][ T8296] ? _parse_integer+0x30/0x30 [ 201.628036][ T8296] ___sys_sendmsg+0xf3/0x170 [ 201.628063][ T8296] ? sendmsg_copy_msghdr+0x160/0x160 [ 201.628094][ T8296] ? lock_downgrade+0x6e0/0x6e0 [ 201.628138][ T8296] ? __fget_files+0x286/0x470 [ 201.628174][ T8296] ? __fget_light+0xea/0x270 [ 201.628200][ T8296] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 201.628233][ T8296] __x64_sys_sendmsg+0x132/0x220 [ 201.628259][ T8296] ? __sys_sendmsg+0x1b0/0x1b0 [ 201.628299][ T8296] ? syscall_enter_from_user_mode+0x21/0x70 [ 201.628338][ T8296] do_syscall_64+0x35/0xb0 [ 201.628364][ T8296] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 201.628390][ T8296] RIP: 0033:0x7f55bba89109 [ 201.628410][ T8296] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 201.628436][ T8296] RSP: 002b:00007f55bcbef168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 201.628460][ T8296] RAX: ffffffffffffffda RBX: 00007f55bbb9bf60 RCX: 00007f55bba89109 [ 201.628479][ T8296] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 201.628495][ T8296] RBP: 00007f55bcbef1d0 R08: 0000000000000000 R09: 0000000000000000 [ 201.628510][ T8296] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 201.628530][ T8296] R13: 00007ffd14a51aef R14: 00007f55bcbef300 R15: 0000000000022000 [ 201.628566][ T8296] [ 201.697445][ T8302] FAULT_INJECTION: forcing a failure. [ 201.697445][ T8302] name failslab, interval 1, probability 0, space 0, times 0 [ 201.697476][ T8302] CPU: 1 PID: 8302 Comm: syz-executor.4 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 201.697503][ T8302] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 201.697516][ T8302] Call Trace: [ 201.697522][ T8302] [ 201.697530][ T8302] dump_stack_lvl+0xcd/0x134 [ 201.697559][ T8302] should_fail.cold+0x5/0xa [ 201.697592][ T8302] ? __build_skb+0x21/0x60 [ 201.697614][ T8302] should_failslab+0x5/0x10 [ 201.697639][ T8302] kmem_cache_alloc+0x5e/0x3b0 [ 201.697665][ T8302] ? netlink_sendmsg+0x690/0xe10 [ 201.697692][ T8302] __build_skb+0x21/0x60 [ 201.697718][ T8302] netlink_sendmsg+0x6ac/0xe10 [ 201.697747][ T8302] ? netlink_unicast+0x7f0/0x7f0 [ 201.697778][ T8302] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 201.697808][ T8302] ? netlink_unicast+0x7f0/0x7f0 [ 201.697833][ T8302] sock_sendmsg+0xcf/0x120 [ 201.697864][ T8302] ____sys_sendmsg+0x6eb/0x810 [ 201.697897][ T8302] ? kernel_sendmsg+0x50/0x50 [ 201.697924][ T8302] ? do_recvmmsg+0x6d0/0x6d0 [ 201.697947][ T8302] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 201.697980][ T8302] ? _parse_integer+0x30/0x30 [ 201.698022][ T8302] ___sys_sendmsg+0xf3/0x170 [ 201.698051][ T8302] ? sendmsg_copy_msghdr+0x160/0x160 [ 201.698081][ T8302] ? lock_downgrade+0x6e0/0x6e0 [ 201.698124][ T8302] ? __fget_files+0x286/0x470 [ 201.698158][ T8302] ? __fget_light+0xea/0x270 [ 201.698184][ T8302] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 201.698216][ T8302] __x64_sys_sendmsg+0x132/0x220 [ 201.698240][ T8302] ? __sys_sendmsg+0x1b0/0x1b0 [ 201.698277][ T8302] ? syscall_enter_from_user_mode+0x21/0x70 [ 201.698314][ T8302] do_syscall_64+0x35/0xb0 [ 201.698339][ T8302] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 201.698364][ T8302] RIP: 0033:0x7f7765489109 [ 201.698383][ T8302] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 201.698408][ T8302] RSP: 002b:00007f7766559168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 201.698431][ T8302] RAX: ffffffffffffffda RBX: 00007f776559bf60 RCX: 00007f7765489109 [ 201.698448][ T8302] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 201.698463][ T8302] RBP: 00007f77665591d0 R08: 0000000000000000 R09: 0000000000000000 [ 201.698478][ T8302] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 201.698493][ T8302] R13: 00007ffec1cb653f R14: 00007f7766559300 R15: 0000000000022000 [ 201.698523][ T8302] [ 201.702798][ T8305] FAULT_INJECTION: forcing a failure. [ 201.702798][ T8305] name failslab, interval 1, probability 0, space 0, times 0 [ 201.702831][ T8305] CPU: 0 PID: 8305 Comm: syz-executor.5 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 201.702860][ T8305] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 201.702873][ T8305] Call Trace: [ 201.702879][ T8305] [ 201.702887][ T8305] dump_stack_lvl+0xcd/0x134 [ 201.702922][ T8305] should_fail.cold+0x5/0xa [ 201.702962][ T8305] should_failslab+0x5/0x10 [ 201.702991][ T8305] kmem_cache_alloc_trace+0x60/0x3f0 [ 201.703020][ T8305] ? do_check_common+0x1af9/0xcfe0 [ 201.703053][ T8305] do_check_common+0x1af9/0xcfe0 [ 201.703077][ T8305] ? find_held_lock+0x2d/0x110 [ 201.703109][ T8305] ? debug_check_no_obj_freed+0x20c/0x420 [ 201.703160][ T8305] ? check_helper_call+0x8620/0x8620 [ 201.703195][ T8305] ? slab_free_freelist_hook+0x8b/0x1c0 [ 201.703224][ T8305] ? kvfree+0x42/0x50 [ 201.703248][ T8305] ? kfree+0xd6/0x4d0 [ 201.703274][ T8305] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 201.703303][ T8305] ? push_insn+0x220/0x530 [ 201.703333][ T8305] ? trace_hardirqs_on+0x38/0x1c0 [ 201.703363][ T8305] bpf_check+0x88a4/0xbbc0 [ 201.703411][ T8305] ? bpf_get_btf_vmlinux+0x10/0x10 [ 201.703455][ T8305] ? lock_downgrade+0x6e0/0x6e0 [ 201.703483][ T8305] ? __might_fault+0xd1/0x170 [ 201.703509][ T8305] ? lock_downgrade+0x6e0/0x6e0 [ 201.703558][ T8305] ? memset+0x20/0x40 [ 201.703582][ T8305] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 201.703612][ T8305] ? bpf_obj_name_cpy+0x144/0x1a0 [ 201.703642][ T8305] ? bpf_prog_load+0xf71/0x2250 [ 201.703673][ T8305] bpf_prog_load+0xfb2/0x2250 [ 201.703710][ T8305] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 201.703742][ T8305] ? find_held_lock+0x2d/0x110 [ 201.703775][ T8305] ? __might_fault+0xd1/0x170 [ 201.703801][ T8305] ? lock_downgrade+0x6e0/0x6e0 [ 201.703847][ T8305] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 201.703879][ T8305] __sys_bpf+0x11a1/0x5700 [ 201.703912][ T8305] ? bpf_perf_link_attach+0x520/0x520 [ 201.703942][ T8305] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 201.703985][ T8305] ? find_held_lock+0x2d/0x110 [ 201.704040][ T8305] ? trace_hardirqs_on+0x38/0x1c0 [ 201.704071][ T8305] __x64_sys_bpf+0x75/0xb0 [ 201.704099][ T8305] ? syscall_enter_from_user_mode+0x21/0x70 [ 201.704132][ T8305] do_syscall_64+0x35/0xb0 [ 201.704161][ T8305] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 201.704189][ T8305] RIP: 0033:0x7f2e16289109 [ 201.704207][ T8305] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 201.704235][ T8305] RSP: 002b:00007f2e1731f168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 201.704259][ T8305] RAX: ffffffffffffffda RBX: 00007f2e1639bf60 RCX: 00007f2e16289109 [ 201.704277][ T8305] RDX: 0000000000000080 RSI: 00000000200001c0 RDI: 0000000000000005 [ 201.704293][ T8305] RBP: 00007f2e1731f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 201.704311][ T8305] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 201.704327][ T8305] R13: 00007ffde7446a9f R14: 00007f2e1731f300 R15: 0000000000022000 [ 201.704365][ T8305] [ 201.787003][ T8309] FAULT_INJECTION: forcing a failure. [ 201.787003][ T8309] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 201.787037][ T8309] CPU: 0 PID: 8309 Comm: syz-executor.1 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 201.787064][ T8309] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 201.787078][ T8309] Call Trace: [ 201.787084][ T8309] [ 201.787092][ T8309] dump_stack_lvl+0xcd/0x134 [ 201.787123][ T8309] should_fail.cold+0x5/0xa [ 201.787160][ T8309] prepare_alloc_pages+0x17b/0x570 [ 201.787193][ T8309] __alloc_pages+0x12f/0x500 [ 201.787219][ T8309] ? __alloc_pages_slowpath.constprop.0+0x20e0/0x20e0 [ 201.787248][ T8309] ? __kmalloc_node+0x62/0x390 [ 201.787294][ T8309] alloc_pages+0x1aa/0x310 [ 201.787327][ T8309] __vmalloc_node_range+0x735/0x13e0 [ 201.787371][ T8309] ? netlink_sendmsg+0x690/0xe10 [ 201.787400][ T8309] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 201.787430][ T8309] ? vfree_atomic+0xe0/0xe0 [ 201.787461][ T8309] ? __netlink_dump_start+0x900/0x900 [ 201.787486][ T8309] ? netlink_sendmsg+0x690/0xe10 [ 201.787518][ T8309] vmalloc+0x67/0x80 [ 201.787546][ T8309] ? netlink_sendmsg+0x690/0xe10 [ 201.787571][ T8309] netlink_sendmsg+0x690/0xe10 [ 201.787603][ T8309] ? netlink_unicast+0x7f0/0x7f0 [ 201.787634][ T8309] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 201.787664][ T8309] ? netlink_unicast+0x7f0/0x7f0 [ 201.787689][ T8309] sock_sendmsg+0xcf/0x120 [ 201.787722][ T8309] ____sys_sendmsg+0x6eb/0x810 [ 201.787754][ T8309] ? kernel_sendmsg+0x50/0x50 [ 201.787782][ T8309] ? do_recvmmsg+0x6d0/0x6d0 [ 201.787807][ T8309] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 201.787841][ T8309] ? _parse_integer+0x30/0x30 [ 201.787880][ T8309] ___sys_sendmsg+0xf3/0x170 [ 201.787907][ T8309] ? sendmsg_copy_msghdr+0x160/0x160 [ 201.787938][ T8309] ? lock_downgrade+0x6e0/0x6e0 [ 201.787981][ T8309] ? __fget_files+0x286/0x470 [ 201.788016][ T8309] ? __fget_light+0xea/0x270 [ 201.788043][ T8309] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 201.788076][ T8309] __x64_sys_sendmsg+0x132/0x220 [ 201.788102][ T8309] ? __sys_sendmsg+0x1b0/0x1b0 [ 201.788139][ T8309] ? syscall_enter_from_user_mode+0x21/0x70 [ 201.788178][ T8309] do_syscall_64+0x35/0xb0 [ 201.788205][ T8309] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 201.788231][ T8309] RIP: 0033:0x7f55bba89109 [ 201.788251][ T8309] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 201.788276][ T8309] RSP: 002b:00007f55bcbef168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 201.788299][ T8309] RAX: ffffffffffffffda RBX: 00007f55bbb9bf60 RCX: 00007f55bba89109 [ 201.788317][ T8309] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 201.788332][ T8309] RBP: 00007f55bcbef1d0 R08: 0000000000000000 R09: 0000000000000000 [ 201.788348][ T8309] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 201.788363][ T8309] R13: 00007ffd14a51aef R14: 00007f55bcbef300 R15: 0000000000022000 [ 201.788395][ T8309] [ 201.828338][ T8311] FAULT_INJECTION: forcing a failure. [ 201.828338][ T8311] name failslab, interval 1, probability 0, space 0, times 0 [ 201.828372][ T8311] CPU: 0 PID: 8311 Comm: syz-executor.5 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 201.828401][ T8311] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 201.828416][ T8311] Call Trace: [ 201.828422][ T8311] [ 201.828430][ T8311] dump_stack_lvl+0xcd/0x134 [ 201.828462][ T8311] should_fail.cold+0x5/0xa [ 201.828496][ T8311] should_failslab+0x5/0x10 [ 201.828530][ T8311] kmem_cache_alloc_trace+0x60/0x3f0 [ 201.828557][ T8311] ? do_check_common+0x1af9/0xcfe0 [ 201.828588][ T8311] do_check_common+0x1af9/0xcfe0 [ 201.828614][ T8311] ? find_held_lock+0x2d/0x110 [ 201.828647][ T8311] ? debug_check_no_obj_freed+0x20c/0x420 [ 201.828699][ T8311] ? check_helper_call+0x8620/0x8620 [ 201.828733][ T8311] ? slab_free_freelist_hook+0x8b/0x1c0 [ 201.828762][ T8311] ? kvfree+0x42/0x50 [ 201.828785][ T8311] ? kfree+0xd6/0x4d0 [ 201.828807][ T8311] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 201.828833][ T8311] ? push_insn+0x220/0x530 [ 201.828864][ T8311] ? trace_hardirqs_on+0x38/0x1c0 [ 201.828894][ T8311] bpf_check+0x88a4/0xbbc0 [ 201.828943][ T8311] ? bpf_get_btf_vmlinux+0x10/0x10 [ 201.828975][ T8311] ? lock_downgrade+0x6e0/0x6e0 [ 201.829002][ T8311] ? __might_fault+0xd1/0x170 [ 201.829026][ T8311] ? lock_downgrade+0x6e0/0x6e0 [ 201.829063][ T8311] ? memset+0x20/0x40 [ 201.829084][ T8311] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 201.829112][ T8311] ? bpf_obj_name_cpy+0x144/0x1a0 [ 201.829140][ T8311] ? bpf_prog_load+0xf71/0x2250 [ 201.829169][ T8311] bpf_prog_load+0xfb2/0x2250 [ 201.829205][ T8311] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 201.829241][ T8311] ? find_held_lock+0x2d/0x110 [ 201.829274][ T8311] ? __might_fault+0xd1/0x170 [ 201.829300][ T8311] ? lock_downgrade+0x6e0/0x6e0 [ 201.829344][ T8311] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 201.829375][ T8311] __sys_bpf+0x11a1/0x5700 [ 201.829407][ T8311] ? bpf_perf_link_attach+0x520/0x520 [ 201.829435][ T8311] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 201.829477][ T8311] ? find_held_lock+0x2d/0x110 [ 201.829538][ T8311] ? trace_hardirqs_on+0x38/0x1c0 [ 201.829571][ T8311] __x64_sys_bpf+0x75/0xb0 [ 201.829600][ T8311] ? syscall_enter_from_user_mode+0x21/0x70 [ 201.829632][ T8311] do_syscall_64+0x35/0xb0 [ 201.829658][ T8311] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 201.829683][ T8311] RIP: 0033:0x7f2e16289109 [ 201.829703][ T8311] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 201.829728][ T8311] RSP: 002b:00007f2e1731f168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 201.829752][ T8311] RAX: ffffffffffffffda RBX: 00007f2e1639bf60 RCX: 00007f2e16289109 [ 201.829767][ T8311] RDX: 0000000000000080 RSI: 00000000200001c0 RDI: 0000000000000005 [ 201.829782][ T8311] RBP: 00007f2e1731f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 201.829797][ T8311] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 201.829812][ T8311] R13: 00007ffde7446a9f R14: 00007f2e1731f300 R15: 0000000000022000 [ 201.829842][ T8311] [ 201.866631][ T8317] FAULT_INJECTION: forcing a failure. [ 201.866631][ T8317] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 201.866664][ T8317] CPU: 1 PID: 8317 Comm: syz-executor.4 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 201.866692][ T8317] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 201.866706][ T8317] Call Trace: [ 201.866712][ T8317] [ 201.866720][ T8317] dump_stack_lvl+0xcd/0x134 [ 201.866751][ T8317] should_fail.cold+0x5/0xa [ 201.866788][ T8317] _copy_from_iter+0x389/0x15a0 [ 201.866826][ T8317] ? rwlock_bug.part.0+0x90/0x90 [ 201.866861][ T8317] ? _copy_from_iter_nocache+0x1510/0x1510 [ 201.866892][ T8317] ? do_raw_spin_unlock+0x171/0x230 [ 201.866917][ T8317] ? _raw_spin_unlock+0x24/0x40 [ 201.866947][ T8317] ? find_vm_area+0x145/0x190 [ 201.866975][ T8317] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 201.867008][ T8317] ? __phys_addr_symbol+0x2c/0x70 [ 201.867038][ T8317] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 201.867065][ T8317] ? __check_object_size+0x353/0x7a0 [ 201.867103][ T8317] netlink_sendmsg+0x875/0xe10 [ 201.867136][ T8317] ? netlink_unicast+0x7f0/0x7f0 [ 201.867168][ T8317] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 201.867198][ T8317] ? netlink_unicast+0x7f0/0x7f0 [ 201.867222][ T8317] sock_sendmsg+0xcf/0x120 [ 201.867254][ T8317] ____sys_sendmsg+0x6eb/0x810 [ 201.867288][ T8317] ? kernel_sendmsg+0x50/0x50 [ 201.867315][ T8317] ? do_recvmmsg+0x6d0/0x6d0 [ 201.867339][ T8317] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 201.867372][ T8317] ? _parse_integer+0x30/0x30 [ 201.867409][ T8317] ___sys_sendmsg+0xf3/0x170 [ 201.867436][ T8317] ? sendmsg_copy_msghdr+0x160/0x160 [ 201.867467][ T8317] ? lock_downgrade+0x6e0/0x6e0 [ 201.867510][ T8317] ? __fget_files+0x286/0x470 [ 201.867546][ T8317] ? __fget_light+0xea/0x270 [ 201.867572][ T8317] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 201.867605][ T8317] __x64_sys_sendmsg+0x132/0x220 [ 201.867630][ T8317] ? __sys_sendmsg+0x1b0/0x1b0 [ 201.867670][ T8317] ? syscall_enter_from_user_mode+0x21/0x70 [ 201.867708][ T8317] do_syscall_64+0x35/0xb0 [ 201.867734][ T8317] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 201.867760][ T8317] RIP: 0033:0x7f7765489109 [ 201.867780][ T8317] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 201.867803][ T8317] RSP: 002b:00007f7766559168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 201.867828][ T8317] RAX: ffffffffffffffda RBX: 00007f776559bf60 RCX: 00007f7765489109 [ 201.867845][ T8317] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 201.867860][ T8317] RBP: 00007f77665591d0 R08: 0000000000000000 R09: 0000000000000000 [ 201.867875][ T8317] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 201.867890][ T8317] R13: 00007ffec1cb653f R14: 00007f7766559300 R15: 0000000000022000 [ 201.867925][ T8317] [ 201.918239][ T8323] FAULT_INJECTION: forcing a failure. [ 201.918239][ T8323] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 201.918273][ T8323] CPU: 1 PID: 8323 Comm: syz-executor.1 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 201.918302][ T8323] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 201.918317][ T8323] Call Trace: [ 201.918323][ T8323] [ 201.918332][ T8323] dump_stack_lvl+0xcd/0x134 [ 201.918364][ T8323] should_fail.cold+0x5/0xa [ 201.918401][ T8323] prepare_alloc_pages+0x17b/0x570 [ 201.918433][ T8323] __alloc_pages+0x12f/0x500 [ 201.918460][ T8323] ? __alloc_pages_slowpath.constprop.0+0x20e0/0x20e0 [ 201.918490][ T8323] ? __kmalloc_node+0x62/0x390 [ 201.918536][ T8323] alloc_pages+0x1aa/0x310 [ 201.918567][ T8323] __vmalloc_node_range+0x735/0x13e0 [ 201.918607][ T8323] ? netlink_sendmsg+0x690/0xe10 [ 201.918634][ T8323] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 201.918664][ T8323] ? vfree_atomic+0xe0/0xe0 [ 201.918695][ T8323] ? __netlink_dump_start+0x900/0x900 [ 201.918720][ T8323] ? netlink_sendmsg+0x690/0xe10 [ 201.918745][ T8323] vmalloc+0x67/0x80 [ 201.918773][ T8323] ? netlink_sendmsg+0x690/0xe10 [ 201.918797][ T8323] netlink_sendmsg+0x690/0xe10 [ 201.918832][ T8323] ? netlink_unicast+0x7f0/0x7f0 [ 201.918864][ T8323] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 201.918894][ T8323] ? netlink_unicast+0x7f0/0x7f0 [ 201.918920][ T8323] sock_sendmsg+0xcf/0x120 [ 201.918953][ T8323] ____sys_sendmsg+0x6eb/0x810 [ 201.918987][ T8323] ? kernel_sendmsg+0x50/0x50 [ 201.919022][ T8323] ? do_recvmmsg+0x6d0/0x6d0 [ 201.919047][ T8323] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 201.919084][ T8323] ? _parse_integer+0x30/0x30 [ 201.919120][ T8323] ___sys_sendmsg+0xf3/0x170 [ 201.919146][ T8323] ? sendmsg_copy_msghdr+0x160/0x160 [ 201.919177][ T8323] ? lock_downgrade+0x6e0/0x6e0 [ 201.919219][ T8323] ? __fget_files+0x286/0x470 [ 201.919253][ T8323] ? __fget_light+0xea/0x270 [ 201.919278][ T8323] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 201.919311][ T8323] __x64_sys_sendmsg+0x132/0x220 [ 201.919335][ T8323] ? __sys_sendmsg+0x1b0/0x1b0 [ 201.919375][ T8323] ? syscall_enter_from_user_mode+0x21/0x70 [ 201.919414][ T8323] do_syscall_64+0x35/0xb0 [ 201.919441][ T8323] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 201.919467][ T8323] RIP: 0033:0x7f55bba89109 [ 201.919487][ T8323] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 201.919513][ T8323] RSP: 002b:00007f55bcbef168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 201.919537][ T8323] RAX: ffffffffffffffda RBX: 00007f55bbb9bf60 RCX: 00007f55bba89109 [ 201.919556][ T8323] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 201.919572][ T8323] RBP: 00007f55bcbef1d0 R08: 0000000000000000 R09: 0000000000000000 [ 201.919589][ T8323] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 201.919605][ T8323] R13: 00007ffd14a51aef R14: 00007f55bcbef300 R15: 0000000000022000 [ 201.919640][ T8323] [ 201.985678][ T8328] FAULT_INJECTION: forcing a failure. [ 201.985678][ T8328] name failslab, interval 1, probability 0, space 0, times 0 [ 201.985712][ T8328] CPU: 1 PID: 8328 Comm: syz-executor.5 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 201.985741][ T8328] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 201.985755][ T8328] Call Trace: [ 201.985762][ T8328] [ 201.985769][ T8328] dump_stack_lvl+0xcd/0x134 [ 201.985801][ T8328] should_fail.cold+0x5/0xa [ 201.985837][ T8328] should_failslab+0x5/0x10 [ 201.985862][ T8328] kmem_cache_alloc_trace+0x60/0x3f0 [ 201.985889][ T8328] ? copy_verifier_state+0x827/0xb80 [ 201.985924][ T8328] copy_verifier_state+0x827/0xb80 [ 201.985961][ T8328] do_check_common+0x1c48/0xcfe0 [ 201.985984][ T8328] ? find_held_lock+0x2d/0x110 [ 201.986025][ T8328] ? debug_check_no_obj_freed+0x20c/0x420 [ 201.986075][ T8328] ? check_helper_call+0x8620/0x8620 [ 201.986109][ T8328] ? slab_free_freelist_hook+0x8b/0x1c0 [ 201.986139][ T8328] ? kvfree+0x42/0x50 [ 201.986162][ T8328] ? kfree+0xd6/0x4d0 [ 201.986183][ T8328] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 201.986209][ T8328] ? push_insn+0x220/0x530 [ 201.986238][ T8328] ? trace_hardirqs_on+0x38/0x1c0 [ 201.986267][ T8328] bpf_check+0x88a4/0xbbc0 [ 201.986315][ T8328] ? bpf_get_btf_vmlinux+0x10/0x10 [ 201.986346][ T8328] ? lock_downgrade+0x6e0/0x6e0 [ 201.986373][ T8328] ? __might_fault+0xd1/0x170 [ 201.986398][ T8328] ? lock_downgrade+0x6e0/0x6e0 [ 201.986435][ T8328] ? memset+0x20/0x40 [ 201.986456][ T8328] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 201.986483][ T8328] ? bpf_obj_name_cpy+0x144/0x1a0 [ 201.986511][ T8328] ? bpf_prog_load+0xf71/0x2250 [ 201.986540][ T8328] bpf_prog_load+0xfb2/0x2250 [ 201.986575][ T8328] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 201.986605][ T8328] ? find_held_lock+0x2d/0x110 [ 201.986636][ T8328] ? __might_fault+0xd1/0x170 [ 201.986659][ T8328] ? lock_downgrade+0x6e0/0x6e0 [ 201.986701][ T8328] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 201.986732][ T8328] __sys_bpf+0x11a1/0x5700 [ 201.986763][ T8328] ? bpf_perf_link_attach+0x520/0x520 [ 201.986792][ T8328] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 201.986832][ T8328] ? find_held_lock+0x2d/0x110 [ 201.986884][ T8328] ? trace_hardirqs_on+0x38/0x1c0 [ 201.986913][ T8328] __x64_sys_bpf+0x75/0xb0 [ 201.986940][ T8328] ? syscall_enter_from_user_mode+0x21/0x70 [ 201.986972][ T8328] do_syscall_64+0x35/0xb0 [ 201.987003][ T8328] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 201.987031][ T8328] RIP: 0033:0x7f2e16289109 [ 201.987052][ T8328] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 201.987077][ T8328] RSP: 002b:00007f2e1731f168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 201.987101][ T8328] RAX: ffffffffffffffda RBX: 00007f2e1639bf60 RCX: 00007f2e16289109 [ 201.987118][ T8328] RDX: 0000000000000080 RSI: 00000000200001c0 RDI: 0000000000000005 [ 201.987133][ T8328] RBP: 00007f2e1731f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 201.987148][ T8328] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 201.987162][ T8328] R13: 00007ffde7446a9f R14: 00007f2e1731f300 R15: 0000000000022000 [ 201.987194][ T8328] [ 202.059613][ T8335] FAULT_INJECTION: forcing a failure. [ 202.059613][ T8335] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 202.059645][ T8335] CPU: 0 PID: 8335 Comm: syz-executor.4 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 202.059674][ T8335] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 202.059689][ T8335] Call Trace: [ 202.059695][ T8335] [ 202.059703][ T8335] dump_stack_lvl+0xcd/0x134 [ 202.059737][ T8335] should_fail.cold+0x5/0xa [ 202.059770][ T8335] ? entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 202.059803][ T8335] prepare_alloc_pages+0x17b/0x570 [ 202.059837][ T8335] __alloc_pages+0x12f/0x500 [ 202.059861][ T8335] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 202.059890][ T8335] ? __alloc_pages_slowpath.constprop.0+0x20e0/0x20e0 [ 202.059918][ T8335] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 202.059963][ T8335] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 202.059990][ T8335] ? ref_tracker_alloc+0x2c3/0x550 [ 202.060023][ T8335] kmalloc_large_node+0x62/0x130 [ 202.060054][ T8335] __kmalloc_node_track_caller+0x2ec/0x360 [ 202.060082][ T8335] ? netlink_deliver_tap+0x66d/0xc40 [ 202.060121][ T8335] __alloc_skb+0xde/0x340 [ 202.060156][ T8335] netlink_deliver_tap+0x66d/0xc40 [ 202.060195][ T8335] netlink_unicast+0x5f5/0x7f0 [ 202.060225][ T8335] ? netlink_attachskb+0x880/0x880 [ 202.060248][ T8335] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 202.060293][ T8335] ? __phys_addr_symbol+0x2c/0x70 [ 202.060322][ T8335] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 202.060349][ T8335] ? __check_object_size+0x353/0x7a0 [ 202.060387][ T8335] netlink_sendmsg+0x917/0xe10 [ 202.060418][ T8335] ? netlink_unicast+0x7f0/0x7f0 [ 202.060448][ T8335] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 202.060476][ T8335] ? netlink_unicast+0x7f0/0x7f0 [ 202.060511][ T8335] sock_sendmsg+0xcf/0x120 [ 202.060543][ T8335] ____sys_sendmsg+0x6eb/0x810 [ 202.060576][ T8335] ? kernel_sendmsg+0x50/0x50 [ 202.060602][ T8335] ? do_recvmmsg+0x6d0/0x6d0 [ 202.060624][ T8335] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 202.060660][ T8335] ? _parse_integer+0x30/0x30 [ 202.060696][ T8335] ___sys_sendmsg+0xf3/0x170 [ 202.060722][ T8335] ? sendmsg_copy_msghdr+0x160/0x160 [ 202.060753][ T8335] ? lock_downgrade+0x6e0/0x6e0 [ 202.060796][ T8335] ? __fget_files+0x286/0x470 [ 202.060832][ T8335] ? __fget_light+0xea/0x270 [ 202.060857][ T8335] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 202.060891][ T8335] __x64_sys_sendmsg+0x132/0x220 [ 202.060916][ T8335] ? __sys_sendmsg+0x1b0/0x1b0 [ 202.060954][ T8335] ? syscall_enter_from_user_mode+0x21/0x70 [ 202.060991][ T8335] do_syscall_64+0x35/0xb0 [ 202.061017][ T8335] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 202.061043][ T8335] RIP: 0033:0x7f7765489109 [ 202.061063][ T8335] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 202.061090][ T8335] RSP: 002b:00007f7766559168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 202.061113][ T8335] RAX: ffffffffffffffda RBX: 00007f776559bf60 RCX: 00007f7765489109 [ 202.061130][ T8335] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 202.061144][ T8335] RBP: 00007f77665591d0 R08: 0000000000000000 R09: 0000000000000000 [ 202.061158][ T8335] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 202.061172][ T8335] R13: 00007ffec1cb653f R14: 00007f7766559300 R15: 0000000000022000 [ 202.061206][ T8335] [ 202.076916][ T8339] FAULT_INJECTION: forcing a failure. [ 202.076916][ T8339] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 202.076952][ T8339] CPU: 1 PID: 8339 Comm: syz-executor.1 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 202.076982][ T8339] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 202.077004][ T8339] Call Trace: [ 202.077011][ T8339] [ 202.077020][ T8339] dump_stack_lvl+0xcd/0x134 [ 202.077053][ T8339] should_fail.cold+0x5/0xa [ 202.077089][ T8339] prepare_alloc_pages+0x17b/0x570 [ 202.077124][ T8339] __alloc_pages+0x12f/0x500 [ 202.077150][ T8339] ? __alloc_pages_slowpath.constprop.0+0x20e0/0x20e0 [ 202.077180][ T8339] ? __kmalloc_node+0x62/0x390 [ 202.077227][ T8339] alloc_pages+0x1aa/0x310 [ 202.077261][ T8339] __vmalloc_node_range+0x735/0x13e0 [ 202.077303][ T8339] ? netlink_sendmsg+0x690/0xe10 [ 202.077330][ T8339] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 202.077359][ T8339] ? vfree_atomic+0xe0/0xe0 [ 202.077389][ T8339] ? __netlink_dump_start+0x900/0x900 [ 202.077415][ T8339] ? netlink_sendmsg+0x690/0xe10 [ 202.077442][ T8339] vmalloc+0x67/0x80 [ 202.077470][ T8339] ? netlink_sendmsg+0x690/0xe10 [ 202.077493][ T8339] netlink_sendmsg+0x690/0xe10 [ 202.077522][ T8339] ? netlink_unicast+0x7f0/0x7f0 [ 202.077551][ T8339] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 202.077581][ T8339] ? netlink_unicast+0x7f0/0x7f0 [ 202.077606][ T8339] sock_sendmsg+0xcf/0x120 [ 202.077639][ T8339] ____sys_sendmsg+0x6eb/0x810 [ 202.077673][ T8339] ? kernel_sendmsg+0x50/0x50 [ 202.077701][ T8339] ? do_recvmmsg+0x6d0/0x6d0 [ 202.077725][ T8339] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 202.077761][ T8339] ? _parse_integer+0x30/0x30 [ 202.077799][ T8339] ___sys_sendmsg+0xf3/0x170 [ 202.077831][ T8339] ? sendmsg_copy_msghdr+0x160/0x160 [ 202.077863][ T8339] ? lock_downgrade+0x6e0/0x6e0 [ 202.077907][ T8339] ? __fget_files+0x286/0x470 [ 202.077941][ T8339] ? __fget_light+0xea/0x270 [ 202.077967][ T8339] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 202.078009][ T8339] __x64_sys_sendmsg+0x132/0x220 [ 202.078037][ T8339] ? __sys_sendmsg+0x1b0/0x1b0 [ 202.078078][ T8339] ? syscall_enter_from_user_mode+0x21/0x70 [ 202.078119][ T8339] do_syscall_64+0x35/0xb0 [ 202.078145][ T8339] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 202.078172][ T8339] RIP: 0033:0x7f55bba89109 [ 202.078194][ T8339] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 202.078218][ T8339] RSP: 002b:00007f55bcbef168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 202.078243][ T8339] RAX: ffffffffffffffda RBX: 00007f55bbb9bf60 RCX: 00007f55bba89109 [ 202.078261][ T8339] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 202.078277][ T8339] RBP: 00007f55bcbef1d0 R08: 0000000000000000 R09: 0000000000000000 [ 202.078293][ T8339] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 202.078309][ T8339] R13: 00007ffd14a51aef R14: 00007f55bcbef300 R15: 0000000000022000 [ 202.078345][ T8339] [ 202.105756][ T8335] netlink: 1046 bytes leftover after parsing attributes in process `syz-executor.4'. [ 202.180060][ T8347] FAULT_INJECTION: forcing a failure. [ 202.180060][ T8347] name failslab, interval 1, probability 0, space 0, times 0 [ 202.180093][ T8347] CPU: 1 PID: 8347 Comm: syz-executor.5 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 202.180122][ T8347] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 202.180138][ T8347] Call Trace: [ 202.180144][ T8347] [ 202.180153][ T8347] dump_stack_lvl+0xcd/0x134 [ 202.180185][ T8347] should_fail.cold+0x5/0xa [ 202.180222][ T8347] should_failslab+0x5/0x10 [ 202.180249][ T8347] kmem_cache_alloc_trace+0x60/0x3f0 [ 202.180276][ T8347] ? do_check_common+0x1af9/0xcfe0 [ 202.180306][ T8347] do_check_common+0x1af9/0xcfe0 [ 202.180330][ T8347] ? find_held_lock+0x2d/0x110 [ 202.180362][ T8347] ? debug_check_no_obj_freed+0x20c/0x420 [ 202.180412][ T8347] ? check_helper_call+0x8620/0x8620 [ 202.180448][ T8347] ? slab_free_freelist_hook+0x8b/0x1c0 [ 202.180478][ T8347] ? kvfree+0x42/0x50 [ 202.180502][ T8347] ? kfree+0xd6/0x4d0 [ 202.180525][ T8347] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 202.180552][ T8347] ? push_insn+0x220/0x530 [ 202.180582][ T8347] ? trace_hardirqs_on+0x38/0x1c0 [ 202.180611][ T8347] bpf_check+0x88a4/0xbbc0 [ 202.180662][ T8347] ? bpf_get_btf_vmlinux+0x10/0x10 [ 202.180696][ T8347] ? lock_downgrade+0x6e0/0x6e0 [ 202.180725][ T8347] ? __might_fault+0xd1/0x170 [ 202.180751][ T8347] ? lock_downgrade+0x6e0/0x6e0 [ 202.180791][ T8347] ? memset+0x20/0x40 [ 202.180813][ T8347] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 202.180842][ T8347] ? bpf_obj_name_cpy+0x144/0x1a0 [ 202.180871][ T8347] ? bpf_prog_load+0xf71/0x2250 [ 202.180902][ T8347] bpf_prog_load+0xfb2/0x2250 [ 202.180939][ T8347] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 202.180971][ T8347] ? find_held_lock+0x2d/0x110 [ 202.181018][ T8347] ? __might_fault+0xd1/0x170 [ 202.181045][ T8347] ? lock_downgrade+0x6e0/0x6e0 [ 202.181091][ T8347] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 202.181126][ T8347] __sys_bpf+0x11a1/0x5700 [ 202.181161][ T8347] ? bpf_perf_link_attach+0x520/0x520 [ 202.181192][ T8347] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 202.181235][ T8347] ? find_held_lock+0x2d/0x110 [ 202.181292][ T8347] ? trace_hardirqs_on+0x38/0x1c0 [ 202.181322][ T8347] __x64_sys_bpf+0x75/0xb0 [ 202.181350][ T8347] ? syscall_enter_from_user_mode+0x21/0x70 [ 202.181384][ T8347] do_syscall_64+0x35/0xb0 [ 202.181411][ T8347] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 202.181435][ T8347] RIP: 0033:0x7f2e16289109 [ 202.181455][ T8347] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 202.181481][ T8347] RSP: 002b:00007f2e1731f168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 202.181506][ T8347] RAX: ffffffffffffffda RBX: 00007f2e1639bf60 RCX: 00007f2e16289109 [ 202.181524][ T8347] RDX: 0000000000000080 RSI: 00000000200001c0 RDI: 0000000000000005 [ 202.181539][ T8347] RBP: 00007f2e1731f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 202.181555][ T8347] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 202.181570][ T8347] R13: 00007ffde7446a9f R14: 00007f2e1731f300 R15: 0000000000022000 [ 202.181605][ T8347] [ 202.217828][ T8350] FAULT_INJECTION: forcing a failure. [ 202.217828][ T8350] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 202.217860][ T8350] CPU: 0 PID: 8350 Comm: syz-executor.1 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 202.217886][ T8350] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 202.217900][ T8350] Call Trace: [ 202.217907][ T8350] [ 202.217915][ T8350] dump_stack_lvl+0xcd/0x134 [ 202.217949][ T8350] should_fail.cold+0x5/0xa [ 202.217983][ T8350] prepare_alloc_pages+0x17b/0x570 [ 202.218016][ T8350] __alloc_pages+0x12f/0x500 [ 202.218042][ T8350] ? __alloc_pages_slowpath.constprop.0+0x20e0/0x20e0 [ 202.218072][ T8350] ? __kmalloc_node+0x62/0x390 [ 202.218117][ T8350] alloc_pages+0x1aa/0x310 [ 202.218149][ T8350] __vmalloc_node_range+0x735/0x13e0 [ 202.218191][ T8350] ? netlink_sendmsg+0x690/0xe10 [ 202.218220][ T8350] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 202.218252][ T8350] ? vfree_atomic+0xe0/0xe0 [ 202.218282][ T8350] ? __netlink_dump_start+0x900/0x900 [ 202.218307][ T8350] ? netlink_sendmsg+0x690/0xe10 [ 202.218333][ T8350] vmalloc+0x67/0x80 [ 202.218359][ T8350] ? netlink_sendmsg+0x690/0xe10 [ 202.218384][ T8350] netlink_sendmsg+0x690/0xe10 [ 202.218415][ T8350] ? netlink_unicast+0x7f0/0x7f0 [ 202.218445][ T8350] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 202.218483][ T8350] ? netlink_unicast+0x7f0/0x7f0 [ 202.218506][ T8350] sock_sendmsg+0xcf/0x120 [ 202.218539][ T8350] ____sys_sendmsg+0x6eb/0x810 [ 202.218571][ T8350] ? kernel_sendmsg+0x50/0x50 [ 202.218598][ T8350] ? do_recvmmsg+0x6d0/0x6d0 [ 202.218622][ T8350] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 202.218654][ T8350] ? _parse_integer+0x30/0x30 [ 202.218691][ T8350] ___sys_sendmsg+0xf3/0x170 [ 202.218718][ T8350] ? sendmsg_copy_msghdr+0x160/0x160 [ 202.218748][ T8350] ? lock_downgrade+0x6e0/0x6e0 [ 202.218788][ T8350] ? __fget_files+0x286/0x470 [ 202.218822][ T8350] ? __fget_light+0xea/0x270 [ 202.218849][ T8350] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 202.218881][ T8350] __x64_sys_sendmsg+0x132/0x220 [ 202.218907][ T8350] ? __sys_sendmsg+0x1b0/0x1b0 [ 202.218946][ T8350] ? syscall_enter_from_user_mode+0x21/0x70 [ 202.218984][ T8350] do_syscall_64+0x35/0xb0 [ 202.219010][ T8350] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 202.219036][ T8350] RIP: 0033:0x7f55bba89109 [ 202.219056][ T8350] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 202.219081][ T8350] RSP: 002b:00007f55bcbef168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 202.219105][ T8350] RAX: ffffffffffffffda RBX: 00007f55bbb9bf60 RCX: 00007f55bba89109 [ 202.219122][ T8350] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 202.219136][ T8350] RBP: 00007f55bcbef1d0 R08: 0000000000000000 R09: 0000000000000000 [ 202.219150][ T8350] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 202.219164][ T8350] R13: 00007ffd14a51aef R14: 00007f55bcbef300 R15: 0000000000022000 [ 202.219198][ T8350] [ 202.237730][ T8353] netlink: 1046 bytes leftover after parsing attributes in process `syz-executor.4'. [ 202.237756][ T8353] FAULT_INJECTION: forcing a failure. [ 202.237756][ T8353] name failslab, interval 1, probability 0, space 0, times 0 [ 202.237784][ T8353] CPU: 0 PID: 8353 Comm: syz-executor.4 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 202.237812][ T8353] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 202.237828][ T8353] Call Trace: [ 202.237834][ T8353] [ 202.237843][ T8353] dump_stack_lvl+0xcd/0x134 [ 202.237879][ T8353] should_fail.cold+0x5/0xa [ 202.237916][ T8353] should_failslab+0x5/0x10 [ 202.237944][ T8353] kmem_cache_alloc_node+0x65/0x3f0 [ 202.237972][ T8353] ? __alloc_skb+0x215/0x340 [ 202.238006][ T8353] __alloc_skb+0x215/0x340 [ 202.238041][ T8353] netlink_ack+0x1f0/0xa80 [ 202.238070][ T8353] ? netlink_sendmsg+0xe10/0xe10 [ 202.238096][ T8353] ? ref_tracker_dir_exit+0x3e0/0x3e0 [ 202.238135][ T8353] netlink_rcv_skb+0x33d/0x420 [ 202.238160][ T8353] ? rtnl_fdb_dump+0x9a0/0x9a0 [ 202.238193][ T8353] ? netlink_ack+0xa80/0xa80 [ 202.238214][ T8353] ? netlink_deliver_tap+0x1a2/0xc40 [ 202.238252][ T8353] ? netlink_deliver_tap+0x1b1/0xc40 [ 202.238293][ T8353] netlink_unicast+0x543/0x7f0 [ 202.238323][ T8353] ? netlink_attachskb+0x880/0x880 [ 202.238347][ T8353] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 202.238375][ T8353] ? __phys_addr_symbol+0x2c/0x70 [ 202.238405][ T8353] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 202.238430][ T8353] ? __check_object_size+0x353/0x7a0 [ 202.238468][ T8353] netlink_sendmsg+0x917/0xe10 [ 202.238506][ T8353] ? netlink_unicast+0x7f0/0x7f0 [ 202.238540][ T8353] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 202.238570][ T8353] ? netlink_unicast+0x7f0/0x7f0 [ 202.238597][ T8353] sock_sendmsg+0xcf/0x120 [ 202.238629][ T8353] ____sys_sendmsg+0x6eb/0x810 [ 202.238663][ T8353] ? kernel_sendmsg+0x50/0x50 [ 202.238692][ T8353] ? do_recvmmsg+0x6d0/0x6d0 [ 202.238716][ T8353] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 202.238765][ T8353] ? _parse_integer+0x30/0x30 [ 202.238803][ T8353] ___sys_sendmsg+0xf3/0x170 [ 202.238831][ T8353] ? sendmsg_copy_msghdr+0x160/0x160 [ 202.238863][ T8353] ? lock_downgrade+0x6e0/0x6e0 [ 202.238907][ T8353] ? __fget_files+0x286/0x470 [ 202.238944][ T8353] ? __fget_light+0xea/0x270 [ 202.238969][ T8353] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 202.239002][ T8353] __x64_sys_sendmsg+0x132/0x220 [ 202.239026][ T8353] ? __sys_sendmsg+0x1b0/0x1b0 [ 202.239065][ T8353] ? syscall_enter_from_user_mode+0x21/0x70 [ 202.239104][ T8353] do_syscall_64+0x35/0xb0 [ 202.239130][ T8353] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 202.239156][ T8353] RIP: 0033:0x7f7765489109 [ 202.239177][ T8353] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 202.239201][ T8353] RSP: 002b:00007f7766559168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 202.239226][ T8353] RAX: ffffffffffffffda RBX: 00007f776559bf60 RCX: 00007f7765489109 [ 202.239244][ T8353] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 202.239260][ T8353] RBP: 00007f77665591d0 R08: 0000000000000000 R09: 0000000000000000 [ 202.239277][ T8353] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 202.239291][ T8353] R13: 00007ffec1cb653f R14: 00007f7766559300 R15: 0000000000022000 [ 202.239325][ T8353] [ 202.344945][ T8358] FAULT_INJECTION: forcing a failure. [ 202.344945][ T8358] name failslab, interval 1, probability 0, space 0, times 0 [ 202.344986][ T8358] CPU: 1 PID: 8358 Comm: syz-executor.5 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 202.345014][ T8358] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 202.345031][ T8358] Call Trace: [ 202.345037][ T8358] [ 202.345045][ T8358] dump_stack_lvl+0xcd/0x134 [ 202.345076][ T8358] should_fail.cold+0x5/0xa [ 202.345112][ T8358] should_failslab+0x5/0x10 [ 202.345136][ T8358] kmem_cache_alloc_trace+0x60/0x3f0 [ 202.345163][ T8358] ? copy_verifier_state+0x827/0xb80 [ 202.345198][ T8358] copy_verifier_state+0x827/0xb80 [ 202.345235][ T8358] do_check_common+0x1c48/0xcfe0 [ 202.345259][ T8358] ? find_held_lock+0x2d/0x110 [ 202.345291][ T8358] ? debug_check_no_obj_freed+0x20c/0x420 [ 202.345338][ T8358] ? check_helper_call+0x8620/0x8620 [ 202.345371][ T8358] ? slab_free_freelist_hook+0x8b/0x1c0 [ 202.345399][ T8358] ? kvfree+0x42/0x50 [ 202.345422][ T8358] ? kfree+0xd6/0x4d0 [ 202.345445][ T8358] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 202.345471][ T8358] ? push_insn+0x220/0x530 [ 202.345500][ T8358] ? trace_hardirqs_on+0x38/0x1c0 [ 202.345535][ T8358] bpf_check+0x88a4/0xbbc0 [ 202.345582][ T8358] ? bpf_get_btf_vmlinux+0x10/0x10 [ 202.345613][ T8358] ? lock_downgrade+0x6e0/0x6e0 [ 202.345640][ T8358] ? __might_fault+0xd1/0x170 [ 202.345664][ T8358] ? lock_downgrade+0x6e0/0x6e0 [ 202.345703][ T8358] ? memset+0x20/0x40 [ 202.345725][ T8358] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 202.345751][ T8358] ? bpf_obj_name_cpy+0x144/0x1a0 [ 202.345779][ T8358] ? bpf_prog_load+0xf71/0x2250 [ 202.345808][ T8358] bpf_prog_load+0xfb2/0x2250 [ 202.345841][ T8358] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 202.345871][ T8358] ? find_held_lock+0x2d/0x110 [ 202.345902][ T8358] ? __might_fault+0xd1/0x170 [ 202.345925][ T8358] ? lock_downgrade+0x6e0/0x6e0 [ 202.345970][ T8358] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 202.346003][ T8358] __sys_bpf+0x11a1/0x5700 [ 202.346033][ T8358] ? bpf_perf_link_attach+0x520/0x520 [ 202.346062][ T8358] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 202.346103][ T8358] ? find_held_lock+0x2d/0x110 [ 202.346157][ T8358] ? trace_hardirqs_on+0x38/0x1c0 [ 202.346186][ T8358] __x64_sys_bpf+0x75/0xb0 [ 202.346212][ T8358] ? syscall_enter_from_user_mode+0x21/0x70 [ 202.346243][ T8358] do_syscall_64+0x35/0xb0 [ 202.346267][ T8358] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 202.346291][ T8358] RIP: 0033:0x7f2e16289109 [ 202.346310][ T8358] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 202.346333][ T8358] RSP: 002b:00007f2e1731f168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 202.346356][ T8358] RAX: ffffffffffffffda RBX: 00007f2e1639bf60 RCX: 00007f2e16289109 [ 202.346372][ T8358] RDX: 0000000000000080 RSI: 00000000200001c0 RDI: 0000000000000005 [ 202.346387][ T8358] RBP: 00007f2e1731f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 202.346402][ T8358] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 202.346416][ T8358] R13: 00007ffde7446a9f R14: 00007f2e1731f300 R15: 0000000000022000 [ 202.346446][ T8358] [ 202.394903][ T8363] FAULT_INJECTION: forcing a failure. [ 202.394903][ T8363] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 202.394937][ T8363] CPU: 1 PID: 8363 Comm: syz-executor.1 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 202.394972][ T8363] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 202.394987][ T8363] Call Trace: [ 202.394993][ T8363] [ 202.395002][ T8363] dump_stack_lvl+0xcd/0x134 [ 202.395033][ T8363] should_fail.cold+0x5/0xa [ 202.395071][ T8363] prepare_alloc_pages+0x17b/0x570 [ 202.395104][ T8363] __alloc_pages+0x12f/0x500 [ 202.395130][ T8363] ? __alloc_pages_slowpath.constprop.0+0x20e0/0x20e0 [ 202.395160][ T8363] ? __kmalloc_node+0x62/0x390 [ 202.395207][ T8363] alloc_pages+0x1aa/0x310 [ 202.395240][ T8363] __vmalloc_node_range+0x735/0x13e0 [ 202.395285][ T8363] ? netlink_sendmsg+0x690/0xe10 [ 202.395314][ T8363] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 202.395344][ T8363] ? vfree_atomic+0xe0/0xe0 [ 202.395375][ T8363] ? __netlink_dump_start+0x900/0x900 [ 202.395401][ T8363] ? netlink_sendmsg+0x690/0xe10 [ 202.395427][ T8363] vmalloc+0x67/0x80 [ 202.395454][ T8363] ? netlink_sendmsg+0x690/0xe10 [ 202.395482][ T8363] netlink_sendmsg+0x690/0xe10 [ 202.395510][ T8363] ? netlink_unicast+0x7f0/0x7f0 [ 202.395543][ T8363] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 202.395572][ T8363] ? netlink_unicast+0x7f0/0x7f0 [ 202.395594][ T8363] sock_sendmsg+0xcf/0x120 [ 202.395628][ T8363] ____sys_sendmsg+0x6eb/0x810 [ 202.395663][ T8363] ? kernel_sendmsg+0x50/0x50 [ 202.395691][ T8363] ? do_recvmmsg+0x6d0/0x6d0 [ 202.395715][ T8363] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 202.395750][ T8363] ? _parse_integer+0x30/0x30 [ 202.395788][ T8363] ___sys_sendmsg+0xf3/0x170 [ 202.395814][ T8363] ? sendmsg_copy_msghdr+0x160/0x160 [ 202.395845][ T8363] ? lock_downgrade+0x6e0/0x6e0 [ 202.395890][ T8363] ? __fget_files+0x286/0x470 [ 202.395927][ T8363] ? __fget_light+0xea/0x270 [ 202.395953][ T8363] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 202.395994][ T8363] __x64_sys_sendmsg+0x132/0x220 [ 202.396021][ T8363] ? __sys_sendmsg+0x1b0/0x1b0 [ 202.396063][ T8363] ? syscall_enter_from_user_mode+0x21/0x70 [ 202.396103][ T8363] do_syscall_64+0x35/0xb0 [ 202.396130][ T8363] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 202.396158][ T8363] RIP: 0033:0x7f55bba89109 [ 202.396178][ T8363] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 202.396204][ T8363] RSP: 002b:00007f55bcbef168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 202.396228][ T8363] RAX: ffffffffffffffda RBX: 00007f55bbb9bf60 RCX: 00007f55bba89109 [ 202.396247][ T8363] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 202.396263][ T8363] RBP: 00007f55bcbef1d0 R08: 0000000000000000 R09: 0000000000000000 [ 202.396280][ T8363] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 202.396297][ T8363] R13: 00007ffd14a51aef R14: 00007f55bcbef300 R15: 0000000000022000 [ 202.396334][ T8363] [ 202.406985][ T8364] netlink: 1046 bytes leftover after parsing attributes in process `syz-executor.4'. [ 202.407012][ T8364] FAULT_INJECTION: forcing a failure. [ 202.407012][ T8364] name failslab, interval 1, probability 0, space 0, times 0 [ 202.407041][ T8364] CPU: 0 PID: 8364 Comm: syz-executor.4 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 202.407071][ T8364] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 202.407087][ T8364] Call Trace: [ 202.407094][ T8364] [ 202.407103][ T8364] dump_stack_lvl+0xcd/0x134 [ 202.407136][ T8364] should_fail.cold+0x5/0xa [ 202.407174][ T8364] should_failslab+0x5/0x10 [ 202.407202][ T8364] kmem_cache_alloc_node+0x65/0x3f0 [ 202.407230][ T8364] ? __alloc_skb+0x215/0x340 [ 202.407266][ T8364] __alloc_skb+0x215/0x340 [ 202.407301][ T8364] netlink_ack+0x1f0/0xa80 [ 202.407331][ T8364] ? netlink_sendmsg+0xe10/0xe10 [ 202.407356][ T8364] ? ref_tracker_dir_exit+0x3e0/0x3e0 [ 202.407394][ T8364] netlink_rcv_skb+0x33d/0x420 [ 202.407419][ T8364] ? rtnl_fdb_dump+0x9a0/0x9a0 [ 202.407451][ T8364] ? netlink_ack+0xa80/0xa80 [ 202.407481][ T8364] ? netlink_deliver_tap+0x1a2/0xc40 [ 202.407519][ T8364] ? netlink_deliver_tap+0x1b1/0xc40 [ 202.407557][ T8364] netlink_unicast+0x543/0x7f0 [ 202.407585][ T8364] ? netlink_attachskb+0x880/0x880 [ 202.407607][ T8364] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 202.407634][ T8364] ? __phys_addr_symbol+0x2c/0x70 [ 202.407661][ T8364] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 202.407687][ T8364] ? __check_object_size+0x353/0x7a0 [ 202.407725][ T8364] netlink_sendmsg+0x917/0xe10 [ 202.407755][ T8364] ? netlink_unicast+0x7f0/0x7f0 [ 202.407787][ T8364] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 202.407819][ T8364] ? netlink_unicast+0x7f0/0x7f0 [ 202.407844][ T8364] sock_sendmsg+0xcf/0x120 [ 202.407876][ T8364] ____sys_sendmsg+0x6eb/0x810 [ 202.407909][ T8364] ? kernel_sendmsg+0x50/0x50 [ 202.407936][ T8364] ? do_recvmmsg+0x6d0/0x6d0 [ 202.407959][ T8364] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 202.407991][ T8364] ? _parse_integer+0x30/0x30 [ 202.408027][ T8364] ___sys_sendmsg+0xf3/0x170 [ 202.408054][ T8364] ? sendmsg_copy_msghdr+0x160/0x160 [ 202.408084][ T8364] ? lock_downgrade+0x6e0/0x6e0 [ 202.408128][ T8364] ? __fget_files+0x286/0x470 [ 202.408164][ T8364] ? __fget_light+0xea/0x270 [ 202.408189][ T8364] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 202.408222][ T8364] __x64_sys_sendmsg+0x132/0x220 [ 202.408248][ T8364] ? __sys_sendmsg+0x1b0/0x1b0 [ 202.408292][ T8364] ? syscall_enter_from_user_mode+0x21/0x70 [ 202.408333][ T8364] do_syscall_64+0x35/0xb0 [ 202.408360][ T8364] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 202.408386][ T8364] RIP: 0033:0x7f7765489109 [ 202.408407][ T8364] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 202.408432][ T8364] RSP: 002b:00007f7766559168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 202.408456][ T8364] RAX: ffffffffffffffda RBX: 00007f776559bf60 RCX: 00007f7765489109 [ 202.408480][ T8364] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 202.408496][ T8364] RBP: 00007f77665591d0 R08: 0000000000000000 R09: 0000000000000000 [ 202.408514][ T8364] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 202.408531][ T8364] R13: 00007ffec1cb653f R14: 00007f7766559300 R15: 0000000000022000 [ 202.408565][ T8364] [ 202.527225][ T8370] FAULT_INJECTION: forcing a failure. [ 202.527225][ T8370] name failslab, interval 1, probability 0, space 0, times 0 [ 202.527260][ T8370] CPU: 0 PID: 8370 Comm: syz-executor.5 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 202.527291][ T8370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 202.527305][ T8370] Call Trace: [ 202.527312][ T8370] [ 202.527322][ T8370] dump_stack_lvl+0xcd/0x134 [ 202.527356][ T8370] should_fail.cold+0x5/0xa [ 202.527394][ T8370] should_failslab+0x5/0x10 [ 202.527422][ T8370] kmem_cache_alloc_trace+0x60/0x3f0 [ 202.527450][ T8370] ? copy_verifier_state+0x827/0xb80 [ 202.527485][ T8370] copy_verifier_state+0x827/0xb80 [ 202.527526][ T8370] do_check_common+0x1c48/0xcfe0 [ 202.527552][ T8370] ? find_held_lock+0x2d/0x110 [ 202.527587][ T8370] ? debug_check_no_obj_freed+0x20c/0x420 [ 202.527636][ T8370] ? check_helper_call+0x8620/0x8620 [ 202.527670][ T8370] ? slab_free_freelist_hook+0x8b/0x1c0 [ 202.527699][ T8370] ? kvfree+0x42/0x50 [ 202.527724][ T8370] ? kfree+0xd6/0x4d0 [ 202.527748][ T8370] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 202.527775][ T8370] ? push_insn+0x220/0x530 [ 202.527804][ T8370] ? trace_hardirqs_on+0x38/0x1c0 [ 202.527833][ T8370] bpf_check+0x88a4/0xbbc0 [ 202.527879][ T8370] ? bpf_get_btf_vmlinux+0x10/0x10 [ 202.527912][ T8370] ? lock_downgrade+0x6e0/0x6e0 [ 202.527940][ T8370] ? __might_fault+0xd1/0x170 [ 202.527965][ T8370] ? lock_downgrade+0x6e0/0x6e0 [ 202.528015][ T8370] ? memset+0x20/0x40 [ 202.528039][ T8370] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 202.528067][ T8370] ? bpf_obj_name_cpy+0x144/0x1a0 [ 202.528097][ T8370] ? bpf_prog_load+0xf71/0x2250 [ 202.528128][ T8370] bpf_prog_load+0xfb2/0x2250 [ 202.528164][ T8370] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 202.528195][ T8370] ? find_held_lock+0x2d/0x110 [ 202.528227][ T8370] ? __might_fault+0xd1/0x170 [ 202.528253][ T8370] ? lock_downgrade+0x6e0/0x6e0 [ 202.528294][ T8370] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 202.528328][ T8370] __sys_bpf+0x11a1/0x5700 [ 202.528360][ T8370] ? bpf_perf_link_attach+0x520/0x520 [ 202.528390][ T8370] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 202.528433][ T8370] ? find_held_lock+0x2d/0x110 [ 202.528487][ T8370] ? trace_hardirqs_on+0x38/0x1c0 [ 202.528518][ T8370] __x64_sys_bpf+0x75/0xb0 [ 202.528546][ T8370] ? syscall_enter_from_user_mode+0x21/0x70 [ 202.528579][ T8370] do_syscall_64+0x35/0xb0 [ 202.528606][ T8370] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 202.528633][ T8370] RIP: 0033:0x7f2e16289109 [ 202.528654][ T8370] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 202.528680][ T8370] RSP: 002b:00007f2e1731f168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 202.528707][ T8370] RAX: ffffffffffffffda RBX: 00007f2e1639bf60 RCX: 00007f2e16289109 [ 202.528725][ T8370] RDX: 0000000000000080 RSI: 00000000200001c0 RDI: 0000000000000005 [ 202.528741][ T8370] RBP: 00007f2e1731f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 202.528756][ T8370] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 202.528772][ T8370] R13: 00007ffde7446a9f R14: 00007f2e1731f300 R15: 0000000000022000 [ 202.528806][ T8370] [ 203.109306][ T8378] FAULT_INJECTION: forcing a failure. [ 203.109306][ T8378] name failslab, interval 1, probability 0, space 0, times 0 [ 203.109341][ T8378] CPU: 0 PID: 8378 Comm: syz-executor.5 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 203.109371][ T8378] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 203.109385][ T8378] Call Trace: [ 203.109393][ T8378] [ 203.109402][ T8378] dump_stack_lvl+0xcd/0x134 [ 203.109436][ T8378] should_fail.cold+0x5/0xa [ 203.109473][ T8378] should_failslab+0x5/0x10 [ 203.109501][ T8378] kmem_cache_alloc_trace+0x60/0x3f0 [ 203.109530][ T8378] ? do_check_common+0x1af9/0xcfe0 [ 203.109564][ T8378] do_check_common+0x1af9/0xcfe0 [ 203.109591][ T8378] ? find_held_lock+0x2d/0x110 [ 203.109624][ T8378] ? debug_check_no_obj_freed+0x20c/0x420 [ 203.109675][ T8378] ? check_helper_call+0x8620/0x8620 [ 203.109710][ T8378] ? slab_free_freelist_hook+0x8b/0x1c0 [ 203.109740][ T8378] ? kvfree+0x42/0x50 [ 203.109765][ T8378] ? kfree+0xd6/0x4d0 [ 203.109786][ T8378] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 203.109813][ T8378] ? push_insn+0x220/0x530 [ 203.109844][ T8378] ? trace_hardirqs_on+0x38/0x1c0 [ 203.109874][ T8378] bpf_check+0x88a4/0xbbc0 [ 203.109932][ T8378] ? bpf_get_btf_vmlinux+0x10/0x10 [ 203.109965][ T8378] ? lock_downgrade+0x6e0/0x6e0 [ 203.109992][ T8378] ? __might_fault+0xd1/0x170 [ 203.110016][ T8378] ? lock_downgrade+0x6e0/0x6e0 [ 203.110054][ T8378] ? memset+0x20/0x40 [ 203.110074][ T8378] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 203.110102][ T8378] ? bpf_obj_name_cpy+0x144/0x1a0 [ 203.110130][ T8378] ? bpf_prog_load+0xf71/0x2250 [ 203.110160][ T8378] bpf_prog_load+0xfb2/0x2250 [ 203.110196][ T8378] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 203.110225][ T8378] ? find_held_lock+0x2d/0x110 [ 203.110257][ T8378] ? __might_fault+0xd1/0x170 [ 203.110282][ T8378] ? lock_downgrade+0x6e0/0x6e0 [ 203.110324][ T8378] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 203.110357][ T8378] __sys_bpf+0x11a1/0x5700 [ 203.110390][ T8378] ? bpf_perf_link_attach+0x520/0x520 [ 203.110419][ T8378] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 203.110461][ T8378] ? find_held_lock+0x2d/0x110 [ 203.110517][ T8378] ? trace_hardirqs_on+0x38/0x1c0 [ 203.110545][ T8378] __x64_sys_bpf+0x75/0xb0 [ 203.110572][ T8378] ? syscall_enter_from_user_mode+0x21/0x70 [ 203.110607][ T8378] do_syscall_64+0x35/0xb0 [ 203.110632][ T8378] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 203.110658][ T8378] RIP: 0033:0x7f2e16289109 [ 203.110679][ T8378] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 203.110704][ T8378] RSP: 002b:00007f2e1731f168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 203.110730][ T8378] RAX: ffffffffffffffda RBX: 00007f2e1639bf60 RCX: 00007f2e16289109 [ 203.110749][ T8378] RDX: 0000000000000080 RSI: 00000000200001c0 RDI: 0000000000000005 [ 203.110765][ T8378] RBP: 00007f2e1731f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 203.110782][ T8378] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 203.110798][ T8378] R13: 00007ffde7446a9f R14: 00007f2e1731f300 R15: 0000000000022000 [ 203.110832][ T8378] [ 203.112971][ T8376] FAULT_INJECTION: forcing a failure. [ 203.112971][ T8376] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 203.113002][ T8376] CPU: 0 PID: 8376 Comm: syz-executor.1 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 203.113029][ T8376] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 203.113043][ T8376] Call Trace: [ 203.113050][ T8376] [ 203.113058][ T8376] dump_stack_lvl+0xcd/0x134 [ 203.113095][ T8376] should_fail.cold+0x5/0xa [ 203.113133][ T8376] prepare_alloc_pages+0x17b/0x570 [ 203.113165][ T8376] __alloc_pages+0x12f/0x500 [ 203.113193][ T8376] ? __alloc_pages_slowpath.constprop.0+0x20e0/0x20e0 [ 203.113246][ T8376] alloc_pages+0x1aa/0x310 [ 203.113280][ T8376] __vmalloc_node_range+0x735/0x13e0 [ 203.113325][ T8376] ? netlink_sendmsg+0x690/0xe10 [ 203.113353][ T8376] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 203.113382][ T8376] ? vfree_atomic+0xe0/0xe0 [ 203.113412][ T8376] ? __netlink_dump_start+0x900/0x900 [ 203.113438][ T8376] ? netlink_sendmsg+0x690/0xe10 [ 203.113464][ T8376] vmalloc+0x67/0x80 [ 203.113492][ T8376] ? netlink_sendmsg+0x690/0xe10 [ 203.113517][ T8376] netlink_sendmsg+0x690/0xe10 [ 203.113547][ T8376] ? netlink_unicast+0x7f0/0x7f0 [ 203.113579][ T8376] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 203.113610][ T8376] ? netlink_unicast+0x7f0/0x7f0 [ 203.113634][ T8376] sock_sendmsg+0xcf/0x120 [ 203.113665][ T8376] ____sys_sendmsg+0x6eb/0x810 [ 203.113699][ T8376] ? kernel_sendmsg+0x50/0x50 [ 203.113726][ T8376] ? do_recvmmsg+0x6d0/0x6d0 [ 203.113751][ T8376] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 203.113785][ T8376] ? _parse_integer+0x30/0x30 [ 203.113822][ T8376] ___sys_sendmsg+0xf3/0x170 [ 203.113847][ T8376] ? sendmsg_copy_msghdr+0x160/0x160 [ 203.113898][ T8376] ? lock_downgrade+0x6e0/0x6e0 [ 203.113942][ T8376] ? __fget_files+0x286/0x470 [ 203.113980][ T8376] ? __fget_light+0xea/0x270 [ 203.114002][ T8376] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 203.114035][ T8376] __x64_sys_sendmsg+0x132/0x220 [ 203.114061][ T8376] ? __sys_sendmsg+0x1b0/0x1b0 [ 203.114100][ T8376] ? syscall_enter_from_user_mode+0x21/0x70 [ 203.114139][ T8376] do_syscall_64+0x35/0xb0 [ 203.114165][ T8376] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 203.114191][ T8376] RIP: 0033:0x7f55bba89109 [ 203.114211][ T8376] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 203.114236][ T8376] RSP: 002b:00007f55bcbef168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 203.114261][ T8376] RAX: ffffffffffffffda RBX: 00007f55bbb9bf60 RCX: 00007f55bba89109 [ 203.114279][ T8376] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 203.114294][ T8376] RBP: 00007f55bcbef1d0 R08: 0000000000000000 R09: 0000000000000000 [ 203.114309][ T8376] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 203.114323][ T8376] R13: 00007ffd14a51aef R14: 00007f55bcbef300 R15: 0000000000022000 [ 203.114356][ T8376] [ 203.163882][ T8380] netlink: 1046 bytes leftover after parsing attributes in process `syz-executor.4'. [ 203.163910][ T8380] FAULT_INJECTION: forcing a failure. [ 203.163910][ T8380] name failslab, interval 1, probability 0, space 0, times 0 [ 203.163941][ T8380] CPU: 1 PID: 8380 Comm: syz-executor.4 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 203.163970][ T8380] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 203.163985][ T8380] Call Trace: [ 203.163991][ T8380] [ 203.164001][ T8380] dump_stack_lvl+0xcd/0x134 [ 203.164034][ T8380] should_fail.cold+0x5/0xa [ 203.164071][ T8380] should_failslab+0x5/0x10 [ 203.164097][ T8380] kmem_cache_alloc_node+0x65/0x3f0 [ 203.164123][ T8380] ? __alloc_skb+0x215/0x340 [ 203.164157][ T8380] __alloc_skb+0x215/0x340 [ 203.164192][ T8380] netlink_ack+0x1f0/0xa80 [ 203.164222][ T8380] ? netlink_sendmsg+0xe10/0xe10 [ 203.164247][ T8380] ? _raw_spin_unlock_irqrestore+0x50/0x70 [ 203.164282][ T8380] ? lockdep_hardirqs_on+0x79/0x100 [ 203.164317][ T8380] netlink_rcv_skb+0x33d/0x420 [ 203.164343][ T8380] ? rtnl_fdb_dump+0x9a0/0x9a0 [ 203.164375][ T8380] ? netlink_ack+0xa80/0xa80 [ 203.164406][ T8380] ? netlink_deliver_tap+0x1a2/0xc40 [ 203.164446][ T8380] ? netlink_deliver_tap+0x1b1/0xc40 [ 203.164488][ T8380] netlink_unicast+0x543/0x7f0 [ 203.164518][ T8380] ? netlink_attachskb+0x880/0x880 [ 203.164542][ T8380] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 203.164568][ T8380] ? __phys_addr_symbol+0x2c/0x70 [ 203.164596][ T8380] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 203.164622][ T8380] ? __check_object_size+0x353/0x7a0 [ 203.164657][ T8380] netlink_sendmsg+0x917/0xe10 [ 203.164685][ T8380] ? netlink_unicast+0x7f0/0x7f0 [ 203.164716][ T8380] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 203.164750][ T8380] ? netlink_unicast+0x7f0/0x7f0 [ 203.164777][ T8380] sock_sendmsg+0xcf/0x120 [ 203.164811][ T8380] ____sys_sendmsg+0x6eb/0x810 [ 203.164844][ T8380] ? kernel_sendmsg+0x50/0x50 [ 203.164871][ T8380] ? do_recvmmsg+0x6d0/0x6d0 [ 203.164894][ T8380] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 203.164942][ T8380] ___sys_sendmsg+0xf3/0x170 [ 203.164968][ T8380] ? sendmsg_copy_msghdr+0x160/0x160 [ 203.164999][ T8380] ? lock_downgrade+0x6e0/0x6e0 [ 203.165026][ T8380] ? finish_task_switch.isra.0+0x319/0xb80 [ 203.165071][ T8380] ? __fget_files+0x286/0x470 [ 203.165104][ T8380] ? __fget_light+0xea/0x270 [ 203.165130][ T8380] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 203.165165][ T8380] __x64_sys_sendmsg+0x132/0x220 [ 203.165191][ T8380] ? __sys_sendmsg+0x1b0/0x1b0 [ 203.165215][ T8380] ? lockdep_hardirqs_on+0x79/0x100 [ 203.165258][ T8380] ? syscall_enter_from_user_mode+0x2b/0x70 [ 203.165295][ T8380] do_syscall_64+0x35/0xb0 [ 203.165321][ T8380] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 203.165347][ T8380] RIP: 0033:0x7f7765489109 [ 203.165367][ T8380] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 203.165401][ T8380] RSP: 002b:00007f7766559168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 203.165427][ T8380] RAX: ffffffffffffffda RBX: 00007f776559bf60 RCX: 00007f7765489109 [ 203.165445][ T8380] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 203.165461][ T8380] RBP: 00007f77665591d0 R08: 0000000000000000 R09: 0000000000000000 [ 203.165476][ T8380] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 203.165490][ T8380] R13: 00007ffec1cb653f R14: 00007f7766559300 R15: 0000000000022000 [ 203.165522][ T8380] [ 203.309298][ T8387] FAULT_INJECTION: forcing a failure. [ 203.309298][ T8387] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 203.309333][ T8387] CPU: 1 PID: 8387 Comm: syz-executor.1 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 203.309362][ T8387] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 203.309383][ T8387] Call Trace: [ 203.309390][ T8387] [ 203.309398][ T8387] dump_stack_lvl+0xcd/0x134 [ 203.309431][ T8387] should_fail.cold+0x5/0xa [ 203.309468][ T8387] prepare_alloc_pages+0x17b/0x570 [ 203.309500][ T8387] __alloc_pages+0x12f/0x500 [ 203.309524][ T8387] ? __alloc_pages_slowpath.constprop.0+0x20e0/0x20e0 [ 203.309552][ T8387] ? __kmalloc_node+0x62/0x390 [ 203.309595][ T8387] alloc_pages+0x1aa/0x310 [ 203.309626][ T8387] __vmalloc_node_range+0x735/0x13e0 [ 203.309668][ T8387] ? netlink_sendmsg+0x690/0xe10 [ 203.309696][ T8387] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 203.309724][ T8387] ? vfree_atomic+0xe0/0xe0 [ 203.309753][ T8387] ? __netlink_dump_start+0x900/0x900 [ 203.309777][ T8387] ? netlink_sendmsg+0x690/0xe10 [ 203.309803][ T8387] vmalloc+0x67/0x80 [ 203.309828][ T8387] ? netlink_sendmsg+0x690/0xe10 [ 203.309852][ T8387] netlink_sendmsg+0x690/0xe10 [ 203.309880][ T8387] ? netlink_unicast+0x7f0/0x7f0 [ 203.309910][ T8387] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 203.309938][ T8387] ? netlink_unicast+0x7f0/0x7f0 [ 203.309962][ T8387] sock_sendmsg+0xcf/0x120 [ 203.309994][ T8387] ____sys_sendmsg+0x6eb/0x810 [ 203.310026][ T8387] ? kernel_sendmsg+0x50/0x50 [ 203.310053][ T8387] ? do_recvmmsg+0x6d0/0x6d0 [ 203.310077][ T8387] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 203.310110][ T8387] ? _parse_integer+0x30/0x30 [ 203.310146][ T8387] ___sys_sendmsg+0xf3/0x170 [ 203.310176][ T8387] ? sendmsg_copy_msghdr+0x160/0x160 [ 203.310206][ T8387] ? lock_downgrade+0x6e0/0x6e0 [ 203.310247][ T8387] ? __fget_files+0x286/0x470 [ 203.310281][ T8387] ? __fget_light+0xea/0x270 [ 203.310307][ T8387] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 203.310341][ T8387] __x64_sys_sendmsg+0x132/0x220 [ 203.310365][ T8387] ? __sys_sendmsg+0x1b0/0x1b0 [ 203.310410][ T8387] ? syscall_enter_from_user_mode+0x21/0x70 [ 203.310447][ T8387] do_syscall_64+0x35/0xb0 [ 203.310472][ T8387] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 203.310497][ T8387] RIP: 0033:0x7f55bba89109 [ 203.310517][ T8387] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 203.310543][ T8387] RSP: 002b:00007f55bcbef168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 203.310568][ T8387] RAX: ffffffffffffffda RBX: 00007f55bbb9bf60 RCX: 00007f55bba89109 [ 203.310585][ T8387] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 203.310601][ T8387] RBP: 00007f55bcbef1d0 R08: 0000000000000000 R09: 0000000000000000 [ 203.310616][ T8387] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 203.310631][ T8387] R13: 00007ffd14a51aef R14: 00007f55bcbef300 R15: 0000000000022000 [ 203.310664][ T8387] [ 203.327663][ T8390] netlink: 1046 bytes leftover after parsing attributes in process `syz-executor.4'. [ 203.327709][ T8390] FAULT_INJECTION: forcing a failure. [ 203.327709][ T8390] name failslab, interval 1, probability 0, space 0, times 0 [ 203.327739][ T8390] CPU: 0 PID: 8390 Comm: syz-executor.4 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 203.327766][ T8390] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 203.327782][ T8390] Call Trace: [ 203.327788][ T8390] [ 203.327798][ T8390] dump_stack_lvl+0xcd/0x134 [ 203.327833][ T8390] should_fail.cold+0x5/0xa [ 203.327887][ T8390] ? skb_clone+0x170/0x3c0 [ 203.327916][ T8390] should_failslab+0x5/0x10 [ 203.327947][ T8390] kmem_cache_alloc+0x5e/0x3b0 [ 203.327986][ T8390] skb_clone+0x170/0x3c0 [ 203.328014][ T8390] netlink_deliver_tap+0xa8a/0xc40 [ 203.328047][ T8390] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 203.328083][ T8390] netlink_unicast+0x6ac/0x7f0 [ 203.328113][ T8390] ? netlink_attachskb+0x880/0x880 [ 203.328138][ T8390] ? memset+0x20/0x40 [ 203.328160][ T8390] ? __nlmsg_put+0x155/0x1c0 [ 203.328191][ T8390] netlink_ack+0x5cd/0xa80 [ 203.328218][ T8390] ? netlink_sendmsg+0xe10/0xe10 [ 203.328242][ T8390] ? _raw_spin_unlock_irqrestore+0x50/0x70 [ 203.328274][ T8390] ? lockdep_hardirqs_on+0x79/0x100 [ 203.328310][ T8390] netlink_rcv_skb+0x33d/0x420 [ 203.328337][ T8390] ? rtnl_fdb_dump+0x9a0/0x9a0 23:06:45 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}}, 0x0, 0x6, 0xffffffffffffffff, 0x0) r1 = gettid() r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x10001}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x9, 0x0, 0x0, 0xfffffffc}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(r0, &(0x7f0000000300)='blkio.bfq.io_serviced\x00', 0x0, 0x0) r4 = openat$cgroup(r3, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000200), 0x1}, 0x0, 0x1000, 0x7, 0x3, 0x0, 0xfffffffe, 0x5, 0x0, 0x8, 0x0, 0xfffffffffffffff7}, r4, 0x0, r2, 0x0) r5 = perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6098}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r2) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0xff, 0x1f, 0x5, 0x7, 0x0, 0x7, 0x1a19, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x233a, 0x0, @perf_bp={&(0x7f0000000040), 0x4}, 0x5a420, 0x13b8, 0x9, 0x2, 0x7f, 0x2, 0x5, 0x0, 0x6, 0x0, 0x80000000}, r1, 0xc, r5, 0x8) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) openat$cgroup_ro(r6, &(0x7f00000004c0)='blkio.bfq.io_service_time\x00', 0x0, 0x0) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) perf_event_open(&(0x7f0000000580)={0x0, 0x80, 0x5, 0xff, 0x1, 0xfa, 0x0, 0x8, 0xc0020, 0x4, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x2, @perf_bp={&(0x7f0000000400), 0xc0df755a24f2547b}, 0x10, 0x3, 0x80000000, 0x9, 0x8001, 0x7ff, 0x9, 0x0, 0x0, 0x0, 0x7fffffff}, r1, 0x6, r6, 0x7) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000004c0)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.swap.events\x00', 0x0, 0x0) r9 = bpf$ITER_CREATE(0x21, 0x0, 0x39) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000003c0)={@map=r8, r9, 0x1b, 0x1, r8}, 0x14) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x44100000, 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:45 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000800180081064e81f782db4cb904021d080004007c03e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) 23:06:45 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0405005500810ce00f80ecdb4cb9f207c804a011000000020006fb0a0002000a0ada1b40d805001100c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) 23:06:45 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (fail_nth: 55) 23:06:45 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002c000505d25a80308c63940d0c35fc60100006400a13400b053582c137153e37080c188004ac0f00d1bd", 0x33fe0}], 0x1}, 0x0) (fail_nth: 55) 23:06:45 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000c00180081064e81f782db4cb9040a1d080004007c09e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) [ 203.328370][ T8390] ? netlink_ack+0xa80/0xa80 [ 203.328391][ T8390] ? netlink_deliver_tap+0x1a2/0xc40 [ 203.328428][ T8390] ? netlink_deliver_tap+0x1b1/0xc40 [ 203.328468][ T8390] netlink_unicast+0x543/0x7f0 23:06:45 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002c000505d25a80308c63940d0c35fc60100006400a13400b053582c137153e37080c188004ac0f00d1bd", 0x33fe0}], 0x1}, 0x0) (fail_nth: 56) 23:06:45 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000900180081064e81f782db4cb904021d080004007c03e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) [ 203.328503][ T8390] ? netlink_attachskb+0x880/0x880 23:06:45 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0406005500810ce00f80ecdb4cb9f207c804a011000000020006fb0a0002000a0ada1b40d805001100c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) 23:06:45 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000e00180081064e81f782db4cb9040a1d080004007c09e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) 23:06:45 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (fail_nth: 56) [ 203.328528][ T8390] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 203.328558][ T8390] ? __phys_addr_symbol+0x2c/0x70 23:06:45 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000a00180081064e81f782db4cb904021d080004007c03e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) [ 203.328588][ T8390] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 203.328614][ T8390] ? __check_object_size+0x353/0x7a0 [ 203.328652][ T8390] netlink_sendmsg+0x917/0xe10 [ 203.328684][ T8390] ? netlink_unicast+0x7f0/0x7f0 [ 203.328717][ T8390] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 203.328748][ T8390] ? netlink_unicast+0x7f0/0x7f0 [ 203.328773][ T8390] sock_sendmsg+0xcf/0x120 [ 203.328804][ T8390] ____sys_sendmsg+0x6eb/0x810 [ 203.328835][ T8390] ? kernel_sendmsg+0x50/0x50 [ 203.328863][ T8390] ? do_recvmmsg+0x6d0/0x6d0 [ 203.328897][ T8390] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 203.328935][ T8390] ? _parse_integer+0x30/0x30 [ 203.328974][ T8390] ___sys_sendmsg+0xf3/0x170 [ 203.329002][ T8390] ? sendmsg_copy_msghdr+0x160/0x160 [ 203.329034][ T8390] ? lock_downgrade+0x6e0/0x6e0 [ 203.329081][ T8390] ? __fget_files+0x286/0x470 [ 203.329120][ T8390] ? __fget_light+0xea/0x270 [ 203.329148][ T8390] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 203.329182][ T8390] __x64_sys_sendmsg+0x132/0x220 [ 203.329208][ T8390] ? __sys_sendmsg+0x1b0/0x1b0 [ 203.329247][ T8390] ? syscall_enter_from_user_mode+0x21/0x70 [ 203.329288][ T8390] do_syscall_64+0x35/0xb0 [ 203.329316][ T8390] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 203.329343][ T8390] RIP: 0033:0x7f7765489109 23:06:45 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0500005500810ce00f80ecdb4cb9f207c804a011000000020006fb0a0002000a0ada1b40d805001100c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) 23:06:45 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002c000505d25a80308c63940d0c35fc60100006400a13400b053582c137153e37080c188004ac0f00d1bd", 0x33fe0}], 0x1}, 0x0) (fail_nth: 57) 23:06:45 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0407005500810ce00f80ecdb4cb9f207c804a011000000020006fb0a0002000a0ada1b40d805001100c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) 23:06:45 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000f00180081064e81f782db4cb9040a1d080004007c09e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) 23:06:45 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (fail_nth: 57) 23:06:45 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000c00180081064e81f782db4cb904021d080004007c03e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) [ 203.329365][ T8390] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 23:06:45 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002c000505d25a80308c63940d0c35fc60100006400a13400b053582c137153e37080c188004ac0f00d1bd", 0x33fe0}], 0x1}, 0x0) (fail_nth: 58) 23:06:45 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (fail_nth: 58) 23:06:45 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0408005500810ce00f80ecdb4cb9f207c804a011000000020006fb0a0002000a0ada1b40d805001100c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) 23:06:45 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8001000180081064e81f782db4cb9040a1d080004007c09e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) 23:06:45 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000e00180081064e81f782db4cb904021d080004007c03e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) [ 203.329391][ T8390] RSP: 002b:00007f7766559168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 23:06:45 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000012008140ec6c1fecff0e00fa0a8b25db4cb904e473730e5591f978450e001d00090040005e510befccd7", 0x2e}], 0x1, 0x0, 0x0, 0x88a8ffff00000000}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000300)=@name={0x1e, 0x2, 0x3, {{0x2, 0x4}, 0x2}}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000340)="85609666c6c5fd7841ba40bbb4a6ba4794dd6e91eedf911c458f7bbbbea5529225407869458c90cf52185afb1ec6cda68cb68f339232dc0a0a3e300a242beadc5f1937c9e36d6bd87462403f65bdfe031df2e23ba39e8ad7480ce134dc24fcf9e79780825f3c2ee6b5cf40c9d5b4915d6fa7471ef9cda35ea19e1d594fb1bf55c03fa56a", 0x84}, {&(0x7f0000000400)="a566dd30af7b6095158ff847af07d992ce2206970d730f123c36eaa47b2e35f48ba9a9f49da67e2d4cdcf33ce51cf42de67bae3c4e0eba18d85a5724cb0e7d85d5cf7842a584c39e2e117c5b4969768e5d212f9bc9c21ff1068125b447abbc7f09293b2ca94fd99b94494000a72b2ff3d7e16eecbbde", 0x76}, {&(0x7f0000000480)="372b84aaf9c155e080c1b19007f12e1336e0052eb69f", 0x16}, {&(0x7f00000004c0)="77177b20aef4e9f65ade35c3b35774a789c5b0ced09ad9fea1ca0c0dedc6af7d13964df8691acddd21341784d29ce3b59bc63b69e99d", 0x36}, {&(0x7f0000000500)="7bd810bc27ffa61b636d48c0d55418ce9f4e6c17fc648d926719533d4561fa9841a4049492f3ea1224f33ba862de89959a7d6ec415d1bec8320c4f8d9b8a119f3e0950a40db02a45ef88", 0x4a}], 0x5, 0x0, 0x0, 0x4010}, 0xc0) socketpair(0x6, 0x2, 0x81, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001780)={r2, 0x20, &(0x7f0000001740)={&(0x7f0000000640)=""/4096, 0x1000, 0x0, &(0x7f0000001640)=""/231, 0xe7}}, 0x10) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x6, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x1ff}, [@alu={0x4, 0x1, 0xa, 0x0, 0x7, 0x4, 0xfffffffffffffff8}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @ldst={0x3, 0x2, 0x1, 0x4, 0x0, 0x4, 0x10}]}, &(0x7f0000000140)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x7, 0x2}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0xd, 0x0, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000200)=[0xffffffffffffffff]}, 0x80) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000002c0)=r3, 0x4) 23:06:45 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8006000180081064e81f782db4cb9040a1d080004007c09e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) 23:06:45 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0409005500810ce00f80ecdb4cb9f207c804a011000000020006fb0a0002000a0ada1b40d805001100c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) 23:06:45 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002c000505d25a80308c63940d0c35fc60100006400a13400b053582c137153e37080c188004ac0f00d1bd", 0x33fe0}], 0x1}, 0x0) (fail_nth: 59) [ 203.329417][ T8390] RAX: ffffffffffffffda RBX: 00007f776559bf60 RCX: 00007f7765489109 [ 203.329436][ T8390] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 23:06:45 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8000f00180081064e81f782db4cb904021d080004007c03e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) [ 203.329454][ T8390] RBP: 00007f77665591d0 R08: 0000000000000000 R09: 0000000000000000 [ 203.329472][ T8390] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 23:06:46 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d800f000180081064e81f782db4cb9040a1d080004007c09e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) 23:06:46 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000012008140ec6c1fecff0e00fa0a8b25db4cb904e473730e5591f978450e001d00090040005e510befccd7", 0x2e}], 0x1, 0x0, 0x0, 0x88a8ffff00000000}, 0x0) (async) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000300)=@name={0x1e, 0x2, 0x3, {{0x2, 0x4}, 0x2}}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000340)="85609666c6c5fd7841ba40bbb4a6ba4794dd6e91eedf911c458f7bbbbea5529225407869458c90cf52185afb1ec6cda68cb68f339232dc0a0a3e300a242beadc5f1937c9e36d6bd87462403f65bdfe031df2e23ba39e8ad7480ce134dc24fcf9e79780825f3c2ee6b5cf40c9d5b4915d6fa7471ef9cda35ea19e1d594fb1bf55c03fa56a", 0x84}, {&(0x7f0000000400)="a566dd30af7b6095158ff847af07d992ce2206970d730f123c36eaa47b2e35f48ba9a9f49da67e2d4cdcf33ce51cf42de67bae3c4e0eba18d85a5724cb0e7d85d5cf7842a584c39e2e117c5b4969768e5d212f9bc9c21ff1068125b447abbc7f09293b2ca94fd99b94494000a72b2ff3d7e16eecbbde", 0x76}, {&(0x7f0000000480)="372b84aaf9c155e080c1b19007f12e1336e0052eb69f", 0x16}, {&(0x7f00000004c0)="77177b20aef4e9f65ade35c3b35774a789c5b0ced09ad9fea1ca0c0dedc6af7d13964df8691acddd21341784d29ce3b59bc63b69e99d", 0x36}, {&(0x7f0000000500)="7bd810bc27ffa61b636d48c0d55418ce9f4e6c17fc648d926719533d4561fa9841a4049492f3ea1224f33ba862de89959a7d6ec415d1bec8320c4f8d9b8a119f3e0950a40db02a45ef88", 0x4a}], 0x5, 0x0, 0x0, 0x4010}, 0xc0) socketpair(0x6, 0x2, 0x81, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) (async, rerun: 64) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001780)={r2, 0x20, &(0x7f0000001740)={&(0x7f0000000640)=""/4096, 0x1000, 0x0, &(0x7f0000001640)=""/231, 0xe7}}, 0x10) (async, rerun: 64) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x6, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x1ff}, [@alu={0x4, 0x1, 0xa, 0x0, 0x7, 0x4, 0xfffffffffffffff8}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @ldst={0x3, 0x2, 0x1, 0x4, 0x0, 0x4, 0x10}]}, &(0x7f0000000140)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x7, 0x2}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0xd, 0x0, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000200)=[0xffffffffffffffff]}, 0x80) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000002c0)=r3, 0x4) 23:06:46 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="2e040a005500810ce00f80ecdb4cb9f207c804a011000000020006fb0a0002000a0ada1b40d805001100c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) [ 203.329488][ T8390] R13: 00007ffec1cb653f R14: 00007f7766559300 R15: 0000000000022000 23:06:46 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x7, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, @exit, @call={0x85, 0x0, 0x0, 0x76}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xa2, &(0x7f0000000240)=""/162, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (fail_nth: 59) 23:06:46 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002c000505d25a80308c63940d0c35fc60100006400a13400b053582c137153e37080c188004ac0f00d1bd", 0x33fe0}], 0x1}, 0x0) (fail_nth: 60) 23:06:46 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x90f, &(0x7f0000000180)=[{&(0x7f0000000300)="d8001000180081064e81f782db4cb904021d080004007c03e8fe55a1090015000800142603000e120800060000000001a800160004000410e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) [ 203.329527][ T8390] [ 203.341525][ T8391] FAULT_INJECTION: forcing a failure. [ 203.341525][ T8391] name failslab, interval 1, probability 0, space 0, times 0 [ 203.341559][ T8391] CPU: 1 PID: 8391 Comm: syz-executor.5 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 203.341559][ T8391] CPU: 1 PID: 8391 Comm: syz-executor.5 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 203.341589][ T8391] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 203.341606][ T8391] Call Trace: [ 203.341613][ T8391] [ 203.341622][ T8391] dump_stack_lvl+0xcd/0x134 [ 203.341655][ T8391] should_fail.cold+0x5/0xa [ 203.341692][ T8391] should_failslab+0x5/0x10 [ 203.341719][ T8391] kmem_cache_alloc_trace+0x60/0x3f0 [ 203.341748][ T8391] ? copy_verifier_state+0x827/0xb80 [ 203.341787][ T8391] copy_verifier_state+0x827/0xb80 [ 203.341828][ T8391] do_check_common+0x1c48/0xcfe0 [ 203.341855][ T8391] ? find_held_lock+0x2d/0x110 [ 203.341888][ T8391] ? debug_check_no_obj_freed+0x20c/0x420 [ 203.341940][ T8391] ? check_helper_call+0x8620/0x8620 [ 203.341977][ T8391] ? slab_free_freelist_hook+0x8b/0x1c0 [ 203.342009][ T8391] ? kvfree+0x42/0x50 [ 203.342034][ T8391] ? kfree+0xd6/0x4d0 [ 203.342058][ T8391] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 203.342086][ T8391] ? push_insn+0x220/0x530 [ 203.342119][ T8391] ? trace_hardirqs_on+0x38/0x1c0 [ 203.342151][ T8391] bpf_check+0x88a4/0xbbc0 [ 203.342201][ T8391] ? bpf_get_btf_vmlinux+0x10/0x10 [ 203.342234][ T8391] ? lock_downgrade+0x6e0/0x6e0 [ 203.342268][ T8391] ? __might_fault+0xd1/0x170 [ 203.342295][ T8391] ? lock_downgrade+0x6e0/0x6e0 [ 203.342335][ T8391] ? memset+0x20/0x40 [ 203.342357][ T8391] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 203.342394][ T8391] ? bpf_obj_name_cpy+0x144/0x1a0 [ 203.342424][ T8391] ? bpf_prog_load+0xf71/0x2250 [ 203.342454][ T8391] bpf_prog_load+0xfb2/0x2250 [ 203.342492][ T8391] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 203.342524][ T8391] ? find_held_lock+0x2d/0x110 [ 203.342558][ T8391] ? __might_fault+0xd1/0x170 [ 203.342584][ T8391] ? lock_downgrade+0x6e0/0x6e0 [ 203.342630][ T8391] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 203.342665][ T8391] __sys_bpf+0x11a1/0x5700 [ 203.342700][ T8391] ? bpf_perf_link_attach+0x520/0x520 [ 203.342732][ T8391] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 203.342776][ T8391] ? find_held_lock+0x2d/0x110 [ 203.342832][ T8391] ? trace_hardirqs_on+0x38/0x1c0 [ 203.342863][ T8391] __x64_sys_bpf+0x75/0xb0 [ 203.342890][ T8391] ? syscall_enter_from_user_mode+0x21/0x70 [ 203.342924][ T8391] do_syscall_64+0x35/0xb0 [ 203.342950][ T8391] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 203.342978][ T8391] RIP: 0033:0x7f2e16289109 [ 203.342998][ T8391] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 203.343025][ T8391] RSP: 002b:00007f2e1731f168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 203.343050][ T8391] RAX: ffffffffffffffda RBX: 00007f2e1639bf60 RCX: 00007f2e16289109 [ 203.343069][ T8391] RDX: 0000000000000080 RSI: 00000000200001c0 RDI: 0000000000000005 [ 203.343085][ T8391] RBP: 00007f2e1731f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 203.343101][ T8391] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 203.343117][ T8391] R13: 00007ffde7446a9f R14: 00007f2e1731f300 R15: 0000000000022000 [ 203.343152][ T8391] [ 203.532338][ T8399] FAULT_INJECTION: forcing a failure. [ 203.532338][ T8399] name failslab, interval 1, probability 0, space 0, times 0 [ 203.532373][ T8399] CPU: 0 PID: 8399 Comm: syz-executor.5 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 203.532402][ T8399] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 203.532418][ T8399] Call Trace: [ 203.532425][ T8399] [ 203.532435][ T8399] dump_stack_lvl+0xcd/0x134 [ 203.532467][ T8399] should_fail.cold+0x5/0xa [ 203.532511][ T8399] should_failslab+0x5/0x10 [ 203.532539][ T8399] kmem_cache_alloc_trace+0x60/0x3f0 [ 203.532570][ T8399] ? copy_verifier_state+0x827/0xb80 [ 203.532609][ T8399] copy_verifier_state+0x827/0xb80 [ 203.532651][ T8399] do_check_common+0x1c48/0xcfe0 [ 203.532678][ T8399] ? find_held_lock+0x2d/0x110 [ 203.532712][ T8399] ? debug_check_no_obj_freed+0x20c/0x420 [ 203.532764][ T8399] ? check_helper_call+0x8620/0x8620 [ 203.532800][ T8399] ? slab_free_freelist_hook+0x8b/0x1c0 [ 203.532831][ T8399] ? kvfree+0x42/0x50 [ 203.532856][ T8399] ? kfree+0xd6/0x4d0 [ 203.532878][ T8399] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 203.532904][ T8399] ? push_insn+0x220/0x530 [ 203.532933][ T8399] ? trace_hardirqs_on+0x38/0x1c0 [ 203.532970][ T8399] bpf_check+0x88a4/0xbbc0 [ 203.533021][ T8399] ? bpf_get_btf_vmlinux+0x10/0x10 [ 203.533052][ T8399] ? lock_downgrade+0x6e0/0x6e0 [ 203.533080][ T8399] ? __might_fault+0xd1/0x170 [ 203.533106][ T8399] ? lock_downgrade+0x6e0/0x6e0 [ 203.533145][ T8399] ? memset+0x20/0x40 [ 203.533166][ T8399] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 203.533196][ T8399] ? bpf_obj_name_cpy+0x144/0x1a0 [ 203.533226][ T8399] ? bpf_prog_load+0xf71/0x2250 [ 203.533256][ T8399] bpf_prog_load+0xfb2/0x2250 [ 203.533290][ T8399] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 203.533320][ T8399] ? find_held_lock+0x2d/0x110 [ 203.533352][ T8399] ? __might_fault+0xd1/0x170 [ 203.533377][ T8399] ? lock_downgrade+0x6e0/0x6e0 [ 203.533420][ T8399] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 203.533452][ T8399] __sys_bpf+0x11a1/0x5700 [ 203.533484][ T8399] ? bpf_perf_link_attach+0x520/0x520 [ 203.533523][ T8399] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 203.533569][ T8399] ? find_held_lock+0x2d/0x110 [ 203.533625][ T8399] ? trace_hardirqs_on+0x38/0x1c0 [ 203.533656][ T8399] __x64_sys_bpf+0x75/0xb0 [ 203.533685][ T8399] ? syscall_enter_from_user_mode+0x21/0x70 [ 203.533718][ T8399] do_syscall_64+0x35/0xb0 [ 203.533744][ T8399] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 203.533772][ T8399] RIP: 0033:0x7f2e16289109 [ 203.533793][ T8399] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 203.533818][ T8399] RSP: 002b:00007f2e1731f168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 203.533859][ T8399] RAX: ffffffffffffffda RBX: 00007f2e1639bf60 RCX: 00007f2e16289109 [ 203.533878][ T8399] RDX: 0000000000000080 RSI: 00000000200001c0 RDI: 0000000000000005 [ 203.533894][ T8399] RBP: 00007f2e1731f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 203.533911][ T8399] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 203.533927][ T8399] R13: 00007ffde7446a9f R14: 00007f2e1731f300 R15: 0000000000022000 [ 203.533964][ T8399] [ 203.631768][ T8406] FAULT_INJECTION: forcing a failure. [ 203.631768][ T8406] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 203.631803][ T8406] CPU: 0 PID: 8406 Comm: syz-executor.1 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 203.631831][ T8406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 203.631845][ T8406] Call Trace: [ 203.631852][ T8406] [ 203.631861][ T8406] dump_stack_lvl+0xcd/0x134 [ 203.631895][ T8406] should_fail.cold+0x5/0xa [ 203.631933][ T8406] prepare_alloc_pages+0x17b/0x570 [ 203.631967][ T8406] __alloc_pages+0x12f/0x500 [ 203.631994][ T8406] ? __alloc_pages_slowpath.constprop.0+0x20e0/0x20e0 [ 203.632025][ T8406] ? __kmalloc_node+0x62/0x390 [ 203.632072][ T8406] alloc_pages+0x1aa/0x310 [ 203.632104][ T8406] __vmalloc_node_range+0x735/0x13e0 [ 203.632149][ T8406] ? netlink_sendmsg+0x690/0xe10 [ 203.632178][ T8406] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 203.632208][ T8406] ? vfree_atomic+0xe0/0xe0 [ 203.632240][ T8406] ? __netlink_dump_start+0x900/0x900 [ 203.632266][ T8406] ? netlink_sendmsg+0x690/0xe10 [ 203.632292][ T8406] vmalloc+0x67/0x80 [ 203.632320][ T8406] ? netlink_sendmsg+0x690/0xe10 [ 203.632344][ T8406] netlink_sendmsg+0x690/0xe10 [ 203.632376][ T8406] ? netlink_unicast+0x7f0/0x7f0 [ 203.632416][ T8406] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 203.632448][ T8406] ? netlink_unicast+0x7f0/0x7f0 [ 203.632474][ T8406] sock_sendmsg+0xcf/0x120 [ 203.632505][ T8406] ____sys_sendmsg+0x6eb/0x810 [ 203.632538][ T8406] ? kernel_sendmsg+0x50/0x50 [ 203.632567][ T8406] ? do_recvmmsg+0x6d0/0x6d0 [ 203.632592][ T8406] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 203.632625][ T8406] ? _parse_integer+0x30/0x30 [ 203.632661][ T8406] ___sys_sendmsg+0xf3/0x170 [ 203.632694][ T8406] ? sendmsg_copy_msghdr+0x160/0x160 [ 203.632727][ T8406] ? lock_downgrade+0x6e0/0x6e0 [ 203.632773][ T8406] ? __fget_files+0x286/0x470 [ 203.632810][ T8406] ? __fget_light+0xea/0x270 [ 203.632837][ T8406] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 203.632871][ T8406] __x64_sys_sendmsg+0x132/0x220 [ 203.632896][ T8406] ? __sys_sendmsg+0x1b0/0x1b0 [ 203.632936][ T8406] ? syscall_enter_from_user_mode+0x21/0x70 [ 203.632975][ T8406] do_syscall_64+0x35/0xb0 [ 203.633001][ T8406] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 203.633026][ T8406] RIP: 0033:0x7f55bba89109 [ 203.633046][ T8406] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 203.633071][ T8406] RSP: 002b:00007f55bcbef168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 203.633095][ T8406] RAX: ffffffffffffffda RBX: 00007f55bbb9bf60 RCX: 00007f55bba89109 [ 203.633111][ T8406] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 203.633127][ T8406] RBP: 00007f55bcbef1d0 R08: 0000000000000000 R09: 0000000000000000 [ 203.633142][ T8406] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 203.633156][ T8406] R13: 00007ffd14a51aef R14: 00007f55bcbef300 R15: 0000000000022000 [ 203.633187][ T8406] [ 203.673262][ T8405] netlink: 1046 bytes leftover after parsing attributes in process `syz-executor.4'. [ 203.673586][ T8405] FAULT_INJECTION: forcing a failure. [ 203.673586][ T8405] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 203.673617][ T8405] CPU: 1 PID: 8405 Comm: syz-executor.4 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 203.673644][ T8405] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 203.673659][ T8405] Call Trace: [ 203.673666][ T8405] [ 203.673676][ T8405] dump_stack_lvl+0xcd/0x134 [ 203.673709][ T8405] should_fail.cold+0x5/0xa [ 203.673747][ T8405] _copy_from_user+0x2a/0x170 [ 203.673777][ T8405] kstrtouint_from_user+0xa8/0x190 [ 203.673807][ T8405] ? kstrtouint+0x120/0x120 [ 203.673865][ T8405] ? lock_release+0x780/0x780 [ 203.673907][ T8405] proc_fail_nth_write+0x79/0x220 [ 203.673940][ T8405] ? proc_task_getattr+0x1f0/0x1f0 [ 203.673978][ T8405] ? proc_task_getattr+0x1f0/0x1f0 [ 203.674008][ T8405] vfs_write+0x269/0xac0 [ 203.674042][ T8405] ksys_write+0x127/0x250 [ 203.674072][ T8405] ? __ia32_sys_read+0xb0/0xb0 [ 203.674103][ T8405] ? syscall_enter_from_user_mode+0x21/0x70 [ 203.674144][ T8405] do_syscall_64+0x35/0xb0 [ 203.674172][ T8405] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 203.674200][ T8405] RIP: 0033:0x7f776543bc1f [ 203.674222][ T8405] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 203.674252][ T8405] RSP: 002b:00007f7766559160 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 203.674279][ T8405] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f776543bc1f [ 203.674297][ T8405] RDX: 0000000000000001 RSI: 00007f77665591e0 RDI: 0000000000000004 [ 203.674314][ T8405] RBP: 00007f77665591d0 R08: 0000000000000000 R09: 0000000000000000 [ 203.674331][ T8405] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 203.674347][ T8405] R13: 00007ffec1cb653f R14: 00007f7766559300 R15: 0000000000022000 [ 203.674384][ T8405] [ 203.788775][ T8421] FAULT_INJECTION: forcing a failure. [ 203.788775][ T8421] name failslab, interval 1, probability 0, space 0, times 0 [ 203.788811][ T8421] CPU: 0 PID: 8421 Comm: syz-executor.5 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 203.788839][ T8421] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 203.788856][ T8421] Call Trace: [ 203.788862][ T8421] [ 203.788871][ T8421] dump_stack_lvl+0xcd/0x134 [ 203.788902][ T8421] should_fail.cold+0x5/0xa [ 203.788940][ T8421] should_failslab+0x5/0x10 [ 203.788968][ T8421] kmem_cache_alloc_trace+0x60/0x3f0 [ 203.788997][ T8421] ? copy_verifier_state+0x827/0xb80 [ 203.789037][ T8421] copy_verifier_state+0x827/0xb80 [ 203.789077][ T8421] push_stack+0x1d2/0x560 [ 203.789108][ T8421] do_check_common+0x6a0f/0xcfe0 [ 203.789133][ T8421] ? find_held_lock+0x2d/0x110 [ 203.789168][ T8421] ? debug_check_no_obj_freed+0x20c/0x420 [ 203.789220][ T8421] ? check_helper_call+0x8620/0x8620 [ 203.789256][ T8421] ? slab_free_freelist_hook+0x8b/0x1c0 [ 203.789286][ T8421] ? kvfree+0x42/0x50 [ 203.789311][ T8421] ? kfree+0xd6/0x4d0 [ 203.789335][ T8421] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 203.789362][ T8421] ? push_insn+0x220/0x530 [ 203.789403][ T8421] ? trace_hardirqs_on+0x38/0x1c0 [ 203.789436][ T8421] bpf_check+0x88a4/0xbbc0 [ 203.789489][ T8421] ? bpf_get_btf_vmlinux+0x10/0x10 [ 203.789525][ T8421] ? lock_downgrade+0x6e0/0x6e0 [ 203.789555][ T8421] ? __might_fault+0xd1/0x170 [ 203.789581][ T8421] ? lock_downgrade+0x6e0/0x6e0 [ 203.789621][ T8421] ? memset+0x20/0x40 [ 203.789646][ T8421] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 203.789675][ T8421] ? bpf_obj_name_cpy+0x144/0x1a0 [ 203.789705][ T8421] ? bpf_prog_load+0xf71/0x2250 [ 203.789738][ T8421] bpf_prog_load+0xfb2/0x2250 [ 203.789776][ T8421] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 203.789809][ T8421] ? find_held_lock+0x2d/0x110 [ 203.789842][ T8421] ? __might_fault+0xd1/0x170 [ 203.789867][ T8421] ? lock_downgrade+0x6e0/0x6e0 [ 203.789912][ T8421] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 203.789946][ T8421] __sys_bpf+0x11a1/0x5700 [ 203.789980][ T8421] ? bpf_perf_link_attach+0x520/0x520 [ 203.790011][ T8421] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 203.790054][ T8421] ? find_held_lock+0x2d/0x110 [ 203.790110][ T8421] ? trace_hardirqs_on+0x38/0x1c0 [ 203.790141][ T8421] __x64_sys_bpf+0x75/0xb0 [ 203.790170][ T8421] ? syscall_enter_from_user_mode+0x21/0x70 [ 203.790203][ T8421] do_syscall_64+0x35/0xb0 [ 203.790230][ T8421] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 203.790257][ T8421] RIP: 0033:0x7f2e16289109 [ 203.790279][ T8421] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 203.790306][ T8421] RSP: 002b:00007f2e1731f168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 203.790331][ T8421] RAX: ffffffffffffffda RBX: 00007f2e1639bf60 RCX: 00007f2e16289109 [ 203.790350][ T8421] RDX: 0000000000000080 RSI: 00000000200001c0 RDI: 0000000000000005 [ 203.790373][ T8421] RBP: 00007f2e1731f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 203.790390][ T8421] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 203.790406][ T8421] R13: 00007ffde7446a9f R14: 00007f2e1731f300 R15: 0000000000022000 [ 203.790485][ T8421] [ 203.863910][ T8427] FAULT_INJECTION: forcing a failure. [ 203.863910][ T8427] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 203.863945][ T8427] CPU: 0 PID: 8427 Comm: syz-executor.1 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 203.863972][ T8427] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 203.863986][ T8427] Call Trace: [ 203.863993][ T8427] [ 203.864002][ T8427] dump_stack_lvl+0xcd/0x134 [ 203.864035][ T8427] should_fail.cold+0x5/0xa [ 203.864071][ T8427] prepare_alloc_pages+0x17b/0x570 [ 203.864107][ T8427] __alloc_pages+0x12f/0x500 [ 203.864133][ T8427] ? __alloc_pages_slowpath.constprop.0+0x20e0/0x20e0 [ 203.864163][ T8427] ? __kmalloc_node+0x62/0x390 [ 203.864208][ T8427] alloc_pages+0x1aa/0x310 [ 203.864242][ T8427] __vmalloc_node_range+0x735/0x13e0 [ 203.864285][ T8427] ? netlink_sendmsg+0x690/0xe10 [ 203.864315][ T8427] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 203.864345][ T8427] ? vfree_atomic+0xe0/0xe0 [ 203.864385][ T8427] ? __netlink_dump_start+0x900/0x900 [ 203.864413][ T8427] ? netlink_sendmsg+0x690/0xe10 [ 203.864441][ T8427] vmalloc+0x67/0x80 [ 203.864471][ T8427] ? netlink_sendmsg+0x690/0xe10 [ 203.864496][ T8427] netlink_sendmsg+0x690/0xe10 [ 203.864526][ T8427] ? netlink_unicast+0x7f0/0x7f0 [ 203.864558][ T8427] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 203.864588][ T8427] ? netlink_unicast+0x7f0/0x7f0 [ 203.864612][ T8427] sock_sendmsg+0xcf/0x120 [ 203.864643][ T8427] ____sys_sendmsg+0x6eb/0x810 [ 203.864678][ T8427] ? kernel_sendmsg+0x50/0x50 [ 203.864705][ T8427] ? do_recvmmsg+0x6d0/0x6d0 [ 203.864730][ T8427] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 203.864765][ T8427] ? _parse_integer+0x30/0x30 [ 203.864803][ T8427] ___sys_sendmsg+0xf3/0x170 [ 203.864831][ T8427] ? sendmsg_copy_msghdr+0x160/0x160 [ 203.864862][ T8427] ? lock_downgrade+0x6e0/0x6e0 [ 203.864905][ T8427] ? __fget_files+0x286/0x470 [ 203.864942][ T8427] ? __fget_light+0xea/0x270 [ 203.864967][ T8427] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 203.865002][ T8427] __x64_sys_sendmsg+0x132/0x220 [ 203.865028][ T8427] ? __sys_sendmsg+0x1b0/0x1b0 [ 203.865069][ T8427] ? syscall_enter_from_user_mode+0x21/0x70 [ 203.865108][ T8427] do_syscall_64+0x35/0xb0 [ 203.865135][ T8427] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 203.865161][ T8427] RIP: 0033:0x7f55bba89109 [ 203.865182][ T8427] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 203.865209][ T8427] RSP: 002b:00007f55bcbef168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 203.865235][ T8427] RAX: ffffffffffffffda RBX: 00007f55bbb9bf60 RCX: 00007f55bba89109 [ 203.865253][ T8427] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 203.865271][ T8427] RBP: 00007f55bcbef1d0 R08: 0000000000000000 R09: 0000000000000000 [ 203.865288][ T8427] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 203.865305][ T8427] R13: 00007ffd14a51aef R14: 00007f55bcbef300 R15: 0000000000022000 [ 203.865340][ T8427] [ 203.874762][ T8426] netlink: 1046 bytes leftover after parsing attributes in process `syz-executor.4'. [ 212.003911][ T8434] FAULT_INJECTION: forcing a failure. [ 212.003911][ T8434] name failslab, interval 1, probability 0, space 0, times 0 [ 212.003947][ T8434] CPU: 1 PID: 8434 Comm: syz-executor.5 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 212.003977][ T8434] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 212.003993][ T8434] Call Trace: [ 212.004000][ T8434] [ 212.004010][ T8434] dump_stack_lvl+0xcd/0x134 [ 212.004042][ T8434] should_fail.cold+0x5/0xa [ 212.004080][ T8434] should_failslab+0x5/0x10 [ 212.004108][ T8434] kmem_cache_alloc_trace+0x60/0x3f0 [ 212.004136][ T8434] ? copy_verifier_state+0x827/0xb80 [ 212.004173][ T8434] copy_verifier_state+0x827/0xb80 [ 212.004214][ T8434] push_stack+0x1d2/0x560 [ 212.004245][ T8434] do_check_common+0x6a0f/0xcfe0 [ 212.004271][ T8434] ? find_held_lock+0x2d/0x110 [ 212.004305][ T8434] ? debug_check_no_obj_freed+0x20c/0x420 [ 212.004357][ T8434] ? check_helper_call+0x8620/0x8620 [ 212.004394][ T8434] ? slab_free_freelist_hook+0x8b/0x1c0 [ 212.004424][ T8434] ? kvfree+0x42/0x50 [ 212.004448][ T8434] ? kfree+0xd6/0x4d0 [ 212.004471][ T8434] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 212.004500][ T8434] ? push_insn+0x220/0x530 [ 212.004532][ T8434] ? trace_hardirqs_on+0x38/0x1c0 [ 212.004563][ T8434] bpf_check+0x88a4/0xbbc0 [ 212.004616][ T8434] ? bpf_get_btf_vmlinux+0x10/0x10 [ 212.004650][ T8434] ? lock_downgrade+0x6e0/0x6e0 [ 212.004680][ T8434] ? __might_fault+0xd1/0x170 [ 212.004706][ T8434] ? lock_downgrade+0x6e0/0x6e0 [ 212.004746][ T8434] ? memset+0x20/0x40 [ 212.004768][ T8434] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 212.004796][ T8434] ? bpf_obj_name_cpy+0x144/0x1a0 [ 212.004827][ T8434] ? bpf_prog_load+0xf71/0x2250 [ 212.004863][ T8434] bpf_prog_load+0xfb2/0x2250 [ 212.004901][ T8434] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 212.004934][ T8434] ? find_held_lock+0x2d/0x110 [ 212.004969][ T8434] ? __might_fault+0xd1/0x170 [ 212.004996][ T8434] ? lock_downgrade+0x6e0/0x6e0 [ 212.005043][ T8434] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 212.005079][ T8434] __sys_bpf+0x11a1/0x5700 [ 212.005114][ T8434] ? bpf_perf_link_attach+0x520/0x520 [ 212.005147][ T8434] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 212.005192][ T8434] ? find_held_lock+0x2d/0x110 [ 212.005250][ T8434] ? trace_hardirqs_on+0x38/0x1c0 [ 212.005281][ T8434] __x64_sys_bpf+0x75/0xb0 [ 212.005310][ T8434] ? syscall_enter_from_user_mode+0x21/0x70 [ 212.005344][ T8434] do_syscall_64+0x35/0xb0 [ 212.005370][ T8434] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 212.005397][ T8434] RIP: 0033:0x7f2e16289109 [ 212.005418][ T8434] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 212.005444][ T8434] RSP: 002b:00007f2e1731f168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 212.005471][ T8434] RAX: ffffffffffffffda RBX: 00007f2e1639bf60 RCX: 00007f2e16289109 [ 212.005486][ T8434] RDX: 0000000000000080 RSI: 00000000200001c0 RDI: 0000000000000005 [ 212.005501][ T8434] RBP: 00007f2e1731f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 212.005517][ T8434] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 212.005532][ T8434] R13: 00007ffde7446a9f R14: 00007f2e1731f300 R15: 0000000000022000 [ 212.005563][ T8434] [ 212.013285][ T8431] netlink: 1046 bytes leftover after parsing attributes in process `syz-executor.4'. [ 212.061208][ T8440] FAULT_INJECTION: forcing a failure. [ 212.061208][ T8440] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 212.061242][ T8440] CPU: 0 PID: 8440 Comm: syz-executor.1 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 212.061269][ T8440] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 212.061285][ T8440] Call Trace: [ 212.061291][ T8440] [ 212.061299][ T8440] dump_stack_lvl+0xcd/0x134 [ 212.061331][ T8440] should_fail.cold+0x5/0xa [ 212.061376][ T8440] prepare_alloc_pages+0x17b/0x570 [ 212.061409][ T8440] __alloc_pages+0x12f/0x500 [ 212.061435][ T8440] ? __alloc_pages_slowpath.constprop.0+0x20e0/0x20e0 [ 212.061465][ T8440] ? __kmalloc_node+0x62/0x390 [ 212.061509][ T8440] alloc_pages+0x1aa/0x310 [ 212.061541][ T8440] __vmalloc_node_range+0x735/0x13e0 [ 212.061582][ T8440] ? netlink_sendmsg+0x690/0xe10 [ 212.061610][ T8440] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 212.061639][ T8440] ? vfree_atomic+0xe0/0xe0 [ 212.061668][ T8440] ? __netlink_dump_start+0x900/0x900 [ 212.061693][ T8440] ? netlink_sendmsg+0x690/0xe10 [ 212.061718][ T8440] vmalloc+0x67/0x80 [ 212.061744][ T8440] ? netlink_sendmsg+0x690/0xe10 [ 212.061767][ T8440] netlink_sendmsg+0x690/0xe10 [ 212.061797][ T8440] ? netlink_unicast+0x7f0/0x7f0 [ 212.061827][ T8440] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 212.061855][ T8440] ? netlink_unicast+0x7f0/0x7f0 [ 212.061879][ T8440] sock_sendmsg+0xcf/0x120 [ 212.061909][ T8440] ____sys_sendmsg+0x6eb/0x810 [ 212.061942][ T8440] ? kernel_sendmsg+0x50/0x50 [ 212.061968][ T8440] ? do_recvmmsg+0x6d0/0x6d0 [ 212.061992][ T8440] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 212.062026][ T8440] ? _parse_integer+0x30/0x30 [ 212.062062][ T8440] ___sys_sendmsg+0xf3/0x170 [ 212.062087][ T8440] ? sendmsg_copy_msghdr+0x160/0x160 [ 212.062117][ T8440] ? lock_downgrade+0x6e0/0x6e0 [ 212.062158][ T8440] ? __fget_files+0x286/0x470 [ 212.062192][ T8440] ? __fget_light+0xea/0x270 [ 212.062218][ T8440] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 212.062250][ T8440] __x64_sys_sendmsg+0x132/0x220 [ 212.062274][ T8440] ? __sys_sendmsg+0x1b0/0x1b0 [ 212.062312][ T8440] ? syscall_enter_from_user_mode+0x21/0x70 [ 212.062355][ T8440] do_syscall_64+0x35/0xb0 [ 212.062381][ T8440] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 212.062407][ T8440] RIP: 0033:0x7f55bba89109 [ 212.062427][ T8440] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 212.062454][ T8440] RSP: 002b:00007f55bcbef168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 212.062478][ T8440] RAX: ffffffffffffffda RBX: 00007f55bbb9bf60 RCX: 00007f55bba89109 [ 212.062495][ T8440] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 212.062511][ T8440] RBP: 00007f55bcbef1d0 R08: 0000000000000000 R09: 0000000000000000 [ 212.062527][ T8440] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 212.062543][ T8440] R13: 00007ffd14a51aef R14: 00007f55bcbef300 R15: 0000000000022000 [ 212.062576][ T8440] [ 212.154385][ T8445] netlink: 1046 bytes leftover after parsing attributes in process `syz-executor.4'. [ 212.198880][ T8450] FAULT_INJECTION: forcing a failure. [ 212.198880][ T8450] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 212.198916][ T8450] CPU: 1 PID: 8450 Comm: syz-executor.1 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 212.198945][ T8450] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 212.198960][ T8450] Call Trace: [ 212.198966][ T8450] [ 212.198976][ T8450] dump_stack_lvl+0xcd/0x134 [ 212.199008][ T8450] should_fail.cold+0x5/0xa [ 212.199047][ T8450] prepare_alloc_pages+0x17b/0x570 [ 212.199080][ T8450] __alloc_pages+0x12f/0x500 [ 212.199108][ T8450] ? __alloc_pages_slowpath.constprop.0+0x20e0/0x20e0 [ 212.199139][ T8450] ? __kmalloc_node+0x62/0x390 [ 212.199186][ T8450] alloc_pages+0x1aa/0x310 [ 212.199219][ T8450] __vmalloc_node_range+0x735/0x13e0 [ 212.199263][ T8450] ? netlink_sendmsg+0x690/0xe10 [ 212.199293][ T8450] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 212.199324][ T8450] ? vfree_atomic+0xe0/0xe0 [ 212.199354][ T8450] ? __netlink_dump_start+0x900/0x900 [ 212.199380][ T8450] ? netlink_sendmsg+0x690/0xe10 [ 212.199408][ T8450] vmalloc+0x67/0x80 [ 212.199436][ T8450] ? netlink_sendmsg+0x690/0xe10 [ 212.199460][ T8450] netlink_sendmsg+0x690/0xe10 [ 212.199492][ T8450] ? netlink_unicast+0x7f0/0x7f0 [ 212.199525][ T8450] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 212.199555][ T8450] ? netlink_unicast+0x7f0/0x7f0 [ 212.199581][ T8450] sock_sendmsg+0xcf/0x120 [ 212.199614][ T8450] ____sys_sendmsg+0x6eb/0x810 [ 212.199644][ T8450] ? kernel_sendmsg+0x50/0x50 [ 212.199671][ T8450] ? do_recvmmsg+0x6d0/0x6d0 [ 212.199696][ T8450] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 212.199730][ T8450] ? _parse_integer+0x30/0x30 [ 212.199767][ T8450] ___sys_sendmsg+0xf3/0x170 [ 212.199793][ T8450] ? sendmsg_copy_msghdr+0x160/0x160 [ 212.199828][ T8450] ? lock_downgrade+0x6e0/0x6e0 [ 212.199879][ T8450] ? __fget_files+0x286/0x470 [ 212.199917][ T8450] ? __fget_light+0xea/0x270 [ 212.199944][ T8450] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 212.199978][ T8450] __x64_sys_sendmsg+0x132/0x220 [ 212.200001][ T8450] ? __sys_sendmsg+0x1b0/0x1b0 [ 212.200038][ T8450] ? syscall_enter_from_user_mode+0x21/0x70 [ 212.200075][ T8450] do_syscall_64+0x35/0xb0 [ 212.200100][ T8450] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 212.200126][ T8450] RIP: 0033:0x7f55bba89109 [ 212.200146][ T8450] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 212.200172][ T8450] RSP: 002b:00007f55bcbef168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 212.200199][ T8450] RAX: ffffffffffffffda RBX: 00007f55bbb9bf60 RCX: 00007f55bba89109 [ 212.200216][ T8450] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 212.200232][ T8450] RBP: 00007f55bcbef1d0 R08: 0000000000000000 R09: 0000000000000000 [ 212.200248][ T8450] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 212.200265][ T8450] R13: 00007ffd14a51aef R14: 00007f55bcbef300 R15: 0000000000022000 [ 212.200298][ T8450] [ 212.258095][ T8453] FAULT_INJECTION: forcing a failure. [ 212.258095][ T8453] name failslab, interval 1, probability 0, space 0, times 0 [ 212.258131][ T8453] CPU: 0 PID: 8453 Comm: syz-executor.5 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 212.258160][ T8453] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 212.258175][ T8453] Call Trace: [ 212.258181][ T8453] [ 212.258190][ T8453] dump_stack_lvl+0xcd/0x134 [ 212.258225][ T8453] should_fail.cold+0x5/0xa [ 212.258262][ T8453] should_failslab+0x5/0x10 [ 212.258290][ T8453] kmem_cache_alloc_trace+0x60/0x3f0 [ 212.258318][ T8453] ? copy_verifier_state+0x827/0xb80 [ 212.258367][ T8453] copy_verifier_state+0x827/0xb80 [ 212.258408][ T8453] do_check_common+0x1c48/0xcfe0 [ 212.258437][ T8453] ? find_held_lock+0x2d/0x110 [ 212.258471][ T8453] ? debug_check_no_obj_freed+0x20c/0x420 [ 212.258524][ T8453] ? check_helper_call+0x8620/0x8620 [ 212.258560][ T8453] ? slab_free_freelist_hook+0x8b/0x1c0 [ 212.258591][ T8453] ? kvfree+0x42/0x50 [ 212.258616][ T8453] ? kfree+0xd6/0x4d0 [ 212.258640][ T8453] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 212.258668][ T8453] ? push_insn+0x220/0x530 [ 212.258700][ T8453] ? trace_hardirqs_on+0x38/0x1c0 [ 212.258731][ T8453] bpf_check+0x88a4/0xbbc0 [ 212.258783][ T8453] ? bpf_get_btf_vmlinux+0x10/0x10 [ 212.258817][ T8453] ? lock_downgrade+0x6e0/0x6e0 [ 212.258846][ T8453] ? __might_fault+0xd1/0x170 [ 212.258872][ T8453] ? lock_downgrade+0x6e0/0x6e0 [ 212.258913][ T8453] ? memset+0x20/0x40 [ 212.258935][ T8453] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 212.258963][ T8453] ? bpf_obj_name_cpy+0x144/0x1a0 [ 212.258994][ T8453] ? bpf_prog_load+0xf71/0x2250 [ 212.259026][ T8453] bpf_prog_load+0xfb2/0x2250 [ 212.259064][ T8453] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 212.259097][ T8453] ? find_held_lock+0x2d/0x110 [ 212.259131][ T8453] ? __might_fault+0xd1/0x170 [ 212.259155][ T8453] ? lock_downgrade+0x6e0/0x6e0 [ 212.259198][ T8453] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 212.259231][ T8453] __sys_bpf+0x11a1/0x5700 [ 212.259262][ T8453] ? bpf_perf_link_attach+0x520/0x520 [ 212.259289][ T8453] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 212.259330][ T8453] ? find_held_lock+0x2d/0x110 [ 212.259393][ T8453] ? trace_hardirqs_on+0x38/0x1c0 [ 212.259423][ T8453] __x64_sys_bpf+0x75/0xb0 [ 212.259452][ T8453] ? syscall_enter_from_user_mode+0x21/0x70 [ 212.259486][ T8453] do_syscall_64+0x35/0xb0 [ 212.259513][ T8453] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 212.259538][ T8453] RIP: 0033:0x7f2e16289109 [ 212.259557][ T8453] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 212.259583][ T8453] RSP: 002b:00007f2e1731f168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 212.259604][ T8453] RAX: ffffffffffffffda RBX: 00007f2e1639bf60 RCX: 00007f2e16289109 [ 212.259621][ T8453] RDX: 0000000000000080 RSI: 00000000200001c0 RDI: 0000000000000005 [ 212.259637][ T8453] RBP: 00007f2e1731f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 212.259652][ T8453] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 212.259666][ T8453] R13: 00007ffde7446a9f R14: 00007f2e1731f300 R15: 0000000000022000 [ 212.259693][ T8453] [ 212.295817][ T8460] netlink: 1046 bytes leftover after parsing attributes in process `syz-executor.4'. [ 212.366183][ T8465] FAULT_INJECTION: forcing a failure. [ 212.366183][ T8465] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 212.366218][ T8465] CPU: 1 PID: 8465 Comm: syz-executor.1 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 212.366247][ T8465] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 212.366262][ T8465] Call Trace: [ 212.366268][ T8465] [ 212.366278][ T8465] dump_stack_lvl+0xcd/0x134 [ 212.366312][ T8465] should_fail.cold+0x5/0xa [ 212.366349][ T8465] prepare_alloc_pages+0x17b/0x570 [ 212.366383][ T8465] __alloc_pages+0x12f/0x500 [ 212.366410][ T8465] ? __alloc_pages_slowpath.constprop.0+0x20e0/0x20e0 [ 212.366441][ T8465] ? __kmalloc_node+0x62/0x390 [ 212.366492][ T8465] alloc_pages+0x1aa/0x310 [ 212.366525][ T8465] __vmalloc_node_range+0x735/0x13e0 [ 212.366571][ T8465] ? netlink_sendmsg+0x690/0xe10 [ 212.366603][ T8465] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 212.366633][ T8465] ? vfree_atomic+0xe0/0xe0 [ 212.366665][ T8465] ? __netlink_dump_start+0x900/0x900 [ 212.366691][ T8465] ? netlink_sendmsg+0x690/0xe10 [ 212.366717][ T8465] vmalloc+0x67/0x80 [ 212.366744][ T8465] ? netlink_sendmsg+0x690/0xe10 [ 212.366767][ T8465] netlink_sendmsg+0x690/0xe10 [ 212.366796][ T8465] ? netlink_unicast+0x7f0/0x7f0 [ 212.366826][ T8465] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 212.366864][ T8465] ? netlink_unicast+0x7f0/0x7f0 [ 212.366890][ T8465] sock_sendmsg+0xcf/0x120 [ 212.366921][ T8465] ____sys_sendmsg+0x6eb/0x810 [ 212.366953][ T8465] ? kernel_sendmsg+0x50/0x50 [ 212.366980][ T8465] ? do_recvmmsg+0x6d0/0x6d0 [ 212.367003][ T8465] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 212.367037][ T8465] ? _parse_integer+0x30/0x30 [ 212.367076][ T8465] ___sys_sendmsg+0xf3/0x170 [ 212.367102][ T8465] ? sendmsg_copy_msghdr+0x160/0x160 [ 212.367133][ T8465] ? lock_downgrade+0x6e0/0x6e0 [ 212.367177][ T8465] ? __fget_files+0x286/0x470 [ 212.367213][ T8465] ? __fget_light+0xea/0x270 [ 212.367240][ T8465] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 212.367274][ T8465] __x64_sys_sendmsg+0x132/0x220 [ 212.367300][ T8465] ? __sys_sendmsg+0x1b0/0x1b0 [ 212.367337][ T8465] ? syscall_enter_from_user_mode+0x21/0x70 [ 212.367377][ T8465] do_syscall_64+0x35/0xb0 [ 212.367405][ T8465] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 212.367431][ T8465] RIP: 0033:0x7f55bba89109 [ 212.367452][ T8465] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 212.367478][ T8465] RSP: 002b:00007f55bcbef168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 212.367505][ T8465] RAX: ffffffffffffffda RBX: 00007f55bbb9bf60 RCX: 00007f55bba89109 [ 212.367523][ T8465] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 212.367539][ T8465] RBP: 00007f55bcbef1d0 R08: 0000000000000000 R09: 0000000000000000 [ 212.367556][ T8465] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 212.367572][ T8465] R13: 00007ffd14a51aef R14: 00007f55bcbef300 R15: 0000000000022000 [ 212.367608][ T8465] [ 212.371801][ T8468] FAULT_INJECTION: forcing a failure. [ 212.371801][ T8468] name failslab, interval 1, probability 0, space 0, times 0 [ 212.371832][ T8468] CPU: 0 PID: 8468 Comm: syz-executor.5 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 212.371861][ T8468] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 212.371877][ T8468] Call Trace: [ 212.371885][ T8468] [ 212.371894][ T8468] dump_stack_lvl+0xcd/0x134 [ 212.371927][ T8468] should_fail.cold+0x5/0xa [ 212.371964][ T8468] should_failslab+0x5/0x10 [ 212.371992][ T8468] kmem_cache_alloc_trace+0x60/0x3f0 [ 212.372020][ T8468] ? copy_verifier_state+0x827/0xb80 [ 212.372056][ T8468] copy_verifier_state+0x827/0xb80 [ 212.372096][ T8468] do_check_common+0x1c48/0xcfe0 [ 212.372124][ T8468] ? find_held_lock+0x2d/0x110 [ 212.372157][ T8468] ? debug_check_no_obj_freed+0x20c/0x420 [ 212.372206][ T8468] ? check_helper_call+0x8620/0x8620 [ 212.372242][ T8468] ? slab_free_freelist_hook+0x8b/0x1c0 [ 212.372272][ T8468] ? kvfree+0x42/0x50 [ 212.372295][ T8468] ? kfree+0xd6/0x4d0 [ 212.372317][ T8468] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 212.372352][ T8468] ? push_insn+0x220/0x530 [ 212.372383][ T8468] ? trace_hardirqs_on+0x38/0x1c0 [ 212.372415][ T8468] bpf_check+0x88a4/0xbbc0 [ 212.372464][ T8468] ? bpf_get_btf_vmlinux+0x10/0x10 [ 212.372498][ T8468] ? lock_downgrade+0x6e0/0x6e0 [ 212.372525][ T8468] ? __might_fault+0xd1/0x170 [ 212.372551][ T8468] ? lock_downgrade+0x6e0/0x6e0 [ 212.372622][ T8468] ? memset+0x20/0x40 [ 212.372646][ T8468] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 212.372674][ T8468] ? bpf_obj_name_cpy+0x144/0x1a0 [ 212.372704][ T8468] ? bpf_prog_load+0xf71/0x2250 [ 212.372736][ T8468] bpf_prog_load+0xfb2/0x2250 [ 212.372771][ T8468] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 212.372802][ T8468] ? find_held_lock+0x2d/0x110 [ 212.372834][ T8468] ? __might_fault+0xd1/0x170 [ 212.372860][ T8468] ? lock_downgrade+0x6e0/0x6e0 [ 212.372902][ T8468] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 212.372934][ T8468] __sys_bpf+0x11a1/0x5700 [ 212.372967][ T8468] ? bpf_perf_link_attach+0x520/0x520 [ 212.372996][ T8468] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 212.373037][ T8468] ? find_held_lock+0x2d/0x110 [ 212.373092][ T8468] ? trace_hardirqs_on+0x38/0x1c0 [ 212.373120][ T8468] __x64_sys_bpf+0x75/0xb0 [ 212.373148][ T8468] ? syscall_enter_from_user_mode+0x21/0x70 [ 212.373202][ T8468] do_syscall_64+0x35/0xb0 [ 212.373231][ T8468] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 212.373259][ T8468] RIP: 0033:0x7f2e16289109 [ 212.373278][ T8468] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 212.373305][ T8468] RSP: 002b:00007f2e1731f168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 212.373337][ T8468] RAX: ffffffffffffffda RBX: 00007f2e1639bf60 RCX: 00007f2e16289109 [ 212.373357][ T8468] RDX: 0000000000000080 RSI: 00000000200001c0 RDI: 0000000000000005 [ 212.373374][ T8468] RBP: 00007f2e1731f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 212.373391][ T8468] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 212.373408][ T8468] R13: 00007ffde7446a9f R14: 00007f2e1731f300 R15: 0000000000022000 [ 212.373445][ T8468] [ 212.454161][ T8477] netlink: 1046 bytes leftover after parsing attributes in process `syz-executor.4'. [ 212.482520][ T8479] FAULT_INJECTION: forcing a failure. [ 212.482520][ T8479] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 212.482555][ T8479] CPU: 0 PID: 8479 Comm: syz-executor.1 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 212.482583][ T8479] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 212.482597][ T8479] Call Trace: [ 212.482604][ T8479] [ 212.482613][ T8479] dump_stack_lvl+0xcd/0x134 [ 212.482645][ T8479] should_fail.cold+0x5/0xa [ 212.482683][ T8479] prepare_alloc_pages+0x17b/0x570 [ 212.482715][ T8479] __alloc_pages+0x12f/0x500 [ 212.482748][ T8479] ? __alloc_pages_slowpath.constprop.0+0x20e0/0x20e0 [ 212.482779][ T8479] ? __kmalloc_node+0x62/0x390 [ 212.482824][ T8479] alloc_pages+0x1aa/0x310 [ 212.482857][ T8479] __vmalloc_node_range+0x735/0x13e0 [ 212.482901][ T8479] ? netlink_sendmsg+0x690/0xe10 [ 212.482928][ T8479] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 212.482957][ T8479] ? vfree_atomic+0xe0/0xe0 [ 212.482987][ T8479] ? __netlink_dump_start+0x900/0x900 [ 212.483011][ T8479] ? netlink_sendmsg+0x690/0xe10 [ 212.483037][ T8479] vmalloc+0x67/0x80 [ 212.483063][ T8479] ? netlink_sendmsg+0x690/0xe10 [ 212.483086][ T8479] netlink_sendmsg+0x690/0xe10 [ 212.483116][ T8479] ? netlink_unicast+0x7f0/0x7f0 [ 212.483145][ T8479] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 212.483174][ T8479] ? netlink_unicast+0x7f0/0x7f0 [ 212.483198][ T8479] sock_sendmsg+0xcf/0x120 [ 212.483228][ T8479] ____sys_sendmsg+0x6eb/0x810 [ 212.483260][ T8479] ? kernel_sendmsg+0x50/0x50 [ 212.483287][ T8479] ? do_recvmmsg+0x6d0/0x6d0 [ 212.483310][ T8479] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 212.483343][ T8479] ? _parse_integer+0x30/0x30 [ 212.483379][ T8479] ___sys_sendmsg+0xf3/0x170 [ 212.483404][ T8479] ? sendmsg_copy_msghdr+0x160/0x160 [ 212.483435][ T8479] ? lock_downgrade+0x6e0/0x6e0 [ 212.483476][ T8479] ? __fget_files+0x286/0x470 [ 212.483510][ T8479] ? __fget_light+0xea/0x270 [ 212.483535][ T8479] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 212.483566][ T8479] __x64_sys_sendmsg+0x132/0x220 [ 212.483589][ T8479] ? __sys_sendmsg+0x1b0/0x1b0 [ 212.483625][ T8479] ? syscall_enter_from_user_mode+0x21/0x70 [ 212.483665][ T8479] do_syscall_64+0x35/0xb0 [ 212.483691][ T8479] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 212.483715][ T8479] RIP: 0033:0x7f55bba89109 [ 212.483734][ T8479] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 212.483767][ T8479] RSP: 002b:00007f55bcbef168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 212.483793][ T8479] RAX: ffffffffffffffda RBX: 00007f55bbb9bf60 RCX: 00007f55bba89109 [ 212.483812][ T8479] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 212.483827][ T8479] RBP: 00007f55bcbef1d0 R08: 0000000000000000 R09: 0000000000000000 [ 212.483841][ T8479] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 212.483855][ T8479] R13: 00007ffd14a51aef R14: 00007f55bcbef300 R15: 0000000000022000 [ 212.483886][ T8479] [ 212.541937][ T8480] FAULT_INJECTION: forcing a failure. [ 212.541937][ T8480] name failslab, interval 1, probability 0, space 0, times 0 [ 212.541972][ T8480] CPU: 1 PID: 8480 Comm: syz-executor.5 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 212.542000][ T8480] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 212.542016][ T8480] Call Trace: [ 212.542023][ T8480] [ 212.542032][ T8480] dump_stack_lvl+0xcd/0x134 [ 212.542065][ T8480] should_fail.cold+0x5/0xa [ 212.542101][ T8480] should_failslab+0x5/0x10 [ 212.542128][ T8480] kmem_cache_alloc_trace+0x60/0x3f0 [ 212.542158][ T8480] ? copy_verifier_state+0x827/0xb80 [ 212.542195][ T8480] copy_verifier_state+0x827/0xb80 [ 212.542245][ T8480] do_check_common+0x1c48/0xcfe0 [ 212.542272][ T8480] ? find_held_lock+0x2d/0x110 [ 212.542307][ T8480] ? debug_check_no_obj_freed+0x20c/0x420 [ 212.542359][ T8480] ? check_helper_call+0x8620/0x8620 [ 212.542394][ T8480] ? slab_free_freelist_hook+0x8b/0x1c0 [ 212.542424][ T8480] ? kvfree+0x42/0x50 [ 212.542449][ T8480] ? kfree+0xd6/0x4d0 [ 212.542473][ T8480] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 212.542503][ T8480] ? push_insn+0x220/0x530 [ 212.542534][ T8480] ? trace_hardirqs_on+0x38/0x1c0 [ 212.542565][ T8480] bpf_check+0x88a4/0xbbc0 [ 212.542619][ T8480] ? bpf_get_btf_vmlinux+0x10/0x10 [ 212.542654][ T8480] ? lock_downgrade+0x6e0/0x6e0 [ 212.542683][ T8480] ? __might_fault+0xd1/0x170 [ 212.542710][ T8480] ? lock_downgrade+0x6e0/0x6e0 [ 212.542749][ T8480] ? memset+0x20/0x40 [ 212.542772][ T8480] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 212.542801][ T8480] ? bpf_obj_name_cpy+0x144/0x1a0 [ 212.542831][ T8480] ? bpf_prog_load+0xf71/0x2250 [ 212.542863][ T8480] bpf_prog_load+0xfb2/0x2250 [ 212.542900][ T8480] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 212.542933][ T8480] ? find_held_lock+0x2d/0x110 [ 212.542966][ T8480] ? __might_fault+0xd1/0x170 [ 212.542993][ T8480] ? lock_downgrade+0x6e0/0x6e0 [ 212.543038][ T8480] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 212.543073][ T8480] __sys_bpf+0x11a1/0x5700 [ 212.543105][ T8480] ? bpf_perf_link_attach+0x520/0x520 [ 212.543135][ T8480] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 212.543176][ T8480] ? find_held_lock+0x2d/0x110 [ 212.543230][ T8480] ? trace_hardirqs_on+0x38/0x1c0 [ 212.543271][ T8480] __x64_sys_bpf+0x75/0xb0 [ 212.543301][ T8480] ? syscall_enter_from_user_mode+0x21/0x70 [ 212.543336][ T8480] do_syscall_64+0x35/0xb0 [ 212.543365][ T8480] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 212.543393][ T8480] RIP: 0033:0x7f2e16289109 [ 212.543414][ T8480] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 212.543442][ T8480] RSP: 002b:00007f2e1731f168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 212.543468][ T8480] RAX: ffffffffffffffda RBX: 00007f2e1639bf60 RCX: 00007f2e16289109 [ 212.543487][ T8480] RDX: 0000000000000080 RSI: 00000000200001c0 RDI: 0000000000000005 [ 212.543502][ T8480] RBP: 00007f2e1731f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 212.543518][ T8480] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 212.543533][ T8480] R13: 00007ffde7446a9f R14: 00007f2e1731f300 R15: 0000000000022000 [ 212.543568][ T8480] [ 212.574569][ T8488] netlink: 1046 bytes leftover after parsing attributes in process `syz-executor.4'. [ 212.706900][ T8498] FAULT_INJECTION: forcing a failure. [ 212.706900][ T8498] name failslab, interval 1, probability 0, space 0, times 0 [ 212.706936][ T8498] CPU: 0 PID: 8498 Comm: syz-executor.5 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 212.706966][ T8498] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 212.706982][ T8498] Call Trace: [ 212.706990][ T8498] [ 212.706999][ T8498] dump_stack_lvl+0xcd/0x134 [ 212.707032][ T8498] should_fail.cold+0x5/0xa [ 212.707069][ T8498] ? __get_vm_area_node+0xed/0x3f0 [ 212.707098][ T8498] should_failslab+0x5/0x10 [ 212.707124][ T8498] kmem_cache_alloc_node_trace+0x59/0x420 [ 212.707161][ T8498] __get_vm_area_node+0xed/0x3f0 [ 212.707193][ T8498] __vmalloc_node_range+0x250/0x13e0 [ 212.707224][ T8498] ? bpf_patch_insn_data+0xa4/0x7e0 [ 212.707250][ T8498] ? is_bpf_text_address+0x99/0x170 [ 212.707279][ T8498] ? kernel_text_address+0x39/0x80 [ 212.707316][ T8498] ? arch_stack_walk+0x93/0xe0 [ 212.707349][ T8498] ? bpf_patch_insn_data+0xa4/0x7e0 [ 212.707385][ T8498] ? vfree_atomic+0xe0/0xe0 [ 212.707417][ T8498] ? __stack_depot_save+0x35/0x500 [ 212.707449][ T8498] ? bpf_patch_insn_data+0xa4/0x7e0 [ 212.707477][ T8498] vzalloc+0x67/0x80 [ 212.707506][ T8498] ? bpf_patch_insn_data+0xa4/0x7e0 [ 212.707533][ T8498] bpf_patch_insn_data+0xa4/0x7e0 [ 212.707558][ T8498] ? kasan_set_free_info+0x20/0x30 [ 212.707582][ T8498] ? ____kasan_slab_free+0x166/0x1a0 [ 212.707612][ T8498] ? kfree+0xd6/0x4d0 [ 212.707636][ T8498] ? kvfree+0x42/0x50 [ 212.707660][ T8498] ? bpf_check+0x9185/0xbbc0 [ 212.707690][ T8498] ? bpf_prog_load+0xfb2/0x2250 [ 212.707719][ T8498] ? __sys_bpf+0x11a1/0x5700 [ 212.707753][ T8498] do_misc_fixups+0x277d/0x3510 [ 212.707785][ T8498] ? find_held_lock+0x2d/0x110 [ 212.707824][ T8498] ? convert_ctx_accesses+0x1490/0x1490 [ 212.707854][ T8498] ? cmp_subprogs+0x11/0x90 [ 212.707884][ T8498] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 212.707913][ T8498] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 212.707941][ T8498] ? __sanitizer_cov_trace_cmp4+0x1c/0x70 [ 212.707968][ T8498] ? convert_ctx_accesses+0x3bc/0x1490 [ 212.707997][ T8498] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 212.708034][ T8498] ? bpf_patch_insn_data+0x7e0/0x7e0 [ 212.708065][ T8498] ? check_reference_leak+0x280/0x280 [ 212.708097][ T8498] ? kvfree+0x42/0x50 [ 212.708122][ T8498] ? kfree+0xd6/0x4d0 [ 212.708145][ T8498] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 212.708189][ T8498] bpf_check+0x4007/0xbbc0 [ 212.708241][ T8498] ? bpf_get_btf_vmlinux+0x10/0x10 [ 212.708275][ T8498] ? lock_downgrade+0x6e0/0x6e0 [ 212.708305][ T8498] ? __might_fault+0xd1/0x170 [ 212.708331][ T8498] ? lock_downgrade+0x6e0/0x6e0 [ 212.708370][ T8498] ? memset+0x20/0x40 [ 212.708392][ T8498] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 212.708421][ T8498] ? bpf_obj_name_cpy+0x144/0x1a0 [ 212.708452][ T8498] ? bpf_prog_load+0xf71/0x2250 [ 212.708483][ T8498] bpf_prog_load+0xfb2/0x2250 [ 212.708519][ T8498] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 212.708550][ T8498] ? find_held_lock+0x2d/0x110 [ 212.708584][ T8498] ? __might_fault+0xd1/0x170 [ 212.708610][ T8498] ? lock_downgrade+0x6e0/0x6e0 [ 212.708655][ T8498] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 212.708695][ T8498] __sys_bpf+0x11a1/0x5700 [ 212.708731][ T8498] ? bpf_perf_link_attach+0x520/0x520 [ 212.708763][ T8498] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 212.708808][ T8498] ? find_held_lock+0x2d/0x110 [ 212.708864][ T8498] ? trace_hardirqs_on+0x38/0x1c0 [ 212.708895][ T8498] __x64_sys_bpf+0x75/0xb0 [ 212.708924][ T8498] ? syscall_enter_from_user_mode+0x21/0x70 [ 212.708958][ T8498] do_syscall_64+0x35/0xb0 [ 212.708985][ T8498] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 212.709014][ T8498] RIP: 0033:0x7f2e16289109 [ 212.709036][ T8498] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 212.709061][ T8498] RSP: 002b:00007f2e1731f168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 212.709087][ T8498] RAX: ffffffffffffffda RBX: 00007f2e1639bf60 RCX: 00007f2e16289109 [ 212.709106][ T8498] RDX: 0000000000000080 RSI: 00000000200001c0 RDI: 0000000000000005 [ 212.709123][ T8498] RBP: 00007f2e1731f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 212.709140][ T8498] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 212.709157][ T8498] R13: 00007ffde7446a9f R14: 00007f2e1731f300 R15: 0000000000022000 [ 212.709192][ T8498] [ 212.725609][ T8498] warn_alloc: 18 callbacks suppressed [ 212.725629][ T8498] syz-executor.5: vmalloc error: size 504, vm_struct allocation failed, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=syz5,mems_allowed=0-1 [ 212.725708][ T8498] CPU: 0 PID: 8498 Comm: syz-executor.5 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 212.725738][ T8498] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 212.725753][ T8498] Call Trace: [ 212.725760][ T8498] [ 212.725769][ T8498] dump_stack_lvl+0xcd/0x134 [ 212.725802][ T8498] warn_alloc.cold+0x9b/0x189 [ 212.725835][ T8498] ? zone_watermark_ok_safe+0x290/0x290 [ 212.725879][ T8498] ? __kasan_kmalloc+0xbd/0xd0 [ 212.725913][ T8498] ? __get_vm_area_node+0x297/0x3f0 [ 212.725948][ T8498] ? __vmalloc_node_range+0xd3e/0x13e0 [ 212.725983][ T8498] __vmalloc_node_range+0xdff/0x13e0 [ 212.726016][ T8498] ? kernel_text_address+0x39/0x80 [ 212.726052][ T8498] ? arch_stack_walk+0x93/0xe0 [ 212.726085][ T8498] ? bpf_patch_insn_data+0xa4/0x7e0 [ 212.726118][ T8498] ? vfree_atomic+0xe0/0xe0 [ 212.726149][ T8498] ? __stack_depot_save+0x35/0x500 [ 212.726181][ T8498] ? bpf_patch_insn_data+0xa4/0x7e0 [ 212.726212][ T8498] vzalloc+0x67/0x80 [ 212.726242][ T8498] ? bpf_patch_insn_data+0xa4/0x7e0 [ 212.726269][ T8498] bpf_patch_insn_data+0xa4/0x7e0 [ 212.726294][ T8498] ? kasan_set_free_info+0x20/0x30 [ 212.726318][ T8498] ? ____kasan_slab_free+0x166/0x1a0 [ 212.726346][ T8498] ? kfree+0xd6/0x4d0 [ 212.726369][ T8498] ? kvfree+0x42/0x50 [ 212.726391][ T8498] ? bpf_check+0x9185/0xbbc0 [ 212.726415][ T8498] ? bpf_prog_load+0xfb2/0x2250 [ 212.726442][ T8498] ? __sys_bpf+0x11a1/0x5700 [ 212.726475][ T8498] do_misc_fixups+0x277d/0x3510 [ 212.726507][ T8498] ? find_held_lock+0x2d/0x110 [ 212.726544][ T8498] ? convert_ctx_accesses+0x1490/0x1490 [ 212.726574][ T8498] ? cmp_subprogs+0x11/0x90 [ 212.726604][ T8498] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 212.726636][ T8498] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 212.726665][ T8498] ? __sanitizer_cov_trace_cmp4+0x1c/0x70 [ 212.726699][ T8498] ? convert_ctx_accesses+0x3bc/0x1490 [ 212.726729][ T8498] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 212.726768][ T8498] ? bpf_patch_insn_data+0x7e0/0x7e0 [ 212.726799][ T8498] ? check_reference_leak+0x280/0x280 [ 212.726832][ T8498] ? kvfree+0x42/0x50 [ 212.726857][ T8498] ? kfree+0xd6/0x4d0 [ 212.726881][ T8498] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 212.726921][ T8498] bpf_check+0x4007/0xbbc0 [ 212.726972][ T8498] ? bpf_get_btf_vmlinux+0x10/0x10 [ 212.727006][ T8498] ? lock_downgrade+0x6e0/0x6e0 [ 212.727036][ T8498] ? __might_fault+0xd1/0x170 [ 212.727064][ T8498] ? lock_downgrade+0x6e0/0x6e0 [ 212.727104][ T8498] ? memset+0x20/0x40 [ 212.727127][ T8498] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 212.727156][ T8498] ? bpf_obj_name_cpy+0x144/0x1a0 [ 212.727186][ T8498] ? bpf_prog_load+0xf71/0x2250 [ 212.727218][ T8498] bpf_prog_load+0xfb2/0x2250 [ 212.727254][ T8498] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 212.727287][ T8498] ? find_held_lock+0x2d/0x110 [ 212.727320][ T8498] ? __might_fault+0xd1/0x170 [ 212.727346][ T8498] ? lock_downgrade+0x6e0/0x6e0 [ 212.727391][ T8498] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 212.727425][ T8498] __sys_bpf+0x11a1/0x5700 [ 212.727459][ T8498] ? bpf_perf_link_attach+0x520/0x520 [ 212.727490][ T8498] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 212.727532][ T8498] ? find_held_lock+0x2d/0x110 [ 212.727587][ T8498] ? trace_hardirqs_on+0x38/0x1c0 [ 212.727620][ T8498] __x64_sys_bpf+0x75/0xb0 [ 212.727648][ T8498] ? syscall_enter_from_user_mode+0x21/0x70 [ 212.727690][ T8498] do_syscall_64+0x35/0xb0 [ 212.727719][ T8498] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 212.727748][ T8498] RIP: 0033:0x7f2e16289109 [ 212.727770][ T8498] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 212.727796][ T8498] RSP: 002b:00007f2e1731f168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 212.727821][ T8498] RAX: ffffffffffffffda RBX: 00007f2e1639bf60 RCX: 00007f2e16289109 [ 212.727839][ T8498] RDX: 0000000000000080 RSI: 00000000200001c0 RDI: 0000000000000005 [ 212.727856][ T8498] RBP: 00007f2e1731f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 212.727873][ T8498] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 212.727891][ T8498] R13: 00007ffde7446a9f R14: 00007f2e1731f300 R15: 0000000000022000 [ 212.727926][ T8498] [ 212.728031][ T8498] Mem-Info: [ 212.728040][ T8498] active_anon:374 inactive_anon:48778 isolated_anon:0 [ 212.728040][ T8498] active_file:3651 inactive_file:7739 isolated_file:0 [ 212.728040][ T8498] unevictable:768 dirty:19 writeback:0 [ 212.728040][ T8498] slab_reclaimable:19316 slab_unreclaimable:95472 [ 212.728040][ T8498] mapped:17970 shmem:1387 pagetables:616 bounce:0 [ 212.728040][ T8498] kernel_misc_reclaimable:0 [ 212.728040][ T8498] free:1388004 free_pcp:11285 free_cma:0 [ 212.728118][ T8498] Node 0 active_anon:1496kB inactive_anon:195112kB active_file:14528kB inactive_file:30956kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:71880kB dirty:72kB writeback:0kB shmem:4012kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 4096kB writeback_tmp:0kB kernel_stack:10528kB pagetables:2460kB all_unreclaimable? no [ 212.728188][ T8498] Node 1 active_anon:0kB inactive_anon:0kB active_file:76kB inactive_file:0kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:1536kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:16kB pagetables:4kB all_unreclaimable? no [ 212.728254][ T8498] Node 0 DMA free:15360kB boost:0kB min:200kB low:248kB high:296kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 212.728328][ T8498] lowmem_reserve[]: 0 2633 2634 2634 2634 [ 212.728368][ T8498] Node 0 DMA32 free:1625952kB boost:0kB min:35572kB low:44464kB high:53356kB reserved_highatomic:0KB active_anon:1496kB inactive_anon:195112kB active_file:14528kB inactive_file:30956kB unevictable:1536kB writepending:72kB present:3129332kB managed:2702052kB mlocked:0kB bounce:0kB free_pcp:25876kB local_pcp:5064kB free_cma:0kB [ 212.728447][ T8498] lowmem_reserve[]: 0 0 1 1 1 [ 212.728485][ T8498] Node 0 Normal free:0kB boost:0kB min:12kB low:12kB high:12kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:1048576kB managed:1168kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 212.728556][ T8498] lowmem_reserve[]: 0 0 0 0 0 [ 212.728592][ T8498] Node 1 Normal free:3910704kB boost:0kB min:54316kB low:67892kB high:81468kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:76kB inactive_file:0kB unevictable:1536kB writepending:4kB present:4194304kB managed:4117620kB mlocked:0kB bounce:0kB free_pcp:19264kB local_pcp:9280kB free_cma:0kB [ 212.728672][ T8498] lowmem_reserve[]: 0 0 0 0 0 [ 212.728708][ T8498] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 212.728846][ T8498] Node 0 DMA32: 144*4kB (UME) 1298*8kB (UME) 903*16kB (UME) 805*32kB (UME) 326*64kB (UME) 150*128kB (UM) 119*256kB (UME) 86*512kB (UME) 54*1024kB (UM) 22*2048kB (UM) 332*4096kB (UM) = 1625952kB [ 212.729034][ T8498] Node 0 Normal: 0*4kB 0*8kB [ 212.730176][ T8499] FAULT_INJECTION: forcing a failure. [ 212.730176][ T8499] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 212.730300][ T8499] CPU: 0 PID: 8499 Comm: syz-executor.1 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 212.730329][ T8499] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 212.730344][ T8499] Call Trace: [ 212.730351][ T8499] [ 212.730360][ T8499] dump_stack_lvl+0xcd/0x134 [ 212.730391][ T8499] should_fail.cold+0x5/0xa [ 212.730429][ T8499] prepare_alloc_pages+0x17b/0x570 [ 212.730462][ T8499] __alloc_pages+0x12f/0x500 [ 212.730488][ T8499] ? __alloc_pages_slowpath.constprop.0+0x20e0/0x20e0 [ 212.730537][ T8499] alloc_pages+0x1aa/0x310 [ 212.730570][ T8499] __vmalloc_node_range+0x735/0x13e0 [ 212.730613][ T8499] ? netlink_sendmsg+0x690/0xe10 [ 212.730643][ T8499] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 212.730680][ T8499] ? vfree_atomic+0xe0/0xe0 [ 212.730711][ T8499] ? __netlink_dump_start+0x900/0x900 [ 212.730736][ T8499] ? netlink_sendmsg+0x690/0xe10 [ 212.730762][ T8499] vmalloc+0x67/0x80 [ 212.730790][ T8499] ? netlink_sendmsg+0x690/0xe10 [ 212.730814][ T8499] netlink_sendmsg+0x690/0xe10 [ 212.730844][ T8499] ? netlink_unicast+0x7f0/0x7f0 [ 212.730872][ T8499] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 212.730900][ T8499] ? netlink_unicast+0x7f0/0x7f0 [ 212.730922][ T8499] sock_sendmsg+0xcf/0x120 [ 212.730951][ T8499] ____sys_sendmsg+0x6eb/0x810 [ 212.730982][ T8499] ? kernel_sendmsg+0x50/0x50 [ 212.731001][ T8500] netlink: 1046 bytes leftover after parsing attributes in process `syz-executor.4'. [ 212.731007][ T8499] ? do_recvmmsg+0x6d0/0x6d0 [ 212.731030][ T8499] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 212.731064][ T8499] ? _parse_integer+0x30/0x30 [ 212.731100][ T8499] ___sys_sendmsg+0xf3/0x170 [ 212.731125][ T8499] ? sendmsg_copy_msghdr+0x160/0x160 [ 212.731157][ T8499] ? lock_downgrade+0x6e0/0x6e0 [ 212.731199][ T8499] ? __fget_files+0x286/0x470 [ 212.731236][ T8499] ? __fget_light+0xea/0x270 [ 212.731262][ T8499] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 212.731294][ T8499] __x64_sys_sendmsg+0x132/0x220 [ 212.731318][ T8499] ? __sys_sendmsg+0x1b0/0x1b0 [ 212.731358][ T8499] ? syscall_enter_from_user_mode+0x21/0x70 [ 212.731396][ T8499] do_syscall_64+0x35/0xb0 [ 212.731423][ T8499] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 212.731449][ T8499] RIP: 0033:0x7f55bba89109 [ 212.731469][ T8499] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 212.731493][ T8499] RSP: 002b:00007f55bcbef168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 212.731516][ T8499] RAX: ffffffffffffffda RBX: 00007f55bbb9bf60 RCX: 00007f55bba89109 [ 212.731531][ T8499] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 212.731545][ T8499] RBP: 00007f55bcbef1d0 R08: 0000000000000000 R09: 0000000000000000 [ 212.731561][ T8499] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 212.731576][ T8499] R13: 00007ffd14a51aef R14: 00007f55bcbef300 R15: 0000000000022000 [ 212.731608][ T8499] [ 212.745216][ T8498] 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 212.745418][ T8498] Node 1 Normal: 232*4kB (UE) 60*8kB (UE) 29*16kB (UME) 45*32kB (UME) 23*64kB (UME) 17*128kB (UE) 5*256kB (U) 2*512kB (UE) 2*1024kB (ME) 2*2048kB (UE) 951*4096kB (M) = 3910704kB [ 212.755873][ T8498] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 212.755896][ T8498] Node 0 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 212.755918][ T8498] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 212.755939][ T8498] Node 1 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 212.755960][ T8498] 12738 total pagecache pages [ 212.755969][ T8498] 0 pages in swap cache [ 212.755976][ T8498] Swap cache stats: add 0, delete 0, find 0/0 [ 212.755992][ T8498] Free swap = 0kB [ 212.755999][ T8498] Total swap = 0kB [ 212.756008][ T8498] 2097051 pages RAM [ 212.756015][ T8498] 0 pages HighMem/MovableOnly [ 212.756023][ T8498] 388001 pages reserved [ 212.756031][ T8498] 0 pages cma reserved [ 212.851951][ T8510] netlink: 1046 bytes leftover after parsing attributes in process `syz-executor.4'. [ 212.869544][ T8512] FAULT_INJECTION: forcing a failure. [ 212.869544][ T8512] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 212.869580][ T8512] CPU: 0 PID: 8512 Comm: syz-executor.1 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 212.869611][ T8512] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 212.869627][ T8512] Call Trace: [ 212.869634][ T8512] [ 212.869643][ T8512] dump_stack_lvl+0xcd/0x134 [ 212.869683][ T8512] should_fail.cold+0x5/0xa [ 212.869722][ T8512] prepare_alloc_pages+0x17b/0x570 [ 212.869758][ T8512] __alloc_pages+0x12f/0x500 [ 212.869785][ T8512] ? __alloc_pages_slowpath.constprop.0+0x20e0/0x20e0 [ 212.869836][ T8512] alloc_pages+0x1aa/0x310 [ 212.869869][ T8512] __vmalloc_node_range+0x735/0x13e0 [ 212.869914][ T8512] ? netlink_sendmsg+0x690/0xe10 [ 212.869943][ T8512] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 212.869973][ T8512] ? vfree_atomic+0xe0/0xe0 [ 212.870004][ T8512] ? __netlink_dump_start+0x900/0x900 [ 212.870029][ T8512] ? netlink_sendmsg+0x690/0xe10 [ 212.870055][ T8512] vmalloc+0x67/0x80 [ 212.870083][ T8512] ? netlink_sendmsg+0x690/0xe10 [ 212.870110][ T8512] netlink_sendmsg+0x690/0xe10 [ 212.870141][ T8512] ? netlink_unicast+0x7f0/0x7f0 [ 212.870171][ T8512] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 212.870199][ T8512] ? netlink_unicast+0x7f0/0x7f0 [ 212.870222][ T8512] sock_sendmsg+0xcf/0x120 [ 212.870254][ T8512] ____sys_sendmsg+0x6eb/0x810 [ 212.870284][ T8512] ? kernel_sendmsg+0x50/0x50 [ 212.870308][ T8512] ? do_recvmmsg+0x6d0/0x6d0 [ 212.870330][ T8512] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 212.870362][ T8512] ? _parse_integer+0x30/0x30 [ 212.870400][ T8512] ___sys_sendmsg+0xf3/0x170 [ 212.870426][ T8512] ? sendmsg_copy_msghdr+0x160/0x160 [ 212.870457][ T8512] ? lock_downgrade+0x6e0/0x6e0 [ 212.870500][ T8512] ? __fget_files+0x286/0x470 [ 212.870536][ T8512] ? __fget_light+0xea/0x270 [ 212.870560][ T8512] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 212.870591][ T8512] __x64_sys_sendmsg+0x132/0x220 [ 212.870614][ T8512] ? __sys_sendmsg+0x1b0/0x1b0 [ 212.870651][ T8512] ? syscall_enter_from_user_mode+0x21/0x70 [ 212.870701][ T8512] do_syscall_64+0x35/0xb0 [ 212.870728][ T8512] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 212.870755][ T8512] RIP: 0033:0x7f55bba89109 [ 212.870776][ T8512] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 212.870801][ T8512] RSP: 002b:00007f55bcbef168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 212.870825][ T8512] RAX: ffffffffffffffda RBX: 00007f55bbb9bf60 RCX: 00007f55bba89109 [ 212.870842][ T8512] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 212.870857][ T8512] RBP: 00007f55bcbef1d0 R08: 0000000000000000 R09: 0000000000000000 [ 212.870872][ T8512] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 212.870888][ T8512] R13: 00007ffd14a51aef R14: 00007f55bcbef300 R15: 0000000000022000 [ 212.870924][ T8512] [ 212.883566][ T8513] FAULT_INJECTION: forcing a failure. [ 212.883566][ T8513] name failslab, interval 1, probability 0, space 0, times 0 [ 212.888116][ T8513] CPU: 0 PID: 8513 Comm: syz-executor.5 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 212.888153][ T8513] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 212.888171][ T8513] Call Trace: [ 212.888179][ T8513] [ 212.888189][ T8513] dump_stack_lvl+0xcd/0x134 [ 212.888226][ T8513] should_fail.cold+0x5/0xa [ 212.888262][ T8513] ? __get_vm_area_node+0xed/0x3f0 [ 212.888294][ T8513] should_failslab+0x5/0x10 [ 212.888320][ T8513] kmem_cache_alloc_node_trace+0x59/0x420 [ 212.888359][ T8513] __get_vm_area_node+0xed/0x3f0 [ 212.888394][ T8513] __vmalloc_node_range+0x250/0x13e0 [ 212.888424][ T8513] ? bpf_patch_insn_data+0xa4/0x7e0 [ 212.888448][ T8513] ? is_bpf_text_address+0x99/0x170 [ 212.888476][ T8513] ? kernel_text_address+0x39/0x80 [ 212.888511][ T8513] ? arch_stack_walk+0x93/0xe0 [ 212.888543][ T8513] ? bpf_patch_insn_data+0xa4/0x7e0 [ 212.888577][ T8513] ? vfree_atomic+0xe0/0xe0 [ 212.888608][ T8513] ? __stack_depot_save+0x35/0x500 [ 212.888667][ T8513] ? bpf_patch_insn_data+0xa4/0x7e0 [ 212.888697][ T8513] vzalloc+0x67/0x80 [ 212.888726][ T8513] ? bpf_patch_insn_data+0xa4/0x7e0 [ 212.888753][ T8513] bpf_patch_insn_data+0xa4/0x7e0 [ 212.888778][ T8513] ? kasan_set_free_info+0x20/0x30 [ 212.888802][ T8513] ? ____kasan_slab_free+0x166/0x1a0 [ 212.888832][ T8513] ? kfree+0xd6/0x4d0 [ 212.888855][ T8513] ? kvfree+0x42/0x50 [ 212.888877][ T8513] ? bpf_check+0x9185/0xbbc0 [ 212.888899][ T8513] ? bpf_prog_load+0xfb2/0x2250 [ 212.888925][ T8513] ? __sys_bpf+0x11a1/0x5700 [ 212.888957][ T8513] do_misc_fixups+0x277d/0x3510 [ 212.888987][ T8513] ? find_held_lock+0x2d/0x110 [ 212.889023][ T8513] ? convert_ctx_accesses+0x1490/0x1490 [ 212.889053][ T8513] ? cmp_subprogs+0x11/0x90 [ 212.889081][ T8513] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 212.889109][ T8513] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 212.889137][ T8513] ? __sanitizer_cov_trace_cmp4+0x1c/0x70 [ 212.889161][ T8513] ? convert_ctx_accesses+0x3bc/0x1490 [ 212.889189][ T8513] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 212.889225][ T8513] ? bpf_patch_insn_data+0x7e0/0x7e0 [ 212.889256][ T8513] ? check_reference_leak+0x280/0x280 [ 212.889287][ T8513] ? kvfree+0x42/0x50 [ 212.889310][ T8513] ? kfree+0xd6/0x4d0 [ 212.889333][ T8513] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 212.889373][ T8513] bpf_check+0x4007/0xbbc0 [ 212.889422][ T8513] ? bpf_get_btf_vmlinux+0x10/0x10 [ 212.889456][ T8513] ? lock_downgrade+0x6e0/0x6e0 [ 212.889485][ T8513] ? __might_fault+0xd1/0x170 [ 212.889511][ T8513] ? lock_downgrade+0x6e0/0x6e0 [ 212.889551][ T8513] ? memset+0x20/0x40 [ 212.889572][ T8513] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 212.889599][ T8513] ? bpf_obj_name_cpy+0x144/0x1a0 [ 212.889629][ T8513] ? bpf_prog_load+0xf71/0x2250 [ 212.889668][ T8513] bpf_prog_load+0xfb2/0x2250 [ 212.889709][ T8513] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 212.889740][ T8513] ? find_held_lock+0x2d/0x110 [ 212.889772][ T8513] ? __might_fault+0xd1/0x170 [ 212.889797][ T8513] ? lock_downgrade+0x6e0/0x6e0 [ 212.889841][ T8513] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 212.889874][ T8513] __sys_bpf+0x11a1/0x5700 [ 212.889906][ T8513] ? bpf_perf_link_attach+0x520/0x520 [ 212.889936][ T8513] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 212.889978][ T8513] ? find_held_lock+0x2d/0x110 [ 212.890033][ T8513] ? trace_hardirqs_on+0x38/0x1c0 [ 212.890064][ T8513] __x64_sys_bpf+0x75/0xb0 [ 212.890091][ T8513] ? syscall_enter_from_user_mode+0x21/0x70 [ 212.890125][ T8513] do_syscall_64+0x35/0xb0 [ 212.890154][ T8513] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 212.890182][ T8513] RIP: 0033:0x7f2e16289109 [ 212.890202][ T8513] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 212.890230][ T8513] RSP: 002b:00007f2e1731f168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 212.890255][ T8513] RAX: ffffffffffffffda RBX: 00007f2e1639bf60 RCX: 00007f2e16289109 [ 212.890272][ T8513] RDX: 0000000000000080 RSI: 00000000200001c0 RDI: 0000000000000005 [ 212.890288][ T8513] RBP: 00007f2e1731f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 212.890304][ T8513] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 212.890319][ T8513] R13: 00007ffde7446a9f R14: 00007f2e1731f300 R15: 0000000000022000 [ 212.890356][ T8513] [ 213.037392][ T8521] FAULT_INJECTION: forcing a failure. [ 213.037392][ T8521] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 213.037427][ T8521] CPU: 1 PID: 8521 Comm: syz-executor.1 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 213.037455][ T8521] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 213.037470][ T8521] Call Trace: [ 213.037476][ T8521] [ 213.037485][ T8521] dump_stack_lvl+0xcd/0x134 [ 213.037518][ T8521] should_fail.cold+0x5/0xa [ 213.037557][ T8521] prepare_alloc_pages+0x17b/0x570 [ 213.037592][ T8521] __alloc_pages+0x12f/0x500 [ 213.037618][ T8521] ? __alloc_pages_slowpath.constprop.0+0x20e0/0x20e0 [ 213.037647][ T8521] ? __kmalloc_node+0x62/0x390 [ 213.037696][ T8521] alloc_pages+0x1aa/0x310 [ 213.037728][ T8521] __vmalloc_node_range+0x735/0x13e0 [ 213.037771][ T8521] ? netlink_sendmsg+0x690/0xe10 [ 213.037801][ T8521] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 213.037831][ T8521] ? vfree_atomic+0xe0/0xe0 [ 213.037860][ T8521] ? __netlink_dump_start+0x900/0x900 [ 213.037884][ T8521] ? netlink_sendmsg+0x690/0xe10 [ 213.037909][ T8521] vmalloc+0x67/0x80 [ 213.037936][ T8521] ? netlink_sendmsg+0x690/0xe10 [ 213.037960][ T8521] netlink_sendmsg+0x690/0xe10 [ 213.037990][ T8521] ? netlink_unicast+0x7f0/0x7f0 [ 213.038022][ T8521] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 213.038052][ T8521] ? netlink_unicast+0x7f0/0x7f0 [ 213.038076][ T8521] sock_sendmsg+0xcf/0x120 [ 213.038108][ T8521] ____sys_sendmsg+0x6eb/0x810 [ 213.038149][ T8521] ? kernel_sendmsg+0x50/0x50 [ 213.038178][ T8521] ? do_recvmmsg+0x6d0/0x6d0 [ 213.038205][ T8521] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 213.038241][ T8521] ? _parse_integer+0x30/0x30 [ 213.038277][ T8521] ___sys_sendmsg+0xf3/0x170 [ 213.038303][ T8521] ? sendmsg_copy_msghdr+0x160/0x160 [ 213.038332][ T8521] ? lock_downgrade+0x6e0/0x6e0 [ 213.038374][ T8521] ? __fget_files+0x286/0x470 [ 213.038409][ T8521] ? __fget_light+0xea/0x270 [ 213.038434][ T8521] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 213.038467][ T8521] __x64_sys_sendmsg+0x132/0x220 [ 213.038493][ T8521] ? __sys_sendmsg+0x1b0/0x1b0 [ 213.038533][ T8521] ? syscall_enter_from_user_mode+0x21/0x70 [ 213.038571][ T8521] do_syscall_64+0x35/0xb0 [ 213.038597][ T8521] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 213.038623][ T8521] RIP: 0033:0x7f55bba89109 [ 213.038643][ T8521] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 213.038665][ T8521] RSP: 002b:00007f55bcbef168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 213.038689][ T8521] RAX: ffffffffffffffda RBX: 00007f55bbb9bf60 RCX: 00007f55bba89109 [ 213.038707][ T8521] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 213.038723][ T8521] RBP: 00007f55bcbef1d0 R08: 0000000000000000 R09: 0000000000000000 [ 213.038739][ T8521] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 213.038754][ T8521] R13: 00007ffd14a51aef R14: 00007f55bcbef300 R15: 0000000000022000 [ 213.038790][ T8521] [ 213.047495][ T8523] FAULT_INJECTION: forcing a failure. [ 213.047495][ T8523] name failslab, interval 1, probability 0, space 0, times 0 [ 213.047528][ T8523] CPU: 0 PID: 8523 Comm: syz-executor.5 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 213.047555][ T8523] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 213.047569][ T8523] Call Trace: [ 213.047576][ T8523] [ 213.047583][ T8523] dump_stack_lvl+0xcd/0x134 [ 213.047616][ T8523] should_fail.cold+0x5/0xa [ 213.047664][ T8523] should_failslab+0x5/0x10 [ 213.047693][ T8523] kmem_cache_alloc_node+0x65/0x3f0 [ 213.047723][ T8523] ? alloc_vmap_area+0x16f/0x1f00 [ 213.047759][ T8523] alloc_vmap_area+0x16f/0x1f00 [ 213.047790][ T8523] ? kmem_cache_alloc_node_trace+0x46/0x420 [ 213.047835][ T8523] ? free_vmap_area+0x1ac0/0x1ac0 [ 213.047865][ T8523] ? rcu_read_lock_sched_held+0x3a/0x70 [ 213.047908][ T8523] ? trace_kmalloc_node+0x32/0x100 [ 213.047945][ T8523] __get_vm_area_node+0x142/0x3f0 [ 213.047982][ T8523] __vmalloc_node_range+0x250/0x13e0 [ 213.048015][ T8523] ? bpf_patch_insn_data+0xa4/0x7e0 [ 213.048040][ T8523] ? is_bpf_text_address+0x99/0x170 [ 213.048067][ T8523] ? kernel_text_address+0x39/0x80 [ 213.048102][ T8523] ? arch_stack_walk+0x93/0xe0 [ 213.048135][ T8523] ? bpf_patch_insn_data+0xa4/0x7e0 [ 213.048167][ T8523] ? vfree_atomic+0xe0/0xe0 [ 213.048196][ T8523] ? __stack_depot_save+0x35/0x500 [ 213.048225][ T8523] ? bpf_patch_insn_data+0xa4/0x7e0 [ 213.048252][ T8523] vzalloc+0x67/0x80 [ 213.048279][ T8523] ? bpf_patch_insn_data+0xa4/0x7e0 [ 213.048305][ T8523] bpf_patch_insn_data+0xa4/0x7e0 [ 213.048333][ T8523] ? kasan_set_free_info+0x20/0x30 [ 213.048358][ T8523] ? ____kasan_slab_free+0x166/0x1a0 [ 213.048388][ T8523] ? kfree+0xd6/0x4d0 [ 213.048412][ T8523] ? kvfree+0x42/0x50 [ 213.048442][ T8523] ? bpf_check+0x9185/0xbbc0 [ 213.048466][ T8523] ? bpf_prog_load+0xfb2/0x2250 [ 213.048492][ T8523] ? __sys_bpf+0x11a1/0x5700 [ 213.048521][ T8523] do_misc_fixups+0x277d/0x3510 [ 213.048549][ T8523] ? find_held_lock+0x2d/0x110 [ 213.048586][ T8523] ? convert_ctx_accesses+0x1490/0x1490 [ 213.048616][ T8523] ? cmp_subprogs+0x11/0x90 [ 213.048649][ T8523] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 213.048684][ T8523] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 213.048713][ T8523] ? __sanitizer_cov_trace_cmp4+0x1c/0x70 [ 213.048742][ T8523] ? convert_ctx_accesses+0x3bc/0x1490 [ 213.048773][ T8523] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 213.048812][ T8523] ? bpf_patch_insn_data+0x7e0/0x7e0 [ 213.048844][ T8523] ? check_reference_leak+0x280/0x280 [ 213.048877][ T8523] ? kvfree+0x42/0x50 [ 213.048902][ T8523] ? kfree+0xd6/0x4d0 [ 213.048925][ T8523] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 213.048969][ T8523] bpf_check+0x4007/0xbbc0 [ 213.049023][ T8523] ? bpf_get_btf_vmlinux+0x10/0x10 [ 213.049057][ T8523] ? lock_downgrade+0x6e0/0x6e0 [ 213.049087][ T8523] ? __might_fault+0xd1/0x170 [ 213.049113][ T8523] ? lock_downgrade+0x6e0/0x6e0 [ 213.049151][ T8523] ? memset+0x20/0x40 [ 213.049172][ T8523] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 213.049198][ T8523] ? bpf_obj_name_cpy+0x144/0x1a0 [ 213.049228][ T8523] ? bpf_prog_load+0xf71/0x2250 [ 213.049260][ T8523] bpf_prog_load+0xfb2/0x2250 [ 213.049298][ T8523] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 213.049331][ T8523] ? find_held_lock+0x2d/0x110 [ 213.049366][ T8523] ? __might_fault+0xd1/0x170 [ 213.049393][ T8523] ? lock_downgrade+0x6e0/0x6e0 [ 213.049439][ T8523] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 213.049474][ T8523] __sys_bpf+0x11a1/0x5700 [ 213.049508][ T8523] ? bpf_perf_link_attach+0x520/0x520 [ 213.049538][ T8523] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 213.049581][ T8523] ? find_held_lock+0x2d/0x110 [ 213.049640][ T8523] ? trace_hardirqs_on+0x38/0x1c0 [ 213.049680][ T8523] __x64_sys_bpf+0x75/0xb0 [ 213.049711][ T8523] ? syscall_enter_from_user_mode+0x21/0x70 [ 213.049747][ T8523] do_syscall_64+0x35/0xb0 [ 213.049773][ T8523] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 213.049800][ T8523] RIP: 0033:0x7f2e16289109 [ 213.049821][ T8523] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 213.049848][ T8523] RSP: 002b:00007f2e1731f168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 213.049872][ T8523] RAX: ffffffffffffffda RBX: 00007f2e1639bf60 RCX: 00007f2e16289109 [ 213.049889][ T8523] RDX: 0000000000000080 RSI: 00000000200001c0 RDI: 0000000000000005 [ 213.049906][ T8523] RBP: 00007f2e1731f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 213.049924][ T8523] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 213.049941][ T8523] R13: 00007ffde7446a9f R14: 00007f2e1731f300 R15: 0000000000022000 [ 213.049979][ T8523] [ 213.427332][ T8534] FAULT_INJECTION: forcing a failure. [ 213.427332][ T8534] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 213.427366][ T8534] CPU: 0 PID: 8534 Comm: syz-executor.1 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 213.427395][ T8534] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 213.427410][ T8534] Call Trace: [ 213.427417][ T8534] [ 213.427426][ T8534] dump_stack_lvl+0xcd/0x134 [ 213.427457][ T8534] should_fail.cold+0x5/0xa [ 213.427494][ T8534] prepare_alloc_pages+0x17b/0x570 [ 213.427528][ T8534] __alloc_pages+0x12f/0x500 [ 213.427555][ T8534] ? __alloc_pages_slowpath.constprop.0+0x20e0/0x20e0 [ 213.427585][ T8534] ? __kmalloc_node+0x62/0x390 [ 213.427633][ T8534] alloc_pages+0x1aa/0x310 [ 213.427666][ T8534] __vmalloc_node_range+0x735/0x13e0 [ 213.427710][ T8534] ? netlink_sendmsg+0x690/0xe10 [ 213.427739][ T8534] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 213.427774][ T8534] ? vfree_atomic+0xe0/0xe0 [ 213.427804][ T8534] ? __netlink_dump_start+0x900/0x900 [ 213.427831][ T8534] ? netlink_sendmsg+0x690/0xe10 [ 213.427858][ T8534] vmalloc+0x67/0x80 [ 213.427885][ T8534] ? netlink_sendmsg+0x690/0xe10 [ 213.427908][ T8534] netlink_sendmsg+0x690/0xe10 [ 213.427938][ T8534] ? netlink_unicast+0x7f0/0x7f0 [ 213.427969][ T8534] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 213.428000][ T8534] ? netlink_unicast+0x7f0/0x7f0 [ 213.428024][ T8534] sock_sendmsg+0xcf/0x120 [ 213.428056][ T8534] ____sys_sendmsg+0x6eb/0x810 [ 213.428089][ T8534] ? kernel_sendmsg+0x50/0x50 [ 213.428116][ T8534] ? do_recvmmsg+0x6d0/0x6d0 [ 213.428139][ T8534] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 213.428182][ T8534] ? _parse_integer+0x30/0x30 [ 213.428221][ T8534] ___sys_sendmsg+0xf3/0x170 [ 213.428248][ T8534] ? sendmsg_copy_msghdr+0x160/0x160 [ 213.428280][ T8534] ? lock_downgrade+0x6e0/0x6e0 [ 213.428323][ T8534] ? __fget_files+0x286/0x470 [ 213.428360][ T8534] ? __fget_light+0xea/0x270 [ 213.428387][ T8534] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 213.428420][ T8534] __x64_sys_sendmsg+0x132/0x220 [ 213.428447][ T8534] ? __sys_sendmsg+0x1b0/0x1b0 [ 213.428488][ T8534] ? syscall_enter_from_user_mode+0x21/0x70 [ 213.428527][ T8534] do_syscall_64+0x35/0xb0 [ 213.428555][ T8534] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 213.428582][ T8534] RIP: 0033:0x7f55bba89109 [ 213.428602][ T8534] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 213.428628][ T8534] RSP: 002b:00007f55bcbef168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 213.428654][ T8534] RAX: ffffffffffffffda RBX: 00007f55bbb9bf60 RCX: 00007f55bba89109 [ 213.428673][ T8534] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 213.428689][ T8534] RBP: 00007f55bcbef1d0 R08: 0000000000000000 R09: 0000000000000000 [ 213.428705][ T8534] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 213.428721][ T8534] R13: 00007ffd14a51aef R14: 00007f55bcbef300 R15: 0000000000022000 [ 213.428757][ T8534] [ 213.430741][ T8532] FAULT_INJECTION: forcing a failure. [ 213.430741][ T8532] name failslab, interval 1, probability 0, space 0, times 0 [ 213.430787][ T8532] CPU: 1 PID: 8532 Comm: syz-executor.5 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 213.430816][ T8532] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 213.430831][ T8532] Call Trace: [ 213.430838][ T8532] [ 213.430847][ T8532] dump_stack_lvl+0xcd/0x134 [ 213.430879][ T8532] should_fail.cold+0x5/0xa [ 213.430914][ T8532] ? __get_vm_area_node+0xed/0x3f0 [ 213.430941][ T8532] should_failslab+0x5/0x10 [ 213.430967][ T8532] kmem_cache_alloc_node_trace+0x59/0x420 [ 213.431003][ T8532] __get_vm_area_node+0xed/0x3f0 [ 213.431038][ T8532] __vmalloc_node_range+0x250/0x13e0 [ 213.431073][ T8532] ? bpf_patch_insn_data+0xa4/0x7e0 [ 213.431101][ T8532] ? is_bpf_text_address+0x99/0x170 [ 213.431132][ T8532] ? kernel_text_address+0x39/0x80 [ 213.431172][ T8532] ? arch_stack_walk+0x93/0xe0 [ 213.431209][ T8532] ? bpf_patch_insn_data+0xa4/0x7e0 [ 213.431246][ T8532] ? vfree_atomic+0xe0/0xe0 [ 213.431275][ T8532] ? __stack_depot_save+0x35/0x500 [ 213.431305][ T8532] ? bpf_patch_insn_data+0xa4/0x7e0 [ 213.431327][ T8532] vzalloc+0x67/0x80 [ 213.431348][ T8532] ? bpf_patch_insn_data+0xa4/0x7e0 [ 213.431369][ T8532] bpf_patch_insn_data+0xa4/0x7e0 [ 213.431391][ T8532] ? kasan_set_free_info+0x20/0x30 [ 213.431415][ T8532] ? ____kasan_slab_free+0x166/0x1a0 [ 213.431445][ T8532] ? kfree+0xd6/0x4d0 [ 213.431469][ T8532] ? kvfree+0x42/0x50 [ 213.431491][ T8532] ? bpf_check+0x9185/0xbbc0 [ 213.431513][ T8532] ? bpf_prog_load+0xfb2/0x2250 [ 213.431539][ T8532] ? __sys_bpf+0x11a1/0x5700 [ 213.431569][ T8532] do_misc_fixups+0x277d/0x3510 [ 213.431601][ T8532] ? find_held_lock+0x2d/0x110 [ 213.431635][ T8532] ? convert_ctx_accesses+0x1490/0x1490 [ 213.431665][ T8532] ? cmp_subprogs+0x11/0x90 [ 213.431701][ T8532] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 213.431731][ T8532] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 213.431760][ T8532] ? __sanitizer_cov_trace_cmp4+0x1c/0x70 [ 213.431788][ T8532] ? convert_ctx_accesses+0x3bc/0x1490 [ 213.431818][ T8532] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 213.431856][ T8532] ? bpf_patch_insn_data+0x7e0/0x7e0 [ 213.431889][ T8532] ? check_reference_leak+0x280/0x280 [ 213.431921][ T8532] ? kvfree+0x42/0x50 [ 213.431946][ T8532] ? kfree+0xd6/0x4d0 [ 213.431970][ T8532] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 213.432013][ T8532] bpf_check+0x4007/0xbbc0 [ 213.432066][ T8532] ? bpf_get_btf_vmlinux+0x10/0x10 [ 213.432100][ T8532] ? lock_downgrade+0x6e0/0x6e0 [ 213.432130][ T8532] ? __might_fault+0xd1/0x170 [ 213.432156][ T8532] ? lock_downgrade+0x6e0/0x6e0 [ 213.432196][ T8532] ? memset+0x20/0x40 [ 213.432217][ T8532] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 213.432247][ T8532] ? bpf_obj_name_cpy+0x144/0x1a0 [ 213.432277][ T8532] ? bpf_prog_load+0xf71/0x2250 [ 213.432309][ T8532] bpf_prog_load+0xfb2/0x2250 [ 213.432347][ T8532] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 213.432379][ T8532] ? find_held_lock+0x2d/0x110 [ 213.432413][ T8532] ? __might_fault+0xd1/0x170 [ 213.432439][ T8532] ? lock_downgrade+0x6e0/0x6e0 [ 213.432484][ T8532] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 213.432517][ T8532] __sys_bpf+0x11a1/0x5700 [ 213.432551][ T8532] ? bpf_perf_link_attach+0x520/0x520 [ 213.432583][ T8532] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 213.432626][ T8532] ? find_held_lock+0x2d/0x110 [ 213.432691][ T8532] ? trace_hardirqs_on+0x38/0x1c0 [ 213.432723][ T8532] __x64_sys_bpf+0x75/0xb0 [ 213.432753][ T8532] ? syscall_enter_from_user_mode+0x21/0x70 [ 213.432788][ T8532] do_syscall_64+0x35/0xb0 [ 213.432817][ T8532] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 213.432844][ T8532] RIP: 0033:0x7f2e16289109 [ 213.432865][ T8532] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 213.432891][ T8532] RSP: 002b:00007f2e1731f168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 213.432916][ T8532] RAX: ffffffffffffffda RBX: 00007f2e1639bf60 RCX: 00007f2e16289109 [ 213.432935][ T8532] RDX: 0000000000000080 RSI: 00000000200001c0 RDI: 0000000000000005 [ 213.432952][ T8532] RBP: 00007f2e1731f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 213.432969][ T8532] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 213.432985][ T8532] R13: 00007ffde7446a9f R14: 00007f2e1731f300 R15: 0000000000022000 [ 213.433022][ T8532] [ 213.569194][ T8545] FAULT_INJECTION: forcing a failure. [ 213.569194][ T8545] name failslab, interval 1, probability 0, space 0, times 0 [ 213.569233][ T8545] CPU: 1 PID: 8545 Comm: syz-executor.5 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 213.569263][ T8545] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 213.569279][ T8545] Call Trace: [ 213.569286][ T8545] [ 213.569296][ T8545] dump_stack_lvl+0xcd/0x134 [ 213.569329][ T8545] should_fail.cold+0x5/0xa [ 213.569367][ T8545] should_failslab+0x5/0x10 [ 213.569395][ T8545] kmem_cache_alloc_node+0x65/0x3f0 [ 213.569423][ T8545] ? alloc_vmap_area+0x16f/0x1f00 [ 213.569457][ T8545] alloc_vmap_area+0x16f/0x1f00 [ 213.569487][ T8545] ? kmem_cache_alloc_node_trace+0x46/0x420 [ 213.569529][ T8545] ? free_vmap_area+0x1ac0/0x1ac0 [ 213.569559][ T8545] ? rcu_read_lock_sched_held+0x3a/0x70 [ 213.569599][ T8545] ? trace_kmalloc_node+0x32/0x100 [ 213.569636][ T8545] __get_vm_area_node+0x142/0x3f0 [ 213.569669][ T8545] __vmalloc_node_range+0x250/0x13e0 [ 213.569700][ T8545] ? bpf_patch_insn_data+0xa4/0x7e0 [ 213.569725][ T8545] ? is_bpf_text_address+0x99/0x170 [ 213.569753][ T8545] ? kernel_text_address+0x39/0x80 [ 213.569787][ T8545] ? arch_stack_walk+0x93/0xe0 [ 213.569820][ T8545] ? bpf_patch_insn_data+0xa4/0x7e0 [ 213.569854][ T8545] ? vfree_atomic+0xe0/0xe0 [ 213.569885][ T8545] ? __stack_depot_save+0x35/0x500 [ 213.569918][ T8545] ? bpf_patch_insn_data+0xa4/0x7e0 [ 213.569950][ T8545] vzalloc+0x67/0x80 [ 213.569978][ T8545] ? bpf_patch_insn_data+0xa4/0x7e0 [ 213.570005][ T8545] bpf_patch_insn_data+0xa4/0x7e0 [ 213.570031][ T8545] ? kasan_set_free_info+0x20/0x30 [ 213.570055][ T8545] ? ____kasan_slab_free+0x166/0x1a0 [ 213.570086][ T8545] ? kfree+0xd6/0x4d0 [ 213.570109][ T8545] ? kvfree+0x42/0x50 [ 213.570132][ T8545] ? bpf_check+0x9185/0xbbc0 [ 213.570165][ T8545] ? bpf_prog_load+0xfb2/0x2250 [ 213.570192][ T8545] ? __sys_bpf+0x11a1/0x5700 [ 213.570225][ T8545] do_misc_fixups+0x277d/0x3510 [ 213.570253][ T8545] ? find_held_lock+0x2d/0x110 [ 213.570289][ T8545] ? convert_ctx_accesses+0x1490/0x1490 [ 213.570319][ T8545] ? cmp_subprogs+0x11/0x90 [ 213.570348][ T8545] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 213.570377][ T8545] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 213.570405][ T8545] ? __sanitizer_cov_trace_cmp4+0x1c/0x70 [ 213.570432][ T8545] ? convert_ctx_accesses+0x3bc/0x1490 [ 213.570461][ T8545] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 213.570498][ T8545] ? bpf_patch_insn_data+0x7e0/0x7e0 [ 213.570537][ T8545] ? check_reference_leak+0x280/0x280 [ 213.570570][ T8545] ? kvfree+0x42/0x50 [ 213.570597][ T8545] ? kfree+0xd6/0x4d0 [ 213.570621][ T8545] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 213.570665][ T8545] bpf_check+0x4007/0xbbc0 [ 213.570714][ T8545] ? bpf_get_btf_vmlinux+0x10/0x10 [ 213.570749][ T8545] ? lock_downgrade+0x6e0/0x6e0 [ 213.570779][ T8545] ? __might_fault+0xd1/0x170 [ 213.570806][ T8545] ? lock_downgrade+0x6e0/0x6e0 [ 213.570846][ T8545] ? memset+0x20/0x40 [ 213.570868][ T8545] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 213.570898][ T8545] ? bpf_obj_name_cpy+0x144/0x1a0 [ 213.570928][ T8545] ? bpf_prog_load+0xf71/0x2250 [ 213.570960][ T8545] bpf_prog_load+0xfb2/0x2250 [ 213.570997][ T8545] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 213.571029][ T8545] ? find_held_lock+0x2d/0x110 [ 213.571063][ T8545] ? __might_fault+0xd1/0x170 [ 213.571087][ T8545] ? lock_downgrade+0x6e0/0x6e0 [ 213.571133][ T8545] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 213.571180][ T8545] __sys_bpf+0x11a1/0x5700 [ 213.571214][ T8545] ? bpf_perf_link_attach+0x520/0x520 [ 213.571244][ T8545] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 213.571288][ T8545] ? find_held_lock+0x2d/0x110 [ 213.571346][ T8545] ? trace_hardirqs_on+0x38/0x1c0 [ 213.571377][ T8545] __x64_sys_bpf+0x75/0xb0 [ 213.571406][ T8545] ? syscall_enter_from_user_mode+0x21/0x70 [ 213.571440][ T8545] do_syscall_64+0x35/0xb0 [ 213.571466][ T8545] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 213.571494][ T8545] RIP: 0033:0x7f2e16289109 [ 213.571515][ T8545] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 213.571543][ T8545] RSP: 002b:00007f2e1731f168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 213.571570][ T8545] RAX: ffffffffffffffda RBX: 00007f2e1639bf60 RCX: 00007f2e16289109 [ 213.571589][ T8545] RDX: 0000000000000080 RSI: 00000000200001c0 RDI: 0000000000000005 [ 213.571606][ T8545] RBP: 00007f2e1731f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 213.571623][ T8545] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 213.571639][ T8545] R13: 00007ffde7446a9f R14: 00007f2e1731f300 R15: 0000000000022000 [ 213.571707][ T8545] [ 213.588186][ T8546] FAULT_INJECTION: forcing a failure. [ 213.588186][ T8546] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 213.588220][ T8546] CPU: 0 PID: 8546 Comm: syz-executor.1 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 213.588247][ T8546] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 213.588262][ T8546] Call Trace: [ 213.588268][ T8546] [ 213.588277][ T8546] dump_stack_lvl+0xcd/0x134 [ 213.588311][ T8546] should_fail.cold+0x5/0xa [ 213.588348][ T8546] prepare_alloc_pages+0x17b/0x570 [ 213.588382][ T8546] __alloc_pages+0x12f/0x500 [ 213.588408][ T8546] ? __alloc_pages_slowpath.constprop.0+0x20e0/0x20e0 [ 213.588438][ T8546] ? __kmalloc_node+0x62/0x390 [ 213.588483][ T8546] alloc_pages+0x1aa/0x310 [ 213.588516][ T8546] __vmalloc_node_range+0x735/0x13e0 [ 213.588560][ T8546] ? netlink_sendmsg+0x690/0xe10 [ 213.588599][ T8546] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 213.588631][ T8546] ? vfree_atomic+0xe0/0xe0 [ 213.588662][ T8546] ? __netlink_dump_start+0x900/0x900 [ 213.588690][ T8546] ? netlink_sendmsg+0x690/0xe10 [ 213.588719][ T8546] vmalloc+0x67/0x80 [ 213.588747][ T8546] ? netlink_sendmsg+0x690/0xe10 [ 213.588772][ T8546] netlink_sendmsg+0x690/0xe10 [ 213.588804][ T8546] ? netlink_unicast+0x7f0/0x7f0 [ 213.588836][ T8546] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 213.588867][ T8546] ? netlink_unicast+0x7f0/0x7f0 [ 213.588892][ T8546] sock_sendmsg+0xcf/0x120 [ 213.588925][ T8546] ____sys_sendmsg+0x6eb/0x810 [ 213.588959][ T8546] ? kernel_sendmsg+0x50/0x50 [ 213.588987][ T8546] ? do_recvmmsg+0x6d0/0x6d0 [ 213.589011][ T8546] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 213.589046][ T8546] ? _parse_integer+0x30/0x30 [ 213.589082][ T8546] ___sys_sendmsg+0xf3/0x170 [ 213.589107][ T8546] ? sendmsg_copy_msghdr+0x160/0x160 [ 213.589135][ T8546] ? lock_downgrade+0x6e0/0x6e0 [ 213.589176][ T8546] ? __fget_files+0x286/0x470 [ 213.589210][ T8546] ? __fget_light+0xea/0x270 [ 213.589235][ T8546] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 213.589269][ T8546] __x64_sys_sendmsg+0x132/0x220 [ 213.589295][ T8546] ? __sys_sendmsg+0x1b0/0x1b0 [ 213.589334][ T8546] ? syscall_enter_from_user_mode+0x21/0x70 [ 213.589371][ T8546] do_syscall_64+0x35/0xb0 [ 213.589395][ T8546] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 213.589417][ T8546] RIP: 0033:0x7f55bba89109 [ 213.589437][ T8546] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 213.589464][ T8546] RSP: 002b:00007f55bcbef168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 213.589487][ T8546] RAX: ffffffffffffffda RBX: 00007f55bbb9bf60 RCX: 00007f55bba89109 [ 213.589500][ T8546] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 213.589512][ T8546] RBP: 00007f55bcbef1d0 R08: 0000000000000000 R09: 0000000000000000 [ 213.589526][ T8546] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 213.589540][ T8546] R13: 00007ffd14a51aef R14: 00007f55bcbef300 R15: 0000000000022000 [ 213.589568][ T8546] [ 213.777631][ T8556] FAULT_INJECTION: forcing a failure. [ 213.777631][ T8556] name failslab, interval 1, probability 0, space 0, times 0 [ 213.777666][ T8556] CPU: 1 PID: 8556 Comm: syz-executor.5 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 213.777694][ T8556] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 213.777708][ T8556] Call Trace: [ 213.777716][ T8556] [ 213.777724][ T8556] dump_stack_lvl+0xcd/0x134 [ 213.777755][ T8556] should_fail.cold+0x5/0xa [ 213.777788][ T8556] ? __get_vm_area_node+0xed/0x3f0 [ 213.777822][ T8556] should_failslab+0x5/0x10 [ 213.777849][ T8556] kmem_cache_alloc_node_trace+0x59/0x420 [ 213.777886][ T8556] __get_vm_area_node+0xed/0x3f0 [ 213.777919][ T8556] __vmalloc_node_range+0x250/0x13e0 [ 213.777949][ T8556] ? bpf_prog_alloc_no_stats+0x38/0x470 [ 213.777989][ T8556] ? bpf_prog_alloc_no_stats+0x38/0x470 [ 213.778021][ T8556] ? vfree_atomic+0xe0/0xe0 [ 213.778054][ T8556] ? bpf_prog_alloc_no_stats+0x38/0x470 [ 213.778080][ T8556] __vmalloc+0x69/0x80 [ 213.778106][ T8556] ? bpf_prog_alloc_no_stats+0x38/0x470 [ 213.778133][ T8556] bpf_prog_alloc_no_stats+0x38/0x470 [ 213.778162][ T8556] bpf_check+0x630e/0xbbc0 [ 213.778208][ T8556] ? bpf_get_btf_vmlinux+0x10/0x10 [ 213.778245][ T8556] ? lock_downgrade+0x6e0/0x6e0 [ 213.778276][ T8556] ? lock_downgrade+0x6e0/0x6e0 [ 213.778313][ T8556] ? memset+0x20/0x40 [ 213.778336][ T8556] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 213.778364][ T8556] ? bpf_obj_name_cpy+0x144/0x1a0 [ 213.778393][ T8556] ? bpf_prog_load+0xf71/0x2250 [ 213.778424][ T8556] bpf_prog_load+0xfb2/0x2250 [ 213.778461][ T8556] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 213.778493][ T8556] ? find_held_lock+0x2d/0x110 [ 213.778527][ T8556] ? __might_fault+0xd1/0x170 [ 213.778552][ T8556] ? lock_downgrade+0x6e0/0x6e0 [ 213.778598][ T8556] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 213.778630][ T8556] __sys_bpf+0x11a1/0x5700 [ 213.778665][ T8556] ? bpf_perf_link_attach+0x520/0x520 [ 213.778695][ T8556] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 213.778738][ T8556] ? find_held_lock+0x2d/0x110 [ 213.778796][ T8556] ? trace_hardirqs_on+0x38/0x1c0 [ 213.778835][ T8556] __x64_sys_bpf+0x75/0xb0 [ 213.778865][ T8556] ? syscall_enter_from_user_mode+0x21/0x70 [ 213.778899][ T8556] do_syscall_64+0x35/0xb0 [ 213.778927][ T8556] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 213.778954][ T8556] RIP: 0033:0x7f2e16289109 [ 213.778976][ T8556] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 213.779002][ T8556] RSP: 002b:00007f2e1731f168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 213.779029][ T8556] RAX: ffffffffffffffda RBX: 00007f2e1639bf60 RCX: 00007f2e16289109 [ 213.779048][ T8556] RDX: 0000000000000080 RSI: 00000000200001c0 RDI: 0000000000000005 [ 213.779066][ T8556] RBP: 00007f2e1731f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 213.779084][ T8556] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 213.779100][ T8556] R13: 00007ffde7446a9f R14: 00007f2e1731f300 R15: 0000000000022000 [ 213.779136][ T8556] [ 213.787039][ T8557] FAULT_INJECTION: forcing a failure. [ 213.787039][ T8557] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 213.787074][ T8557] CPU: 0 PID: 8557 Comm: syz-executor.1 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 213.787100][ T8557] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 213.787114][ T8557] Call Trace: [ 213.787121][ T8557] [ 213.787128][ T8557] dump_stack_lvl+0xcd/0x134 [ 213.787159][ T8557] should_fail.cold+0x5/0xa [ 213.787197][ T8557] prepare_alloc_pages+0x17b/0x570 [ 213.787231][ T8557] __alloc_pages+0x12f/0x500 [ 213.787257][ T8557] ? __alloc_pages_slowpath.constprop.0+0x20e0/0x20e0 [ 213.787288][ T8557] ? __kmalloc_node+0x62/0x390 [ 213.787346][ T8557] alloc_pages+0x1aa/0x310 [ 213.787381][ T8557] __vmalloc_node_range+0x735/0x13e0 [ 213.787420][ T8557] ? netlink_sendmsg+0x690/0xe10 [ 213.787450][ T8557] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 213.787482][ T8557] ? vfree_atomic+0xe0/0xe0 [ 213.787515][ T8557] ? __netlink_dump_start+0x900/0x900 [ 213.787542][ T8557] ? netlink_sendmsg+0x690/0xe10 [ 213.787570][ T8557] vmalloc+0x67/0x80 [ 213.787598][ T8557] ? netlink_sendmsg+0x690/0xe10 [ 213.787624][ T8557] netlink_sendmsg+0x690/0xe10 [ 213.787655][ T8557] ? netlink_unicast+0x7f0/0x7f0 [ 213.787687][ T8557] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 213.787717][ T8557] ? netlink_unicast+0x7f0/0x7f0 [ 213.787742][ T8557] sock_sendmsg+0xcf/0x120 [ 213.787775][ T8557] ____sys_sendmsg+0x6eb/0x810 [ 213.787809][ T8557] ? kernel_sendmsg+0x50/0x50 [ 213.787837][ T8557] ? do_recvmmsg+0x6d0/0x6d0 [ 213.787862][ T8557] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 213.787897][ T8557] ? _parse_integer+0x30/0x30 [ 213.787933][ T8557] ___sys_sendmsg+0xf3/0x170 [ 213.787957][ T8557] ? sendmsg_copy_msghdr+0x160/0x160 [ 213.787986][ T8557] ? lock_downgrade+0x6e0/0x6e0 [ 213.788030][ T8557] ? __fget_files+0x286/0x470 [ 213.788072][ T8557] ? __fget_light+0xea/0x270 [ 213.788101][ T8557] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 213.788138][ T8557] __x64_sys_sendmsg+0x132/0x220 [ 213.788168][ T8557] ? __sys_sendmsg+0x1b0/0x1b0 [ 213.788208][ T8557] ? syscall_enter_from_user_mode+0x21/0x70 [ 213.788248][ T8557] do_syscall_64+0x35/0xb0 [ 213.788276][ T8557] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 213.788303][ T8557] RIP: 0033:0x7f55bba89109 [ 213.788331][ T8557] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 213.788358][ T8557] RSP: 002b:00007f55bcbef168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 213.788385][ T8557] RAX: ffffffffffffffda RBX: 00007f55bbb9bf60 RCX: 00007f55bba89109 [ 213.788403][ T8557] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 213.788420][ T8557] RBP: 00007f55bcbef1d0 R08: 0000000000000000 R09: 0000000000000000 [ 213.788437][ T8557] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 213.788453][ T8557] R13: 00007ffd14a51aef R14: 00007f55bcbef300 R15: 0000000000022000 [ 213.788489][ T8557] [ 213.832669][ T8558] netlink: 1037 bytes leftover after parsing attributes in process `syz-executor.4'. [ 215.938908][ T8575] FAULT_INJECTION: forcing a failure. [ 215.938908][ T8575] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 215.938953][ T8575] CPU: 1 PID: 8575 Comm: syz-executor.1 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 215.938982][ T8575] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 215.938997][ T8575] Call Trace: [ 215.939004][ T8575] [ 215.939013][ T8575] dump_stack_lvl+0xcd/0x134 [ 215.939047][ T8575] should_fail.cold+0x5/0xa [ 215.939083][ T8575] prepare_alloc_pages+0x17b/0x570 [ 215.939117][ T8575] __alloc_pages+0x12f/0x500 [ 215.939145][ T8575] ? __alloc_pages_slowpath.constprop.0+0x20e0/0x20e0 [ 215.939176][ T8575] ? __kmalloc_node+0x62/0x390 [ 215.939220][ T8575] alloc_pages+0x1aa/0x310 [ 215.939252][ T8575] __vmalloc_node_range+0x735/0x13e0 [ 215.939295][ T8575] ? netlink_sendmsg+0x690/0xe10 [ 215.939322][ T8575] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 215.939348][ T8575] ? vfree_atomic+0xe0/0xe0 [ 215.939371][ T8575] ? __netlink_dump_start+0x900/0x900 [ 215.939394][ T8575] ? netlink_sendmsg+0x690/0xe10 [ 215.939420][ T8575] vmalloc+0x67/0x80 [ 215.939446][ T8575] ? netlink_sendmsg+0x690/0xe10 [ 215.939469][ T8575] netlink_sendmsg+0x690/0xe10 [ 215.939497][ T8575] ? netlink_unicast+0x7f0/0x7f0 [ 215.939526][ T8575] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 215.939556][ T8575] ? netlink_unicast+0x7f0/0x7f0 [ 215.939580][ T8575] sock_sendmsg+0xcf/0x120 [ 215.939611][ T8575] ____sys_sendmsg+0x6eb/0x810 [ 215.939643][ T8575] ? kernel_sendmsg+0x50/0x50 [ 215.939670][ T8575] ? do_recvmmsg+0x6d0/0x6d0 [ 215.939693][ T8575] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 215.939727][ T8575] ? _parse_integer+0x30/0x30 [ 215.939767][ T8575] ___sys_sendmsg+0xf3/0x170 [ 215.939796][ T8575] ? sendmsg_copy_msghdr+0x160/0x160 [ 215.939827][ T8575] ? lock_downgrade+0x6e0/0x6e0 [ 215.939870][ T8575] ? __fget_files+0x286/0x470 [ 215.939905][ T8575] ? __fget_light+0xea/0x270 [ 215.939937][ T8575] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 215.939971][ T8575] __x64_sys_sendmsg+0x132/0x220 [ 215.939997][ T8575] ? __sys_sendmsg+0x1b0/0x1b0 [ 215.940036][ T8575] ? syscall_enter_from_user_mode+0x21/0x70 [ 215.940076][ T8575] do_syscall_64+0x35/0xb0 [ 215.940103][ T8575] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 215.940128][ T8575] RIP: 0033:0x7f55bba89109 [ 215.940148][ T8575] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 215.940173][ T8575] RSP: 002b:00007f55bcbef168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 215.940197][ T8575] RAX: ffffffffffffffda RBX: 00007f55bbb9bf60 RCX: 00007f55bba89109 [ 215.940215][ T8575] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 215.940231][ T8575] RBP: 00007f55bcbef1d0 R08: 0000000000000000 R09: 0000000000000000 [ 215.940248][ T8575] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 215.940264][ T8575] R13: 00007ffd14a51aef R14: 00007f55bcbef300 R15: 0000000000022000 [ 215.940299][ T8575] [ 215.951162][ T8571] netlink: 65201 bytes leftover after parsing attributes in process `syz-executor.4'. [ 215.959712][ T8577] FAULT_INJECTION: forcing a failure. [ 215.959712][ T8577] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 215.959746][ T8577] CPU: 0 PID: 8577 Comm: syz-executor.5 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 215.959774][ T8577] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 215.959790][ T8577] Call Trace: [ 215.959797][ T8577] [ 215.959805][ T8577] dump_stack_lvl+0xcd/0x134 [ 215.959839][ T8577] should_fail.cold+0x5/0xa [ 215.959876][ T8577] prepare_alloc_pages+0x17b/0x570 [ 215.959902][ T8577] ? arch_stack_walk+0x93/0xe0 [ 215.959938][ T8577] __alloc_pages+0x12f/0x500 [ 215.959966][ T8577] ? __alloc_pages_slowpath.constprop.0+0x20e0/0x20e0 [ 215.959998][ T8577] ? stack_trace_save+0x8c/0xc0 [ 215.960036][ T8577] __alloc_pages_bulk+0xbf3/0x1a10 [ 215.960061][ T8577] ? do_misc_fixups+0x277d/0x3510 [ 215.960085][ T8577] ? bpf_check+0x4007/0xbbc0 [ 215.960110][ T8577] ? __x64_sys_bpf+0x75/0xb0 [ 215.960137][ T8577] ? do_syscall_64+0x35/0xb0 [ 215.960162][ T8577] ? entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 215.960203][ T8577] ? __alloc_pages+0x500/0x500 [ 215.960226][ T8577] ? find_held_lock+0x2d/0x110 [ 215.960263][ T8577] ? __kmalloc_node+0x62/0x390 [ 215.960304][ T8577] alloc_pages_bulk_array_mempolicy+0x1c3/0x4d0 [ 215.960338][ T8577] ? rcu_read_lock_sched_held+0x3a/0x70 [ 215.960368][ T8577] ? trace_kmalloc_node+0x32/0x100 [ 215.960403][ T8577] __vmalloc_node_range+0x576/0x13e0 [ 215.960455][ T8577] ? bpf_patch_insn_data+0xa4/0x7e0 [ 215.960488][ T8577] ? vfree_atomic+0xe0/0xe0 [ 215.960519][ T8577] ? __stack_depot_save+0x35/0x500 [ 215.960550][ T8577] ? bpf_patch_insn_data+0xa4/0x7e0 [ 215.960579][ T8577] vzalloc+0x67/0x80 [ 215.960607][ T8577] ? bpf_patch_insn_data+0xa4/0x7e0 [ 215.960633][ T8577] bpf_patch_insn_data+0xa4/0x7e0 [ 215.960656][ T8577] ? kasan_set_free_info+0x20/0x30 [ 215.960680][ T8577] ? ____kasan_slab_free+0x166/0x1a0 [ 215.960709][ T8577] ? kfree+0xd6/0x4d0 [ 215.960731][ T8577] ? kvfree+0x42/0x50 [ 215.960753][ T8577] ? bpf_check+0x9185/0xbbc0 [ 215.960774][ T8577] ? bpf_prog_load+0xfb2/0x2250 [ 215.960800][ T8577] ? __sys_bpf+0x11a1/0x5700 [ 215.960832][ T8577] do_misc_fixups+0x277d/0x3510 [ 215.960861][ T8577] ? find_held_lock+0x2d/0x110 [ 215.960898][ T8577] ? convert_ctx_accesses+0x1490/0x1490 [ 215.960926][ T8577] ? cmp_subprogs+0x11/0x90 [ 215.960956][ T8577] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 215.960985][ T8577] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 215.961013][ T8577] ? __sanitizer_cov_trace_cmp4+0x1c/0x70 [ 215.961038][ T8577] ? convert_ctx_accesses+0x3bc/0x1490 [ 215.961067][ T8577] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 215.961103][ T8577] ? bpf_patch_insn_data+0x7e0/0x7e0 [ 215.961133][ T8577] ? check_reference_leak+0x280/0x280 [ 215.961165][ T8577] ? kvfree+0x42/0x50 [ 215.961189][ T8577] ? kfree+0xd6/0x4d0 [ 215.961212][ T8577] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 215.961257][ T8577] bpf_check+0x4007/0xbbc0 [ 215.961306][ T8577] ? bpf_get_btf_vmlinux+0x10/0x10 [ 215.961339][ T8577] ? lock_downgrade+0x6e0/0x6e0 [ 215.961368][ T8577] ? __might_fault+0xd1/0x170 [ 215.961393][ T8577] ? lock_downgrade+0x6e0/0x6e0 [ 215.961441][ T8577] ? memset+0x20/0x40 [ 215.961464][ T8577] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 215.961494][ T8577] ? bpf_obj_name_cpy+0x144/0x1a0 [ 215.961526][ T8577] ? bpf_prog_load+0xf71/0x2250 [ 215.961559][ T8577] bpf_prog_load+0xfb2/0x2250 [ 215.961597][ T8577] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 215.961629][ T8577] ? find_held_lock+0x2d/0x110 [ 215.961663][ T8577] ? __might_fault+0xd1/0x170 [ 215.961689][ T8577] ? lock_downgrade+0x6e0/0x6e0 [ 215.961734][ T8577] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 215.961769][ T8577] __sys_bpf+0x11a1/0x5700 [ 215.961803][ T8577] ? bpf_perf_link_attach+0x520/0x520 [ 215.961834][ T8577] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 215.961877][ T8577] ? find_held_lock+0x2d/0x110 [ 215.961934][ T8577] ? trace_hardirqs_on+0x38/0x1c0 [ 215.961965][ T8577] __x64_sys_bpf+0x75/0xb0 [ 215.961995][ T8577] ? syscall_enter_from_user_mode+0x21/0x70 [ 215.962028][ T8577] do_syscall_64+0x35/0xb0 [ 215.962057][ T8577] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 215.962086][ T8577] RIP: 0033:0x7f2e16289109 [ 215.962106][ T8577] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 215.962133][ T8577] RSP: 002b:00007f2e1731f168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 215.962158][ T8577] RAX: ffffffffffffffda RBX: 00007f2e1639bf60 RCX: 00007f2e16289109 [ 215.962177][ T8577] RDX: 0000000000000080 RSI: 00000000200001c0 RDI: 0000000000000005 [ 215.962194][ T8577] RBP: 00007f2e1731f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 215.962210][ T8577] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 215.962227][ T8577] R13: 00007ffde7446a9f R14: 00007f2e1731f300 R15: 0000000000022000 [ 215.962262][ T8577] [ 216.109850][ T8589] netlink: 534 bytes leftover after parsing attributes in process `syz-executor.4'. [ 216.148513][ T8591] FAULT_INJECTION: forcing a failure. [ 216.148513][ T8591] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 216.148549][ T8591] CPU: 0 PID: 8591 Comm: syz-executor.1 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 216.148577][ T8591] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 216.148593][ T8591] Call Trace: [ 216.148600][ T8591] [ 216.148609][ T8591] dump_stack_lvl+0xcd/0x134 [ 216.148643][ T8591] should_fail.cold+0x5/0xa [ 216.148681][ T8591] prepare_alloc_pages+0x17b/0x570 [ 216.148716][ T8591] __alloc_pages+0x12f/0x500 [ 216.148744][ T8591] ? __alloc_pages_slowpath.constprop.0+0x20e0/0x20e0 [ 216.148774][ T8591] ? __kmalloc_node+0x62/0x390 [ 216.148822][ T8591] alloc_pages+0x1aa/0x310 [ 216.148856][ T8591] __vmalloc_node_range+0x735/0x13e0 [ 216.148901][ T8591] ? netlink_sendmsg+0x690/0xe10 [ 216.148931][ T8591] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 216.148961][ T8591] ? vfree_atomic+0xe0/0xe0 [ 216.148995][ T8591] ? __netlink_dump_start+0x900/0x900 [ 216.149022][ T8591] ? netlink_sendmsg+0x690/0xe10 [ 216.149050][ T8591] vmalloc+0x67/0x80 [ 216.149078][ T8591] ? netlink_sendmsg+0x690/0xe10 [ 216.149102][ T8591] netlink_sendmsg+0x690/0xe10 [ 216.149132][ T8591] ? netlink_unicast+0x7f0/0x7f0 [ 216.149162][ T8591] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 216.149192][ T8591] ? netlink_unicast+0x7f0/0x7f0 [ 216.149218][ T8591] sock_sendmsg+0xcf/0x120 [ 216.149250][ T8591] ____sys_sendmsg+0x6eb/0x810 [ 216.149285][ T8591] ? kernel_sendmsg+0x50/0x50 [ 216.149313][ T8591] ? do_recvmmsg+0x6d0/0x6d0 [ 216.149338][ T8591] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 216.149371][ T8591] ? _parse_integer+0x30/0x30 [ 216.149414][ T8591] ___sys_sendmsg+0xf3/0x170 [ 216.149442][ T8591] ? sendmsg_copy_msghdr+0x160/0x160 [ 216.149475][ T8591] ? lock_downgrade+0x6e0/0x6e0 [ 216.149519][ T8591] ? __fget_files+0x286/0x470 [ 216.149556][ T8591] ? __fget_light+0xea/0x270 [ 216.149583][ T8591] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 216.149616][ T8591] __x64_sys_sendmsg+0x132/0x220 [ 216.149643][ T8591] ? __sys_sendmsg+0x1b0/0x1b0 [ 216.149684][ T8591] ? syscall_enter_from_user_mode+0x21/0x70 [ 216.149724][ T8591] do_syscall_64+0x35/0xb0 [ 216.149751][ T8591] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 216.149778][ T8591] RIP: 0033:0x7f55bba89109 [ 216.149799][ T8591] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 216.149827][ T8591] RSP: 002b:00007f55bcbef168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 216.149853][ T8591] RAX: ffffffffffffffda RBX: 00007f55bbb9bf60 RCX: 00007f55bba89109 [ 216.149873][ T8591] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 216.149890][ T8591] RBP: 00007f55bcbef1d0 R08: 0000000000000000 R09: 0000000000000000 [ 216.149907][ T8591] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 216.149922][ T8591] R13: 00007ffd14a51aef R14: 00007f55bcbef300 R15: 0000000000022000 [ 216.149957][ T8591] [ 216.151631][ T8590] FAULT_INJECTION: forcing a failure. [ 216.151631][ T8590] name failslab, interval 1, probability 0, space 0, times 0 [ 216.151665][ T8590] CPU: 0 PID: 8590 Comm: syz-executor.5 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 216.151694][ T8590] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 216.151710][ T8590] Call Trace: [ 216.151716][ T8590] [ 216.151725][ T8590] dump_stack_lvl+0xcd/0x134 [ 216.151757][ T8590] should_fail.cold+0x5/0xa [ 216.151792][ T8590] should_failslab+0x5/0x10 [ 216.151818][ T8590] kmem_cache_alloc_node+0x65/0x3f0 [ 216.151848][ T8590] ? alloc_vmap_area+0x16f/0x1f00 [ 216.151882][ T8590] alloc_vmap_area+0x16f/0x1f00 [ 216.151910][ T8590] ? kmem_cache_alloc_node_trace+0x46/0x420 [ 216.151952][ T8590] ? free_vmap_area+0x1ac0/0x1ac0 [ 216.151981][ T8590] ? rcu_read_lock_sched_held+0x3a/0x70 [ 216.152011][ T8590] ? trace_kmalloc_node+0x32/0x100 [ 216.152046][ T8590] __get_vm_area_node+0x142/0x3f0 [ 216.152080][ T8590] __vmalloc_node_range+0x250/0x13e0 [ 216.152112][ T8590] ? bpf_prog_alloc_no_stats+0x38/0x470 [ 216.152152][ T8590] ? bpf_prog_alloc_no_stats+0x38/0x470 [ 216.152186][ T8590] ? vfree_atomic+0xe0/0xe0 [ 216.152226][ T8590] ? bpf_prog_alloc_no_stats+0x38/0x470 [ 216.152254][ T8590] __vmalloc+0x69/0x80 [ 216.152282][ T8590] ? bpf_prog_alloc_no_stats+0x38/0x470 [ 216.152311][ T8590] bpf_prog_alloc_no_stats+0x38/0x470 [ 216.152344][ T8590] bpf_check+0x630e/0xbbc0 [ 216.152396][ T8590] ? bpf_get_btf_vmlinux+0x10/0x10 [ 216.152438][ T8590] ? lock_downgrade+0x6e0/0x6e0 [ 216.152471][ T8590] ? lock_downgrade+0x6e0/0x6e0 [ 216.152512][ T8590] ? memset+0x20/0x40 [ 216.152535][ T8590] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 216.152564][ T8590] ? bpf_obj_name_cpy+0x144/0x1a0 [ 216.152595][ T8590] ? bpf_prog_load+0xf71/0x2250 [ 216.152626][ T8590] bpf_prog_load+0xfb2/0x2250 [ 216.152664][ T8590] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 216.152696][ T8590] ? find_held_lock+0x2d/0x110 [ 216.152728][ T8590] ? __might_fault+0xd1/0x170 [ 216.152754][ T8590] ? lock_downgrade+0x6e0/0x6e0 [ 216.152798][ T8590] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 216.152832][ T8590] __sys_bpf+0x11a1/0x5700 [ 216.152865][ T8590] ? bpf_perf_link_attach+0x520/0x520 [ 216.152917][ T8590] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 216.152963][ T8590] ? find_held_lock+0x2d/0x110 [ 216.153020][ T8590] ? trace_hardirqs_on+0x38/0x1c0 [ 216.153051][ T8590] __x64_sys_bpf+0x75/0xb0 [ 216.153089][ T8590] ? syscall_enter_from_user_mode+0x21/0x70 [ 216.153124][ T8590] do_syscall_64+0x35/0xb0 [ 216.153153][ T8590] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 216.153180][ T8590] RIP: 0033:0x7f2e16289109 [ 216.153201][ T8590] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 216.153227][ T8590] RSP: 002b:00007f2e1731f168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 216.153253][ T8590] RAX: ffffffffffffffda RBX: 00007f2e1639bf60 RCX: 00007f2e16289109 [ 216.153272][ T8590] RDX: 0000000000000080 RSI: 00000000200001c0 RDI: 0000000000000005 [ 216.153289][ T8590] RBP: 00007f2e1731f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 216.153312][ T8590] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 216.153328][ T8590] R13: 00007ffde7446a9f R14: 00007f2e1731f300 R15: 0000000000022000 [ 216.153387][ T8590] [ 216.300053][ T8606] FAULT_INJECTION: forcing a failure. [ 216.300053][ T8606] name failslab, interval 1, probability 0, space 0, times 0 [ 216.300089][ T8606] CPU: 0 PID: 8606 Comm: syz-executor.5 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 216.300121][ T8606] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 216.300136][ T8606] Call Trace: [ 216.300143][ T8606] [ 216.300152][ T8606] dump_stack_lvl+0xcd/0x134 [ 216.300185][ T8606] should_fail.cold+0x5/0xa [ 216.300218][ T8606] ? __vmalloc_node_range+0xa40/0x13e0 [ 216.300247][ T8606] should_failslab+0x5/0x10 [ 216.300273][ T8606] __kmalloc_node+0x75/0x390 [ 216.300304][ T8606] __vmalloc_node_range+0xa40/0x13e0 [ 216.300349][ T8606] ? bpf_prog_alloc_no_stats+0x38/0x470 [ 216.300384][ T8606] ? vfree_atomic+0xe0/0xe0 [ 216.300427][ T8606] ? bpf_prog_alloc_no_stats+0x38/0x470 [ 216.300453][ T8606] __vmalloc+0x69/0x80 [ 216.300482][ T8606] ? bpf_prog_alloc_no_stats+0x38/0x470 [ 216.300510][ T8606] bpf_prog_alloc_no_stats+0x38/0x470 [ 216.300541][ T8606] bpf_check+0x630e/0xbbc0 [ 216.300609][ T8606] ? bpf_get_btf_vmlinux+0x10/0x10 [ 216.300644][ T8606] ? lock_downgrade+0x6e0/0x6e0 [ 216.300678][ T8606] ? lock_downgrade+0x6e0/0x6e0 [ 216.300716][ T8606] ? memset+0x20/0x40 [ 216.300738][ T8606] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 216.300765][ T8606] ? bpf_obj_name_cpy+0x144/0x1a0 [ 216.300796][ T8606] ? bpf_prog_load+0xf71/0x2250 [ 216.300827][ T8606] bpf_prog_load+0xfb2/0x2250 [ 216.300865][ T8606] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 216.300897][ T8606] ? find_held_lock+0x2d/0x110 [ 216.300929][ T8606] ? __might_fault+0xd1/0x170 [ 216.300955][ T8606] ? lock_downgrade+0x6e0/0x6e0 [ 216.301000][ T8606] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 216.301034][ T8606] __sys_bpf+0x11a1/0x5700 [ 216.301068][ T8606] ? bpf_perf_link_attach+0x520/0x520 [ 216.301099][ T8606] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 216.301141][ T8606] ? find_held_lock+0x2d/0x110 [ 216.301197][ T8606] ? trace_hardirqs_on+0x38/0x1c0 [ 216.301228][ T8606] __x64_sys_bpf+0x75/0xb0 [ 216.301256][ T8606] ? syscall_enter_from_user_mode+0x21/0x70 [ 216.301290][ T8606] do_syscall_64+0x35/0xb0 [ 216.301319][ T8606] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 216.301347][ T8606] RIP: 0033:0x7f2e16289109 [ 216.301368][ T8606] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 216.301395][ T8606] RSP: 002b:00007f2e1731f168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 216.301428][ T8606] RAX: ffffffffffffffda RBX: 00007f2e1639bf60 RCX: 00007f2e16289109 [ 216.301447][ T8606] RDX: 0000000000000080 RSI: 00000000200001c0 RDI: 0000000000000005 [ 216.301465][ T8606] RBP: 00007f2e1731f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 216.301482][ T8606] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 216.301499][ T8606] R13: 00007ffde7446a9f R14: 00007f2e1731f300 R15: 0000000000022000 [ 216.301536][ T8606] [ 216.315970][ T8608] FAULT_INJECTION: forcing a failure. [ 216.315970][ T8608] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 216.316007][ T8608] CPU: 0 PID: 8608 Comm: syz-executor.1 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 216.316037][ T8608] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 216.316052][ T8608] Call Trace: [ 216.316059][ T8608] [ 216.316068][ T8608] dump_stack_lvl+0xcd/0x134 [ 216.316101][ T8608] should_fail.cold+0x5/0xa [ 216.316139][ T8608] prepare_alloc_pages+0x17b/0x570 [ 216.316174][ T8608] __alloc_pages+0x12f/0x500 [ 216.316200][ T8608] ? __alloc_pages_slowpath.constprop.0+0x20e0/0x20e0 [ 216.316230][ T8608] ? __kmalloc_node+0x62/0x390 [ 216.316277][ T8608] alloc_pages+0x1aa/0x310 [ 216.316310][ T8608] __vmalloc_node_range+0x735/0x13e0 [ 216.316355][ T8608] ? netlink_sendmsg+0x690/0xe10 [ 216.316385][ T8608] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 216.316423][ T8608] ? vfree_atomic+0xe0/0xe0 [ 216.316456][ T8608] ? __netlink_dump_start+0x900/0x900 [ 216.316483][ T8608] ? netlink_sendmsg+0x690/0xe10 [ 216.316511][ T8608] vmalloc+0x67/0x80 [ 216.316540][ T8608] ? netlink_sendmsg+0x690/0xe10 [ 216.316565][ T8608] netlink_sendmsg+0x690/0xe10 [ 216.316597][ T8608] ? netlink_unicast+0x7f0/0x7f0 [ 216.316630][ T8608] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 216.316660][ T8608] ? netlink_unicast+0x7f0/0x7f0 [ 216.316689][ T8608] sock_sendmsg+0xcf/0x120 [ 216.316721][ T8608] ____sys_sendmsg+0x6eb/0x810 [ 216.316756][ T8608] ? kernel_sendmsg+0x50/0x50 [ 216.316785][ T8608] ? do_recvmmsg+0x6d0/0x6d0 [ 216.316810][ T8608] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 216.316846][ T8608] ? _parse_integer+0x30/0x30 [ 216.316886][ T8608] ___sys_sendmsg+0xf3/0x170 [ 216.316912][ T8608] ? sendmsg_copy_msghdr+0x160/0x160 [ 216.316944][ T8608] ? lock_downgrade+0x6e0/0x6e0 [ 216.316987][ T8608] ? __fget_files+0x286/0x470 [ 216.317024][ T8608] ? __fget_light+0xea/0x270 [ 216.317051][ T8608] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 216.317085][ T8608] __x64_sys_sendmsg+0x132/0x220 [ 216.317112][ T8608] ? __sys_sendmsg+0x1b0/0x1b0 [ 216.317153][ T8608] ? syscall_enter_from_user_mode+0x21/0x70 [ 216.317194][ T8608] do_syscall_64+0x35/0xb0 [ 216.317221][ T8608] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 216.317248][ T8608] RIP: 0033:0x7f55bba89109 [ 216.317269][ T8608] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 216.317296][ T8608] RSP: 002b:00007f55bcbef168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 216.317320][ T8608] RAX: ffffffffffffffda RBX: 00007f55bbb9bf60 RCX: 00007f55bba89109 [ 216.317338][ T8608] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 216.317355][ T8608] RBP: 00007f55bcbef1d0 R08: 0000000000000000 R09: 0000000000000000 [ 216.317372][ T8608] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 216.317388][ T8608] R13: 00007ffd14a51aef R14: 00007f55bcbef300 R15: 0000000000022000 [ 216.317429][ T8608] [ 216.475859][ T8618] FAULT_INJECTION: forcing a failure. [ 216.475859][ T8618] name failslab, interval 1, probability 0, space 0, times 0 [ 216.475896][ T8618] CPU: 0 PID: 8618 Comm: syz-executor.5 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 216.475926][ T8618] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 216.475941][ T8618] Call Trace: [ 216.475948][ T8618] [ 216.475958][ T8618] dump_stack_lvl+0xcd/0x134 [ 216.475991][ T8618] should_fail.cold+0x5/0xa [ 216.476028][ T8618] ? __get_vm_area_node+0xed/0x3f0 [ 216.476057][ T8618] should_failslab+0x5/0x10 [ 216.476083][ T8618] kmem_cache_alloc_node_trace+0x59/0x420 [ 216.476124][ T8618] __get_vm_area_node+0xed/0x3f0 [ 216.476159][ T8618] __vmalloc_node_range+0x250/0x13e0 [ 216.476191][ T8618] ? bpf_prog_alloc_no_stats+0x38/0x470 [ 216.476231][ T8618] ? bpf_prog_alloc_no_stats+0x38/0x470 [ 216.476266][ T8618] ? vfree_atomic+0xe0/0xe0 [ 216.476302][ T8618] ? bpf_prog_alloc_no_stats+0x38/0x470 [ 216.476327][ T8618] __vmalloc+0x69/0x80 [ 216.476354][ T8618] ? bpf_prog_alloc_no_stats+0x38/0x470 [ 216.476380][ T8618] bpf_prog_alloc_no_stats+0x38/0x470 [ 216.476418][ T8618] bpf_check+0x630e/0xbbc0 [ 216.476470][ T8618] ? bpf_get_btf_vmlinux+0x10/0x10 [ 216.476503][ T8618] ? lock_downgrade+0x6e0/0x6e0 [ 216.476535][ T8618] ? lock_downgrade+0x6e0/0x6e0 [ 216.476575][ T8618] ? memset+0x20/0x40 [ 216.476597][ T8618] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 216.476624][ T8618] ? bpf_obj_name_cpy+0x144/0x1a0 [ 216.476655][ T8618] ? bpf_prog_load+0xf71/0x2250 [ 216.476686][ T8618] bpf_prog_load+0xfb2/0x2250 [ 216.476721][ T8618] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 216.476752][ T8618] ? find_held_lock+0x2d/0x110 [ 216.476784][ T8618] ? __might_fault+0xd1/0x170 [ 216.476809][ T8618] ? lock_downgrade+0x6e0/0x6e0 [ 216.476853][ T8618] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 216.476887][ T8618] __sys_bpf+0x11a1/0x5700 [ 216.476921][ T8618] ? bpf_perf_link_attach+0x520/0x520 [ 216.476951][ T8618] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 216.476993][ T8618] ? find_held_lock+0x2d/0x110 [ 216.477048][ T8618] ? trace_hardirqs_on+0x38/0x1c0 [ 216.477080][ T8618] __x64_sys_bpf+0x75/0xb0 [ 216.477109][ T8618] ? syscall_enter_from_user_mode+0x21/0x70 [ 216.477143][ T8618] do_syscall_64+0x35/0xb0 [ 216.477168][ T8618] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 216.477196][ T8618] RIP: 0033:0x7f2e16289109 [ 216.477217][ T8618] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 216.477244][ T8618] RSP: 002b:00007f2e1731f168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 216.477270][ T8618] RAX: ffffffffffffffda RBX: 00007f2e1639bf60 RCX: 00007f2e16289109 [ 216.477289][ T8618] RDX: 0000000000000080 RSI: 00000000200001c0 RDI: 0000000000000005 [ 216.477304][ T8618] RBP: 00007f2e1731f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 216.477319][ T8618] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 216.477335][ T8618] R13: 00007ffde7446a9f R14: 00007f2e1731f300 R15: 0000000000022000 [ 216.477369][ T8618] [ 216.480045][ T8622] FAULT_INJECTION: forcing a failure. [ 216.480045][ T8622] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 216.480076][ T8622] CPU: 1 PID: 8622 Comm: syz-executor.1 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 216.480105][ T8622] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 216.480119][ T8622] Call Trace: [ 216.480125][ T8622] [ 216.480134][ T8622] dump_stack_lvl+0xcd/0x134 [ 216.480167][ T8622] should_fail.cold+0x5/0xa [ 216.480203][ T8622] prepare_alloc_pages+0x17b/0x570 [ 216.480235][ T8622] __alloc_pages+0x12f/0x500 [ 216.480257][ T8622] ? __alloc_pages_slowpath.constprop.0+0x20e0/0x20e0 [ 216.480285][ T8622] ? __kmalloc_node+0x62/0x390 [ 216.480329][ T8622] alloc_pages+0x1aa/0x310 [ 216.480362][ T8622] __vmalloc_node_range+0x735/0x13e0 [ 216.480404][ T8622] ? netlink_sendmsg+0x690/0xe10 [ 216.480433][ T8622] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 216.480463][ T8622] ? vfree_atomic+0xe0/0xe0 [ 216.480493][ T8622] ? __netlink_dump_start+0x900/0x900 [ 216.480518][ T8622] ? netlink_sendmsg+0x690/0xe10 [ 216.480545][ T8622] vmalloc+0x67/0x80 [ 216.480573][ T8622] ? netlink_sendmsg+0x690/0xe10 [ 216.480597][ T8622] netlink_sendmsg+0x690/0xe10 [ 216.480628][ T8622] ? netlink_unicast+0x7f0/0x7f0 [ 216.480660][ T8622] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 216.480690][ T8622] ? netlink_unicast+0x7f0/0x7f0 [ 216.480716][ T8622] sock_sendmsg+0xcf/0x120 [ 216.480747][ T8622] ____sys_sendmsg+0x6eb/0x810 [ 216.480781][ T8622] ? kernel_sendmsg+0x50/0x50 [ 216.480809][ T8622] ? do_recvmmsg+0x6d0/0x6d0 [ 216.480834][ T8622] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 216.480867][ T8622] ? _parse_integer+0x30/0x30 [ 216.480912][ T8622] ___sys_sendmsg+0xf3/0x170 [ 216.480939][ T8622] ? sendmsg_copy_msghdr+0x160/0x160 [ 216.480970][ T8622] ? lock_downgrade+0x6e0/0x6e0 [ 216.481010][ T8622] ? __fget_files+0x286/0x470 [ 216.481045][ T8622] ? __fget_light+0xea/0x270 [ 216.481071][ T8622] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 216.481104][ T8622] __x64_sys_sendmsg+0x132/0x220 [ 216.481130][ T8622] ? __sys_sendmsg+0x1b0/0x1b0 [ 216.481169][ T8622] ? syscall_enter_from_user_mode+0x21/0x70 [ 216.481208][ T8622] do_syscall_64+0x35/0xb0 [ 216.481235][ T8622] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 216.481260][ T8622] RIP: 0033:0x7f55bba89109 [ 216.481280][ T8622] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 216.481307][ T8622] RSP: 002b:00007f55bcbef168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 216.481331][ T8622] RAX: ffffffffffffffda RBX: 00007f55bbb9bf60 RCX: 00007f55bba89109 [ 216.481349][ T8622] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 216.481365][ T8622] RBP: 00007f55bcbef1d0 R08: 0000000000000000 R09: 0000000000000000 [ 216.481381][ T8622] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 216.481397][ T8622] R13: 00007ffd14a51aef R14: 00007f55bcbef300 R15: 0000000000022000 [ 216.481430][ T8622] [ 216.653779][ T8631] FAULT_INJECTION: forcing a failure. [ 216.653779][ T8631] name failslab, interval 1, probability 0, space 0, times 0 [ 216.653814][ T8631] CPU: 0 PID: 8631 Comm: syz-executor.5 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 216.653844][ T8631] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 216.653860][ T8631] Call Trace: [ 216.653867][ T8631] [ 216.653876][ T8631] dump_stack_lvl+0xcd/0x134 [ 216.653909][ T8631] should_fail.cold+0x5/0xa [ 216.653953][ T8631] should_failslab+0x5/0x10 [ 216.653982][ T8631] kmem_cache_alloc_trace+0x60/0x3f0 [ 216.654013][ T8631] ? bpf_prog_alloc_no_stats+0xd5/0x470 [ 216.654046][ T8631] bpf_prog_alloc_no_stats+0xd5/0x470 [ 216.654076][ T8631] bpf_check+0x630e/0xbbc0 [ 216.654130][ T8631] ? bpf_get_btf_vmlinux+0x10/0x10 [ 216.654164][ T8631] ? lock_downgrade+0x6e0/0x6e0 [ 216.654196][ T8631] ? lock_downgrade+0x6e0/0x6e0 [ 216.654236][ T8631] ? memset+0x20/0x40 [ 216.654258][ T8631] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 216.654285][ T8631] ? bpf_obj_name_cpy+0x144/0x1a0 [ 216.654316][ T8631] ? bpf_prog_load+0xf71/0x2250 [ 216.654346][ T8631] bpf_prog_load+0xfb2/0x2250 [ 216.654382][ T8631] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 216.654413][ T8631] ? find_held_lock+0x2d/0x110 [ 216.654444][ T8631] ? __might_fault+0xd1/0x170 [ 216.654470][ T8631] ? lock_downgrade+0x6e0/0x6e0 [ 216.654514][ T8631] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 216.654548][ T8631] __sys_bpf+0x11a1/0x5700 [ 216.654582][ T8631] ? bpf_perf_link_attach+0x520/0x520 [ 216.654613][ T8631] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 216.654656][ T8631] ? find_held_lock+0x2d/0x110 [ 216.654711][ T8631] ? trace_hardirqs_on+0x38/0x1c0 [ 216.654743][ T8631] __x64_sys_bpf+0x75/0xb0 [ 216.654771][ T8631] ? syscall_enter_from_user_mode+0x21/0x70 [ 216.654805][ T8631] do_syscall_64+0x35/0xb0 [ 216.654831][ T8631] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 216.654859][ T8631] RIP: 0033:0x7f2e16289109 [ 216.654880][ T8631] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 216.654906][ T8631] RSP: 002b:00007f2e1731f168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 216.654931][ T8631] RAX: ffffffffffffffda RBX: 00007f2e1639bf60 RCX: 00007f2e16289109 [ 216.654956][ T8631] RDX: 0000000000000080 RSI: 00000000200001c0 RDI: 0000000000000005 [ 216.654973][ T8631] RBP: 00007f2e1731f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 216.654990][ T8631] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 216.655007][ T8631] R13: 00007ffde7446a9f R14: 00007f2e1731f300 R15: 0000000000022000 [ 216.655044][ T8631] [ 216.725682][ T8634] FAULT_INJECTION: forcing a failure. [ 216.725682][ T8634] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 216.725719][ T8634] CPU: 1 PID: 8634 Comm: syz-executor.1 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 216.725748][ T8634] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 216.725763][ T8634] Call Trace: [ 216.725771][ T8634] [ 216.725780][ T8634] dump_stack_lvl+0xcd/0x134 [ 216.725812][ T8634] should_fail.cold+0x5/0xa [ 216.725850][ T8634] prepare_alloc_pages+0x17b/0x570 [ 216.725884][ T8634] __alloc_pages+0x12f/0x500 [ 216.725910][ T8634] ? __alloc_pages_slowpath.constprop.0+0x20e0/0x20e0 [ 216.725939][ T8634] ? __kmalloc_node+0x62/0x390 [ 216.725986][ T8634] alloc_pages+0x1aa/0x310 [ 216.726020][ T8634] __vmalloc_node_range+0x735/0x13e0 [ 216.726065][ T8634] ? netlink_sendmsg+0x690/0xe10 [ 216.726095][ T8634] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 216.726130][ T8634] ? vfree_atomic+0xe0/0xe0 [ 216.726161][ T8634] ? __netlink_dump_start+0x900/0x900 [ 216.726188][ T8634] ? netlink_sendmsg+0x690/0xe10 [ 216.726216][ T8634] vmalloc+0x67/0x80 [ 216.726245][ T8634] ? netlink_sendmsg+0x690/0xe10 [ 216.726270][ T8634] netlink_sendmsg+0x690/0xe10 [ 216.726304][ T8634] ? netlink_unicast+0x7f0/0x7f0 [ 216.726337][ T8634] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 216.726367][ T8634] ? netlink_unicast+0x7f0/0x7f0 [ 216.726393][ T8634] sock_sendmsg+0xcf/0x120 [ 216.726432][ T8634] ____sys_sendmsg+0x6eb/0x810 [ 216.726472][ T8634] ? kernel_sendmsg+0x50/0x50 [ 216.726501][ T8634] ? do_recvmmsg+0x6d0/0x6d0 [ 216.726526][ T8634] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 216.726563][ T8634] ? _parse_integer+0x30/0x30 [ 216.726602][ T8634] ___sys_sendmsg+0xf3/0x170 [ 216.726630][ T8634] ? sendmsg_copy_msghdr+0x160/0x160 [ 216.726662][ T8634] ? lock_downgrade+0x6e0/0x6e0 [ 216.726709][ T8634] ? __fget_files+0x286/0x470 [ 216.726746][ T8634] ? __fget_light+0xea/0x270 [ 216.726773][ T8634] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 216.726808][ T8634] __x64_sys_sendmsg+0x132/0x220 [ 216.726834][ T8634] ? __sys_sendmsg+0x1b0/0x1b0 [ 216.726874][ T8634] ? syscall_enter_from_user_mode+0x21/0x70 [ 216.726915][ T8634] do_syscall_64+0x35/0xb0 [ 216.726941][ T8634] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 216.726969][ T8634] RIP: 0033:0x7f55bba89109 [ 216.726990][ T8634] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 216.727016][ T8634] RSP: 002b:00007f55bcbef168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 216.727041][ T8634] RAX: ffffffffffffffda RBX: 00007f55bbb9bf60 RCX: 00007f55bba89109 [ 216.727060][ T8634] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 216.727076][ T8634] RBP: 00007f55bcbef1d0 R08: 0000000000000000 R09: 0000000000000000 [ 216.727093][ T8634] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 216.727110][ T8634] R13: 00007ffd14a51aef R14: 00007f55bcbef300 R15: 0000000000022000 [ 216.727147][ T8634] [ 218.968872][ T8648] FAULT_INJECTION: forcing a failure. [ 218.968872][ T8648] name failslab, interval 1, probability 0, space 0, times 0 [ 218.968907][ T8648] CPU: 0 PID: 8648 Comm: syz-executor.5 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 218.968936][ T8648] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 218.968952][ T8648] Call Trace: [ 218.968959][ T8648] [ 218.968968][ T8648] dump_stack_lvl+0xcd/0x134 [ 218.969001][ T8648] should_fail.cold+0x5/0xa [ 218.969037][ T8648] ? __get_vm_area_node+0xed/0x3f0 [ 218.969067][ T8648] should_failslab+0x5/0x10 [ 218.969093][ T8648] kmem_cache_alloc_node_trace+0x59/0x420 [ 218.969131][ T8648] __get_vm_area_node+0xed/0x3f0 [ 218.969164][ T8648] __vmalloc_node_range+0x250/0x13e0 [ 218.969193][ T8648] ? bpf_prog_calc_tag+0xc9/0x6c0 [ 218.969217][ T8648] ? find_held_lock+0x2d/0x110 [ 218.969246][ T8648] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 218.969286][ T8648] ? bpf_prog_calc_tag+0xc9/0x6c0 [ 218.969317][ T8648] ? vfree_atomic+0xe0/0xe0 [ 218.969348][ T8648] ? pcpu_memcg_post_alloc_hook+0x1cc/0x3a0 [ 218.969376][ T8648] ? bpf_prog_calc_tag+0xc9/0x6c0 [ 218.969404][ T8648] vmalloc+0x67/0x80 [ 218.969432][ T8648] ? bpf_prog_calc_tag+0xc9/0x6c0 [ 218.969457][ T8648] bpf_prog_calc_tag+0xc9/0x6c0 [ 218.969487][ T8648] ? __bpf_prog_free+0x190/0x190 [ 218.969513][ T8648] ? lockdep_init_map_type+0x21a/0x7f0 [ 218.969546][ T8648] ? lockdep_init_map_type+0x21a/0x7f0 [ 218.969576][ T8648] ? __raw_spin_lock_init+0x36/0x110 [ 218.969610][ T8648] ? debug_mutex_init+0x33/0x60 [ 218.969640][ T8648] ? bpf_prog_alloc_no_stats+0x353/0x470 [ 218.969671][ T8648] bpf_check+0x63f6/0xbbc0 [ 218.969731][ T8648] ? bpf_get_btf_vmlinux+0x10/0x10 [ 218.969767][ T8648] ? lock_downgrade+0x6e0/0x6e0 [ 218.969799][ T8648] ? lock_downgrade+0x6e0/0x6e0 [ 218.969841][ T8648] ? memset+0x20/0x40 [ 218.969862][ T8648] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 218.969892][ T8648] ? bpf_obj_name_cpy+0x144/0x1a0 [ 218.969922][ T8648] ? bpf_prog_load+0xf71/0x2250 [ 218.969954][ T8648] bpf_prog_load+0xfb2/0x2250 [ 218.969992][ T8648] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 218.970023][ T8648] ? find_held_lock+0x2d/0x110 [ 218.970057][ T8648] ? __might_fault+0xd1/0x170 [ 218.970083][ T8648] ? lock_downgrade+0x6e0/0x6e0 [ 218.970128][ T8648] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 218.970161][ T8648] __sys_bpf+0x11a1/0x5700 [ 218.970194][ T8648] ? bpf_perf_link_attach+0x520/0x520 [ 218.970224][ T8648] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 218.970266][ T8648] ? find_held_lock+0x2d/0x110 [ 218.970319][ T8648] ? trace_hardirqs_on+0x38/0x1c0 [ 218.970350][ T8648] __x64_sys_bpf+0x75/0xb0 [ 218.970377][ T8648] ? syscall_enter_from_user_mode+0x21/0x70 [ 218.970410][ T8648] do_syscall_64+0x35/0xb0 [ 218.970437][ T8648] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 218.970465][ T8648] RIP: 0033:0x7f2e16289109 [ 218.970485][ T8648] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 218.970512][ T8648] RSP: 002b:00007f2e1731f168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 218.970537][ T8648] RAX: ffffffffffffffda RBX: 00007f2e1639bf60 RCX: 00007f2e16289109 [ 218.970556][ T8648] RDX: 0000000000000080 RSI: 00000000200001c0 RDI: 0000000000000005 [ 218.970572][ T8648] RBP: 00007f2e1731f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 218.970587][ T8648] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 218.970602][ T8648] R13: 00007ffde7446a9f R14: 00007f2e1731f300 R15: 0000000000022000 [ 218.970635][ T8648] [ 218.971905][ T8644] __nla_validate_parse: 4 callbacks suppressed [ 218.971923][ T8644] netlink: 4374 bytes leftover after parsing attributes in process `syz-executor.4'. [ 219.000980][ T8650] FAULT_INJECTION: forcing a failure. [ 219.000980][ T8650] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 219.001016][ T8650] CPU: 0 PID: 8650 Comm: syz-executor.1 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 219.001044][ T8650] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 219.001059][ T8650] Call Trace: [ 219.001066][ T8650] [ 219.001075][ T8650] dump_stack_lvl+0xcd/0x134 [ 219.001107][ T8650] should_fail.cold+0x5/0xa [ 219.001143][ T8650] prepare_alloc_pages+0x17b/0x570 [ 219.001177][ T8650] __alloc_pages+0x12f/0x500 [ 219.001204][ T8650] ? __alloc_pages_slowpath.constprop.0+0x20e0/0x20e0 [ 219.001235][ T8650] ? __kmalloc_node+0x62/0x390 [ 219.001283][ T8650] alloc_pages+0x1aa/0x310 [ 219.001316][ T8650] __vmalloc_node_range+0x735/0x13e0 [ 219.001362][ T8650] ? netlink_sendmsg+0x690/0xe10 [ 219.001391][ T8650] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 219.001421][ T8650] ? vfree_atomic+0xe0/0xe0 [ 219.001452][ T8650] ? __netlink_dump_start+0x900/0x900 [ 219.001478][ T8650] ? netlink_sendmsg+0x690/0xe10 [ 219.001505][ T8650] vmalloc+0x67/0x80 [ 219.001532][ T8650] ? netlink_sendmsg+0x690/0xe10 [ 219.001557][ T8650] netlink_sendmsg+0x690/0xe10 [ 219.001589][ T8650] ? netlink_unicast+0x7f0/0x7f0 [ 219.001621][ T8650] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 219.001651][ T8650] ? netlink_unicast+0x7f0/0x7f0 [ 219.001676][ T8650] sock_sendmsg+0xcf/0x120 [ 219.001718][ T8650] ____sys_sendmsg+0x6eb/0x810 [ 219.001753][ T8650] ? kernel_sendmsg+0x50/0x50 [ 219.001783][ T8650] ? do_recvmmsg+0x6d0/0x6d0 [ 219.001809][ T8650] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 219.001846][ T8650] ? _parse_integer+0x30/0x30 [ 219.001885][ T8650] ___sys_sendmsg+0xf3/0x170 [ 219.001912][ T8650] ? sendmsg_copy_msghdr+0x160/0x160 [ 219.001944][ T8650] ? lock_downgrade+0x6e0/0x6e0 [ 219.001990][ T8650] ? __fget_files+0x286/0x470 [ 219.002027][ T8650] ? __fget_light+0xea/0x270 [ 219.002054][ T8650] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 219.002088][ T8650] __x64_sys_sendmsg+0x132/0x220 [ 219.002115][ T8650] ? __sys_sendmsg+0x1b0/0x1b0 [ 219.002156][ T8650] ? syscall_enter_from_user_mode+0x21/0x70 [ 219.002195][ T8650] do_syscall_64+0x35/0xb0 [ 219.002222][ T8650] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 219.002250][ T8650] RIP: 0033:0x7f55bba89109 [ 219.002271][ T8650] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 219.002297][ T8650] RSP: 002b:00007f55bcbef168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 219.002323][ T8650] RAX: ffffffffffffffda RBX: 00007f55bbb9bf60 RCX: 00007f55bba89109 [ 219.002341][ T8650] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 219.002358][ T8650] RBP: 00007f55bcbef1d0 R08: 0000000000000000 R09: 0000000000000000 [ 219.002375][ T8650] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 219.002392][ T8650] R13: 00007ffd14a51aef R14: 00007f55bcbef300 R15: 0000000000022000 [ 219.002429][ T8650] [ 219.178010][ T8659] FAULT_INJECTION: forcing a failure. [ 219.178010][ T8659] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 219.178046][ T8659] CPU: 0 PID: 8659 Comm: syz-executor.1 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 219.178075][ T8659] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 219.178090][ T8659] Call Trace: [ 219.178097][ T8659] [ 219.178107][ T8659] dump_stack_lvl+0xcd/0x134 [ 219.178141][ T8659] should_fail.cold+0x5/0xa [ 219.178178][ T8659] prepare_alloc_pages+0x17b/0x570 [ 219.178213][ T8659] __alloc_pages+0x12f/0x500 [ 219.178240][ T8659] ? __alloc_pages_slowpath.constprop.0+0x20e0/0x20e0 [ 219.178270][ T8659] ? __kmalloc_node+0x62/0x390 [ 219.178317][ T8659] alloc_pages+0x1aa/0x310 [ 219.178349][ T8659] __vmalloc_node_range+0x735/0x13e0 [ 219.178393][ T8659] ? netlink_sendmsg+0x690/0xe10 [ 219.178422][ T8659] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 219.178451][ T8659] ? vfree_atomic+0xe0/0xe0 [ 219.178480][ T8659] ? __netlink_dump_start+0x900/0x900 [ 219.178504][ T8659] ? netlink_sendmsg+0x690/0xe10 [ 219.178530][ T8659] vmalloc+0x67/0x80 [ 219.178558][ T8659] ? netlink_sendmsg+0x690/0xe10 [ 219.178581][ T8659] netlink_sendmsg+0x690/0xe10 [ 219.178612][ T8659] ? netlink_unicast+0x7f0/0x7f0 [ 219.178642][ T8659] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 219.178679][ T8659] ? netlink_unicast+0x7f0/0x7f0 [ 219.178706][ T8659] sock_sendmsg+0xcf/0x120 [ 219.178740][ T8659] ____sys_sendmsg+0x6eb/0x810 [ 219.178775][ T8659] ? kernel_sendmsg+0x50/0x50 [ 219.178804][ T8659] ? do_recvmmsg+0x6d0/0x6d0 [ 219.178829][ T8659] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 219.178863][ T8659] ? _parse_integer+0x30/0x30 [ 219.178902][ T8659] ___sys_sendmsg+0xf3/0x170 [ 219.178929][ T8659] ? sendmsg_copy_msghdr+0x160/0x160 [ 219.178962][ T8659] ? lock_downgrade+0x6e0/0x6e0 [ 219.179009][ T8659] ? __fget_files+0x286/0x470 [ 219.179046][ T8659] ? __fget_light+0xea/0x270 [ 219.179074][ T8659] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 219.179108][ T8659] __x64_sys_sendmsg+0x132/0x220 [ 219.179135][ T8659] ? __sys_sendmsg+0x1b0/0x1b0 [ 219.179174][ T8659] ? syscall_enter_from_user_mode+0x21/0x70 [ 219.179214][ T8659] do_syscall_64+0x35/0xb0 [ 219.179240][ T8659] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 219.179266][ T8659] RIP: 0033:0x7f55bba89109 [ 219.179288][ T8659] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 219.179314][ T8659] RSP: 002b:00007f55bcbef168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 219.179340][ T8659] RAX: ffffffffffffffda RBX: 00007f55bbb9bf60 RCX: 00007f55bba89109 [ 219.179359][ T8659] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 219.179376][ T8659] RBP: 00007f55bcbef1d0 R08: 0000000000000000 R09: 0000000000000000 [ 219.179393][ T8659] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 219.179410][ T8659] R13: 00007ffd14a51aef R14: 00007f55bcbef300 R15: 0000000000022000 [ 219.179446][ T8659] [ 219.216817][ T8676] FAULT_INJECTION: forcing a failure. [ 219.216817][ T8676] name failslab, interval 1, probability 0, space 0, times 0 [ 219.216852][ T8676] CPU: 0 PID: 8676 Comm: syz-executor.5 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 219.216880][ T8676] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 219.216899][ T8676] Call Trace: [ 219.216906][ T8676] [ 219.216915][ T8676] dump_stack_lvl+0xcd/0x134 [ 219.216947][ T8676] should_fail.cold+0x5/0xa [ 219.216983][ T8676] should_failslab+0x5/0x10 [ 219.217009][ T8676] kmem_cache_alloc_node+0x65/0x3f0 [ 219.217036][ T8676] ? alloc_vmap_area+0x16f/0x1f00 [ 219.217069][ T8676] alloc_vmap_area+0x16f/0x1f00 [ 219.217097][ T8676] ? kmem_cache_alloc_node_trace+0x46/0x420 [ 219.217138][ T8676] ? free_vmap_area+0x1ac0/0x1ac0 [ 219.217165][ T8676] ? rcu_read_lock_sched_held+0x3a/0x70 [ 219.217194][ T8676] ? trace_kmalloc_node+0x32/0x100 [ 219.217228][ T8676] __get_vm_area_node+0x142/0x3f0 [ 219.217260][ T8676] __vmalloc_node_range+0x250/0x13e0 [ 219.217289][ T8676] ? bpf_prog_calc_tag+0xc9/0x6c0 [ 219.217312][ T8676] ? find_held_lock+0x2d/0x110 [ 219.217339][ T8676] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 219.217380][ T8676] ? bpf_prog_calc_tag+0xc9/0x6c0 [ 219.217409][ T8676] ? vfree_atomic+0xe0/0xe0 [ 219.217440][ T8676] ? pcpu_memcg_post_alloc_hook+0x1cc/0x3a0 [ 219.217465][ T8676] ? bpf_prog_calc_tag+0xc9/0x6c0 [ 219.217492][ T8676] vmalloc+0x67/0x80 [ 219.217518][ T8676] ? bpf_prog_calc_tag+0xc9/0x6c0 [ 219.217543][ T8676] bpf_prog_calc_tag+0xc9/0x6c0 [ 219.217572][ T8676] ? __bpf_prog_free+0x190/0x190 [ 219.217598][ T8676] ? lockdep_init_map_type+0x21a/0x7f0 [ 219.217631][ T8676] ? lockdep_init_map_type+0x21a/0x7f0 [ 219.217659][ T8676] ? __raw_spin_lock_init+0x36/0x110 [ 219.217702][ T8676] ? debug_mutex_init+0x33/0x60 [ 219.217732][ T8676] ? bpf_prog_alloc_no_stats+0x353/0x470 [ 219.217761][ T8676] bpf_check+0x63f6/0xbbc0 [ 219.217811][ T8676] ? bpf_get_btf_vmlinux+0x10/0x10 [ 219.217844][ T8676] ? lock_downgrade+0x6e0/0x6e0 [ 219.217874][ T8676] ? lock_downgrade+0x6e0/0x6e0 [ 219.217912][ T8676] ? memset+0x20/0x40 [ 219.217934][ T8676] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 219.217964][ T8676] ? bpf_obj_name_cpy+0x144/0x1a0 [ 219.217994][ T8676] ? bpf_prog_load+0xf71/0x2250 [ 219.218026][ T8676] bpf_prog_load+0xfb2/0x2250 [ 219.218064][ T8676] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 219.218096][ T8676] ? find_held_lock+0x2d/0x110 [ 219.218129][ T8676] ? __might_fault+0xd1/0x170 [ 219.218156][ T8676] ? lock_downgrade+0x6e0/0x6e0 [ 219.218201][ T8676] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 219.218235][ T8676] __sys_bpf+0x11a1/0x5700 [ 219.218269][ T8676] ? bpf_perf_link_attach+0x520/0x520 [ 219.218299][ T8676] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 219.218341][ T8676] ? find_held_lock+0x2d/0x110 [ 219.218396][ T8676] ? trace_hardirqs_on+0x38/0x1c0 [ 219.218428][ T8676] __x64_sys_bpf+0x75/0xb0 [ 219.218457][ T8676] ? syscall_enter_from_user_mode+0x21/0x70 [ 219.218492][ T8676] do_syscall_64+0x35/0xb0 [ 219.218520][ T8676] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 219.218548][ T8676] RIP: 0033:0x7f2e16289109 [ 219.218569][ T8676] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 219.218595][ T8676] RSP: 002b:00007f2e1731f168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 219.218621][ T8676] RAX: ffffffffffffffda RBX: 00007f2e1639bf60 RCX: 00007f2e16289109 [ 219.218640][ T8676] RDX: 0000000000000080 RSI: 00000000200001c0 RDI: 0000000000000005 [ 219.218656][ T8676] RBP: 00007f2e1731f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 219.218682][ T8676] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 219.218699][ T8676] R13: 00007ffde7446a9f R14: 00007f2e1731f300 R15: 0000000000022000 [ 219.218735][ T8676] [ 219.627848][ T8689] FAULT_INJECTION: forcing a failure. [ 219.627848][ T8689] name failslab, interval 1, probability 0, space 0, times 0 [ 219.627890][ T8689] CPU: 1 PID: 8689 Comm: syz-executor.5 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 219.627919][ T8689] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 219.627934][ T8689] Call Trace: [ 219.627942][ T8689] [ 219.627951][ T8689] dump_stack_lvl+0xcd/0x134 [ 219.627985][ T8689] should_fail.cold+0x5/0xa [ 219.628021][ T8689] ? __vmalloc_node_range+0xa40/0x13e0 [ 219.628050][ T8689] should_failslab+0x5/0x10 [ 219.628073][ T8689] __kmalloc_node+0x75/0x390 [ 219.628103][ T8689] __vmalloc_node_range+0xa40/0x13e0 [ 219.628144][ T8689] ? bpf_prog_calc_tag+0xc9/0x6c0 [ 219.628174][ T8689] ? vfree_atomic+0xe0/0xe0 [ 219.628204][ T8689] ? pcpu_memcg_post_alloc_hook+0x1cc/0x3a0 [ 219.628230][ T8689] ? bpf_prog_calc_tag+0xc9/0x6c0 [ 219.628255][ T8689] vmalloc+0x67/0x80 [ 219.628285][ T8689] ? bpf_prog_calc_tag+0xc9/0x6c0 [ 219.628311][ T8689] bpf_prog_calc_tag+0xc9/0x6c0 [ 219.628342][ T8689] ? __bpf_prog_free+0x190/0x190 [ 219.628367][ T8689] ? lockdep_init_map_type+0x21a/0x7f0 [ 219.628400][ T8689] ? lockdep_init_map_type+0x21a/0x7f0 [ 219.628427][ T8689] ? __raw_spin_lock_init+0x36/0x110 [ 219.628456][ T8689] ? debug_mutex_init+0x33/0x60 [ 219.628482][ T8689] ? bpf_prog_alloc_no_stats+0x353/0x470 [ 219.628511][ T8689] bpf_check+0x63f6/0xbbc0 [ 219.628562][ T8689] ? bpf_get_btf_vmlinux+0x10/0x10 [ 219.628593][ T8689] ? lock_downgrade+0x6e0/0x6e0 [ 219.628619][ T8689] ? lock_downgrade+0x6e0/0x6e0 [ 219.628655][ T8689] ? memset+0x20/0x40 [ 219.628688][ T8689] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 219.628716][ T8689] ? bpf_obj_name_cpy+0x144/0x1a0 [ 219.628745][ T8689] ? bpf_prog_load+0xf71/0x2250 [ 219.628776][ T8689] bpf_prog_load+0xfb2/0x2250 [ 219.628814][ T8689] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 219.628847][ T8689] ? find_held_lock+0x2d/0x110 [ 219.628880][ T8689] ? __might_fault+0xd1/0x170 [ 219.628907][ T8689] ? lock_downgrade+0x6e0/0x6e0 [ 219.628952][ T8689] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 219.628986][ T8689] __sys_bpf+0x11a1/0x5700 [ 219.629019][ T8689] ? bpf_perf_link_attach+0x520/0x520 [ 219.629051][ T8689] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 219.629094][ T8689] ? find_held_lock+0x2d/0x110 [ 219.629152][ T8689] ? trace_hardirqs_on+0x38/0x1c0 [ 219.629181][ T8689] __x64_sys_bpf+0x75/0xb0 [ 219.629210][ T8689] ? syscall_enter_from_user_mode+0x21/0x70 [ 219.629244][ T8689] do_syscall_64+0x35/0xb0 [ 219.629271][ T8689] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 219.629298][ T8689] RIP: 0033:0x7f2e16289109 [ 219.629319][ T8689] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 219.629345][ T8689] RSP: 002b:00007f2e1731f168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 219.629370][ T8689] RAX: ffffffffffffffda RBX: 00007f2e1639bf60 RCX: 00007f2e16289109 [ 219.629389][ T8689] RDX: 0000000000000080 RSI: 00000000200001c0 RDI: 0000000000000005 [ 219.629407][ T8689] RBP: 00007f2e1731f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 219.629424][ T8689] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 219.629441][ T8689] R13: 00007ffde7446a9f R14: 00007f2e1731f300 R15: 0000000000022000 [ 219.629478][ T8689] [ 219.633990][ T8682] FAULT_INJECTION: forcing a failure. [ 219.633990][ T8682] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 219.634023][ T8682] CPU: 1 PID: 8682 Comm: syz-executor.1 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 219.634051][ T8682] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 219.634067][ T8682] Call Trace: [ 219.634074][ T8682] [ 219.634083][ T8682] dump_stack_lvl+0xcd/0x134 [ 219.634115][ T8682] should_fail.cold+0x5/0xa [ 219.634154][ T8682] prepare_alloc_pages+0x17b/0x570 [ 219.634188][ T8682] __alloc_pages+0x12f/0x500 [ 219.634211][ T8682] ? irqentry_enter+0x28/0x50 [ 219.634242][ T8682] ? __alloc_pages_slowpath.constprop.0+0x20e0/0x20e0 [ 219.634294][ T8682] alloc_pages+0x1aa/0x310 [ 219.634327][ T8682] __vmalloc_node_range+0x735/0x13e0 [ 219.634372][ T8682] ? netlink_sendmsg+0x690/0xe10 [ 219.634402][ T8682] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 219.634432][ T8682] ? vfree_atomic+0xe0/0xe0 [ 219.634463][ T8682] ? __netlink_dump_start+0x900/0x900 [ 219.634490][ T8682] ? netlink_sendmsg+0x690/0xe10 [ 219.634517][ T8682] vmalloc+0x67/0x80 [ 219.634544][ T8682] ? netlink_sendmsg+0x690/0xe10 [ 219.634569][ T8682] netlink_sendmsg+0x690/0xe10 [ 219.634601][ T8682] ? netlink_unicast+0x7f0/0x7f0 [ 219.634633][ T8682] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 219.634669][ T8682] ? netlink_unicast+0x7f0/0x7f0 [ 219.634695][ T8682] sock_sendmsg+0xcf/0x120 [ 219.634728][ T8682] ____sys_sendmsg+0x6eb/0x810 [ 219.634763][ T8682] ? kernel_sendmsg+0x50/0x50 [ 219.634791][ T8682] ? do_recvmmsg+0x6d0/0x6d0 [ 219.634817][ T8682] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 219.634854][ T8682] ? _parse_integer+0x30/0x30 [ 219.634893][ T8682] ___sys_sendmsg+0xf3/0x170 [ 219.634920][ T8682] ? sendmsg_copy_msghdr+0x160/0x160 [ 219.634952][ T8682] ? lock_downgrade+0x6e0/0x6e0 [ 219.634997][ T8682] ? __fget_files+0x286/0x470 [ 219.635034][ T8682] ? __fget_light+0xea/0x270 [ 219.635060][ T8682] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 219.635094][ T8682] __x64_sys_sendmsg+0x132/0x220 [ 219.635121][ T8682] ? __sys_sendmsg+0x1b0/0x1b0 [ 219.635162][ T8682] ? syscall_enter_from_user_mode+0x21/0x70 [ 219.635201][ T8682] do_syscall_64+0x35/0xb0 [ 219.635228][ T8682] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 219.635255][ T8682] RIP: 0033:0x7f55bba89109 [ 219.635275][ T8682] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 219.635301][ T8682] RSP: 002b:00007f55bcbef168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 219.635326][ T8682] RAX: ffffffffffffffda RBX: 00007f55bbb9bf60 RCX: 00007f55bba89109 [ 219.635344][ T8682] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 219.635359][ T8682] RBP: 00007f55bcbef1d0 R08: 0000000000000000 R09: 0000000000000000 [ 219.635376][ T8682] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 219.635391][ T8682] R13: 00007ffd14a51aef R14: 00007f55bcbef300 R15: 0000000000022000 [ 219.635427][ T8682] [ 219.850968][ T8703] FAULT_INJECTION: forcing a failure. [ 219.850968][ T8703] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 219.851005][ T8703] CPU: 1 PID: 8703 Comm: syz-executor.5 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 219.851034][ T8703] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 219.851050][ T8703] Call Trace: [ 219.851058][ T8703] [ 219.851067][ T8703] dump_stack_lvl+0xcd/0x134 [ 219.851100][ T8703] should_fail.cold+0x5/0xa [ 219.851138][ T8703] prepare_alloc_pages+0x17b/0x570 [ 219.851164][ T8703] ? arch_stack_walk+0x93/0xe0 [ 219.851200][ T8703] __alloc_pages+0x12f/0x500 [ 219.851227][ T8703] ? __alloc_pages_slowpath.constprop.0+0x20e0/0x20e0 [ 219.851261][ T8703] ? stack_trace_save+0x8c/0xc0 [ 219.851303][ T8703] __alloc_pages_bulk+0xbf3/0x1a10 [ 219.851328][ T8703] ? bpf_check+0x63f6/0xbbc0 [ 219.851352][ T8703] ? bpf_prog_load+0xfb2/0x2250 [ 219.851381][ T8703] ? do_syscall_64+0x35/0xb0 [ 219.851407][ T8703] ? entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 219.851448][ T8703] ? __alloc_pages+0x500/0x500 [ 219.851475][ T8703] ? find_held_lock+0x2d/0x110 [ 219.851509][ T8703] ? __kmalloc_node+0x62/0x390 [ 219.851550][ T8703] alloc_pages_bulk_array_mempolicy+0x1c3/0x4d0 [ 219.851583][ T8703] ? rcu_read_lock_sched_held+0x3a/0x70 [ 219.851614][ T8703] ? trace_kmalloc_node+0x32/0x100 [ 219.851654][ T8703] __vmalloc_node_range+0x576/0x13e0 [ 219.851702][ T8703] ? bpf_prog_calc_tag+0xc9/0x6c0 [ 219.851736][ T8703] ? vfree_atomic+0xe0/0xe0 [ 219.851767][ T8703] ? pcpu_memcg_post_alloc_hook+0x1cc/0x3a0 [ 219.851795][ T8703] ? bpf_prog_calc_tag+0xc9/0x6c0 [ 219.851821][ T8703] vmalloc+0x67/0x80 [ 219.851848][ T8703] ? bpf_prog_calc_tag+0xc9/0x6c0 [ 219.851873][ T8703] bpf_prog_calc_tag+0xc9/0x6c0 [ 219.851903][ T8703] ? __bpf_prog_free+0x190/0x190 [ 219.851929][ T8703] ? lockdep_init_map_type+0x21a/0x7f0 [ 219.851963][ T8703] ? lockdep_init_map_type+0x21a/0x7f0 [ 219.851994][ T8703] ? __raw_spin_lock_init+0x36/0x110 [ 219.852028][ T8703] ? debug_mutex_init+0x33/0x60 [ 219.852058][ T8703] ? bpf_prog_alloc_no_stats+0x353/0x470 [ 219.852089][ T8703] bpf_check+0x63f6/0xbbc0 [ 219.852142][ T8703] ? bpf_get_btf_vmlinux+0x10/0x10 [ 219.852175][ T8703] ? lock_downgrade+0x6e0/0x6e0 [ 219.852208][ T8703] ? lock_downgrade+0x6e0/0x6e0 [ 219.852248][ T8703] ? memset+0x20/0x40 [ 219.852270][ T8703] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 219.852299][ T8703] ? bpf_obj_name_cpy+0x144/0x1a0 [ 219.852329][ T8703] ? bpf_prog_load+0xf71/0x2250 [ 219.852360][ T8703] bpf_prog_load+0xfb2/0x2250 [ 219.852399][ T8703] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 219.852430][ T8703] ? find_held_lock+0x2d/0x110 [ 219.852464][ T8703] ? __might_fault+0xd1/0x170 [ 219.852490][ T8703] ? lock_downgrade+0x6e0/0x6e0 [ 219.852535][ T8703] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 219.852568][ T8703] __sys_bpf+0x11a1/0x5700 [ 219.852602][ T8703] ? bpf_perf_link_attach+0x520/0x520 [ 219.852660][ T8703] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 219.852706][ T8703] ? find_held_lock+0x2d/0x110 [ 219.852764][ T8703] ? trace_hardirqs_on+0x38/0x1c0 [ 219.852793][ T8703] __x64_sys_bpf+0x75/0xb0 [ 219.852822][ T8703] ? syscall_enter_from_user_mode+0x21/0x70 [ 219.852854][ T8703] do_syscall_64+0x35/0xb0 [ 219.852881][ T8703] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 219.852906][ T8703] RIP: 0033:0x7f2e16289109 [ 219.852926][ T8703] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 219.852953][ T8703] RSP: 002b:00007f2e1731f168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 219.852978][ T8703] RAX: ffffffffffffffda RBX: 00007f2e1639bf60 RCX: 00007f2e16289109 [ 219.852996][ T8703] RDX: 0000000000000080 RSI: 00000000200001c0 RDI: 0000000000000005 [ 219.853012][ T8703] RBP: 00007f2e1731f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 219.853029][ T8703] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 219.853044][ T8703] R13: 00007ffde7446a9f R14: 00007f2e1731f300 R15: 0000000000022000 [ 219.853079][ T8703] [ 219.855444][ T8704] FAULT_INJECTION: forcing a failure. [ 219.855444][ T8704] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 219.875641][ T8704] CPU: 1 PID: 8704 Comm: syz-executor.1 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 219.875684][ T8704] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 219.875700][ T8704] Call Trace: [ 219.875708][ T8704] [ 219.875717][ T8704] dump_stack_lvl+0xcd/0x134 [ 219.875751][ T8704] should_fail.cold+0x5/0xa [ 219.875790][ T8704] prepare_alloc_pages+0x17b/0x570 [ 219.875824][ T8704] __alloc_pages+0x12f/0x500 [ 219.875850][ T8704] ? __alloc_pages_slowpath.constprop.0+0x20e0/0x20e0 [ 219.875881][ T8704] ? __kmalloc_node+0x62/0x390 [ 219.875929][ T8704] alloc_pages+0x1aa/0x310 [ 219.875962][ T8704] __vmalloc_node_range+0x735/0x13e0 [ 219.876007][ T8704] ? netlink_sendmsg+0x690/0xe10 [ 219.876037][ T8704] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 219.876068][ T8704] ? vfree_atomic+0xe0/0xe0 [ 219.876098][ T8704] ? __netlink_dump_start+0x900/0x900 [ 219.876125][ T8704] ? netlink_sendmsg+0x690/0xe10 [ 219.876152][ T8704] vmalloc+0x67/0x80 [ 219.876180][ T8704] ? netlink_sendmsg+0x690/0xe10 [ 219.876204][ T8704] netlink_sendmsg+0x690/0xe10 [ 219.876236][ T8704] ? netlink_unicast+0x7f0/0x7f0 [ 219.876267][ T8704] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 219.876298][ T8704] ? netlink_unicast+0x7f0/0x7f0 [ 219.876324][ T8704] sock_sendmsg+0xcf/0x120 [ 219.876356][ T8704] ____sys_sendmsg+0x6eb/0x810 [ 219.876390][ T8704] ? kernel_sendmsg+0x50/0x50 [ 219.876419][ T8704] ? do_recvmmsg+0x6d0/0x6d0 [ 219.876444][ T8704] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 219.876480][ T8704] ? _parse_integer+0x30/0x30 [ 219.876518][ T8704] ___sys_sendmsg+0xf3/0x170 [ 219.876545][ T8704] ? sendmsg_copy_msghdr+0x160/0x160 [ 219.876577][ T8704] ? lock_downgrade+0x6e0/0x6e0 [ 219.876621][ T8704] ? __fget_files+0x286/0x470 [ 219.876671][ T8704] ? __fget_light+0xea/0x270 [ 219.876701][ T8704] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 219.876737][ T8704] __x64_sys_sendmsg+0x132/0x220 [ 219.876765][ T8704] ? __sys_sendmsg+0x1b0/0x1b0 [ 219.876812][ T8704] ? syscall_enter_from_user_mode+0x21/0x70 [ 219.876854][ T8704] do_syscall_64+0x35/0xb0 [ 219.876882][ T8704] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 219.876909][ T8704] RIP: 0033:0x7f55bba89109 [ 219.876930][ T8704] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 219.876955][ T8704] RSP: 002b:00007f55bcbef168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 219.876980][ T8704] RAX: ffffffffffffffda RBX: 00007f55bbb9bf60 RCX: 00007f55bba89109 [ 219.876999][ T8704] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 219.877017][ T8704] RBP: 00007f55bcbef1d0 R08: 0000000000000000 R09: 0000000000000000 [ 219.877034][ T8704] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 219.877051][ T8704] R13: 00007ffd14a51aef R14: 00007f55bcbef300 R15: 0000000000022000 [ 219.877087][ T8704] [ 221.677885][ T6164] Bluetooth: hci0: command 0x0406 tx timeout [ 221.677937][ T6164] Bluetooth: hci3: command 0x0406 tx timeout [ 221.677965][ T6164] Bluetooth: hci2: command 0x0406 tx timeout [ 221.677991][ T6164] Bluetooth: hci5: command 0x0406 tx timeout [ 221.678018][ T6164] Bluetooth: hci4: command 0x0406 tx timeout [ 242.156520][ T6164] Bluetooth: hci1: command 0x0406 tx timeout [ 244.706408][ T8710] FAULT_INJECTION: forcing a failure. [ 244.706408][ T8710] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 244.706443][ T8710] CPU: 1 PID: 8710 Comm: syz-executor.1 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 244.706469][ T8710] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 244.706485][ T8710] Call Trace: [ 244.706491][ T8710] [ 244.706501][ T8710] dump_stack_lvl+0xcd/0x134 [ 244.706656][ T8710] should_fail.cold+0x5/0xa [ 244.706698][ T8710] prepare_alloc_pages+0x17b/0x570 [ 244.706786][ T8710] __alloc_pages+0x12f/0x500 [ 244.706832][ T8710] ? __alloc_pages_slowpath.constprop.0+0x20e0/0x20e0 [ 244.706862][ T8710] ? __kmalloc_node+0x62/0x390 [ 244.706938][ T8710] alloc_pages+0x1aa/0x310 [ 244.706971][ T8710] __vmalloc_node_range+0x735/0x13e0 [ 244.707015][ T8710] ? netlink_sendmsg+0x690/0xe10 [ 244.707090][ T8710] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 244.707151][ T8710] ? vfree_atomic+0xe0/0xe0 [ 244.707181][ T8710] ? __netlink_dump_start+0x900/0x900 [ 244.707208][ T8710] ? netlink_sendmsg+0x690/0xe10 [ 244.707235][ T8710] vmalloc+0x67/0x80 [ 244.707310][ T8710] ? netlink_sendmsg+0x690/0xe10 [ 244.707337][ T8710] netlink_sendmsg+0x690/0xe10 [ 244.707367][ T8710] ? netlink_unicast+0x7f0/0x7f0 [ 244.707398][ T8710] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 244.707429][ T8710] ? netlink_unicast+0x7f0/0x7f0 [ 244.707454][ T8710] sock_sendmsg+0xcf/0x120 [ 244.707544][ T8710] ____sys_sendmsg+0x6eb/0x810 [ 244.707579][ T8710] ? kernel_sendmsg+0x50/0x50 [ 244.707607][ T8710] ? do_recvmmsg+0x6d0/0x6d0 [ 244.707655][ T8710] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 244.707696][ T8710] ? _parse_integer+0x30/0x30 [ 244.707815][ T8710] ___sys_sendmsg+0xf3/0x170 [ 244.707843][ T8710] ? sendmsg_copy_msghdr+0x160/0x160 [ 244.707874][ T8710] ? lock_downgrade+0x6e0/0x6e0 [ 244.707917][ T8710] ? __fget_files+0x286/0x470 [ 244.707969][ T8710] ? __fget_light+0xea/0x270 [ 244.707995][ T8710] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 244.708027][ T8710] __x64_sys_sendmsg+0x132/0x220 [ 244.708053][ T8710] ? __sys_sendmsg+0x1b0/0x1b0 [ 244.708090][ T8710] ? syscall_enter_from_user_mode+0x21/0x70 [ 244.708180][ T8710] do_syscall_64+0x35/0xb0 [ 244.708208][ T8710] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 244.708263][ T8710] RIP: 0033:0x7f55bba89109 [ 244.708284][ T8710] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 244.708310][ T8710] RSP: 002b:00007f55bcbef168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 244.708335][ T8710] RAX: ffffffffffffffda RBX: 00007f55bbb9bf60 RCX: 00007f55bba89109 [ 244.708352][ T8710] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 244.708368][ T8710] RBP: 00007f55bcbef1d0 R08: 0000000000000000 R09: 0000000000000000 [ 244.708383][ T8710] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 244.708398][ T8710] R13: 00007ffd14a51aef R14: 00007f55bcbef300 R15: 0000000000022000 [ 244.708433][ T8710] [ 244.758146][ T8716] FAULT_INJECTION: forcing a failure. [ 244.758146][ T8716] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 244.758184][ T8716] CPU: 1 PID: 8716 Comm: syz-executor.5 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 244.758213][ T8716] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 244.758228][ T8716] Call Trace: [ 244.758235][ T8716] [ 244.758244][ T8716] dump_stack_lvl+0xcd/0x134 [ 244.758277][ T8716] should_fail.cold+0x5/0xa [ 244.758313][ T8716] prepare_alloc_pages+0x17b/0x570 [ 244.758340][ T8716] ? arch_stack_walk+0x93/0xe0 [ 244.758440][ T8716] __alloc_pages+0x12f/0x500 [ 244.758467][ T8716] ? __alloc_pages_slowpath.constprop.0+0x20e0/0x20e0 [ 244.758497][ T8716] ? stack_trace_save+0x8c/0xc0 [ 244.758564][ T8716] __alloc_pages_bulk+0xbf3/0x1a10 [ 244.758589][ T8716] ? bpf_check+0x63f6/0xbbc0 [ 244.758619][ T8716] ? bpf_prog_load+0xfb2/0x2250 [ 244.758676][ T8716] ? do_syscall_64+0x35/0xb0 [ 244.758702][ T8716] ? entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 244.758745][ T8716] ? __alloc_pages+0x500/0x500 [ 244.758775][ T8716] ? find_held_lock+0x2d/0x110 [ 244.758813][ T8716] ? __kmalloc_node+0x62/0x390 [ 244.758852][ T8716] alloc_pages_bulk_array_mempolicy+0x1c3/0x4d0 [ 244.758884][ T8716] ? rcu_read_lock_sched_held+0x3a/0x70 [ 244.758963][ T8716] ? trace_kmalloc_node+0x32/0x100 [ 244.758995][ T8716] __vmalloc_node_range+0x576/0x13e0 [ 244.759044][ T8716] ? bpf_prog_calc_tag+0xc9/0x6c0 [ 244.759079][ T8716] ? vfree_atomic+0xe0/0xe0 [ 244.759112][ T8716] ? pcpu_memcg_post_alloc_hook+0x1cc/0x3a0 [ 244.759163][ T8716] ? bpf_prog_calc_tag+0xc9/0x6c0 [ 244.759193][ T8716] vmalloc+0x67/0x80 [ 244.759222][ T8716] ? bpf_prog_calc_tag+0xc9/0x6c0 [ 244.759248][ T8716] bpf_prog_calc_tag+0xc9/0x6c0 [ 244.759278][ T8716] ? __bpf_prog_free+0x190/0x190 [ 244.759306][ T8716] ? lockdep_init_map_type+0x21a/0x7f0 [ 244.759340][ T8716] ? lockdep_init_map_type+0x21a/0x7f0 [ 244.759370][ T8716] ? __raw_spin_lock_init+0x36/0x110 [ 244.759405][ T8716] ? debug_mutex_init+0x33/0x60 [ 244.759432][ T8716] ? bpf_prog_alloc_no_stats+0x353/0x470 [ 244.759458][ T8716] bpf_check+0x63f6/0xbbc0 [ 244.759511][ T8716] ? bpf_get_btf_vmlinux+0x10/0x10 [ 244.759544][ T8716] ? lock_downgrade+0x6e0/0x6e0 [ 244.759576][ T8716] ? lock_downgrade+0x6e0/0x6e0 [ 244.759615][ T8716] ? memset+0x20/0x40 [ 244.759645][ T8716] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 244.759674][ T8716] ? bpf_obj_name_cpy+0x144/0x1a0 [ 244.759701][ T8716] ? bpf_prog_load+0xf71/0x2250 [ 244.759730][ T8716] bpf_prog_load+0xfb2/0x2250 [ 244.759771][ T8716] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 244.759803][ T8716] ? find_held_lock+0x2d/0x110 [ 244.759837][ T8716] ? __might_fault+0xd1/0x170 [ 244.759888][ T8716] ? lock_downgrade+0x6e0/0x6e0 [ 244.759933][ T8716] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 244.759966][ T8716] __sys_bpf+0x11a1/0x5700 [ 244.759998][ T8716] ? bpf_perf_link_attach+0x520/0x520 [ 244.760028][ T8716] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 244.760069][ T8716] ? find_held_lock+0x2d/0x110 [ 244.760122][ T8716] ? trace_hardirqs_on+0x38/0x1c0 [ 244.760161][ T8716] __x64_sys_bpf+0x75/0xb0 [ 244.760190][ T8716] ? syscall_enter_from_user_mode+0x21/0x70 [ 244.760226][ T8716] do_syscall_64+0x35/0xb0 [ 244.760253][ T8716] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 244.760279][ T8716] RIP: 0033:0x7f2e16289109 [ 244.760300][ T8716] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 244.760325][ T8716] RSP: 002b:00007f2e1731f168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 244.760350][ T8716] RAX: ffffffffffffffda RBX: 00007f2e1639bf60 RCX: 00007f2e16289109 [ 244.760368][ T8716] RDX: 0000000000000080 RSI: 00000000200001c0 RDI: 0000000000000005 [ 244.760386][ T8716] RBP: 00007f2e1731f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 244.760404][ T8716] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 244.760420][ T8716] R13: 00007ffde7446a9f R14: 00007f2e1731f300 R15: 0000000000022000 [ 244.760456][ T8716] [ 244.855994][ T8723] FAULT_INJECTION: forcing a failure. [ 244.855994][ T8723] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 244.856030][ T8723] CPU: 1 PID: 8723 Comm: syz-executor.1 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 244.856059][ T8723] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 244.856074][ T8723] Call Trace: [ 244.856082][ T8723] [ 244.856091][ T8723] dump_stack_lvl+0xcd/0x134 [ 244.856126][ T8723] should_fail.cold+0x5/0xa [ 244.856164][ T8723] prepare_alloc_pages+0x17b/0x570 [ 244.856201][ T8723] __alloc_pages+0x12f/0x500 [ 244.856227][ T8723] ? __alloc_pages_slowpath.constprop.0+0x20e0/0x20e0 [ 244.856258][ T8723] ? __kmalloc_node+0x62/0x390 [ 244.856303][ T8723] alloc_pages+0x1aa/0x310 [ 244.856335][ T8723] __vmalloc_node_range+0x735/0x13e0 [ 244.856379][ T8723] ? netlink_sendmsg+0x690/0xe10 [ 244.856410][ T8723] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 244.856440][ T8723] ? vfree_atomic+0xe0/0xe0 [ 244.856471][ T8723] ? __netlink_dump_start+0x900/0x900 [ 244.856497][ T8723] ? netlink_sendmsg+0x690/0xe10 [ 244.856525][ T8723] vmalloc+0x67/0x80 [ 244.856552][ T8723] ? netlink_sendmsg+0x690/0xe10 [ 244.856577][ T8723] netlink_sendmsg+0x690/0xe10 [ 244.856608][ T8723] ? netlink_unicast+0x7f0/0x7f0 [ 244.856639][ T8723] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 244.856671][ T8723] ? netlink_unicast+0x7f0/0x7f0 [ 244.856697][ T8723] sock_sendmsg+0xcf/0x120 [ 244.856729][ T8723] ____sys_sendmsg+0x6eb/0x810 [ 244.856771][ T8723] ? kernel_sendmsg+0x50/0x50 [ 244.856803][ T8723] ? do_recvmmsg+0x6d0/0x6d0 [ 244.856827][ T8723] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 244.856862][ T8723] ? _parse_integer+0x30/0x30 [ 244.856901][ T8723] ___sys_sendmsg+0xf3/0x170 [ 244.856927][ T8723] ? sendmsg_copy_msghdr+0x160/0x160 [ 244.856959][ T8723] ? lock_downgrade+0x6e0/0x6e0 [ 244.857002][ T8723] ? __fget_files+0x286/0x470 [ 244.857039][ T8723] ? __fget_light+0xea/0x270 [ 244.857066][ T8723] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 244.857101][ T8723] __x64_sys_sendmsg+0x132/0x220 [ 244.857127][ T8723] ? __sys_sendmsg+0x1b0/0x1b0 [ 244.857167][ T8723] ? syscall_enter_from_user_mode+0x21/0x70 [ 244.857208][ T8723] do_syscall_64+0x35/0xb0 [ 244.857234][ T8723] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 244.857262][ T8723] RIP: 0033:0x7f55bba89109 [ 244.857283][ T8723] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 244.857306][ T8723] RSP: 002b:00007f55bcbef168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 244.857329][ T8723] RAX: ffffffffffffffda RBX: 00007f55bbb9bf60 RCX: 00007f55bba89109 [ 244.857347][ T8723] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 244.857364][ T8723] RBP: 00007f55bcbef1d0 R08: 0000000000000000 R09: 0000000000000000 [ 244.857381][ T8723] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 244.857398][ T8723] R13: 00007ffd14a51aef R14: 00007f55bcbef300 R15: 0000000000022000 [ 244.857434][ T8723] [ 244.959178][ T8729] FAULT_INJECTION: forcing a failure. [ 244.959178][ T8729] name failslab, interval 1, probability 0, space 0, times 0 [ 244.959212][ T8729] CPU: 1 PID: 8729 Comm: syz-executor.5 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 244.959241][ T8729] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 244.959258][ T8729] Call Trace: [ 244.959264][ T8729] [ 244.959272][ T8729] dump_stack_lvl+0xcd/0x134 [ 244.959305][ T8729] should_fail.cold+0x5/0xa [ 244.959341][ T8729] should_failslab+0x5/0x10 [ 244.959372][ T8729] kmem_cache_alloc_trace+0x60/0x3f0 [ 244.959401][ T8729] ? bpf_int_jit_compile+0xf7b/0x13e0 [ 244.959458][ T8729] bpf_int_jit_compile+0xf7b/0x13e0 [ 244.959485][ T8729] ? bpf_prog_calc_tag+0x4b5/0x6c0 [ 244.959516][ T8729] ? __bpf_prog_free+0x190/0x190 [ 244.959543][ T8729] ? arch_prepare_bpf_dispatcher+0xc0/0xc0 [ 244.959567][ T8729] ? lockdep_init_map_type+0x21a/0x7f0 [ 244.959610][ T8729] ? bpf_prog_alloc_no_stats+0x353/0x470 [ 244.959639][ T8729] bpf_check+0x6e45/0xbbc0 [ 244.959687][ T8729] ? bpf_get_btf_vmlinux+0x10/0x10 [ 244.959719][ T8729] ? lock_downgrade+0x6e0/0x6e0 [ 244.959754][ T8729] ? lock_downgrade+0x6e0/0x6e0 [ 244.959792][ T8729] ? memset+0x20/0x40 [ 244.959814][ T8729] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 244.959844][ T8729] ? bpf_obj_name_cpy+0x144/0x1a0 [ 244.959875][ T8729] ? bpf_prog_load+0xf71/0x2250 [ 244.959905][ T8729] bpf_prog_load+0xfb2/0x2250 [ 244.959939][ T8729] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 244.959968][ T8729] ? find_held_lock+0x2d/0x110 [ 244.960000][ T8729] ? __might_fault+0xd1/0x170 [ 244.960024][ T8729] ? lock_downgrade+0x6e0/0x6e0 [ 244.960065][ T8729] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 244.960097][ T8729] __sys_bpf+0x11a1/0x5700 [ 244.960129][ T8729] ? bpf_perf_link_attach+0x520/0x520 [ 244.960157][ T8729] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 244.960197][ T8729] ? find_held_lock+0x2d/0x110 [ 244.960248][ T8729] ? trace_hardirqs_on+0x38/0x1c0 [ 244.960277][ T8729] __x64_sys_bpf+0x75/0xb0 [ 244.960304][ T8729] ? syscall_enter_from_user_mode+0x21/0x70 [ 244.960336][ T8729] do_syscall_64+0x35/0xb0 [ 244.960362][ T8729] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 244.960388][ T8729] RIP: 0033:0x7f2e16289109 [ 244.960408][ T8729] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 244.960432][ T8729] RSP: 002b:00007f2e1731f168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 244.960456][ T8729] RAX: ffffffffffffffda RBX: 00007f2e1639bf60 RCX: 00007f2e16289109 [ 244.960473][ T8729] RDX: 0000000000000080 RSI: 00000000200001c0 RDI: 0000000000000005 [ 244.960488][ T8729] RBP: 00007f2e1731f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 244.960504][ T8729] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 244.960525][ T8729] R13: 00007ffde7446a9f R14: 00007f2e1731f300 R15: 0000000000022000 [ 244.960558][ T8729] [ 245.309434][ T8743] FAULT_INJECTION: forcing a failure. [ 245.309434][ T8743] name failslab, interval 1, probability 0, space 0, times 0 [ 245.309470][ T8743] CPU: 0 PID: 8743 Comm: syz-executor.5 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 245.309498][ T8743] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 245.309514][ T8743] Call Trace: [ 245.309520][ T8743] [ 245.309530][ T8743] dump_stack_lvl+0xcd/0x134 [ 245.309563][ T8743] should_fail.cold+0x5/0xa [ 245.309600][ T8743] ? kvmalloc_node+0x3e/0x190 [ 245.309699][ T8743] should_failslab+0x5/0x10 [ 245.309761][ T8743] __kmalloc_node+0x75/0x390 [ 245.309791][ T8743] ? rcu_read_lock_sched_held+0x3a/0x70 [ 245.309828][ T8743] kvmalloc_node+0x3e/0x190 [ 245.309856][ T8743] bpf_int_jit_compile+0xe65/0x13e0 [ 245.309894][ T8743] ? arch_prepare_bpf_dispatcher+0xc0/0xc0 [ 245.309919][ T8743] ? lockdep_init_map_type+0x21a/0x7f0 [ 245.309965][ T8743] ? bpf_prog_alloc_no_stats+0x353/0x470 [ 245.309997][ T8743] bpf_check+0x6e45/0xbbc0 [ 245.310056][ T8743] ? bpf_get_btf_vmlinux+0x10/0x10 [ 245.310092][ T8743] ? lock_downgrade+0x6e0/0x6e0 [ 245.310125][ T8743] ? lock_downgrade+0x6e0/0x6e0 [ 245.310174][ T8743] ? memset+0x20/0x40 [ 245.310197][ T8743] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 245.310226][ T8743] ? bpf_obj_name_cpy+0x144/0x1a0 [ 245.310257][ T8743] ? bpf_prog_load+0xf71/0x2250 [ 245.310289][ T8743] bpf_prog_load+0xfb2/0x2250 [ 245.310326][ T8743] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 245.310358][ T8743] ? find_held_lock+0x2d/0x110 [ 245.310391][ T8743] ? __might_fault+0xd1/0x170 [ 245.310417][ T8743] ? lock_downgrade+0x6e0/0x6e0 [ 245.310462][ T8743] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 245.310496][ T8743] __sys_bpf+0x11a1/0x5700 [ 245.310530][ T8743] ? bpf_perf_link_attach+0x520/0x520 [ 245.310561][ T8743] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 245.310604][ T8743] ? find_held_lock+0x2d/0x110 [ 245.310661][ T8743] ? trace_hardirqs_on+0x38/0x1c0 [ 245.310692][ T8743] __x64_sys_bpf+0x75/0xb0 [ 245.310746][ T8743] ? syscall_enter_from_user_mode+0x21/0x70 [ 245.310782][ T8743] do_syscall_64+0x35/0xb0 [ 245.310810][ T8743] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 245.310838][ T8743] RIP: 0033:0x7f2e16289109 [ 245.310858][ T8743] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 245.310884][ T8743] RSP: 002b:00007f2e1731f168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 245.310910][ T8743] RAX: ffffffffffffffda RBX: 00007f2e1639bf60 RCX: 00007f2e16289109 [ 245.310928][ T8743] RDX: 0000000000000080 RSI: 00000000200001c0 RDI: 0000000000000005 [ 245.310946][ T8743] RBP: 00007f2e1731f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 245.310963][ T8743] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 245.310980][ T8743] R13: 00007ffde7446a9f R14: 00007f2e1731f300 R15: 0000000000022000 [ 245.311017][ T8743] [ 245.317738][ T8741] FAULT_INJECTION: forcing a failure. [ 245.317738][ T8741] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 245.317775][ T8741] CPU: 0 PID: 8741 Comm: syz-executor.1 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 245.317803][ T8741] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 245.317820][ T8741] Call Trace: [ 245.317827][ T8741] [ 245.317836][ T8741] dump_stack_lvl+0xcd/0x134 [ 245.317870][ T8741] should_fail.cold+0x5/0xa [ 245.317908][ T8741] prepare_alloc_pages+0x17b/0x570 [ 245.317943][ T8741] __alloc_pages+0x12f/0x500 [ 245.317970][ T8741] ? __alloc_pages_slowpath.constprop.0+0x20e0/0x20e0 [ 245.318007][ T8741] ? __kmalloc_node+0x62/0x390 [ 245.318053][ T8741] alloc_pages+0x1aa/0x310 [ 245.318087][ T8741] __vmalloc_node_range+0x735/0x13e0 [ 245.318131][ T8741] ? netlink_sendmsg+0x690/0xe10 [ 245.318161][ T8741] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 245.318192][ T8741] ? vfree_atomic+0xe0/0xe0 [ 245.318221][ T8741] ? __netlink_dump_start+0x900/0x900 [ 245.318244][ T8741] ? netlink_sendmsg+0x690/0xe10 [ 245.318271][ T8741] vmalloc+0x67/0x80 [ 245.318299][ T8741] ? netlink_sendmsg+0x690/0xe10 [ 245.318324][ T8741] netlink_sendmsg+0x690/0xe10 [ 245.318356][ T8741] ? netlink_unicast+0x7f0/0x7f0 [ 245.318389][ T8741] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 245.318419][ T8741] ? netlink_unicast+0x7f0/0x7f0 [ 245.318445][ T8741] sock_sendmsg+0xcf/0x120 [ 245.318486][ T8741] ____sys_sendmsg+0x6eb/0x810 [ 245.318523][ T8741] ? kernel_sendmsg+0x50/0x50 [ 245.318553][ T8741] ? do_recvmmsg+0x6d0/0x6d0 [ 245.318579][ T8741] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 245.318615][ T8741] ? _parse_integer+0x30/0x30 [ 245.318650][ T8741] ___sys_sendmsg+0xf3/0x170 [ 245.318677][ T8741] ? sendmsg_copy_msghdr+0x160/0x160 [ 245.318716][ T8741] ? lock_downgrade+0x6e0/0x6e0 [ 245.318763][ T8741] ? __fget_files+0x286/0x470 [ 245.318801][ T8741] ? __fget_light+0xea/0x270 [ 245.318827][ T8741] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 245.318861][ T8741] __x64_sys_sendmsg+0x132/0x220 [ 245.318887][ T8741] ? __sys_sendmsg+0x1b0/0x1b0 [ 245.318927][ T8741] ? syscall_enter_from_user_mode+0x21/0x70 [ 245.318966][ T8741] do_syscall_64+0x35/0xb0 [ 245.318994][ T8741] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 245.319021][ T8741] RIP: 0033:0x7f55bba89109 [ 245.319042][ T8741] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 245.319075][ T8741] RSP: 002b:00007f55bcbef168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 245.319101][ T8741] RAX: ffffffffffffffda RBX: 00007f55bbb9bf60 RCX: 00007f55bba89109 [ 245.319120][ T8741] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 245.319137][ T8741] RBP: 00007f55bcbef1d0 R08: 0000000000000000 R09: 0000000000000000 [ 245.319153][ T8741] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 245.319168][ T8741] R13: 00007ffd14a51aef R14: 00007f55bcbef300 R15: 0000000000022000 [ 245.319203][ T8741] [ 245.457293][ T8751] FAULT_INJECTION: forcing a failure. [ 245.457293][ T8751] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 245.457328][ T8751] CPU: 1 PID: 8751 Comm: syz-executor.1 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 245.457357][ T8751] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 245.457373][ T8751] Call Trace: [ 245.457380][ T8751] [ 245.457389][ T8751] dump_stack_lvl+0xcd/0x134 [ 245.457423][ T8751] should_fail.cold+0x5/0xa [ 245.457461][ T8751] prepare_alloc_pages+0x17b/0x570 [ 245.457495][ T8751] __alloc_pages+0x12f/0x500 [ 245.457521][ T8751] ? __alloc_pages_slowpath.constprop.0+0x20e0/0x20e0 [ 245.457551][ T8751] ? __kmalloc_node+0x62/0x390 [ 245.457599][ T8751] alloc_pages+0x1aa/0x310 [ 245.457634][ T8751] __vmalloc_node_range+0x735/0x13e0 [ 245.457681][ T8751] ? netlink_sendmsg+0x690/0xe10 [ 245.457710][ T8751] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 245.457741][ T8751] ? vfree_atomic+0xe0/0xe0 [ 245.457771][ T8751] ? __netlink_dump_start+0x900/0x900 [ 245.457798][ T8751] ? netlink_sendmsg+0x690/0xe10 [ 245.457825][ T8751] vmalloc+0x67/0x80 [ 245.457853][ T8751] ? netlink_sendmsg+0x690/0xe10 [ 245.457878][ T8751] netlink_sendmsg+0x690/0xe10 [ 245.457909][ T8751] ? netlink_unicast+0x7f0/0x7f0 [ 245.457942][ T8751] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 245.457972][ T8751] ? netlink_unicast+0x7f0/0x7f0 [ 245.457998][ T8751] sock_sendmsg+0xcf/0x120 [ 245.458030][ T8751] ____sys_sendmsg+0x6eb/0x810 [ 245.458071][ T8751] ? kernel_sendmsg+0x50/0x50 [ 245.458100][ T8751] ? do_recvmmsg+0x6d0/0x6d0 [ 245.458124][ T8751] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 245.458159][ T8751] ? _parse_integer+0x30/0x30 [ 245.458202][ T8751] ___sys_sendmsg+0xf3/0x170 [ 245.458229][ T8751] ? sendmsg_copy_msghdr+0x160/0x160 [ 245.458261][ T8751] ? lock_downgrade+0x6e0/0x6e0 [ 245.458306][ T8751] ? __fget_files+0x286/0x470 [ 245.458344][ T8751] ? __fget_light+0xea/0x270 [ 245.458371][ T8751] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 245.458406][ T8751] __x64_sys_sendmsg+0x132/0x220 [ 245.458432][ T8751] ? __sys_sendmsg+0x1b0/0x1b0 [ 245.458473][ T8751] ? syscall_enter_from_user_mode+0x21/0x70 [ 245.458513][ T8751] do_syscall_64+0x35/0xb0 [ 245.458540][ T8751] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 245.458567][ T8751] RIP: 0033:0x7f55bba89109 [ 245.458587][ T8751] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 245.458612][ T8751] RSP: 002b:00007f55bcbef168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 245.458638][ T8751] RAX: ffffffffffffffda RBX: 00007f55bbb9bf60 RCX: 00007f55bba89109 [ 245.458657][ T8751] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 245.458675][ T8751] RBP: 00007f55bcbef1d0 R08: 0000000000000000 R09: 0000000000000000 [ 245.458692][ T8751] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 245.458707][ T8751] R13: 00007ffd14a51aef R14: 00007f55bcbef300 R15: 0000000000022000 [ 245.458744][ T8751] [ 245.474830][ T8747] netlink: 1302 bytes leftover after parsing attributes in process `syz-executor.2'. [ 245.500698][ T8755] FAULT_INJECTION: forcing a failure. [ 245.500698][ T8755] name failslab, interval 1, probability 0, space 0, times 0 [ 245.500732][ T8755] CPU: 1 PID: 8755 Comm: syz-executor.5 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 245.500761][ T8755] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 245.500776][ T8755] Call Trace: [ 245.500783][ T8755] [ 245.500792][ T8755] dump_stack_lvl+0xcd/0x134 [ 245.500826][ T8755] should_fail.cold+0x5/0xa [ 245.500864][ T8755] ? __get_vm_area_node+0xed/0x3f0 [ 245.500894][ T8755] should_failslab+0x5/0x10 [ 245.500922][ T8755] kmem_cache_alloc_node_trace+0x59/0x420 [ 245.500960][ T8755] __get_vm_area_node+0xed/0x3f0 [ 245.500995][ T8755] __vmalloc_node_range+0x250/0x13e0 [ 245.501026][ T8755] ? bpf_prog_alloc_no_stats+0x38/0x470 [ 245.501065][ T8755] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 245.501097][ T8755] ? bpf_prog_alloc_no_stats+0x38/0x470 [ 245.501131][ T8755] ? vfree_atomic+0xe0/0xe0 [ 245.501164][ T8755] ? arch_prepare_bpf_dispatcher+0xc0/0xc0 [ 245.501198][ T8755] ? lockdep_init_map_type+0x21a/0x7f0 [ 245.501236][ T8755] ? bpf_prog_alloc_no_stats+0x38/0x470 [ 245.501264][ T8755] __vmalloc+0x69/0x80 [ 245.501293][ T8755] ? bpf_prog_alloc_no_stats+0x38/0x470 [ 245.501322][ T8755] bpf_prog_alloc_no_stats+0x38/0x470 [ 245.501353][ T8755] bpf_check+0x630e/0xbbc0 [ 245.501405][ T8755] ? bpf_get_btf_vmlinux+0x10/0x10 [ 245.501439][ T8755] ? lock_downgrade+0x6e0/0x6e0 [ 245.501470][ T8755] ? lock_downgrade+0x6e0/0x6e0 [ 245.501511][ T8755] ? memset+0x20/0x40 [ 245.501533][ T8755] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 245.501562][ T8755] ? bpf_obj_name_cpy+0x144/0x1a0 [ 245.501592][ T8755] ? bpf_prog_load+0xf71/0x2250 [ 245.501624][ T8755] bpf_prog_load+0xfb2/0x2250 [ 245.501662][ T8755] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 245.501692][ T8755] ? find_held_lock+0x2d/0x110 [ 245.501725][ T8755] ? __might_fault+0xd1/0x170 [ 245.501751][ T8755] ? lock_downgrade+0x6e0/0x6e0 [ 245.501796][ T8755] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 245.501830][ T8755] __sys_bpf+0x11a1/0x5700 [ 245.501863][ T8755] ? bpf_perf_link_attach+0x520/0x520 [ 245.501892][ T8755] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 245.501934][ T8755] ? find_held_lock+0x2d/0x110 [ 245.501991][ T8755] ? trace_hardirqs_on+0x38/0x1c0 [ 245.502019][ T8755] __x64_sys_bpf+0x75/0xb0 [ 245.502046][ T8755] ? syscall_enter_from_user_mode+0x21/0x70 [ 245.502080][ T8755] do_syscall_64+0x35/0xb0 [ 245.502107][ T8755] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 245.502135][ T8755] RIP: 0033:0x7f2e16289109 [ 245.502155][ T8755] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 245.502182][ T8755] RSP: 002b:00007f2e1731f168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 245.502218][ T8755] RAX: ffffffffffffffda RBX: 00007f2e1639bf60 RCX: 00007f2e16289109 [ 245.502237][ T8755] RDX: 0000000000000080 RSI: 00000000200001c0 RDI: 0000000000000005 [ 245.502254][ T8755] RBP: 00007f2e1731f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 245.502272][ T8755] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 245.502289][ T8755] R13: 00007ffde7446a9f R14: 00007f2e1731f300 R15: 0000000000022000 [ 245.502324][ T8755] [ 245.541529][ T8755] warn_alloc: 9 callbacks suppressed [ 245.541550][ T8755] syz-executor.5: vmalloc error: size 4096, vm_struct allocation failed, mode:0x500dc0(GFP_USER|__GFP_ZERO|__GFP_ACCOUNT), nodemask=(null),cpuset=syz5,mems_allowed=0-1 [ 245.541622][ T8755] CPU: 1 PID: 8755 Comm: syz-executor.5 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 245.541651][ T8755] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 245.541665][ T8755] Call Trace: [ 245.541672][ T8755] [ 245.541682][ T8755] dump_stack_lvl+0xcd/0x134 [ 245.541719][ T8755] warn_alloc.cold+0x9b/0x189 [ 245.541792][ T8755] ? zone_watermark_ok_safe+0x290/0x290 [ 245.541832][ T8755] ? __kasan_kmalloc+0xbd/0xd0 [ 245.541865][ T8755] ? __get_vm_area_node+0x297/0x3f0 [ 245.541896][ T8755] ? __vmalloc_node_range+0xd3e/0x13e0 [ 245.541930][ T8755] __vmalloc_node_range+0xdff/0x13e0 [ 245.541972][ T8755] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 245.542005][ T8755] ? bpf_prog_alloc_no_stats+0x38/0x470 [ 245.542038][ T8755] ? vfree_atomic+0xe0/0xe0 [ 245.542066][ T8755] ? arch_prepare_bpf_dispatcher+0xc0/0xc0 [ 245.542092][ T8755] ? lockdep_init_map_type+0x21a/0x7f0 [ 245.542126][ T8755] ? bpf_prog_alloc_no_stats+0x38/0x470 [ 245.542150][ T8755] __vmalloc+0x69/0x80 [ 245.542175][ T8755] ? bpf_prog_alloc_no_stats+0x38/0x470 [ 245.542212][ T8755] bpf_prog_alloc_no_stats+0x38/0x470 [ 245.542243][ T8755] bpf_check+0x630e/0xbbc0 [ 245.542292][ T8755] ? bpf_get_btf_vmlinux+0x10/0x10 [ 245.542324][ T8755] ? lock_downgrade+0x6e0/0x6e0 [ 245.542355][ T8755] ? lock_downgrade+0x6e0/0x6e0 [ 245.542394][ T8755] ? memset+0x20/0x40 [ 245.542419][ T8755] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 245.542448][ T8755] ? bpf_obj_name_cpy+0x144/0x1a0 [ 245.542479][ T8755] ? bpf_prog_load+0xf71/0x2250 [ 245.542510][ T8755] bpf_prog_load+0xfb2/0x2250 [ 245.542547][ T8755] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 245.542580][ T8755] ? find_held_lock+0x2d/0x110 [ 245.542613][ T8755] ? __might_fault+0xd1/0x170 [ 245.542640][ T8755] ? lock_downgrade+0x6e0/0x6e0 [ 245.542684][ T8755] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 245.542717][ T8755] __sys_bpf+0x11a1/0x5700 [ 245.542752][ T8755] ? bpf_perf_link_attach+0x520/0x520 [ 245.542782][ T8755] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 245.542823][ T8755] ? find_held_lock+0x2d/0x110 [ 245.542880][ T8755] ? trace_hardirqs_on+0x38/0x1c0 [ 245.542911][ T8755] __x64_sys_bpf+0x75/0xb0 [ 245.542941][ T8755] ? syscall_enter_from_user_mode+0x21/0x70 [ 245.542975][ T8755] do_syscall_64+0x35/0xb0 [ 245.543001][ T8755] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 245.543027][ T8755] RIP: 0033:0x7f2e16289109 [ 245.543050][ T8755] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 245.543076][ T8755] RSP: 002b:00007f2e1731f168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 245.543102][ T8755] RAX: ffffffffffffffda RBX: 00007f2e1639bf60 RCX: 00007f2e16289109 [ 245.543121][ T8755] RDX: 0000000000000080 RSI: 00000000200001c0 RDI: 0000000000000005 [ 245.543138][ T8755] RBP: 00007f2e1731f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 245.543154][ T8755] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 245.543170][ T8755] R13: 00007ffde7446a9f R14: 00007f2e1731f300 R15: 0000000000022000 [ 245.543213][ T8755] [ 245.543334][ T8755] Mem-Info: [ 245.543345][ T8755] active_anon:374 inactive_anon:49391 isolated_anon:0 [ 245.543345][ T8755] active_file:3657 inactive_file:7739 isolated_file:0 [ 245.543345][ T8755] unevictable:768 dirty:25 writeback:0 [ 245.543345][ T8755] slab_reclaimable:18938 slab_unreclaimable:95661 [ 245.543345][ T8755] mapped:17969 shmem:1391 pagetables:621 bounce:0 [ 245.543345][ T8755] kernel_misc_reclaimable:0 [ 245.543345][ T8755] free:1389812 free_pcp:9597 free_cma:0 [ 245.543417][ T8755] Node 0 active_anon:1496kB inactive_anon:197564kB active_file:14552kB inactive_file:30956kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:71876kB dirty:96kB writeback:0kB shmem:4028kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 4096kB writeback_tmp:0kB kernel_stack:10508kB pagetables:2480kB all_unreclaimable? no [ 245.543487][ T8755] Node 1 active_anon:0kB inactive_anon:0kB active_file:76kB inactive_file:0kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:1536kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:16kB pagetables:4kB all_unreclaimable? no [ 245.543550][ T8755] Node 0 DMA free:15360kB boost:0kB min:200kB low:248kB high:296kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 245.543622][ T8755] lowmem_reserve[]: 0 2633 2634 2634 2634 [ 245.543660][ T8755] Node 0 DMA32 free:1632672kB boost:0kB min:35572kB low:44464kB high:53356kB reserved_highatomic:0KB active_anon:1496kB inactive_anon:197564kB active_file:14552kB inactive_file:30956kB unevictable:1536kB writepending:96kB present:3129332kB managed:2702052kB mlocked:0kB bounce:0kB free_pcp:19636kB local_pcp:16308kB free_cma:0kB [ 245.543733][ T8755] lowmem_reserve[]: 0 0 1 1 1 [ 245.543769][ T8755] Node 0 Normal free:0kB boost:0kB min:12kB low:12kB high:12kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:1048576kB managed:1168kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 245.543840][ T8755] lowmem_reserve[]: 0 0 0 0 0 [ 245.543876][ T8755] Node 1 Normal free:3911216kB boost:0kB min:54316kB low:67892kB high:81468kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:76kB inactive_file:0kB unevictable:1536kB writepending:4kB present:4194304kB managed:4117620kB mlocked:0kB bounce:0kB free_pcp:18752kB local_pcp:9728kB free_cma:0kB [ 245.543949][ T8755] lowmem_reserve[]: 0 0 0 0 0 [ 245.543984][ T8755] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 245.544119][ T8755] Node 0 DMA32: 78*4kB (UME) 1147*8kB (UME) 1175*16kB (UME) 1905*32kB (UME) 338*64kB (UME) 41*128kB (UME) 46*256kB (UME) 85*512kB (UME) 55*1024kB (UM) 22*2048kB (UM) 332*4096kB (UM) = 1632672kB [ 245.544308][ T8755] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 245.544515][ T8755] Node 1 Normal: 232*4kB (UE) 60*8kB (UE) 29*16kB (UME) 45*32kB (UME) 23*64kB (UME) 17*128kB (UE) 7*256kB (U) 2*512kB (UE) 2*1024kB (ME) 2*2048kB (UE) 951*4096kB (M) = 3911216kB [ 245.544693][ T8755] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 245.544714][ T8755] Node 0 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 245.544734][ T8755] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 245.544756][ T8755] Node 1 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 245.544775][ T8755] 12748 total pagecache pages [ 245.544782][ T8755] 0 pages in swap cache [ 245.544789][ T8755] Swap cache stats: add 0, delete 0, find 0/0 [ 245.544804][ T8755] Free swap = 0kB [ 245.544811][ T8755] Total swap = 0kB [ 245.544818][ T8755] 2097051 pages RAM [ 245.544825][ T8755] 0 pages HighMem/MovableOnly [ 245.544832][ T8755] 388001 pages reserved [ 245.544838][ T8755] 0 pages cma reserved [ 245.607265][ T8761] validate_nla: 7 callbacks suppressed [ 245.607285][ T8761] netlink: 'syz-executor.2': attribute type 29 has an invalid length. [ 245.634727][ T8762] FAULT_INJECTION: forcing a failure. [ 245.634727][ T8762] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 245.634765][ T8762] CPU: 1 PID: 8762 Comm: syz-executor.1 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 245.634796][ T8762] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 245.634812][ T8762] Call Trace: [ 245.634820][ T8762] [ 245.634830][ T8762] dump_stack_lvl+0xcd/0x134 [ 245.634864][ T8762] should_fail.cold+0x5/0xa [ 245.634900][ T8762] prepare_alloc_pages+0x17b/0x570 [ 245.634936][ T8762] __alloc_pages+0x12f/0x500 [ 245.634962][ T8762] ? __alloc_pages_slowpath.constprop.0+0x20e0/0x20e0 [ 245.634993][ T8762] ? __kmalloc_node+0x62/0x390 [ 245.635041][ T8762] alloc_pages+0x1aa/0x310 [ 245.635074][ T8762] __vmalloc_node_range+0x735/0x13e0 [ 245.635116][ T8762] ? netlink_sendmsg+0x690/0xe10 [ 245.635145][ T8762] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 245.635183][ T8762] ? vfree_atomic+0xe0/0xe0 [ 245.635213][ T8762] ? __netlink_dump_start+0x900/0x900 [ 245.635240][ T8762] ? netlink_sendmsg+0x690/0xe10 [ 245.635265][ T8762] vmalloc+0x67/0x80 [ 245.635293][ T8762] ? netlink_sendmsg+0x690/0xe10 [ 245.635315][ T8762] netlink_sendmsg+0x690/0xe10 [ 245.635345][ T8762] ? netlink_unicast+0x7f0/0x7f0 [ 245.635374][ T8762] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 245.635404][ T8762] ? netlink_unicast+0x7f0/0x7f0 [ 245.635430][ T8762] sock_sendmsg+0xcf/0x120 [ 245.635460][ T8762] ____sys_sendmsg+0x6eb/0x810 [ 245.635491][ T8762] ? kernel_sendmsg+0x50/0x50 [ 245.635523][ T8762] ? do_recvmmsg+0x6d0/0x6d0 [ 245.635549][ T8762] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 245.635584][ T8762] ? _parse_integer+0x30/0x30 [ 245.635620][ T8762] ___sys_sendmsg+0xf3/0x170 [ 245.635648][ T8762] ? sendmsg_copy_msghdr+0x160/0x160 [ 245.635676][ T8762] ? lock_downgrade+0x6e0/0x6e0 [ 245.635719][ T8762] ? __fget_files+0x286/0x470 [ 245.635753][ T8762] ? __fget_light+0xea/0x270 [ 245.635778][ T8762] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 245.635811][ T8762] __x64_sys_sendmsg+0x132/0x220 [ 245.635837][ T8762] ? __sys_sendmsg+0x1b0/0x1b0 [ 245.635876][ T8762] ? syscall_enter_from_user_mode+0x21/0x70 [ 245.635916][ T8762] do_syscall_64+0x35/0xb0 [ 245.635944][ T8762] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 245.635972][ T8762] RIP: 0033:0x7f55bba89109 [ 245.635992][ T8762] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 245.636018][ T8762] RSP: 002b:00007f55bcbef168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 245.636045][ T8762] RAX: ffffffffffffffda RBX: 00007f55bbb9bf60 RCX: 00007f55bba89109 [ 245.636065][ T8762] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 245.636079][ T8762] RBP: 00007f55bcbef1d0 R08: 0000000000000000 R09: 0000000000000000 [ 245.636094][ T8762] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 245.636109][ T8762] R13: 00007ffd14a51aef R14: 00007f55bcbef300 R15: 0000000000022000 [ 245.636144][ T8762] [ 245.753297][ T8773] FAULT_INJECTION: forcing a failure. [ 245.753297][ T8773] name failslab, interval 1, probability 0, space 0, times 0 [ 245.753333][ T8773] CPU: 0 PID: 8773 Comm: syz-executor.5 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 245.753363][ T8773] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 245.753378][ T8773] Call Trace: [ 245.753384][ T8773] [ 245.753393][ T8773] dump_stack_lvl+0xcd/0x134 [ 245.753427][ T8773] should_fail.cold+0x5/0xa [ 245.753464][ T8773] should_failslab+0x5/0x10 [ 245.753493][ T8773] kmem_cache_alloc_node+0x65/0x3f0 [ 245.753522][ T8773] ? alloc_vmap_area+0x16f/0x1f00 [ 245.753556][ T8773] alloc_vmap_area+0x16f/0x1f00 [ 245.753585][ T8773] ? kmem_cache_alloc_node_trace+0x46/0x420 [ 245.753627][ T8773] ? free_vmap_area+0x1ac0/0x1ac0 [ 245.753656][ T8773] ? rcu_read_lock_sched_held+0x3a/0x70 [ 245.753691][ T8773] ? trace_kmalloc_node+0x32/0x100 [ 245.753725][ T8773] __get_vm_area_node+0x142/0x3f0 [ 245.753759][ T8773] __vmalloc_node_range+0x250/0x13e0 [ 245.753790][ T8773] ? bpf_prog_alloc_no_stats+0x38/0x470 [ 245.753826][ T8773] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 245.753858][ T8773] ? bpf_prog_alloc_no_stats+0x38/0x470 [ 245.753892][ T8773] ? vfree_atomic+0xe0/0xe0 [ 245.753920][ T8773] ? arch_prepare_bpf_dispatcher+0xc0/0xc0 [ 245.753945][ T8773] ? lockdep_init_map_type+0x21a/0x7f0 [ 245.753982][ T8773] ? bpf_prog_alloc_no_stats+0x38/0x470 [ 245.754009][ T8773] __vmalloc+0x69/0x80 [ 245.754038][ T8773] ? bpf_prog_alloc_no_stats+0x38/0x470 [ 245.754065][ T8773] bpf_prog_alloc_no_stats+0x38/0x470 [ 245.754095][ T8773] bpf_check+0x630e/0xbbc0 [ 245.754145][ T8773] ? bpf_get_btf_vmlinux+0x10/0x10 [ 245.754178][ T8773] ? lock_downgrade+0x6e0/0x6e0 [ 245.754210][ T8773] ? lock_downgrade+0x6e0/0x6e0 [ 245.754248][ T8773] ? memset+0x20/0x40 [ 245.754280][ T8773] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 245.754310][ T8773] ? bpf_obj_name_cpy+0x144/0x1a0 [ 245.754339][ T8773] ? bpf_prog_load+0xf71/0x2250 [ 245.754369][ T8773] bpf_prog_load+0xfb2/0x2250 [ 245.754406][ T8773] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 245.754439][ T8773] ? find_held_lock+0x2d/0x110 [ 245.754472][ T8773] ? __might_fault+0xd1/0x170 [ 245.754498][ T8773] ? lock_downgrade+0x6e0/0x6e0 [ 245.754542][ T8773] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 245.754575][ T8773] __sys_bpf+0x11a1/0x5700 [ 245.754608][ T8773] ? bpf_perf_link_attach+0x520/0x520 [ 245.754637][ T8773] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 245.754680][ T8773] ? find_held_lock+0x2d/0x110 [ 245.754734][ T8773] ? trace_hardirqs_on+0x38/0x1c0 [ 245.754762][ T8773] __x64_sys_bpf+0x75/0xb0 [ 245.754790][ T8773] ? syscall_enter_from_user_mode+0x21/0x70 [ 245.754822][ T8773] do_syscall_64+0x35/0xb0 [ 245.754849][ T8773] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 245.754874][ T8773] RIP: 0033:0x7f2e16289109 [ 245.754894][ T8773] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 245.754918][ T8773] RSP: 002b:00007f2e1731f168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 245.754944][ T8773] RAX: ffffffffffffffda RBX: 00007f2e1639bf60 RCX: 00007f2e16289109 [ 245.754961][ T8773] RDX: 0000000000000080 RSI: 00000000200001c0 RDI: 0000000000000005 [ 245.754977][ T8773] RBP: 00007f2e1731f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 245.754993][ T8773] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 245.755009][ T8773] R13: 00007ffde7446a9f R14: 00007f2e1731f300 R15: 0000000000022000 [ 245.755042][ T8773] [ 245.764002][ T8777] netlink: 'syz-executor.2': attribute type 29 has an invalid length. [ 245.775163][ T8773] BUG: unable to handle page fault for address: fffffbfff4080200 [ 245.775184][ T8773] #PF: supervisor read access in kernel mode [ 245.775200][ T8773] #PF: error_code(0x0000) - not-present page [ 245.775215][ T8773] PGD 23ffe4067 P4D 23ffe4067 PUD 23ffe3067 PMD 1669d067 PTE 0 [ 245.775271][ T8773] Oops: 0000 [#1] PREEMPT SMP KASAN [ 245.775297][ T8773] CPU: 0 PID: 8773 Comm: syz-executor.5 Not tainted 5.18.0-syzkaller-04993-gd08af2c46881 #0 [ 245.775326][ T8773] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 245.775342][ T8773] RIP: 0010:bpf_jit_free+0x207/0x2b0 [ 245.775377][ T8773] Code: 5d 41 5c 41 5d e9 b9 93 ff ff e8 64 b0 f2 ff 48 81 e3 00 f0 ff ff 48 b8 00 00 00 00 00 fc ff df 48 89 da 48 89 df 48 c1 ea 03 <0f> b6 04 02 84 c0 74 04 3c 03 7e 50 8b 1f e8 e6 c0 ff ff be 08 00 [ 245.775407][ T8773] RSP: 0018:ffffc90002d5f878 EFLAGS: 00010a06 [ 245.775429][ T8773] RAX: dffffc0000000000 RBX: ffffffffa0401000 RCX: ffffc900037d4000 [ 245.775451][ T8773] RDX: 1ffffffff4080200 RSI: ffffffff818703fc RDI: ffffffffa0401000 [ 245.775469][ T8773] RBP: ffffc900028f6000 R08: 0000000000000000 R09: 0000000000000000 [ 245.775485][ T8773] R10: ffffffff818702f0 R11: 0000000000000000 R12: ffffc900028f6038 [ 245.775503][ T8773] R13: 0000000000000000 R14: ffff88807c476800 R15: ffffc900028f6000 [ 245.775528][ T8773] FS: 00007f2e1731f700(0000) GS:ffff8880b9a00000(0000) knlGS:0000000000000000 [ 245.775557][ T8773] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 245.775575][ T8773] CR2: fffffbfff4080200 CR3: 000000007d231000 CR4: 00000000003506f0 [ 245.775593][ T8773] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 245.775609][ T8773] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 245.775627][ T8773] Call Trace: [ 245.775635][ T8773] [ 245.775646][ T8773] bpf_check+0x71ab/0xbbc0 [ 245.775684][ T8773] ? bpf_get_btf_vmlinux+0x10/0x10 [ 245.775715][ T8773] ? lock_downgrade+0x6e0/0x6e0 [ 245.775747][ T8773] ? lock_downgrade+0x6e0/0x6e0 [ 245.775783][ T8773] ? memset+0x20/0x40 [ 245.775806][ T8773] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 245.775837][ T8773] ? bpf_obj_name_cpy+0x144/0x1a0 [ 245.775867][ T8773] ? bpf_prog_load+0xf71/0x2250 [ 245.775898][ T8773] bpf_prog_load+0xfb2/0x2250 [ 245.775931][ T8773] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 245.775962][ T8773] ? find_held_lock+0x2d/0x110 [ 245.775993][ T8773] ? __might_fault+0xd1/0x170 [ 245.776020][ T8773] ? lock_downgrade+0x6e0/0x6e0 [ 245.776058][ T8773] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 245.776089][ T8773] __sys_bpf+0x11a1/0x5700 [ 245.776120][ T8773] ? bpf_perf_link_attach+0x520/0x520 [ 245.776151][ T8773] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 245.776189][ T8773] ? find_held_lock+0x2d/0x110 [ 245.776231][ T8773] ? trace_hardirqs_on+0x38/0x1c0 [ 245.776267][ T8773] __x64_sys_bpf+0x75/0xb0 [ 245.776299][ T8773] ? syscall_enter_from_user_mode+0x21/0x70 [ 245.776334][ T8773] do_syscall_64+0x35/0xb0 [ 245.776362][ T8773] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 245.776389][ T8773] RIP: 0033:0x7f2e16289109 [ 245.776409][ T8773] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 245.776435][ T8773] RSP: 002b:00007f2e1731f168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 245.776462][ T8773] RAX: ffffffffffffffda RBX: 00007f2e1639bf60 RCX: 00007f2e16289109 [ 245.776480][ T8773] RDX: 0000000000000080 RSI: 00000000200001c0 RDI: 0000000000000005 [ 245.776497][ T8773] RBP: 00007f2e1731f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 245.776515][ T8773] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 245.776533][ T8773] R13: 00007ffde7446a9f R14: 00007f2e1731f300 R15: 0000000000022000 [ 245.776560][ T8773] [ 245.776569][ T8773] Modules linked in: [ 245.776582][ T8773] CR2: fffffbfff4080200 [ 245.776597][ T8773] ---[ end trace 0000000000000000 ]--- [ 245.776607][ T8773] RIP: 0010:bpf_jit_free+0x207/0x2b0 [ 245.776636][ T8773] Code: 5d 41 5c 41 5d e9 b9 93 ff ff e8 64 b0 f2 ff 48 81 e3 00 f0 ff ff 48 b8 00 00 00 00 00 fc ff df 48 89 da 48 89 df 48 c1 ea 03 <0f> b6 04 02 84 c0 74 04 3c 03 7e 50 8b 1f e8 e6 c0 ff ff be 08 00 [ 245.776664][ T8773] RSP: 0018:ffffc90002d5f878 EFLAGS: 00010a06 [ 245.776683][ T8773] RAX: dffffc0000000000 RBX: ffffffffa0401000 RCX: ffffc900037d4000 [ 245.776701][ T8773] RDX: 1ffffffff4080200 RSI: ffffffff818703fc RDI: ffffffffa0401000 [ 245.776720][ T8773] RBP: ffffc900028f6000 R08: 0000000000000000 R09: 0000000000000000 [ 245.776737][ T8773] R10: ffffffff818702f0 R11: 0000000000000000 R12: ffffc900028f6038 [ 245.776755][ T8773] R13: 0000000000000000 R14: ffff88807c476800 R15: ffffc900028f6000 [ 245.776773][ T8773] FS: 00007f2e1731f700(0000) GS:ffff8880b9a00000(0000) knlGS:0000000000000000 [ 245.776799][ T8773] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 245.776817][ T8773] CR2: fffffbfff4080200 CR3: 000000007d231000 CR4: 00000000003506f0 [ 245.776835][ T8773] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 245.776852][ T8773] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 245.776871][ T8773] Kernel panic - not syncing: Fatal exception [ 245.777039][ T8773] Kernel Offset: disabled