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", 0x1000}, {&(0x7f0000002740)="8197ecb2e718956f3c43b8c373c96b939485e4fee88c753bf80191026c985312f6fb9ec2c603b901af8e89914ba044bd5a9ee4b02cb66a830fadc27c65502156f87258100ed8fee4e1719bd824651f9524fa171433827e62dfc520052a715e598af0ed085943c7508f469b7dc7bb1b19f4c547d46270762d7ecb7e858e78c6fb35e777d34b017c8da2a6e5c6679f882c9666f51b64e4607c492d95ff", 0x9c}, {&(0x7f0000002800)="11952688cbc79fc3d08f18deab9e4a2dd0ec5be69401c1a836b6bdd13ec4789f80f462fd290a7a849e53e66b00bba08677e19ef051826f998cdd7b2c976ed7711471cadfa46f98a7525f574c19fff029a9b1d3e02ed29aad8dc7deab117eb205a867f31c7d83837282bb509a0baf0801823a4d7b3f23c4ef3ca4508bd3b3b3168f65f6e9f0637b859548924d445b0ba7b82174ef5fb9acfdfd6d7e050b4d69ccd45f7773907398f5a608ab5b9a67611c1fef662ee31b0382e3afd3f3d6e5374dc91d67ff7ec829b89a54f6af1aa38733df26bc3278f53dc0102f85d914afdc78", 0xe0}, {&(0x7f0000002900)="437f5477df25c7e1c26eefe135a231c1c32629a25166b7c7f54d500ff06486e8b9034137c8357ad2311f4034b8e634981abac647a858438248fc003d91e139685bd1e5e90a0d494f230989de0daee63c9c156221fa1f0082e97703e720a88dc535c4fbd4fe34b0cccb6a3afcfc54e3b78eb9fe2ee57b772ac15dc4acb4c99068bc0418f6221faa0c9af1d3af52367cc26f6305edb0b2efa05be957aa8cf5c08df4185fff957b30c687c75d6d62db6cf52f23f125df5bba8a6bba8e920d9310b6df8914e7ebd45502c31be287", 0xcc}, {&(0x7f0000002a00)="e051ab56ab446a9f892fa5ca95fe9eb6dc1916fcb172bf266797679f50cbe14f0165e70b3d64b09ce5f81bb2f79929dac47ef87bae3f6f9fb81725b4f39ad20e9c7c6f36bffaeed3895d27bf10372e148ad2d1fe278733d853a01ab270a5155e9dfced86bf9aa8fa9bd85c919e8e42d621a173fd8d98389fde0010b81b5786a7", 0x80}, {&(0x7f0000002a80)="425b1789d9c8d5b18150da43955d0fe716dfaf9dc6e64850178b13b70e83e199a85c51486145cb3d531a0d917b6c825659c1ff759355d55fa7f27da12577fcbdc6c12dd8dc7b4a5e69732f47997aeb79dd8a8b03995aa0168ade226e94b1df7688f88b73f65d5df59fce82d4a64b9a9ebb98783eb306a46babb83bbf67f1e5b223c275b2b2001442cee72f10629c5ed42fc92d00bb3994deaecc1839eb321c3cdaeced1710b23b4a1ab6df31d738f1c86290d3ad43e929542759afbb9ec9", 0xbe}], 0x9}, 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000002c40)) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000035c0)='cpuset.effective_mems\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000003540)={0x2, 0x70, 0x8, 0x20, 0x7, 0x6, 0x0, 0x3, 0x1010, 0x8, 0x4212, 0x5, 0xffffffff, 0x4f6, 0x6, 0x9, 0x2, 0x5, 0x4, 0x71b0de6c, 0x8, 0xc74, 0x79, 0x8, 0xfff, 0x7fff, 0x1, 0x5, 0x20, 0x8, 0x1, 0x7, 0xfffffffffffffffa, 0x8000, 0x0, 0x0, 0xfff, 0x4, 0x0, 0x1000, 0x7, @perf_config_ext={0x2, 0x9}, 0x1000, 0x6, 0x2, 0x1, 0x7, 0x3, 0x400}, r2, 0x6, 0xffffffffffffff9c, 0x1) 16:39:05 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) 16:39:05 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0xc, 0x100, 0x5, 0x4, 0x24, 0xffffffffffffff9c, 0x4, [], 0x0, 0xffffffffffffffff, 0x100000000, 0x4}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, 0x0, &(0x7f0000000200)}, 0x359) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f8, &(0x7f0000000040)='sit0\x00\xf5\xf7\x9b\xe6\x81\xd7\xd1\xb5\x06&\x80\x00`p') r3 = perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x8001, 0x0, 0x80000000, 0x3f, 0x0, 0x100000001, 0x28, 0x0, 0x6, 0x5, 0xba4, 0x7fffffff, 0x2, 0x78b8, 0x81, 0x800, 0x10000, 0x0, 0xf33, 0x0, 0xfffffffffffffffb, 0x400, 0x3, 0xfff, 0x8001, 0xb, 0x5, 0x4, 0x79be, 0x4dc, 0x4, 0xfffffffeffffffff, 0x1ff, 0xcd, 0x5, 0x0, 0x0, 0xc68e, 0x4, @perf_config_ext={0x6, 0x8001}, 0x20000, 0xa0, 0x0, 0x0, 0x5, 0x418, 0x8}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0xfffffffffffff696) 16:39:05 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open$cgroup(&(0x7f0000000180)={0x3, 0x70, 0x4, 0x2, 0x9, 0x2, 0x0, 0x3, 0x0, 0x2, 0x1, 0xf9, 0x7fffffff, 0x7e, 0xffffffffffffff5e, 0x3, 0x9, 0x550, 0x6, 0x800, 0x100, 0xa13, 0x7fff, 0xda, 0xf760, 0x5, 0x8, 0x7f, 0xfff, 0x400, 0x7fffffff, 0x0, 0xfffffffffffff801, 0x28000000000000, 0x6, 0x5, 0x7ff, 0x1, 0x0, 0x426d, 0x0, @perf_bp={&(0x7f0000000140), 0x3}, 0x200, 0x6, 0x4, 0xf, 0x6, 0x1, 0xffff}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x6) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x9) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xc, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="8500000000001d0a000000000000f34a83fc58745a5e3800"/36], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) 16:39:05 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) [ 186.819971][T13498] FAULT_INJECTION: forcing a failure. [ 186.819971][T13498] name failslab, interval 1, probability 0, space 0, times 0 [ 186.915448][T13498] CPU: 1 PID: 13498 Comm: syz-executor.4 Not tainted 5.1.0-rc2+ #82 [ 186.923460][T13498] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 186.933522][T13498] Call Trace: [ 186.936817][T13498] dump_stack+0x172/0x1f0 [ 186.941150][T13498] should_fail.cold+0xa/0x15 [ 186.945744][T13498] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 186.951552][T13498] ? ___might_sleep+0x163/0x280 [ 186.956401][T13498] __should_failslab+0x121/0x190 [ 186.961343][T13498] should_failslab+0x9/0x14 [ 186.965841][T13498] kmem_cache_alloc_node+0x264/0x710 [ 186.971127][T13498] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 186.977367][T13498] __alloc_skb+0xd5/0x5e0 [ 186.981693][T13498] ? skb_trim+0x190/0x190 [ 186.986543][T13498] ? skb_page_frag_refill+0x127/0x460 [ 186.991911][T13498] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 186.997623][T13498] ? skb_put+0x177/0x1d0 [ 187.001875][T13498] __ip_append_data.isra.0+0x24d6/0x2dd0 [ 187.007508][T13498] ? ip_reply_glue_bits+0xc0/0xc0 [ 187.012539][T13498] ? __ip_flush_pending_frames.isra.0+0x2d0/0x2d0 [ 187.018959][T13498] ? mark_held_locks+0xf0/0xf0 [ 187.023726][T13498] ? lock_sock_nested+0xac/0x120 [ 187.028664][T13498] ? ip_reply_glue_bits+0xc0/0xc0 [ 187.033690][T13498] ip_append_data.part.0+0xf2/0x170 [ 187.038896][T13498] ? ip_reply_glue_bits+0xc0/0xc0 [ 187.043928][T13498] ip_append_data+0x6e/0x90 [ 187.048450][T13498] udp_sendmsg+0x8e7/0x2820 [ 187.052964][T13498] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 187.059205][T13498] ? __lock_acquire+0x548/0x3fb0 [ 187.064159][T13498] ? ip_reply_glue_bits+0xc0/0xc0 [ 187.069190][T13498] ? udp4_lib_lookup_skb+0x440/0x440 [ 187.074481][T13498] ? is_bpf_text_address+0xac/0x170 [ 187.079682][T13498] ? find_held_lock+0x35/0x130 [ 187.084454][T13498] ? is_bpf_text_address+0xac/0x170 [ 187.089662][T13498] ? ___might_sleep+0x163/0x280 [ 187.094514][T13498] ? __might_sleep+0x95/0x190 [ 187.099190][T13498] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 187.104814][T13498] ? aa_sk_perm+0x288/0x880 [ 187.109320][T13498] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 187.114863][T13498] inet_sendmsg+0x147/0x5e0 [ 187.119836][T13498] ? udp4_lib_lookup_skb+0x440/0x440 [ 187.125114][T13498] ? inet_sendmsg+0x147/0x5e0 [ 187.129785][T13498] ? ipip_gro_receive+0x100/0x100 [ 187.134809][T13498] sock_sendmsg+0xdd/0x130 [ 187.139224][T13498] sock_write_iter+0x27c/0x3e0 [ 187.143983][T13498] ? sock_sendmsg+0x130/0x130 [ 187.148668][T13498] ? aa_path_link+0x460/0x460 [ 187.153339][T13498] ? find_held_lock+0x35/0x130 [ 187.158097][T13498] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 187.164334][T13498] ? iov_iter_init+0xee/0x220 [ 187.169011][T13498] new_sync_write+0x4c7/0x760 [ 187.173690][T13498] ? default_llseek+0x2e0/0x2e0 [ 187.178545][T13498] ? common_file_perm+0x238/0x720 [ 187.183650][T13498] ? __fget+0x381/0x550 [ 187.187804][T13498] ? apparmor_file_permission+0x25/0x30 [ 187.193358][T13498] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 187.199630][T13498] ? security_file_permission+0x94/0x380 [ 187.205260][T13498] __vfs_write+0xe4/0x110 [ 187.209587][T13498] vfs_write+0x20c/0x580 [ 187.213828][T13498] ksys_write+0xea/0x1f0 [ 187.218086][T13498] ? __ia32_sys_read+0xb0/0xb0 [ 187.222847][T13498] ? do_syscall_64+0x26/0x610 [ 187.227521][T13498] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 187.234106][T13498] ? do_syscall_64+0x26/0x610 [ 187.238784][T13498] __x64_sys_write+0x73/0xb0 [ 187.243390][T13498] do_syscall_64+0x103/0x610 [ 187.247992][T13498] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 187.253883][T13498] RIP: 0033:0x4582f9 [ 187.257776][T13498] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 187.277375][T13498] RSP: 002b:00007f6dcf2fbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 187.285783][T13498] RAX: ffffffffffffffda RBX: 00007f6dcf2fbc90 RCX: 00000000004582f9 [ 187.293750][T13498] RDX: 000000000000fdef RSI: 0000000020000280 RDI: 0000000000000005 [ 187.301715][T13498] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 16:39:05 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000006ac0)={&(0x7f0000005680)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000005a80)=[{&(0x7f0000005700)=""/77, 0x4d}, {&(0x7f0000005780)=""/199, 0xc7}, {&(0x7f0000005880)=""/221, 0xdd}, {&(0x7f0000005980)=""/238, 0xee}], 0x4, &(0x7f0000005ac0)=""/4096, 0x1000}, 0x40000001) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000006b40)='pids.events\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000006b00)={0xd, 0x10000000200, 0x6, 0x9, 0x0, r0, 0x0, [], r1, r2, 0x400}, 0x3c) [ 187.309678][T13498] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6dcf2fc6d4 [ 187.317644][T13498] R13: 00000000004c7ad0 R14: 00000000004ddba8 R15: 0000000000000006 16:39:06 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28, &(0x7f0000000080)}, 0x10) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0xf6ac, &(0x7f0000002580)=[{&(0x7f0000000000), 0xfdde}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) 16:39:06 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000040)={0x1, 0x3, [@dev={[], 0x24}, @local, @remote]}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r3 = getpid() perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x2, 0x3f, 0x4, 0x6, 0x0, 0x1, 0x20020, 0xb, 0x7, 0xd454, 0x6, 0x80, 0x8, 0x200, 0x81, 0x9, 0x54, 0x3, 0x3f, 0x8, 0x9, 0xfff, 0x4, 0x66babe48, 0x7d, 0x8000, 0x4, 0x5, 0x4, 0x0, 0xfffffffffffffeff, 0x100, 0x1, 0x8, 0x7, 0x7f, 0x0, 0x2b, 0x0, @perf_bp={&(0x7f0000000080), 0x3}, 0x200, 0x8001, 0x200, 0x8, 0x3f, 0x5}, r3, 0x10, r1, 0x1) 16:39:06 executing program 2: r0 = socket$kcm(0xa, 0x1, 0x0) recvmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000080)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x80, &(0x7f0000000100)}, 0x1) sendmsg$kcm(r0, &(0x7f00000005c0)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x80, 0x0}, 0x200000c0) close(r0) 16:39:06 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) 16:39:06 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)) r0 = perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x7f, 0xff, 0x4, 0x0, 0x200, 0x6000, 0x0, 0x8, 0xfffffffffffffe8f, 0x0, 0x0, 0xc3, 0xbeed, 0x9, 0x8, 0x8, 0x3f, 0x3, 0xad2e, 0x2, 0x8, 0x4, 0x6, 0x8001, 0x7ff, 0x5, 0x100, 0x3f, 0x20, 0x5, 0xde8e, 0x5117, 0x8, 0x81, 0x9, 0x0, 0xfff, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x2, 0x400, 0x2, 0x0, 0x4, 0x800, 0x9}, 0xffffffffffffffff, 0x3, 0xffffffffffffff9c, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5421, &(0x7f0000000080)='ppp0\x00') 16:39:06 executing program 4 (fault-call:5 fault-nth:32): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) [ 187.616367][T13552] FAULT_INJECTION: forcing a failure. [ 187.616367][T13552] name failslab, interval 1, probability 0, space 0, times 0 [ 187.643928][T13552] CPU: 1 PID: 13552 Comm: syz-executor.4 Not tainted 5.1.0-rc2+ #82 [ 187.651931][T13552] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 187.661990][T13552] Call Trace: [ 187.665299][T13552] dump_stack+0x172/0x1f0 [ 187.669645][T13552] should_fail.cold+0xa/0x15 [ 187.674248][T13552] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 187.680069][T13552] ? ___might_sleep+0x163/0x280 [ 187.684933][T13552] __should_failslab+0x121/0x190 [ 187.689876][T13552] should_failslab+0x9/0x14 [ 187.694382][T13552] kmem_cache_alloc_node_trace+0x270/0x720 [ 187.700195][T13552] __kmalloc_node_track_caller+0x3d/0x70 [ 187.705825][T13552] __kmalloc_reserve.isra.0+0x40/0xf0 [ 187.711196][T13552] __alloc_skb+0x10b/0x5e0 [ 187.715612][T13552] ? skb_trim+0x190/0x190 [ 187.719938][T13552] ? skb_page_frag_refill+0x127/0x460 [ 187.725307][T13552] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 187.731029][T13552] ? skb_put+0x177/0x1d0 [ 187.735274][T13552] __ip_append_data.isra.0+0x24d6/0x2dd0 [ 187.740908][T13552] ? ip_reply_glue_bits+0xc0/0xc0 [ 187.745937][T13552] ? __ip_flush_pending_frames.isra.0+0x2d0/0x2d0 [ 187.752347][T13552] ? mark_held_locks+0xf0/0xf0 [ 187.757118][T13552] ? lock_sock_nested+0xac/0x120 [ 187.762079][T13552] ? ip_reply_glue_bits+0xc0/0xc0 [ 187.767123][T13552] ip_append_data.part.0+0xf2/0x170 [ 187.772323][T13552] ? ip_reply_glue_bits+0xc0/0xc0 [ 187.777341][T13552] ip_append_data+0x6e/0x90 [ 187.781849][T13552] udp_sendmsg+0x8e7/0x2820 [ 187.786351][T13552] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 187.792586][T13552] ? __lock_acquire+0x548/0x3fb0 [ 187.797516][T13552] ? ip_reply_glue_bits+0xc0/0xc0 [ 187.802545][T13552] ? udp4_lib_lookup_skb+0x440/0x440 [ 187.807828][T13552] ? is_bpf_text_address+0xac/0x170 [ 187.813020][T13552] ? find_held_lock+0x35/0x130 [ 187.817786][T13552] ? is_bpf_text_address+0xac/0x170 [ 187.822985][T13552] ? ___might_sleep+0x163/0x280 [ 187.827832][T13552] ? __might_sleep+0x95/0x190 [ 187.832508][T13552] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 187.838150][T13552] ? aa_sk_perm+0x288/0x880 [ 187.842661][T13552] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 187.848201][T13552] inet_sendmsg+0x147/0x5e0 [ 187.852700][T13552] ? udp4_lib_lookup_skb+0x440/0x440 [ 187.857980][T13552] ? inet_sendmsg+0x147/0x5e0 [ 187.862653][T13552] ? ipip_gro_receive+0x100/0x100 [ 187.867685][T13552] sock_sendmsg+0xdd/0x130 [ 187.872099][T13552] sock_write_iter+0x27c/0x3e0 [ 187.876859][T13552] ? sock_sendmsg+0x130/0x130 [ 187.881545][T13552] ? aa_path_link+0x460/0x460 [ 187.886217][T13552] ? find_held_lock+0x35/0x130 [ 187.890977][T13552] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 187.897213][T13552] ? iov_iter_init+0xee/0x220 [ 187.901890][T13552] new_sync_write+0x4c7/0x760 [ 187.906568][T13552] ? default_llseek+0x2e0/0x2e0 [ 187.911430][T13552] ? common_file_perm+0x238/0x720 [ 187.916461][T13552] ? __fget+0x381/0x550 [ 187.920616][T13552] ? apparmor_file_permission+0x25/0x30 [ 187.926172][T13552] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 187.932409][T13552] ? security_file_permission+0x94/0x380 [ 187.938060][T13552] __vfs_write+0xe4/0x110 [ 187.942391][T13552] vfs_write+0x20c/0x580 [ 187.946641][T13552] ksys_write+0xea/0x1f0 [ 187.950884][T13552] ? __ia32_sys_read+0xb0/0xb0 [ 187.956946][T13552] ? do_syscall_64+0x26/0x610 [ 187.961619][T13552] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 187.967678][T13552] ? do_syscall_64+0x26/0x610 [ 187.972356][T13552] __x64_sys_write+0x73/0xb0 [ 187.976942][T13552] do_syscall_64+0x103/0x610 [ 187.981531][T13552] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 187.987413][T13552] RIP: 0033:0x4582f9 [ 187.991311][T13552] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 188.010907][T13552] RSP: 002b:00007f6dcf2fbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 16:39:06 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28, &(0x7f0000000080)}, 0x10) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0xf6ac, &(0x7f0000002580)=[{&(0x7f0000000000), 0xfdde}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) 16:39:06 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) 16:39:06 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r0, 0x0, 0x23, &(0x7f0000000040)='\xa0vboxnet0^\'(..posix_acl_accessem0&\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r2, r0, 0x0, 0x7, &(0x7f0000000000)='system\x00', r3}, 0x30) r4 = openat$cgroup_ro(r1, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140)={r1, r4, 0xd, 0x1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x6, 0x4, 0x338d, 0x7, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x81}, 0x3c) 16:39:06 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x1a, &(0x7f0000000100)='*,+wlan1posix_acl_access%\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000080)={0x7, 0x70, 0x1, 0x7, 0x4, 0x7920, 0x0, 0x9, 0x0, 0x8, 0x5, 0x80000000, 0x3f, 0x101, 0x3, 0xdeaa, 0x7f, 0x81, 0xaa0, 0xeb9, 0x6, 0x12, 0x0, 0x80000001, 0x3, 0x2, 0x3ff, 0x6, 0x8, 0x2, 0x4, 0x28a, 0x5bd5c4f6, 0x4, 0x8, 0x4, 0x2, 0x0, 0x0, 0x20000000000, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x1, 0x6, 0x1000, 0x7, 0x3, 0x10001, 0x8}, r1, 0x9, 0xffffffffffffff9c, 0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000540)=ANY=[], 0x22b5) write$cgroup_pid(r3, &(0x7f0000000000), 0x200) [ 188.019311][T13552] RAX: ffffffffffffffda RBX: 00007f6dcf2fbc90 RCX: 00000000004582f9 [ 188.027272][T13552] RDX: 000000000000fdef RSI: 0000000020000280 RDI: 0000000000000005 [ 188.035232][T13552] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 188.043195][T13552] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6dcf2fc6d4 [ 188.051158][T13552] R13: 00000000004c7ad0 R14: 00000000004ddba8 R15: 0000000000000006 16:39:06 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x3}, 0x3c) socketpair(0x0, 0x1, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='rdma.current\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000500)='syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000540)='syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) recvmsg(r0, 0x0, 0x4001205d) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x2, 0x0, 0xfffffffffffffffe, 0x100000001, 0x0, 0x10000, 0x83c4, 0x0, 0x0, 0x0, 0x3, 0x8, 0x2, 0x0, 0x0, 0x5, 0x80000001, 0x6, 0x0, 0x80, 0x0, 0x2, 0x4, 0x3, 0x7ff, 0x9, 0x2, 0x8, 0x721, 0x8, 0x4d4, 0x40, 0x0, 0x3ff, 0x821, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0xf}, 0x0, 0x5, 0x9, 0x9, 0x8, 0x80, 0x1}, 0x0, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14000, 0x0, 0x0, 0x400000009, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x8, 0x80000000, 0x0, 0x0, 0xd3, 0x0, 0x0, 0x0, 0x0, 0x7, 0x9, 0x0, 0x3, 0x0, 0x5b1183ed, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0x5, 0xe, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x9) socketpair(0x17, 0x0, 0x1000, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x20032600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1700) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8921, &(0x7f00000001c0)='veth0\x00') socket$kcm(0x29, 0x5, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0, 0x2}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r1, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=0x7, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x8, 0x8}, 0x0, 0x0, &(0x7f0000000100)={0x2, 0x4, 0x1, 0x5}, &(0x7f0000000200)=0x7b5, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=0x5}}, 0x10) 16:39:06 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) 16:39:06 executing program 3: r0 = socket$kcm(0x10, 0x40000000000002, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000280)="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", 0xcfa}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) recvmsg(r0, &(0x7f0000004c80)={&(0x7f0000001540)=@x25, 0x80, &(0x7f0000004c00)=[{&(0x7f00000049c0)=""/141, 0x8d}, {&(0x7f0000004a80)=""/135, 0x87}, {&(0x7f0000004b40)=""/160, 0xa0}], 0x3, &(0x7f0000004c40)=""/11, 0xb}, 0x40) recvmsg$kcm(r0, &(0x7f0000001140)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000001600)=""/4096, 0x2500}, {&(0x7f0000000f80)=""/46, 0x2e}, {&(0x7f0000000fc0)=""/69, 0x45}, {&(0x7f0000001040)=""/89, 0x59}], 0x5}, 0x0) recvmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001180)=""/191, 0xbf}, {&(0x7f0000000000)=""/110, 0x6e}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000001240)=""/219, 0xdb}], 0x4}, 0x20) sendmsg$kcm(r0, &(0x7f0000001500)={&(0x7f0000001340)=@nfc={0x27, 0x1, 0x0, 0x7}, 0x80, &(0x7f00000014c0)=[{&(0x7f00000013c0)="d6ae3b93b2f2ac3e6c48f72c637ff7b8358edbeba5575458ee822b851be1327e3e5918aaaa1c7927eab8a7e0250bc9927e2d89e86f10edb458ed4d96b5a51ef86db23d7f829de283e231c93742190743acdac181d79cd24e98e00e0af8ea34461b9e52be7a8e91f937b32e67fd6c3b7381e202d5cd9996d9ee12012b8d8ef74b0f2cc082c839e4889d01cd6d3a838d2509b062264e8e26b389753135456d548d4fb12da21055e35f34fefaaa199c1bfdd22e54808017f139826ea2c58c36dde2801f796a123f4fe3357f10d936a4cc595413495858d878f363490805fdc363599a8c7184f5557fe12fd343c14e7b95112cd48c2f", 0xf4}], 0x1, &(0x7f0000003600)=[{0x20, 0x1ff, 0x9995, "cc3877f5677abde276db60cccc770c"}, {0xf0, 0x105, 0x4, "f37d41f123f137b71273d9a36fc986446c831f39beaef788fba20241b708094c711e4a66c52cfd897b4c93a6c32c089fc558fb590aa6538db23caae0efc2ec1c930f486d070220fd7f3784086dba3655849fbb682d71156a06cccb2b8a2bd3189077f5c74a5bc241960e61e9f1b22861bca3b00a31e500bc12cf4ca1e39b97bba251ef71be38be7f121e0dd750c7e93deaaa6735e2b28ba4d2a2a2f6013258e6ae8753d8ae42c7ada09c3dbba014695cbca14e5ef1c6dadfbd02583226a351bc65684248e3f32bc03002de928c14e587b6c29079aec72d678c533c08989018"}, {0xe0, 0x119, 0x846c, "6ba55e97607f0762eadd5217652fa3e921d334e121f353033644e86325d48b686a959d26ba9b3af403f67bcfbcbf9712c7aa9ddd6b005b43ecfad9a1885ab8da6094c11c340ccdef68417d52fbcf39751eb5de31a0f3866d264a46e7cb86cc951a4175819274f223e3537bbd919cb218d6af7c6f576248537cdffc84fa5514f93bc1cce964435e0000e03903c09e69734f0ae59fd4794174ff07ffbfa90e23bb38690a3b32fe7cb722f2c62dbc5f95cb557a36215e969de01fc6185485a4cbcfcbefc09c9a54033cd0bef9b0"}, {0x60, 0x10f, 0x9, "6804c7b3ba587532786feedd747d2961804e80b40b349d6ac8e7ebc18a24c86348655f81908919a809c1d6fc16430d38e3dc7fab4778800bba88931771583d07b737a72bae87fcc19ac7"}, {0xa8, 0x119, 0x8, "5980bde977ccf9fe5d89709907a7a348ef72ec5315667754e109fcd57c35a5a8e25a040555a1fd610defff3479f4476249f75894903efd6c6a92f91b2df8180ca186740dbeb673b6662adaf6c755610065395d43339ba8161040db7781ffc6b25d1e45acdf17502a6f5c897c2dcda983ca72131563e1f9df1f9401b144aa9f98d00fd8cb7952a83a009cb5a22a4a352a1acc20da19f1"}, {0xfffffffffffffca5, 0x6, 0x0, "0fcf9fe85c66b664e5afc67d67cd5a99bab066ca0af09463d400cce95d3851699755ef31d4ca5f609cac3ba9739e5b5805d31dda54734e21a43db06d36eb075583c3e1ff579114aeaa590abbd97f1a3a4c5be1dcc85bd7f20938321cc5ba8fda5152d9b8270209e00e1d2410f89c7c157cab3e0774ac0746a8c58af1fdec44b0"}, {0x1010, 0x11d, 0x1, "03fb61494313754dff629db62004c4f7cc524cde24eb4c6aca8c76b1315170a1d6e27e53cca3740c1c11337951adaa6a2155c58315f8132de4fa209f9c0459fc3bb5190a597e8cbdb207c913241e1ad79d06ce289ce2f9e927f14604d47f4d45df489910306b2eea514d4d0cc79b5de4ef315fbbe6e843f17c9d497153d2df849248aa8e3994080b60b546cbf9c3e5b0a7b66a8ef9032d0071b0a9c50da54800d4e81ce1608c538e593b10fc5ddc53cf2e6fa05bbbeed028981176d2e5be855c77868a70ab21528fd0c0f42b69b2e72ac9b589471878b5a92ec122fef2bf35829b218c6e4932c784522815e07d5d377ea45f785188491a1507ee5f6d926b7029d3565c6dd439558211bb16dc9f27068fc9e07a0d91bb94810888f6b4277842cbaf03fa778dace80e059125a1db2aa1383b74646ee9262331f693de2d77ae361a0328fd69cc046a0080f96198f47d0d56d1b7eabeb33cd890c308a8c775310d190c17fb168be5da517eb73044703f1146610d40b11cd2f1a2f80f03c0c22ec637dab686c0bc4b21a034af39f2876312bafc1348704096b24eb83fcc97f5691f6e2cd4841412c3754115d491a3a42d3a4ab21993bb7a309b2b5ad38eb9365e78097158b9d685d5baf102b203005eed71d0820b6a0a7f7bc03aec3776581018786491960f2301c9de80b41f5586d3f38c1fe0d373f6059f22f8591c88757d2a99e1f243bad1565b67f46a7b3d8112cf1cde5fbe5db2f1981a55daa2d0c487f832c16848fab559ed9c704a645fe9be5fab5f906993d4c9e086a135089b06aff94fb230d7f179eb94642ba6a39b25d53d392718f06dada5a60c6540608145904b63115132012dd2298ad8f361bec9cb3929da6b59f61f01d750a4def4696296e1e1e828df600d5591df0db32c89556e6d98e78d9f3a9cb9cf78059b554fd5f6e1604e70151ea2efcc5464558253f0b50f41bc74fbfc20f60bad9c335cd86622f1731a934b29c427a81bed79a7df56559342683ad114a0bfc9c7368e4c2456d23d7103192c99a39e878721ef3202701bf5c91f1bfc2508262fc94f305ee4632b1cf36007fcb5d382592d7c346918e552d1f9c750939e75bf27830006e04d223f972c9364ea2e09d34327eb16cecd39776e23fb76f290132d0e97cb326c6352a8f3e247811dd7dc079064d8c94be91863e777f411a92879c305aa6c1a05112e9046660d7d745e42e6fb281e21563d216d96da2df1cc4092e866aa9261ea15e5410e05d8de65d084cce9e556360396448c371a1c5d8d4e4a3379c3d5a191590004a4889c108b0906a124cff9fefced4352043731055ad4d2dec85d176cfe49c822c2294dd470118806d15c2b5363a149a63438d427d3fd4696184a14fc7c68a2841bcb1c1fc192d0ebe069fce6c73eacbae5f86d17619dda3950d63f60bccaf8d93a64f5f49f1037cc9b71de24c10189906667a57a9bb830041e858850c2234f43cada6b200a69244b7a1886b309e1ab0fb167ae9ecef4ad84947e14228c26de52efd3b592861592dc0c8e4cea88f236453412c21af413dd7b2a89bef451c16643fcc86a37cc7b7fd42bf915e8588623fdac24c6cbdb264fda015103c0f11bc51a9f584275eb81998085d7f4f6c0d3d444ed6d9641713a9964528a1a5ed109463edcea4af34e0739df98a469783db62f3e3dcca08c7d38aeacad89105980417e8eb61588640788a6fb69a151782ac715024b9c95a6cb8f125f57753a20bcc5372b871d60b488e153d87526fe4086d2d60f1d0258bc595d4ba064e60451359d348d1b33688336038ca68db52cc1b4ad7f071af7d9f0f1bf07427937a43bfc28247a0480faf1a45fdfd8200bfe2f301878e38633143c35aa28ed13b1a7d2d760b3e881b581db387193350cb56d4724fd42d31b0feeb1b78f3bc2a65bbfaacfeb1e5239951abed0c89637a9a6bd280d3713373dc419fdd5423aa6582b00f6357bc6ba294089b0fae4fa9302ec67d18e2b92333d9bcf3506ffafa81750096159137cc72634eeb4194d412ac92b546547e96d2eb5d0fcf41cc8ca3e8a05bf6f896b4775a44b4a14ebbf1faad5cbaa6697a1af1469e30655a49a710da6fb023b8e10092308247afb774f5cfc44adac3eb601526f45a37aee02d214cc9b4bc8909a87d67a98ba13e4c55ffe6f705de5013f79f038c44c38c25708e25504a5222a0b7dcf423168cc490179c6d89fa58b08dc46ce58b2d8a8cdefeaf6f82334087b97d29d93aea352d5cf069609560f976f11831b98e0efcce27812abe40c4b1629111cd67d3811048dc1ee5bd733847f80ac587c84b9de0fb67700cdb4bc31f77f4b5c7bde11a8e42366f98eb5bfdedf09d7e18b7822d8df58a5a8688e11160ff4f86d7e8206f22e554a99dbbb37633b91539058b0dae94fe3c8f6c96bb4871fa626ae2d6af62008c96f9b9cf6389fed18f6ac68f49a6b16253b3a9a21fbd88c9c815cbc4f6dab59f2d63e1af6e49bf2c30f6255f6909f66ec3511b3af875f0c7d48fc3f2e599096c9f53cb2ad7105c40547c9c514473847901c740cacf980b76643be08a64e4db0404bfe044bf6551d4cf220801bdfc60f97d914d81d4edac548cd13715575138d30ae42c26b1e22758e4e6de2ba96075fac331aa6faf05b60cd0c461036cb487203e605b93999380dcbd79024f1751101f54dc931d50fd8c07ca9d0d38005b4d0b31556d9edbfbb612798c33f011126e519cd8fe6a16666b1b6698ac90c2da3b318ca38de74447e5d34f13a419992f5a4e5e4855b8117f60e0b7d72e39145f5a71fac5e2e731271b02dde3ae56a2e101ddd0baa41f42238952293bc679235231b100935cd9c0e62aa1bc7148ff9ea3ce160f185e63247eefc4cd68b2a7c2a7f537f39773c7ddadbc45467b52af5ff5684b392c07a3cb230754e708e3e6a5f914d32503c1ee278a3e74e08f2d2718a54a255dabc0baa47f890ac5dfb43883f5ac187e635111dcafa197c4a2082b6f8f0018f03c30e5eb6e6b20f1524e87a74a9eb240b318a1758d65ca047fc7fd582040bc90bc85abddebb631848a6d2565a415a036e13a1d17b9ae09cc277288559ad82bf9e0c4efd22c737f9f93557eea463fbb41f63993db0fed6c33a8423aafbf9862c2a751ceac05ba86e50c8b879ab968266d4405c8f069677bb64f9f79d7055ab1f207913eaa509f1fb895918f712133384d7995f00d301416c031e34896a147cc0b972c3deb21d57a288469696ec19922bf9cd411e95838050dd2f3b056579621c7603e2f005fa82eb02941f2115071ff44e2eb6b3db9f496bfbd983d9d576b7886cea5e1aba044069aac441401de4477993f5b3f0463abba00fb2f1d327a546f7989ae4987cd6776178894edc478fb9f6cbb57080647becf9d9db3830b2bb3a089918dd8498103ca05e4fa3cd23334457c810145012fc085638c9c2b21c69d933184731f0ab40e3aeb034cd9e99e6de310261776d1f98568566dbf0eef5040f2ecfc65e8a9911cbe2094bbaeff36dfc6c31e3aeb623ce267fff75b92d8aad8bd02f06166b67c713208b377afc514108c175f967d2a6063189bfc95b291df82d0113be3bc56785b8abf7cd2b622c1e2c46f997e7075d105148ddc9df298b90ff76b1544f5814a38ffdc2c0c081fa0d990e7aa476f561b5276025e8fe4e3132e52b9f9023d8eb70c1dc28626cb8fdf187c0bd3a866c7d6520077d3abd2c7cfe4539ff7a27fbdf4287922b392e1c537b25806ed418bf74412ade17a37f4e32cc434bb646f122b1d9c95c88184598c1ffed8a45b7fa55277f5e449231c02e22c6881f14d4bb5c49a3a966517b51010cdef1bf692a64fbeac4bc2dce33ebc68e9a76e1f411c02e54d1a86ca94f566498e1291b605adeb760f6b213df88213df3ff3708358ca18d7286e66f26d2cb146fe5b1f9e4d1d791064863d698b4bdd4aad300a7cdc4f68a9addff2bbf17b7008c19ad4d65adfcebc43d48f22f1a77265cb24a57bb1681a863067fa21095438bbf0ef6d3b70de456ef8c5ef4f7b95d31d6a62cb9888d8f1cff52b1b0b93ddf116165b6bcc4fe90f7d92dddc5fb5debd7cd79b140328019398ad407a94d14d1aa450e293e064098bc7f5f9264c1673f9396b5979c8351c41db9f62d2c7336c5955552c0917a6cf9cdc2fa44c4360bf11a0e78885a74a3d2b55a68e80908d471dd1369401c14c7c501960444b818434f79a752d5895a4ec2e0d2622535b71d0f325647914297659124a940cb8147e27f0820d2e9c2343ede76c79c961062835544703856ff184adcb4897bdc1f38e884e87d4819c94015c182d1e9f7140a655356bb8804030845321622f1626607af05ac049c487c13c33795fc8f1f523dea096b94591f7c3b6acca47689867f18cac2ce384adf26dacd794b1d02adea2b71b6ae72df68a2b2f060352230dc70791567fd098e66ca7b00c4f77d91d8d49226bf18f5fabfabd71a88774adc1ce4732d3d5c3b4585da935698ad600e5d552482e83aa12fc41240fa4726d3e05652147185f7c83a7d5f219e44e53e83d66c26a2c4ef0b95394595fb0f4f1a7a706543c601eedc58a23f963bc3a4431d976ff24760a3f5cdd3445e720d3721fd403cd8376b42fe99934788888742fd729d54998d7a41080e5d2e7a2f9406f525e0284223b1770bf9586ad4d3a6265733e12e9b8aea91c66e0883f3a511ab478e17c547f52be1f1316af814c87486e7cb5d0cb55d139d8e2db8a8d7f27a988baea2ffda5e27fd6acc615508dcf83f2b5cf9ad51e4de32b3e944c4f7b15e809481d8459fe946618273863666a97afb12215b9b883015f416b6dbcb7877eb8835c68308ee0a4d1bca3f517bc158c2eb7dca7f2d79b6b9fc6b32183de877ac883abf02540e82b3bfe0cde84d9fcf16467984911090f482e65c7ef7425eb2951e131b49d1ca11799168bdd56cc6ae3599232224bd7a147147fd0597a9802ff84304d68258d631daf6588c6957962390c72d4e2ab3739eccc095bf2a0eb48256493c4236d3608ba789ba9069d2d24ce5ee6ede2fe9fdb401c5e14b156c3299d53d2b9cebfa72eb0492e49cf863d1b685e30d6dc3cfe2572881298274015ea5ed1ec7b34ca5ef3566347077f0ece6b568413422bf058330a39836c1cc7a9fe59082ba087b3195d6cc5c7acdb385d9b834306a8b96e2abf24001e986768f7b99bf9dec7588624a8ddd1a905e33ef8fb00de7185518c1f2f876e174eabb8de68dfd3875044997f73c84f1474b58f30a62c3ca8ae7aa2ec6c531269e496f9b3d0005397755f50b25f8f18c75c349724223aa13b0ecefdcf889296e8c2868ac864f257f753f0697ebb771ac8c83e02aff19dd5851612ba6dabf6b7b251d9faa52dd4963a784a13e25f89594fb121f4cacf96794cd13af5d76247ab31ef3d6fecde19bff69de4472affea2dd1d848aaca8f63d195ac20bde41d28ef960b7e156d6dfeda7e04ea99c064e99261abdcafc8ae5e8ea906407e6326a776f42cda66b1b7abb5e67154a012835a8ae918e2ca04e450be8b59c3617bc806893cb8250a62aea647cbe8151ddd8d7d43233547f8b58f020a7684a823ec05e2b6b4849070ae10a489896bb54f2201af6e0aed63fc369decd28956eb19b7bd56e38da8c0f4fa569e3574c622d4a180c26b399257fd645b7fb175bd3f07d3c3bec0843518fc1ea2dabdfd933f4dee745a4f4aedda42a05483aa349f56c804da4b3dddea5c0c9a2aca1171854b63a298e7e4c490e6a3e796823c3e738943233a8dff113f355"}], 0x1398}, 0x20000000) 16:39:06 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x5, 0x1, 0x70}]}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0xffffffff80000001, 0x10}, 0xc) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000002440)={&(0x7f0000001f00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f00000023c0)=[{&(0x7f0000001f80)=""/72, 0x48}, {&(0x7f0000002000)=""/160, 0xa0}, {&(0x7f00000020c0)=""/13, 0xd}, {&(0x7f0000002100)=""/33, 0x21}, {&(0x7f0000002140)=""/19, 0x13}, {&(0x7f0000002180)=""/164, 0xa4}, {&(0x7f0000002240)=""/117, 0x75}, {&(0x7f00000022c0)=""/242, 0xf2}], 0x8}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000002480)='cpuacct.stat\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000002540)={0x12, 0xe, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000500000080000000000004008500000026000000850000004f000000bd60ffff140000000d39f9ff0400000018110000", @ANYRES32=r0, @ANYBLOB="000000000000000095000000000000007ba2c0ffffffffff95000000000000000504ffff0800000095000000000000009500000000000000"], &(0x7f0000000180)='syzkaller\x00', 0x100000000, 0x3c, &(0x7f00000001c0)=""/60, 0x41000, 0x1, [], r1, 0xf, r2, 0x8, &(0x7f00000024c0)={0x7f, 0x100000000}, 0x8, 0x10, &(0x7f0000002500)={0x0, 0x2, 0x100, 0xa80}, 0x10}, 0x70) 16:39:06 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28, &(0x7f0000000080)}, 0x10) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0xf6ac, &(0x7f0000002580)=[{&(0x7f0000000000), 0xfdde}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:06 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) [ 188.310479][T13582] netlink: 3290 bytes leftover after parsing attributes in process `syz-executor.3'. [ 188.370884][T13582] netlink: 3290 bytes leftover after parsing attributes in process `syz-executor.3'. 16:39:07 executing program 4 (fault-call:5 fault-nth:33): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) [ 188.426801][T13589] netlink: 3290 bytes leftover after parsing attributes in process `syz-executor.3'. 16:39:07 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) 16:39:07 executing program 2: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000040)=0x7) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f00000000c0)=ANY=[@ANYBLOB="010009006014ee68fbc80180c200000eaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaabb0180c2000000ffffffffffff000000000000aaaaaaaaab24"]) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) socket$kcm(0x29, 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000080)={'syzkaller0\x00', 0x200}) 16:39:07 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28, &(0x7f0000000080)}, 0x10) sendmsg(r0, &(0x7f00000027c0)={0x0, 0xf6ac, &(0x7f0000002580)=[{&(0x7f0000000000), 0xfdde}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) [ 188.603347][T13595] netlink: 3290 bytes leftover after parsing attributes in process `syz-executor.3'. 16:39:07 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28, &(0x7f0000000080)}, 0x10) sendmsg(r0, &(0x7f00000027c0)={0x0, 0xf6ac, &(0x7f0000002580)=[{&(0x7f0000000000), 0xfdde}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:07 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) [ 188.652478][T13582] netlink: 3290 bytes leftover after parsing attributes in process `syz-executor.3'. [ 188.715338][T13600] netlink: 3290 bytes leftover after parsing attributes in process `syz-executor.3'. [ 188.748145][T13582] netlink: 3290 bytes leftover after parsing attributes in process `syz-executor.3'. [ 188.788054][T13582] netlink: 3290 bytes leftover after parsing attributes in process `syz-executor.3'. [ 188.808784][T13589] netlink: 3290 bytes leftover after parsing attributes in process `syz-executor.3'. [ 188.846676][T13595] netlink: 3290 bytes leftover after parsing attributes in process `syz-executor.3'. [ 188.863816][T13621] FAULT_INJECTION: forcing a failure. [ 188.863816][T13621] name failslab, interval 1, probability 0, space 0, times 0 [ 188.901897][T13621] CPU: 0 PID: 13621 Comm: syz-executor.4 Not tainted 5.1.0-rc2+ #82 [ 188.909882][T13621] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 188.919963][T13621] Call Trace: [ 188.923265][T13621] dump_stack+0x172/0x1f0 [ 188.927605][T13621] should_fail.cold+0xa/0x15 [ 188.932192][T13621] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 188.940857][T13621] ? ___might_sleep+0x163/0x280 [ 188.945711][T13621] __should_failslab+0x121/0x190 [ 188.950652][T13621] should_failslab+0x9/0x14 [ 188.955194][T13621] kmem_cache_alloc_node+0x264/0x710 [ 188.960519][T13621] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 188.968076][T13621] __alloc_skb+0xd5/0x5e0 [ 188.972413][T13621] ? skb_trim+0x190/0x190 [ 188.976758][T13621] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 188.982482][T13621] ? skb_put+0x177/0x1d0 [ 188.987110][T13621] __ip_append_data.isra.0+0x24d6/0x2dd0 [ 188.992755][T13621] ? ip_reply_glue_bits+0xc0/0xc0 [ 188.997794][T13621] ? __ip_flush_pending_frames.isra.0+0x2d0/0x2d0 [ 189.004213][T13621] ? mark_held_locks+0xf0/0xf0 [ 189.008981][T13621] ? lock_sock_nested+0xac/0x120 [ 189.013968][T13621] ? ip_reply_glue_bits+0xc0/0xc0 [ 189.018995][T13621] ip_append_data.part.0+0xf2/0x170 [ 189.024209][T13621] ? ip_reply_glue_bits+0xc0/0xc0 [ 189.029241][T13621] ip_append_data+0x6e/0x90 [ 189.033754][T13621] udp_sendmsg+0x8e7/0x2820 [ 189.038273][T13621] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 189.044530][T13621] ? __lock_acquire+0x548/0x3fb0 [ 189.049476][T13621] ? ip_reply_glue_bits+0xc0/0xc0 [ 189.054539][T13621] ? udp4_lib_lookup_skb+0x440/0x440 [ 189.059841][T13621] ? is_bpf_text_address+0xac/0x170 [ 189.065045][T13621] ? find_held_lock+0x35/0x130 [ 189.069833][T13621] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 189.075288][T13621] ? lockdep_hardirqs_on+0x418/0x5d0 [ 189.080574][T13621] ? ___might_sleep+0x163/0x280 [ 189.085436][T13621] ? __might_sleep+0x95/0x190 [ 189.090200][T13621] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 189.095833][T13621] ? aa_sk_perm+0x288/0x880 [ 189.100354][T13621] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 189.105912][T13621] inet_sendmsg+0x147/0x5e0 [ 189.110416][T13621] ? udp4_lib_lookup_skb+0x440/0x440 [ 189.116050][T13621] ? inet_sendmsg+0x147/0x5e0 [ 189.118315][ T26] audit: type=1804 audit(1555000747.705:73): pid=13583 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir257669541/syzkaller.HUz29h/220/memory.events" dev="sda1" ino=16902 res=1 [ 189.120728][T13621] ? ipip_gro_receive+0x100/0x100 16:39:07 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001680)={0x16, 0x1, &(0x7f0000000240)=@raw=[@generic={0x4080, 0x3, 0x3, 0x2, 0x401}], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0xf, 0xffffffffffffff9c, 0x8, &(0x7f0000000400)={0x37f, 0x1}, 0x8, 0x10, &(0x7f0000000440)={0x2, 0x6, 0x7, 0x6}, 0x10}, 0x70) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000480)={r1, r2}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2) socket$kcm(0x29, 0x2, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r3 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0x0, 0x3, 0x10}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r4, &(0x7f0000000680)="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", &(0x7f0000000340)=""/137}, 0x18) r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000000, 0x0, 0x2, 0x0, 0x71e4, 0x4, 0x1, 0x0, 0x0, 0x5, 0xf686, 0x6, 0x80, 0x1, 0x31a8000, 0x0, 0x0, 0x3ff, 0x4, 0x0, 0x0, 0x0, 0x8, 0x0, 0x7, 0x5, 0x9, 0x7fffffff, 0x0, 0x1, 0x2, 0x0, 0x8, 0x4, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x1, 0x5, 0x0, 0x8af3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='\x00\x00\x00\x00\x00\xe2\x1e^\xd3\x0e\xdd^i\xef\x1d\xa8\xba\xf3\xc8\x8e\x00\x00\a\x9b\xa9z\x008bE\xc7\xfdv8\xfbv\n\x88\xda}\xe6w\xad\xc7\xce\xd0Jh\xe4b\xc8\xf7\x98\xd7\xb9\x10\x15f\x0f\xd6\xce\x9d\xf3|\x0e\xe7\xbd=\x04Q6C\xf5gJ\x87I\xc1\xfc\xd7\xc0\x991e#x\xc6c\xc3\x00N\x95\xca\xbc\xdfd\xae\x82rA_\xb2u1\xcf&\xd0q\xca1\\\xacF\xf1\x06\x90\xde\xa9W<\x84@\x161\xa58_RI\x05\xc5\x19|\xbb4\xe5T\x9d\xde^\x15\xfa\x0f\xb5(\xcc\xa0\xef\xebz\xbc\xcdZ\xeb\x13\xab_\x17h\xf4Cr\x8b\x80)\xac.\x94]\xe7\x95\xdd\b\x16\x0e\xbe\xb0{\xf7X?\xd9\f\xa6\xc0WT\x13m\xd2\xdd\x1e\xa1\xf8\xb6\x97\xa4\xc7\x93\xf4Y\xee\xe7|\xa7_\xfeu\xf6\x97\x164f\x145\x0e\x1a\xb5j\xc0\xef\xe6\xb2\xf5O\xfdEK\xc2\xed\x8b\xbc\x12\xbe\ve\xde\xc6\xea\xc9\xe9\x04\xfeN\x89X\xf1\x85\x9d%\x1d\x99ysH\x87\x1f\x9c\x7f\xe6\xb6sNR3\x19\xa0`\xa7\x8c/<\xeex\xc0i\x8e\xcc{\xd6\xa9\xe2\xb8\x13UO\xbc\xbe\xee\x1a\xd2\xc8E\xde-\xda\xf7\x9c0A\xfc}\x91\'Ktn\xc7\x05{\x1fP\v\xf1v\x87\f\x0f\x84\x850H\xec\x86iA\xca\x7f\xf3\xba\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf5\x90\x82\xb8\x18\x92\xdb0\xa2\xee\xdf\xbaE\x97\x82\xbcMx\xbbXW\xd4)\x80\x1b(H\x16fC`v\xb0!\x8a\xd4\x01\xf0n\xed\xc7B\x02\x94Q\xb1\x1b\xc2\xa6\xf0\xc3\xe4\x9d.\xbf\x13oY^A\x8e*S\xbc!\x02\xf3\xe8;\x8a\x03\f\xd9\x94\x17\x1b\x02\xbd,z^5\a\f\xc0Z\xe6N2\x13\x00\x81r\x1do', 0x26e1, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0x32600) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000040)=ANY=[@ANYPTR, @ANYRES16, @ANYPTR64=&(0x7f0000000000)=ANY=[]], 0x12) write$cgroup_int(r7, &(0x7f0000000200), 0x42400) 16:39:07 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28, &(0x7f0000000080)}, 0x10) sendmsg(r0, &(0x7f00000027c0)={0x0, 0xf6ac, &(0x7f0000002580)=[{&(0x7f0000000000), 0xfdde}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) [ 189.120747][T13621] sock_sendmsg+0xdd/0x130 [ 189.120765][T13621] sock_write_iter+0x27c/0x3e0 [ 189.120781][T13621] ? sock_sendmsg+0x130/0x130 [ 189.120806][T13621] ? aa_path_link+0x460/0x460 [ 189.120821][T13621] ? find_held_lock+0x35/0x130 [ 189.120835][T13621] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 189.120849][T13621] ? iov_iter_init+0xee/0x220 [ 189.120868][T13621] new_sync_write+0x4c7/0x760 [ 189.120893][T13621] ? default_llseek+0x2e0/0x2e0 [ 189.164962][T13621] ? common_file_perm+0x238/0x720 [ 189.164979][T13621] ? __fget+0x381/0x550 [ 189.164999][T13621] ? apparmor_file_permission+0x25/0x30 [ 189.174414][T13621] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 189.174443][T13621] ? security_file_permission+0x94/0x380 [ 189.174463][T13621] __vfs_write+0xe4/0x110 [ 189.205050][ T26] audit: type=1800 audit(1555000747.705:74): pid=13583 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="memory.events" dev="sda1" ino=16902 res=0 [ 189.209507][T13621] vfs_write+0x20c/0x580 [ 189.209536][T13621] ksys_write+0xea/0x1f0 [ 189.209554][T13621] ? __ia32_sys_read+0xb0/0xb0 [ 189.209572][T13621] ? do_syscall_64+0x26/0x610 [ 189.209587][T13621] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 189.209607][T13621] ? do_syscall_64+0x26/0x610 [ 189.216881][ T26] audit: type=1804 audit(1555000747.705:75): pid=13590 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir257669541/syzkaller.HUz29h/220/memory.events" dev="sda1" ino=16902 res=1 [ 189.221454][T13621] __x64_sys_write+0x73/0xb0 [ 189.221473][T13621] do_syscall_64+0x103/0x610 [ 189.221491][T13621] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 189.221503][T13621] RIP: 0033:0x4582f9 [ 189.221519][T13621] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 189.221534][T13621] RSP: 002b:00007f6dcf2fbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 16:39:07 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000100)=ANY=[@ANYBLOB='M']) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='rdma.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f00000005c0)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) r3 = gettid() perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x81, 0xfffffffffffffffe, 0x4, 0x81, 0x0, 0xa63, 0x100, 0x2, 0x758, 0x8, 0x1, 0x1, 0xffffffffffffffff, 0x7, 0x704b, 0x1, 0xffffffffffff8000, 0x7, 0xb55, 0x5, 0x3ced, 0x0, 0x4, 0x8, 0x6, 0x0, 0x9, 0x1, 0x0, 0x5, 0x4fe, 0x100000000, 0xfffffffffffffffa, 0x57, 0x1f, 0x8000, 0x0, 0xb1, 0x0, @perf_bp={&(0x7f0000000080), 0xa}, 0x10000, 0x7, 0x7, 0xf, 0xfffffffffffffffe, 0x10000, 0x8}, r3, 0xe, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f0000000200)=@ax25={{0x3, @default, 0x4}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000480)="c90d5c27bf9fa0516c1511fe99208e17cd5ca0a5d30549f59837475ff810fef4b42224e0a54465994a9495eee8629147db10bc1ff14354384ac06d778b3bbca9b0d71e5e73d06545c324ffe20faeb8e650f1cfd564d75507373d5d99a616a36c6b14a08ecbedf4a2044c76d7642e23380f59c9c208fb582dfc85dbd9a66a5e2bf1c7124b852eb48a9c5f1cadaa67b5e93f1a5d473f07140a8a317b65b072dd59ecf606e403eac729909c3e134bfd760a34f0763a8b3256f889e0406b2b755daf53a5af65544095661a1e62f2405b83", 0xcf}], 0x1, &(0x7f0000000780)=[{0xb0, 0x117, 0xfffffffffffff686, "d2fa77eac3467dc9be8d9a59e58398c36a0d425d80b2003af37a4ec5bd1529ca515a2a6ed14cf9b5af6cdf228bb3df31c34f1c667a2d69816833d6f4fa6c262bd465f1b55b81da9c00fa06fb8ea1715434029bde9c1fe75b046f0b8b4bd8879045030745227720af8ca660a441d4c6f6768c7b0a915034ac37694de2c7a3137ffce200617c15858072289676de026882a9e94be20cd07cf3baf6b4f370c1"}, {0x98, 0x13d, 0x1ff, "a1bdad7ef4f85bdd6147d7ff392b417aba52fbb89dec8934d36b2debc99d3b56e09d7d3aae80bbbeea0a9ad596dbb7076d580594901fd098c888e6c4de83e533c2760555a3e50f225f03ea9d8370a012862c40f56cc485ce3115893ba770302444910b618253a07bc054364fbdb15a4c23e1fe4734193e2c9c488142f7d5a19863fa745c"}, {0xe8, 0x13f, 0x2, "793840a1392ad4e2c5c496d8ab014b3d5910be69c1c45697c75af405a8e375b697b8096e89be5761b0780083238ad0a609e1fa1c5870ef8a7d2f6e4f31eeb6162ccd76a762334657f764b02344b953012bf6fab45de57983278a2a00274928ee4fe52ca0656bdb1c87fccf807d5d4669951c69c1288230c79af6495bbf1b204e5a3e1f02612ae7aef212916c8a275f90f3f4c1713105d4026c09a76a802c4827a323c00a61e1fe03ba14c760361b0d8fe94ccd1ea4618d2f3caed7fad4c18b835770ab827bb09404385ae02de4737ffc80cf10"}, {0x60, 0x104, 0x9c0a, "4a7d3118ff68814c34bc8f3d991c8a798b12c70dddb4acb85484f43d135fc89c35ce579387ac25c6618da24f5916cc7d5e340e8ecb5706e25da309e8767dfbc3271d573b337f51f0f1acdd8d"}], 0x290}, 0x8000) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8946, &(0x7f00000001c0)='veth0\x00') sendmsg(r0, &(0x7f00000000c0)={&(0x7f0000000000)=@ax25={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x3}, [@default, @bcast, @bcast, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}]}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000300)=[{0xb8, 0x11d, 0x9, "23823685a096a802c0124c30c3e6225db0ce71e9825034340059fdb4a755dd30450ee75bb4ef717326929be33835ee826ec18de3f8d33a22c3c0d012e05a55ad8220c8e0fc6f64edc97887b18733ca7dd0f6c17afe968390ba906223141d56949e42cfff058472576fd5122260a53e91cf8df8e9cb3a90304505002cba12728ff343c2b0ce1c958008035b52d2a6e44a914e0d13070700ecc3a7ea68b600"/168}, {0x98, 0x0, 0xfffffffffffffffc, "3011a046724831e9068d12e807d9994de3e245d83c590e103910b5fb6f0554e78de3363b0b19557d6776411e72f715c434f1f5e7d75d2719df6a6a8ab80281b0a7928c64bdd296fb283698ca2b65772bffc2837d005ab41d95b8aaa73f7ea29b18dd44b92a253455b45d6697a0a855c8679ff3dd02985e420cdaa1e6ebd382f1ff28258875f9cd"}], 0x150}, 0x1) 16:39:07 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) 16:39:07 executing program 3: openat$cgroup(0xffffffffffffff9c, &(0x7f00000029c0)='syz1\x00', 0x200002, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={0x0, 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x7, 0x0, 0x7, 0x0, 0x0, 0x81, 0x3f80, 0x0, 0x0, 0x400, 0x7, 0x8, 0x0, 0x0, 0x1, 0x2, 0x101, 0x0, 0x0, 0x0, 0x1, 0x200, 0x0, 0x4, 0x3ff, 0x5, 0x0, 0x0, 0x200, 0x0, @perf_config_ext={0x0, 0x100000001}, 0xa08, 0x0, 0x0, 0x6, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgro\x85p.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) 16:39:08 executing program 4 (fault-call:5 fault-nth:34): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) [ 189.221549][T13621] RAX: ffffffffffffffda RBX: 00007f6dcf2fbc90 RCX: 00000000004582f9 [ 189.221565][T13621] RDX: 000000000000fdef RSI: 0000000020000280 RDI: 0000000000000005 [ 189.231238][ T26] audit: type=1800 audit(1555000747.705:76): pid=13590 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="memory.events" dev="sda1" ino=16902 res=0 [ 189.246864][T13621] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 189.246874][T13621] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6dcf2fc6d4 16:39:08 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xb, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000000880000087000000000000009500000000000000"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) [ 189.246881][T13621] R13: 00000000004c7ad0 R14: 00000000004ddba8 R15: 0000000000000006 16:39:08 executing program 2: perf_event_open(&(0x7f0000000180)={0x3, 0xffffffffffffffd9, 0x3ff, 0x1, 0xffff, 0xe2, 0x0, 0x8, 0x1800, 0x2, 0x7, 0x1, 0x7, 0x1000, 0x407, 0x372f, 0x4, 0x95, 0x5, 0x1, 0x3, 0x1, 0x6618b449, 0x7, 0x4, 0x7fffffff, 0x0, 0x7, 0x0, 0x7fff, 0x1000, 0x7, 0x7fffffff, 0x3, 0x2, 0xfffffffffffffff9, 0x6, 0x8001, 0x0, 0x9, 0x5, @perf_bp={&(0x7f0000000000), 0x7}, 0x0, 0x2, 0x115, 0x5, 0x8, 0x101, 0x1}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) r0 = socket$kcm(0x2, 0x8, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff916, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x9, &(0x7f0000000080), 0x3d7) socketpair(0x0, 0x80001, 0x0, &(0x7f0000000040)) [ 189.522056][T13643] FAULT_INJECTION: forcing a failure. [ 189.522056][T13643] name failslab, interval 1, probability 0, space 0, times 0 [ 189.558821][T13643] CPU: 0 PID: 13643 Comm: syz-executor.4 Not tainted 5.1.0-rc2+ #82 [ 189.566851][T13643] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 189.576914][T13643] Call Trace: [ 189.580222][T13643] dump_stack+0x172/0x1f0 [ 189.584570][T13643] should_fail.cold+0xa/0x15 [ 189.589168][T13643] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 189.594987][T13643] ? ___might_sleep+0x163/0x280 [ 189.599848][T13643] __should_failslab+0x121/0x190 [ 189.604792][T13643] should_failslab+0x9/0x14 [ 189.609305][T13643] kmem_cache_alloc_node_trace+0x270/0x720 [ 189.615165][T13643] __kmalloc_node_track_caller+0x3d/0x70 [ 189.620821][T13643] __kmalloc_reserve.isra.0+0x40/0xf0 [ 189.626204][T13643] __alloc_skb+0x10b/0x5e0 [ 189.630628][T13643] ? skb_trim+0x190/0x190 [ 189.634984][T13643] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 189.640738][T13643] ? skb_put+0x177/0x1d0 [ 189.644986][T13643] __ip_append_data.isra.0+0x24d6/0x2dd0 [ 189.650632][T13643] ? ip_reply_glue_bits+0xc0/0xc0 [ 189.655680][T13643] ? __ip_flush_pending_frames.isra.0+0x2d0/0x2d0 [ 189.662103][T13643] ? mark_held_locks+0xf0/0xf0 [ 189.666868][T13643] ? lock_sock_nested+0xac/0x120 [ 189.671814][T13643] ? ip_reply_glue_bits+0xc0/0xc0 [ 189.676839][T13643] ip_append_data.part.0+0xf2/0x170 [ 189.682049][T13643] ? ip_reply_glue_bits+0xc0/0xc0 [ 189.687080][T13643] ip_append_data+0x6e/0x90 [ 189.691598][T13643] udp_sendmsg+0x8e7/0x2820 [ 189.696109][T13643] ? lock_downgrade+0x880/0x880 [ 189.700969][T13643] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 189.707208][T13643] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 189.713452][T13643] ? ip_reply_glue_bits+0xc0/0xc0 [ 189.718484][T13643] ? udp4_lib_lookup_skb+0x440/0x440 [ 189.723756][T13643] ? perf_event_task_disable+0x120/0x120 [ 189.729382][T13643] ? kvm_clock_read+0x18/0x30 [ 189.734066][T13643] ? kvm_sched_clock_read+0x9/0x20 [ 189.739172][T13643] ? sched_clock+0x2e/0x50 [ 189.743596][T13643] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 189.749040][T13643] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 189.754509][T13643] ? lockdep_hardirqs_on+0x418/0x5d0 [ 189.759802][T13643] ? trace_hardirqs_on_caller+0x6a/0x220 [ 189.765448][T13643] ? ___might_sleep+0x163/0x280 [ 189.770315][T13643] ? __might_sleep+0x95/0x190 [ 189.774992][T13643] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 189.780609][T13643] ? aa_sk_perm+0x288/0x880 [ 189.785103][T13643] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 189.790644][T13643] inet_sendmsg+0x147/0x5e0 [ 189.795173][T13643] ? udp4_lib_lookup_skb+0x440/0x440 [ 189.800450][T13643] ? inet_sendmsg+0x147/0x5e0 [ 189.805114][T13643] ? ipip_gro_receive+0x100/0x100 [ 189.810138][T13643] sock_sendmsg+0xdd/0x130 [ 189.814564][T13643] sock_write_iter+0x27c/0x3e0 [ 189.819324][T13643] ? sock_sendmsg+0x130/0x130 [ 189.823989][T13643] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 189.830226][T13643] ? iov_iter_init+0xee/0x220 [ 189.834901][T13643] new_sync_write+0x4c7/0x760 [ 189.839566][T13643] ? default_llseek+0x2e0/0x2e0 [ 189.844404][T13643] ? common_file_perm+0x238/0x720 [ 189.849444][T13643] ? __fget+0x381/0x550 [ 189.853609][T13643] ? apparmor_file_permission+0x25/0x30 [ 189.859160][T13643] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 189.865402][T13643] ? security_file_permission+0x94/0x380 [ 189.871046][T13643] __vfs_write+0xe4/0x110 [ 189.875378][T13643] vfs_write+0x20c/0x580 [ 189.879634][T13643] ksys_write+0xea/0x1f0 [ 189.883860][T13643] ? __ia32_sys_read+0xb0/0xb0 [ 189.888624][T13643] ? do_syscall_64+0x26/0x610 [ 189.893294][T13643] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 189.899358][T13643] ? do_syscall_64+0x26/0x610 [ 189.904021][T13643] __x64_sys_write+0x73/0xb0 [ 189.908648][T13643] do_syscall_64+0x103/0x610 [ 189.913239][T13643] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 189.919226][T13643] RIP: 0033:0x4582f9 [ 189.923122][T13643] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 189.942711][T13643] RSP: 002b:00007f6dcf2fbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 189.951117][T13643] RAX: ffffffffffffffda RBX: 00007f6dcf2fbc90 RCX: 00000000004582f9 [ 189.959099][T13643] RDX: 000000000000fdef RSI: 0000000020000280 RDI: 0000000000000005 16:39:08 executing program 2: r0 = socket$kcm(0xa, 0x7, 0x11) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000380)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="2d70696473202f70696473202d7242857ed05bcfc4befd2bb3aa646d61"], 0x1d) write$cgroup_subtree(r2, &(0x7f0000000240)=ANY=[@ANYBLOB="2b72646d60202d70696473202d63707520eb6d5372f173202f7069647320"], 0x1d) write$cgroup_subtree(r2, &(0x7f00000001c0)={[{0x2d, 'pids'}, {0x2f, 'memory'}, {0x2d, 'io'}, {0x2b, 'memory'}, {0x2b, 'rdma'}]}, 0x20) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000080)=@generic={0x0, "eebc8d55a71d00c134a1e378be0410488ee1ba2e5734cac75da6fd42c11356b45372a502f9d4b65bb47802cd79b821587cc66bea8a034a490b8a4f4961261df7a7a3dd6696c4c22385f61e39ec4d248ea5b00db8c963a52e5bb3f602a06f1afd01aaa7243b140eb4ab146e11747acd1f04b5e58cb16911556556d1f92172"}, 0x80, 0x0, 0x0, &(0x7f0000000180)}, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r3, 0x0, 0x1, 0x7fffffff, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8}, 0x18d) 16:39:08 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r2, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="180000000000000001000000010000000400000004000000"], 0x18}, 0x0) recvmsg(r1, &(0x7f0000002680)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001680)=""/4096, 0x1000}, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x100, 0x0) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x1) 16:39:08 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) 16:39:08 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0xf6ac, &(0x7f0000002580)=[{&(0x7f0000000000), 0xfdde}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:08 executing program 3: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0xffffffffffffffff, r0, 0x0, 0x2, &(0x7f0000000080)='/\x00'}, 0x30) perf_event_open(&(0x7f0000000180)={0x7, 0x70, 0x2, 0x6, 0x6, 0xe76, 0x0, 0x3, 0x942c685df3dbe16d, 0xa, 0x800, 0xa6, 0x5bd, 0x2, 0x1f, 0x7f, 0x5, 0x3, 0x800, 0xffffffffffff0001, 0xc5, 0x100000001, 0x0, 0x200, 0x8, 0x2c, 0xffffffffffff0000, 0x2, 0x3d79cb0e, 0x3, 0x7, 0x9, 0x0, 0x0, 0x3ff, 0x1, 0x0, 0x5834, 0x0, 0xb33, 0x1, @perf_config_ext={0x1000, 0x800}, 0x10000, 0x6, 0xffff, 0xf, 0x5b3c, 0x100, 0x200}, r1, 0xd, r0, 0x1) socket$kcm(0x29, 0x5, 0x0) r2 = socket$kcm(0x10, 0x7, 0x0) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000340)="23000000210081ae00060c00f20e000002000000000000018001006fabeb264e7d06a4", 0x23}], 0x1}, 0x0) r3 = getpid() perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x7, 0x104, 0x7, 0x4, 0x0, 0xbf7, 0x10, 0x4, 0x3, 0x2, 0x9, 0x1, 0x2, 0x0, 0x1, 0xf50, 0x1f, 0xffff, 0x8000, 0x7, 0x6, 0x94e, 0x0, 0x400, 0xb7, 0x5, 0x4, 0xffffffff, 0x0, 0x100000000, 0x10000, 0x1, 0x40474eb, 0x7, 0x100000001, 0x2, 0x0, 0x9b, 0x1, @perf_config_ext={0x283, 0x9}, 0x1000, 0x4, 0x8, 0x0, 0x80000000, 0xffff, 0x2000}, r3, 0x4, 0xffffffffffffff9c, 0x2) [ 189.967071][T13643] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 189.975040][T13643] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6dcf2fc6d4 [ 189.983012][T13643] R13: 00000000004c7ad0 R14: 00000000004ddba8 R15: 0000000000000006 16:39:08 executing program 4 (fault-call:5 fault-nth:35): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) 16:39:08 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000f00fb8)={0xe, 0x5, &(0x7f0000b0afd8)=@framed={{0x18, 0x7a000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000fe9000)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000e18000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r1, 0x0, 0xa4, 0x90, &(0x7f0000000040)="151e06bcabe0db53ccdf99d76205be1138031c0cfc9a180706c49417d431e1e0c910527571753f817ff6b650a9bac18bccde1686bb623cb8589ed84e1fac4f165301ecc096e35a6e0af159c5c21081de40dbe10d5d10e48346e340ab89f88a206b5dba1436de7c57f221f161300d72e117c000bd0b0cdd915499fd86a26ee537673119ca853995170e395c3d07bb6ab8d499984b32667cc0f575b42d8827c9fb28c9861c", &(0x7f0000000100)=""/144, 0x1ff}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000008640)={&(0x7f0000008380)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f00000085c0)=[{&(0x7f0000008400)=""/164, 0xa4}, {&(0x7f00000084c0)=""/251, 0xfb}], 0x2, &(0x7f0000008600)=""/39, 0x27}, 0x61) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000088c0)={&(0x7f0000008680)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x68, 0x80, 0x4, {"813c25a910751cb9814373126760b4ea7ea25db272c20e176ad27e73b7a4d8a1d3222063c94e4e0d157b6b07129e56415e72d57048d103d2750039ea8d5857b413025a80ede376f0db982e1d3eabd791102ca8a209742193f40dbc54b1dae3f98e60f45c7bee4cd7"}}, {0x0, "9a71debbb6a3a74e17a6e3231511335df2e7db275be585b89364ad664b4dd11080d3d92b727793d645952179a274e47ada170dc6613203e716c041363eb3d83d0e99dca217d5a22ba508c443500e36f1dd8bf599fafd299c83a5a7299ca41c3ff3fef1f203c81130dbf1ff222a60c858ad9188ea73f096cc9c7e0d88cfd3b68997d1520533820cb42d77392bef6972b1f58fe8735f2ac559ca225c765188532a592c00459267f19858ddbc3542e9844931186dfcb2923ca108982a1624e3965ef75b4b57"}}, &(0x7f0000008800)=""/141, 0x146, 0x8d, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000008900)={0x7, 0x101, 0x9, 0x9f16, 0x10, r0, 0xffffffffffffffff, [], r2, r3, 0x4, 0x2}, 0x3c) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={r3, 0x10, &(0x7f0000000300)={&(0x7f0000000240)=""/183, 0xb7}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x1b, 0x0, 0x0, 0x8001, 0x0, r0, 0x1f, [], r2, r3, 0x6, 0x9}, 0x3c) 16:39:08 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) 16:39:08 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0xf6ac, &(0x7f0000002580)=[{&(0x7f0000000000), 0xfdde}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:08 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r1, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0x59, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x5, 0x29}, 0x0, 0x0, &(0x7f0000000180)={0x1, 0x100000000, 0x8001, 0x6}, &(0x7f00000001c0)=0x7fffffff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x4}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x5, 0x1, 0x44}]}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 16:39:08 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='rdma.current\x00', 0x0, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000080)) r1 = openat$cgroup_ro(r0, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) recvmsg(r0, &(0x7f0000000700)={&(0x7f0000000100)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000180)=""/76, 0x4c}, {&(0x7f0000000200)=""/130, 0x82}, {&(0x7f00000002c0)=""/50, 0x32}, {&(0x7f0000000300)=""/188, 0xbc}, {&(0x7f00000003c0)=""/75, 0x4b}, {&(0x7f0000000440)=""/161, 0xa1}, {&(0x7f0000000500)=""/228, 0xe4}, {&(0x7f0000000600)=""/100, 0x64}], 0x8}, 0x2000) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r1, 0x28, &(0x7f0000000740)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000007c0)={r2, 0x8, 0x18}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r2, 0x0, 0x8}, 0xc) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000840)=""/143) mkdir(&(0x7f0000000900)='./file0\x00', 0x21) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000940)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000a80)={0xffffffffffffffff, r0, 0x0, 0x2, &(0x7f0000000a40)='/\x00', 0xffffffffffffffff}, 0x30) r5 = perf_event_open(&(0x7f00000009c0)={0x0, 0x70, 0x10000000, 0x2, 0x100000001, 0x7ff, 0x0, 0x101, 0xf8a00, 0x1, 0x1000, 0x7, 0x5, 0x4, 0x2, 0xc9e, 0x7, 0x9, 0x0, 0x74b, 0xfff, 0x2, 0x0, 0x80, 0x1ff, 0x8, 0x7, 0x0, 0x10001, 0x80000000, 0x7f, 0x2, 0x10000, 0xff, 0x6, 0x4, 0x5, 0x49, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000980), 0x4}, 0x400, 0x4, 0x7fffffff, 0x7, 0x9, 0x80000001, 0xa5e3}, r3, 0x3, r0, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000ac0)={0x0, 0x70, 0x5, 0x0, 0x8, 0x40, 0x0, 0x0, 0x40, 0x0, 0x44e, 0x0, 0x6, 0x9ed, 0x1ff, 0x9, 0x7, 0x6, 0xfffffffffffffc00, 0x6, 0x863, 0x3, 0x400, 0xa0d, 0x67, 0xffffffffffff21d6, 0x21, 0x4, 0xdab9, 0x6, 0x9, 0x5, 0x2, 0xa27, 0x20, 0x0, 0xff, 0x800, 0x0, 0x5, 0x2, @perf_config_ext={0xc1, 0x3b}, 0x2, 0x80000001, 0xdf01, 0x5, 0x7, 0x7, 0x2}) openat$cgroup_subtree(r0, &(0x7f0000000b40)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000b80)={r1}) perf_event_open(&(0x7f0000000c00)={0x7, 0x70, 0x4, 0x10000, 0x8, 0x800, 0x0, 0x1172, 0x80000, 0xc, 0x3, 0x3, 0x6, 0x1, 0x2, 0x2, 0x40, 0x5a, 0x2, 0x3, 0x8, 0x101, 0x2, 0x9, 0x7, 0x22b0, 0x3f, 0x3, 0x3f, 0x5, 0x3, 0x0, 0x8, 0x4, 0x4, 0x81, 0x101, 0x3, 0x0, 0x7, 0x6, @perf_bp={&(0x7f0000000bc0), 0x9fbbce166103cbdf}, 0x120, 0x2, 0x386, 0x4, 0x2, 0x1ff, 0xffffffffffff7fff}, r3, 0x9, r5, 0x8) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000cc0)={&(0x7f0000000c80)='./file0\x00', r0}, 0x10) recvmsg$kcm(r6, &(0x7f0000001280)={&(0x7f0000000d00)=@can={0x1d, 0x0}, 0x80, &(0x7f0000001180)=[{&(0x7f0000000d80)=""/123, 0x7b}, {&(0x7f0000000e00)=""/139, 0x8b}, {&(0x7f0000000ec0)=""/246, 0xf6}, {&(0x7f0000000fc0)=""/141, 0x8d}, {&(0x7f0000001080)=""/233, 0xe9}], 0x5, &(0x7f0000001200)=""/86, 0x56}, 0x40000060) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000012c0)={0x17, 0x401, 0x2, 0x4, 0x2b, r1, 0x6, [], r7, r0, 0x0, 0x8000}, 0x3c) mkdir(&(0x7f0000001300)='./file0\x00', 0x2c) perf_event_open(&(0x7f0000001340)={0x0, 0x70, 0x1, 0x0, 0x7, 0x5000000000000000, 0x0, 0x40, 0x8002, 0x1, 0x19, 0xffffffffffffff6e, 0x10000, 0x8000, 0xa8, 0x800, 0x551, 0xffff, 0x7, 0x8, 0x7, 0xb153, 0x1, 0x20000000000000, 0x3e, 0x3, 0x1000, 0x8, 0x3, 0x8c4, 0x7, 0x5, 0x2, 0xc34, 0x7f, 0x7f, 0xca07, 0x9960, 0x0, 0x63d2, 0x2, @perf_config_ext={0x40}, 0x20000, 0x6, 0xe20, 0x39ac0935fedf122e, 0x7, 0x7, 0x2caf}, r3, 0x6, 0xffffffffffffff9c, 0x2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001400)={r0, 0x28, &(0x7f00000013c0)}, 0x10) recvmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000014c0)=[{&(0x7f0000001440)=""/118, 0x76}], 0x1, &(0x7f0000001500)=""/37, 0x25}, 0x121) unlink(&(0x7f0000001580)='./file0\x00') ioctl$PERF_EVENT_IOC_SET_OUTPUT(r8, 0x2405, r4) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000015c0)={'gretap0\x00', 0x2000}) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000001600)) mkdir(&(0x7f0000001640)='./file0\x00', 0x80) 16:39:09 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0xef8f, 0xbbef, 0x3, 0x7fff, 0x0, 0x5, 0x2100, 0x2, 0x9, 0x5, 0x401, 0x7, 0x88a, 0x1, 0x9, 0x7, 0x3, 0x200, 0x80, 0x6, 0x4, 0x2, 0x8001, 0x2, 0x5, 0x6, 0x3, 0xfff, 0xbb4d, 0x2, 0x7bcd, 0x3, 0x6, 0x5c08, 0x3f, 0x39, 0x0, 0x0, 0x2, @perf_bp, 0x400, 0xfffffffffffffff9, 0x8000, 0x2, 0x400040000000, 0x20, 0x7}, 0xffffffffffffffff, 0x2, r0, 0x1) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x1}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0x20008844) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='self#em0\x00') openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) 16:39:09 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) [ 190.341162][T13691] FAULT_INJECTION: forcing a failure. [ 190.341162][T13691] name failslab, interval 1, probability 0, space 0, times 0 [ 190.418625][T13691] CPU: 1 PID: 13691 Comm: syz-executor.4 Not tainted 5.1.0-rc2+ #82 [ 190.426640][T13691] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 190.436701][T13691] Call Trace: [ 190.440005][T13691] dump_stack+0x172/0x1f0 [ 190.444365][T13691] should_fail.cold+0xa/0x15 [ 190.448969][T13691] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 190.454786][T13691] ? ___might_sleep+0x163/0x280 [ 190.459645][T13691] __should_failslab+0x121/0x190 [ 190.464588][T13691] should_failslab+0x9/0x14 16:39:09 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) 16:39:09 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000040)={r1}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuset.effective_mems\x00', 0x0, 0x0) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000180)='cpuset.memory_pressure\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.stat\x00', 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000100)=r4) r5 = socket$kcm(0x2, 0x3, 0x2) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)) sendmsg$kcm(r5, &(0x7f0000000800)={&(0x7f00000001c0)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0, 0x0, &(0x7f0000000680)=[{0x10, 0x0, 0x8}], 0x10}, 0x0) [ 190.469101][T13691] kmem_cache_alloc_node+0x264/0x710 [ 190.474400][T13691] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 190.480665][T13691] __alloc_skb+0xd5/0x5e0 [ 190.485005][T13691] ? skb_trim+0x190/0x190 [ 190.489343][T13691] ? skb_page_frag_refill+0x127/0x460 [ 190.494714][T13691] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 190.500444][T13691] ? skb_put+0x177/0x1d0 [ 190.504700][T13691] __ip_append_data.isra.0+0x24d6/0x2dd0 [ 190.510345][T13691] ? ip_reply_glue_bits+0xc0/0xc0 16:39:09 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) [ 190.515389][T13691] ? __ip_flush_pending_frames.isra.0+0x2d0/0x2d0 [ 190.521814][T13691] ? mark_held_locks+0xf0/0xf0 [ 190.526595][T13691] ? lock_sock_nested+0xac/0x120 [ 190.531552][T13691] ? ip_reply_glue_bits+0xc0/0xc0 [ 190.536581][T13691] ip_append_data.part.0+0xf2/0x170 [ 190.541789][T13691] ? ip_reply_glue_bits+0xc0/0xc0 [ 190.546822][T13691] ip_append_data+0x6e/0x90 [ 190.551342][T13691] udp_sendmsg+0x8e7/0x2820 [ 190.555859][T13691] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 190.562103][T13691] ? __lock_acquire+0x548/0x3fb0 16:39:09 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x3c) openat$tun(0xffffffffffffff9c, 0x0, 0x10000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fff8, 0x0, 0x820004, 0x0}, 0x2c) getpid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) r0 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x24, &(0x7f00000002c0), 0x161) socketpair(0x1, 0x1, 0x0, &(0x7f0000000040)) [ 190.567045][T13691] ? ip_reply_glue_bits+0xc0/0xc0 [ 190.572079][T13691] ? udp4_lib_lookup_skb+0x440/0x440 [ 190.577373][T13691] ? is_bpf_text_address+0xac/0x170 [ 190.582581][T13691] ? find_held_lock+0x35/0x130 [ 190.587352][T13691] ? is_bpf_text_address+0xac/0x170 [ 190.592564][T13691] ? ___might_sleep+0x163/0x280 [ 190.597439][T13691] ? __might_sleep+0x95/0x190 [ 190.602125][T13691] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 190.607762][T13691] ? aa_sk_perm+0x288/0x880 [ 190.612278][T13691] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 190.617836][T13691] inet_sendmsg+0x147/0x5e0 [ 190.622344][T13691] ? udp4_lib_lookup_skb+0x440/0x440 [ 190.627628][T13691] ? inet_sendmsg+0x147/0x5e0 [ 190.632309][T13691] ? ipip_gro_receive+0x100/0x100 [ 190.637341][T13691] sock_sendmsg+0xdd/0x130 [ 190.641765][T13691] sock_write_iter+0x27c/0x3e0 [ 190.646541][T13691] ? sock_sendmsg+0x130/0x130 [ 190.651235][T13691] ? aa_path_link+0x460/0x460 [ 190.655914][T13691] ? find_held_lock+0x35/0x130 [ 190.660680][T13691] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 190.666921][T13691] ? iov_iter_init+0xee/0x220 [ 190.671606][T13691] new_sync_write+0x4c7/0x760 [ 190.676289][T13691] ? default_llseek+0x2e0/0x2e0 [ 190.681153][T13691] ? common_file_perm+0x238/0x720 [ 190.686186][T13691] ? __fget+0x381/0x550 [ 190.690355][T13691] ? apparmor_file_permission+0x25/0x30 [ 190.695905][T13691] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 190.702146][T13691] ? security_file_permission+0x94/0x380 [ 190.707785][T13691] __vfs_write+0xe4/0x110 [ 190.712123][T13691] vfs_write+0x20c/0x580 [ 190.716378][T13691] ksys_write+0xea/0x1f0 [ 190.720634][T13691] ? __ia32_sys_read+0xb0/0xb0 [ 190.725399][T13691] ? do_syscall_64+0x26/0x610 [ 190.730083][T13691] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 190.736154][T13691] ? do_syscall_64+0x26/0x610 [ 190.740845][T13691] __x64_sys_write+0x73/0xb0 [ 190.745451][T13691] do_syscall_64+0x103/0x610 [ 190.750063][T13691] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 190.755959][T13691] RIP: 0033:0x4582f9 [ 190.759858][T13691] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 190.779464][T13691] RSP: 002b:00007f6dcf2fbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 190.787883][T13691] RAX: ffffffffffffffda RBX: 00007f6dcf2fbc90 RCX: 00000000004582f9 [ 190.795852][T13691] RDX: 000000000000fdef RSI: 0000000020000280 RDI: 0000000000000005 [ 190.803825][T13691] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 190.811798][T13691] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6dcf2fc6d4 [ 190.819774][T13691] R13: 00000000004c7ad0 R14: 00000000004ddba8 R15: 0000000000000006 16:39:09 executing program 4 (fault-call:5 fault-nth:36): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) 16:39:09 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) 16:39:09 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0xe00) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000100)='memory.current\x00', 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair(0x11, 0x805, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 16:39:09 executing program 3: bpf$PROG_LOAD(0x3, &(0x7f0000000040)={0x1f, 0x0, 0x0, 0x0, 0x0, 0x22c3e344a8ef2b8a, 0x0, 0x40f00, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffdc4, 0x10, 0x0}, 0x70) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f00000000c0)=0x8) 16:39:09 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0xf6ac, &(0x7f0000002580)=[{&(0x7f0000000000), 0xfdde}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:09 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) [ 191.058241][T13743] FAULT_INJECTION: forcing a failure. [ 191.058241][T13743] name failslab, interval 1, probability 0, space 0, times 0 [ 191.203499][T13743] CPU: 1 PID: 13743 Comm: syz-executor.4 Not tainted 5.1.0-rc2+ #82 [ 191.211514][T13743] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 191.221566][T13743] Call Trace: [ 191.224873][T13743] dump_stack+0x172/0x1f0 [ 191.229219][T13743] should_fail.cold+0xa/0x15 [ 191.233823][T13743] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 191.239639][T13743] ? ___might_sleep+0x163/0x280 [ 191.244501][T13743] __should_failslab+0x121/0x190 [ 191.249452][T13743] should_failslab+0x9/0x14 [ 191.253962][T13743] kmem_cache_alloc_node_trace+0x270/0x720 [ 191.259787][T13743] __kmalloc_node_track_caller+0x3d/0x70 [ 191.265435][T13743] __kmalloc_reserve.isra.0+0x40/0xf0 [ 191.270811][T13743] __alloc_skb+0x10b/0x5e0 [ 191.275235][T13743] ? skb_trim+0x190/0x190 [ 191.279575][T13743] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 191.285294][T13743] ? skb_put+0x177/0x1d0 [ 191.289539][T13743] __ip_append_data.isra.0+0x24d6/0x2dd0 [ 191.289569][T13743] ? ip_reply_glue_bits+0xc0/0xc0 16:39:09 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x4, 0x800}, 0x3c) socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) socketpair$unix(0x1, 0x40000000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={r1, r2, 0x4, 0x1}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/grotat\b\x00\x00\x00\x00', 0x2761, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000380)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) r4 = socket$kcm(0x11, 0x2, 0x300) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000280)={r3, r2}) setsockopt$sock_attach_bpf(r4, 0x1, 0x41, &(0x7f0000000000)=r4, 0x4) openat$tun(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/net/tun\x00', 0x1, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000640)={&(0x7f0000000040)=@caif=@rfm={0x25, 0x1f, "35b0d04845eddb3bc5582e88086d0216"}, 0x80, 0x0}, 0x0) recvmsg(r4, &(0x7f000000cd00)={0x0, 0x0, 0x0}, 0x2000) 16:39:09 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000018008100e00f80ecdb4cb92e0a0800181e0cd306e8bd6efb000000060005001200"/46, 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) 16:39:09 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0xf6ac, &(0x7f0000002580)=[{&(0x7f0000000000), 0xfdde}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:09 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) close(r0) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f0000002700)={&(0x7f00000001c0)=@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0xfffffff5]}, 0xd}, 0x80, &(0x7f0000001640)=[{&(0x7f00000003c0)='\x00', 0x1}], 0x1}, 0x45) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x10) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x2c, 0x100000000, {"fa25dd908aaf32549f96c53546558c58efbf75"}}, {0x0, "6bc6eec3e8f68c50908b77a6b4b11604e1cdb54cd688bdb40c550237d194c4bddda6f370d4a609d959"}}, &(0x7f0000000240)=""/161, 0x57, 0xa1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x1d, 0xffffffff, 0x7ff, 0x9, 0x8, r2, 0xfff, [], 0x0, r3, 0x3, 0x100000000}, 0x3c) setsockopt$sock_attach_bpf(r0, 0x1, 0xd, &(0x7f0000000080), 0x2cb) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000300)={r1}) close(r0) 16:39:09 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) [ 191.289595][T13743] ? __ip_flush_pending_frames.isra.0+0x2d0/0x2d0 [ 191.289616][T13743] ? lockdep_hardirqs_on+0x418/0x5d0 [ 191.306637][T13743] ? retint_kernel+0x2d/0x2d [ 191.306654][T13743] ? trace_hardirqs_on_caller+0x6a/0x220 [ 191.306673][T13743] ? lock_sock_nested+0xac/0x120 [ 191.322128][T13743] ? ip_reply_glue_bits+0xc0/0xc0 [ 191.322143][T13743] ip_append_data.part.0+0xf2/0x170 [ 191.322162][T13743] ? ip_reply_glue_bits+0xc0/0xc0 [ 191.342277][T13743] ip_append_data+0x6e/0x90 [ 191.346796][T13743] udp_sendmsg+0x8e7/0x2820 [ 191.351305][T13743] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 191.356766][T13743] ? lockdep_hardirqs_on+0x418/0x5d0 [ 191.362061][T13743] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 191.368312][T13743] ? trace_hardirqs_on_caller+0x6a/0x220 [ 191.373944][T13743] ? ip_reply_glue_bits+0xc0/0xc0 [ 191.373966][T13743] ? udp4_lib_lookup_skb+0x440/0x440 [ 191.373983][T13743] ? retint_kernel+0x2d/0x2d [ 191.374008][T13743] ? __wake_q_add.isra.0+0xa0/0xa0 [ 191.384292][T13743] ? ___might_sleep+0x163/0x280 [ 191.384312][T13743] ? __might_sleep+0x95/0x190 [ 191.384330][T13743] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 191.384351][T13743] ? aa_sk_perm+0x288/0x880 [ 191.413616][T13743] ? trace_hardirqs_on_caller+0x6a/0x220 [ 191.419253][T13743] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 191.424795][T13743] inet_sendmsg+0x147/0x5e0 [ 191.429314][T13743] ? udp4_lib_lookup_skb+0x440/0x440 [ 191.434592][T13743] ? inet_sendmsg+0x147/0x5e0 [ 191.439262][T13743] ? ipip_gro_receive+0x100/0x100 [ 191.444284][T13743] sock_sendmsg+0xdd/0x130 [ 191.448715][T13743] sock_write_iter+0x27c/0x3e0 [ 191.453479][T13743] ? sock_sendmsg+0x130/0x130 [ 191.458160][T13743] ? aa_path_link+0x460/0x460 [ 191.462829][T13743] ? find_held_lock+0x35/0x130 [ 191.467588][T13743] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 191.473823][T13743] ? iov_iter_init+0xee/0x220 [ 191.478500][T13743] new_sync_write+0x4c7/0x760 [ 191.483174][T13743] ? default_llseek+0x2e0/0x2e0 [ 191.488030][T13743] ? common_file_perm+0x238/0x720 [ 191.493050][T13743] ? __fget+0x381/0x550 [ 191.497205][T13743] ? apparmor_file_permission+0x25/0x30 [ 191.502836][T13743] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 191.509070][T13743] ? security_file_permission+0x94/0x380 [ 191.514701][T13743] __vfs_write+0xe4/0x110 [ 191.519033][T13743] vfs_write+0x20c/0x580 [ 191.523279][T13743] ksys_write+0xea/0x1f0 [ 191.527520][T13743] ? __ia32_sys_read+0xb0/0xb0 [ 191.532281][T13743] ? do_syscall_64+0x26/0x610 [ 191.536954][T13743] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 191.543015][T13743] ? do_syscall_64+0x26/0x610 [ 191.547697][T13743] __x64_sys_write+0x73/0xb0 [ 191.552288][T13743] do_syscall_64+0x103/0x610 [ 191.556881][T13743] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 191.562764][T13743] RIP: 0033:0x4582f9 [ 191.566656][T13743] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 191.586251][T13743] RSP: 002b:00007f6dcf2fbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 191.594653][T13743] RAX: ffffffffffffffda RBX: 00007f6dcf2fbc90 RCX: 00000000004582f9 [ 191.602617][T13743] RDX: 000000000000fdef RSI: 0000000020000280 RDI: 0000000000000005 [ 191.610583][T13743] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 191.618545][T13743] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6dcf2fc6d4 [ 191.626508][T13743] R13: 00000000004c7ad0 R14: 00000000004ddba8 R15: 0000000000000006 16:39:10 executing program 4 (fault-call:5 fault-nth:37): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) 16:39:10 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x4, 0x4, 0x80000000004, 0xe657}, 0x2c) close(r0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, 0x0, 0x0) unlink(&(0x7f0000000000)='./file0\x00') 16:39:10 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) 16:39:10 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(0xffffffffffffffff, &(0x7f00000027c0)={0x0, 0xf6ac, &(0x7f0000002580)=[{&(0x7f0000000000), 0xfdde}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:10 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f00000002c0)={&(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x2, 0x1, 0x3, 0x2, {0xa, 0x4e23, 0x5, @loopback, 0x400}}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="00b8d7128ceefd73e210bf20015410c405a227fae24fbc5d27a78cdd27c1556f3e0da6c93f2750d1e1cc1e6df7a1a74af264a15ee0a3a5259e9a9413bfe85a074d632ca09b1c9348f9bd", 0x4a}, {&(0x7f00000001c0)="00de2505a7a1450ae996b2af23f0a3d6f015b0d0b87709dcea4b00a8efb37c1ee85adb3eb81aa83b21bd88a6f4b8043bb4", 0x31}], 0x2, &(0x7f0000000240)=[{0x70, 0x11b, 0x7, "28d4cfd35352b33290cfb607bfa848cd4ffa31a6c05e7da4915d7294a96a558fdedd665bd4551b4e3c2a89a6262d6efa6ab8681aa8adf196f695e4bcdd50ddcff168f60a49b628baba94bc7ae7108f670f2e4ddb448799be9f4c1c"}], 0x70}, 0x4000) socketpair(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r3, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000005c0)="d4", 0x1}], 0x1}, 0x0) sendmsg$kcm(r3, &(0x7f0000000580)={&(0x7f0000000300)=@nfc_llcp={0x27, 0x1, 0x2, 0x1, 0x8000, 0x7, "ecabbaa2438b8f1c278b9f0149dc55ae92ef5814d64cb97f61ca2cb0dbf37c499c1ef73832158d63af798c07f06aeea08c6da94b39c6c2622ced1a976d9f5b", 0x17}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000380)="dbaf3928f64e06d39bcd583ead9a82500496a9d1152c91aa1b3f4fa98ee8392e53bf624a9172aa86513f08478b8d325a", 0x30}, {&(0x7f00000003c0)="3d450766491a1d69ff45fd43931124b15bef0ce7b01f2356e14a200e374a0eb0f930f438caf0bfe1e7ce9cdcf1fdc0e13cff127f3377bef972106d1930ac8ebf4c426b6d7a915d32d2283a8ace0793ceae2b686384c06a19a1b1166638e9deb53df8d0a3438fbb3042ed0e2bac206c02b698e59614b35cfb80c27abb3c9d196aa226ecf38b03eb", 0x87}, {&(0x7f0000000480)="0ef5a0332020598b15d5dcc426fcafa8fab5c5ef69695c0912ca6e5d0d262a643a2f991c83e9b5a11d089086976db4901c89e8cf5b5789a6d383dc4f2eaa10260c62e4c52c245b9dceb580335dbb191ef8165f57d59189e45476ae6079f41a941dd98ff7ced6d021e60e5ec88936f051d8da9dcfb19f06f0b610451a65fef1a192db96875e5b", 0x86}, {&(0x7f0000000680)="002300804e6add6a02ea35562f9bf2a2bc0aa0c2fa47f6faf0c7af53eb9a44319c277d6cdeca41aada940ca5fb02fa87b973eb7bf9ae41b5c2a0ac36744fdf8b130881ec8506a1fb8ddd813a249d6433280bcd8eba13d258d6c4b58d6f12af8d7a0d981e9a0ea848e380c86ea92c3f3f0cc482aec6b4e8dd23692e340fff87e3c94468d3dc47339058abc8eddbb4", 0x8e}], 0x4, &(0x7f0000000a00)=ANY=[@ANYBLOB="90000000000000001d010000ce000000d59a54eba23479f7d046a96081fa7bc1cf243c466710d902f1456edca3ae275f6a5968c65a4435bba02de81a50a35a8a7a6f2376e84a354684b561a0b1e7377744cec237c5ae9af5e70540d2c2531abe050696fb9fc454005167a4c01b8ea67d24ba90542bc053cd80f52ef5fdb67641033dddc68f827b9a9add996f7f000000900000000000000004010000010000004bf55d582400c7d5dbb866cc166db27ad92d536ff08c75a50e0bb3f3c3843b74107f603374ba5646d52e25ebeccb04e48f9f01339614aa4ce4472f236f0434e18f20d36686a007e8576acc7a0569aa8539e040aaaba93fbf7283827c20d722020dd0f8ed80516bf45d5ba19ba50482be5e603f969c061c7a8900000000000000380000000000000000000000070000001b14ea00861bc06456852d8f43a4a4f0b3ac1619e011d6838038c72a8a953f8e5fd97ec99a1beb6e380000000000000017010000020000009145eb0b731ecafcbbf901e5a1dce96129e9ca8e03892a886370234e8b9d03af2fe1dee821000000680000000000000004010000150a0000cdb6b2452253509a852bc1379a99dfad7b92faf1b22af8637a5fa7d7d0cd1394c4ba0942c4332946e7d633a3419dbd67458c18a8dff375e14386ea2970b1e56517160a97ddbbd645495769d6ae7455c935060000000000008000000000000000160100003f00000065ff25a83e74be01cad1a30fd5d7aa444713851946863bada531f9335dff7c2a628de4a2ba066d3d60dd7efdde4727a24600109be09a6434003a4485564b0c989f40182872b58b279a8d01285983f093d6d826246d5f5cd95559ecd5583147ecaf07aefe6dc36ed805ad000000000000380000000000000012010000ff000000c128bd8ae1b416d26acc4b2216841f000000000000009c3a8c7e1ddb21b91038630a250300000000"], 0x2b0}, 0x81) recvmsg(r2, &(0x7f0000008040)={0x0, 0xf8, &(0x7f0000007f00), 0x34d, 0x0, 0x327}, 0x0) 16:39:10 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000080)='pids.events\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0x0, 0xc9, 0x22, &(0x7f0000000100)="ce40d5f1a26dab1891e5eb6dc4a8beb28186ec495d636445518f865a06f188d58315f88ee8055b74e00e041826fc4c75b3d720572036aa8bc5165ff4670c73c45430647669da03b578dc8d4c5ad78f54285cec07b29ad7a7c357ee7f5f4166cf4d1ea9128873ef740ec59119d76f32143003fb775b70e92ade0ad8758f572f4574f352ee1e4ed552b4690e31c3dcaa6a906e8b15624177b223de567e4f93cebacb9be62e9842887b7e898753e2b6d932ba256ec0a199f1f9d2bc79bfa0514fce6263cb3ac7e2fcf3aa", &(0x7f0000000200)=""/34, 0x80000001}, 0x28) socketpair$unix(0x1, 0x200000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TUNSETSNDBUF(r1, 0x400454d4, &(0x7f0000000280)=0x1) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="250000001a008100a00f80ecdb4cb904024865160b000000d4126efb09000300ac14142240", 0x25}], 0x1}, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f00000002c0)={'veth0_to_bridge\x00', 0x200}) [ 191.902747][T13775] FAULT_INJECTION: forcing a failure. [ 191.902747][T13775] name failslab, interval 1, probability 0, space 0, times 0 [ 191.942901][T13775] CPU: 0 PID: 13775 Comm: syz-executor.4 Not tainted 5.1.0-rc2+ #82 [ 191.950904][T13775] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 191.950910][T13775] Call Trace: [ 191.950936][T13775] dump_stack+0x172/0x1f0 [ 191.950961][T13775] should_fail.cold+0xa/0x15 [ 191.950983][T13775] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 191.951006][T13775] ? ___might_sleep+0x163/0x280 [ 191.951030][T13775] __should_failslab+0x121/0x190 [ 191.951051][T13775] should_failslab+0x9/0x14 [ 191.988855][T13775] kmem_cache_alloc_node+0x264/0x710 [ 191.988874][T13775] ? __asan_set_shadow_f8+0x20/0x20 [ 191.988896][T13775] __alloc_skb+0xd5/0x5e0 [ 191.988918][T13775] ? skb_trim+0x190/0x190 [ 192.013878][T13775] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 192.013894][T13775] ? skb_put+0x177/0x1d0 [ 192.013915][T13775] __ip_append_data.isra.0+0x24d6/0x2dd0 [ 192.013936][T13775] ? ip_reply_glue_bits+0xc0/0xc0 [ 192.034513][T13775] ? __ip_flush_pending_frames.isra.0+0x2d0/0x2d0 [ 192.040938][T13775] ? ip_reply_glue_bits+0xc0/0xc0 [ 192.040958][T13775] ? ip_reply_glue_bits+0xc0/0xc0 [ 192.040973][T13775] ip_append_data.part.0+0xf2/0x170 [ 192.040993][T13775] ? ip_reply_glue_bits+0xc0/0xc0 [ 192.041009][T13775] ip_append_data+0x6e/0x90 [ 192.041031][T13775] udp_sendmsg+0x8e7/0x2820 [ 192.041051][T13775] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 192.041065][T13775] ? __lock_acquire+0x548/0x3fb0 [ 192.041085][T13775] ? ip_reply_glue_bits+0xc0/0xc0 [ 192.086457][T13775] ? udp4_lib_lookup_skb+0x440/0x440 [ 192.091760][T13775] ? is_bpf_text_address+0xac/0x170 [ 192.096964][T13775] ? find_held_lock+0x35/0x130 16:39:10 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(0xffffffffffffffff, &(0x7f00000027c0)={0x0, 0xf6ac, &(0x7f0000002580)=[{&(0x7f0000000000), 0xfdde}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) [ 192.101740][T13775] ? is_bpf_text_address+0xac/0x170 [ 192.106952][T13775] ? ___might_sleep+0x163/0x280 [ 192.111813][T13775] ? __might_sleep+0x95/0x190 [ 192.116494][T13775] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 192.122138][T13775] ? aa_sk_perm+0x288/0x880 [ 192.126653][T13775] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 192.126672][T13775] inet_sendmsg+0x147/0x5e0 [ 192.126692][T13775] ? udp4_lib_lookup_skb+0x440/0x440 [ 192.136715][T13775] ? inet_sendmsg+0x147/0x5e0 [ 192.136730][T13775] ? ipip_gro_receive+0x100/0x100 [ 192.136748][T13775] sock_sendmsg+0xdd/0x130 [ 192.136768][T13775] sock_write_iter+0x27c/0x3e0 [ 192.157599][T13795] netlink: 'syz-executor.3': attribute type 3 has an invalid length. [ 192.160859][T13775] ? sock_sendmsg+0x130/0x130 [ 192.160888][T13775] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 192.160904][T13775] ? iov_iter_init+0xee/0x220 [ 192.160923][T13775] new_sync_write+0x4c7/0x760 [ 192.160941][T13775] ? default_llseek+0x2e0/0x2e0 [ 192.160955][T13775] ? lockdep_hardirqs_on+0x418/0x5d0 [ 192.160977][T13775] ? common_file_perm+0x238/0x720 [ 192.175829][T13797] netlink: 'syz-executor.3': attribute type 3 has an invalid length. [ 192.179945][T13775] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 192.179968][T13775] ? apparmor_file_permission+0x25/0x30 [ 192.179983][T13775] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 192.180000][T13775] ? security_file_permission+0x94/0x380 [ 192.180022][T13775] __vfs_write+0xe4/0x110 [ 192.189163][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 192.189362][T13775] vfs_write+0x20c/0x580 [ 192.194226][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 192.199467][T13775] ksys_write+0xea/0x1f0 [ 192.199486][T13775] ? __ia32_sys_read+0xb0/0xb0 [ 192.199506][T13775] ? do_syscall_64+0x26/0x610 [ 192.229762][T13775] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 192.229778][T13775] ? do_syscall_64+0x26/0x610 [ 192.229800][T13775] __x64_sys_write+0x73/0xb0 [ 192.229820][T13775] do_syscall_64+0x103/0x610 [ 192.239766][T13775] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 192.239779][T13775] RIP: 0033:0x4582f9 [ 192.239794][T13775] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 192.239802][T13775] RSP: 002b:00007f6dcf2fbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 192.239816][T13775] RAX: ffffffffffffffda RBX: 00007f6dcf2fbc90 RCX: 00000000004582f9 [ 192.239824][T13775] RDX: 000000000000fdef RSI: 0000000020000280 RDI: 0000000000000005 [ 192.239833][T13775] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 192.239842][T13775] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6dcf2fc6d4 [ 192.239857][T13775] R13: 00000000004c7ad0 R14: 00000000004ddba8 R15: 0000000000000006 [ 192.367575][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 192.373833][ C0] protocol 88fb is buggy, dev hsr_slave_1 16:39:11 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) 16:39:11 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(0xffffffffffffffff, &(0x7f00000027c0)={0x0, 0xf6ac, &(0x7f0000002580)=[{&(0x7f0000000000), 0xfdde}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:11 executing program 3: recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000400)=@nfc_llcp, 0x80, &(0x7f0000000840)=[{&(0x7f0000000740)=""/246, 0xf6}], 0x1, &(0x7f0000000880)=""/121, 0x79}, 0x2040) r0 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x200000000000002, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x4000003fc) socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x200008c4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x1ff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)) r2 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r3 = socket$kcm(0x29, 0x1, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f00000004c0)='./file0\x00', r2}, 0x10) sendmsg$kcm(r3, &(0x7f0000000540)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0xffffffff, @hyper}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000040)="73f4df1e8164e35ef56a2f13b2c3", 0xe}, {&(0x7f0000000600)="50363fe6186f979c7208cbeb499c636c64d4d27a9ea3443b468d6a69b7098a35dfcec06832b5c304437260135d6bac3aa0ffb3c035a75c04ac33bd9aba7c29a3685bda2a4efdee0c5283dff0479fb18bf297fa0994aa7baf8da7b2347f91ef4bd95ca9928015d7179aeab2f16678a41e65fa38b3a629ce4828c2877adb683123bbf94cc203a92d2fb0a30d186c77dbd036ebdf56d26b", 0x96}], 0x2}, 0x4000000) close(r2) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) r4 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7ff, 0x10000, 0x5, 0x2, 0x0, 0x6, 0x0, 0x8, 0x1, 0x9, 0x410, 0x143a, 0x0, 0xcdd, 0xfffffffffffffffe, 0x7, 0x101, 0x3, 0xdf, 0x2, 0x7ff, 0x2a, 0x20, 0x10000, 0xf5, 0x0, 0x8, 0x7, 0x101, 0x0, 0x9, 0x101, 0x2ebe6daa, 0x55, 0x800, 0x3, 0x0, 0xffff, 0x4, @perf_bp={&(0x7f0000000000), 0x2}, 0x8, 0x7, 0xfffffffffffffffb, 0x5, 0x6, 0xfffffffffffffff7, 0xff}, r4, 0x7, r0, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r5 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000700)) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) recvmsg(r3, &(0x7f0000004fc0)={0x0, 0x0, &(0x7f0000004ec0)=[{&(0x7f0000003c80)=""/14, 0xe}, {&(0x7f0000003cc0)=""/236, 0xec}, {0x0}, {&(0x7f0000003ec0)=""/4096, 0x1000}], 0x4}, 0x10040) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000006c0)={&(0x7f0000000580)='./file0\x00', 0x0, 0x8}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='cpu.stat\x00', 0x0, 0x0) 16:39:11 executing program 2: r0 = socket$kcm(0x11, 0x5, 0x300) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000f40)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000f80)='syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x8}, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) sendmsg$kcm(r3, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) recvmsg(r0, &(0x7f0000000340)={&(0x7f0000000080)=@tipc, 0x80, &(0x7f0000000e40), 0x6, &(0x7f0000000ec0)=""/73, 0x49}, 0x100) sendmsg$tipc(r2, &(0x7f00000010c0)={&(0x7f0000000140)=@id={0x1e, 0x3, 0x0, {0x4e20, 0x2}}, 0x10, &(0x7f0000000300)=[{&(0x7f0000000240)="3078de4d1e8cb57aba11cc80cf39fbd83c2b2e82", 0x14}, {&(0x7f0000000c80)="d488593e5b120664170a061814cb7058d4521e0fb1147ef65b44c043fa0abe01efe62511f5cf0b16bb5d2fda046a71685636b48d86d2ad447e0c270791f933f3bfb90d607fc5a9c4e579230515fbc3c8c3992e9e1e706182307c2f458d0d3cc7093d22d1c5694130a4d34dafdb8b3d3104d3152800ff7366278f200b31c0600a5370bf657818b04a749deaf76753787acd4f1042f051b9b6b9b3bee445b9db29b5e3ee3fefe5dc2e8cdd75f67848842fe07beb71635ec297922cd8d21828038efd929f9607e78cdf38c0dfa59fd4509e145f555d83da9593602a580ba9356875983727187ce13441bdc4c071eb10885b9720fd28ad", 0xf5}, {&(0x7f0000000d80)="cee2b82f45a4a396dfe52010f1280daeb9d906fcd192b943a018cf6dc374588da0c4b0371247296fd5ffb4abf454ce856398a49ec2f7e90628922d262191b0a67aef5d691e8ac1bd74efd6f4a6ae4562cfa5a6b408ba53b6e35390e686a4320820becf7cf2ea53f40fb049354c1dde24f10981dca8ec617de89975937d9c8d0259615e2e64f25da7fe50f62bad296a948da80459dacefaed89714be11e8951135499a00f37", 0xa5}, {&(0x7f0000000e40)="7ee1d8411513a8b61c6425e1b1c87b156b347efbadd3813ca083889af6132d32b3c391df71abba55fba45cb4914792122479402942c831a166bf04e4917c9eef7f7671bef57797fe8ee2", 0x4a}], 0x4, &(0x7f0000000fc0)="b0e6110a705aaf891bc11c2f1146be815724998ef161f891618819259b395b03d521a1b032ff5a0c2ea44777a2a7a92d095c31b80f915977e10d0469e7fa77172e7b31d6658b495856bc008b2d4a506f1ab33a1a3858b5d12ec4d6f2ceab87ab403c7885bb56c4dfaa1d9efad3299974b0273f3d91ebf88d084a1326d7e348624328472ebffa4acb133a68b14c7be767ee51640eab6b6389b2485f883b6399d65ab4deb2dd7dfd5a6de8a0b5af96530ec1baa797d1caa7c84d368d789fb50bfa77a2e3ad7ff7b27696d9324ba9b2eeed9085538e064464ee04250fee33642633453105c8ec91dfe412e1", 0xea, 0xf4925a8e8ec3d39a}, 0x4000800) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000001140)=r3, 0x4) write$cgroup_subtree(r3, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg(r3, 0x0, 0x4003ffd) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000012c0)={&(0x7f0000000000)=@x25={0x9, @null=' \x00'}, 0x80, &(0x7f0000001100)=[{0x0}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x871}, 0x0) 16:39:11 executing program 1: r0 = socket$kcm(0xa, 0x5, 0x0) recvmsg$kcm(r0, &(0x7f000001b300)={&(0x7f0000019ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f000001b180)=[{&(0x7f0000019f40)=""/147, 0x93}, {&(0x7f000001a000)=""/60, 0x3c}, {&(0x7f000001a040)=""/101, 0x65}, {&(0x7f000001a0c0)=""/4096, 0x1000}, {&(0x7f000001b0c0)=""/168, 0xa8}], 0x5, &(0x7f000001b200)=""/231, 0xe7}, 0x10000) sendmsg$kcm(r0, &(0x7f000001b9c0)={&(0x7f000001b340)=@hci={0x1f, r1, 0x2}, 0x80, &(0x7f000001b900)=[{&(0x7f000001b3c0)="0404797ba730889ea37a0a7af6614d31c9f8a3fe83334c83193825858c957a3668b0c83d60b4ee284a0f897967f995102f38d9ff4a9dca87a80fbdcfc98c79b03b637280f4eb508891a245af4d969840fe7b21df291d61c16782188b33ea7776d44e1641e9ddd3388cde33b01947c04b98bd8ae439f710e06a09141acbc87f1cbea88cca572e5191f04c7826", 0x8c}, {&(0x7f000001b480)="fd6f9e10824a404e14c696c1f1e1788478dc22f9c02fcd454fbf6362542bba5518257c289188bc5d478eb9aab5a1b3f92c9aa975f64790fdf87e2508af4bed54c1bb1f00d31a4dabf1094db98b2f601e9173e651743fdae8f1f7f82752372789768cbead1db3291fb11c8028376a10e0c26d81a430f6d34c49e1a646a74f5b5204630e589bbf223081467464d54dc61a1816380b304810ea230e9b7ac4f55fdbbd427e0cb95316a9a6182f5626ed4ef9295c4244abacd087630f93b28bb3dcf680c44f2ff445b876d6cec8acde8f07b940c9582af2a36669ff37635454a1b8ae0a", 0xe1}, {&(0x7f000001b580)="1a18fd9beed4f9afd00c7e17a72da324802ea36be72b62bfb4eb12227dea43b82ebcba716123c7bdd67584d85b09e25449fbcc91478f99d0f42f11d44c4e7293a37d59895b5f5eb8cfa5d11556eabfb9b910c8d61eca1c3f1331a801823113131ddde01e2ae9f37d18562f948adac49724b1c89ad47e154a538362862eee7ccddc54840a7e0831f803b36f7f169ed9fa1a", 0x91}, {&(0x7f000001b640)="fb1b9fff076e8413beffb8ba638b791b4d0dd787b27ebc9b5fa40ed5c935e118decf8971cd003f64c58a162672a937c8601f46cb72e133d464c8f3127c3590765c0c2b4b0c5824f7c5cd2f2afbfa7338b822315710911468fa843ecbd625cd561a51d842a33fdc3982396d57ad25efea82385de9e1ea1cee16ba5662f1cf0726e6fe5d7217c9a28e46df06a36e1df82a13f6e931894065c25de15cc3ad190d42030368760a6c0ec5d6d62ac27e675c8df9c9a72403dfa688a99a64b37c8051911639920ed116661cae1374a3f3b020a84028df370bdcb0c4bf2bbede6a4b2e710e76", 0xe2}, {&(0x7f000001b740)="c5382d0429ea47e26500dc606a40062bcc07db6251e83dfda999d4cae16b8623be0887a493c76a83d76a4071b4c655a1ba67b0ad6774ae01f388729a731686d39fd27d567fa5e1ef17e1d3212b8815a12d1ed1d7abdb8a654d9228c0584799029a6aa961237611c5a5544192dc3463b61d38e66546715f20ce46bd1a5f68d9a76be419cc09ddd98af8554e9d8eb5ae906a5af54fbb449d9fbd0f13f91eb322df41c6d93195c60fb50878ad3e1554836066c2cbeb8923b24f3fa55b3aa6a974e46537", 0xc2}, {&(0x7f000001b840)="1051096690e310cbb0460612254e8e2f011c65e5d05cc55d1efcc5bb8db015ce2c7ecc7a1c40660fe9631b502e0d4a5137f4d2961c07d4a2e894221efe2eaf02e4ec9a25bd9095d634388e469d9436e67e3442aef7476cf93a35353da15329d5e58bbb5733f43328993b2bf5d35e72644c807a4bad880b8ef4da864abbe9e2c17a928ce111b25c8df02edd02345d571b16ca93b7b2b5523675dc9904b34dbf5378b8dfea571131f1514a4d7119", 0xad}], 0x6, &(0x7f000001b980)}, 0x20000011) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x3, 0x3, &(0x7f0000000080)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x4c}}, &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) setsockopt$sock_attach_bpf(r0, 0x84, 0x4, &(0x7f0000000240)=r2, 0x4) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.current\x00', 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f00000000c0)=0xaa4) 16:39:11 executing program 4 (fault-call:5 fault-nth:38): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) [ 192.579046][T13804] FAULT_INJECTION: forcing a failure. [ 192.579046][T13804] name failslab, interval 1, probability 0, space 0, times 0 [ 192.664600][T13804] CPU: 0 PID: 13804 Comm: syz-executor.4 Not tainted 5.1.0-rc2+ #82 [ 192.672597][T13804] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 192.682654][T13804] Call Trace: [ 192.685956][T13804] dump_stack+0x172/0x1f0 [ 192.690302][T13804] should_fail.cold+0xa/0x15 [ 192.694920][T13804] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 192.700750][T13804] ? ___might_sleep+0x163/0x280 [ 192.705610][T13804] __should_failslab+0x121/0x190 [ 192.710558][T13804] should_failslab+0x9/0x14 [ 192.715070][T13804] kmem_cache_alloc_node_trace+0x270/0x720 [ 192.720891][T13804] __kmalloc_node_track_caller+0x3d/0x70 [ 192.726542][T13804] __kmalloc_reserve.isra.0+0x40/0xf0 [ 192.732013][T13804] __alloc_skb+0x10b/0x5e0 [ 192.736449][T13804] ? skb_trim+0x190/0x190 [ 192.740794][T13804] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 192.746518][T13804] ? skb_put+0x177/0x1d0 [ 192.750777][T13804] __ip_append_data.isra.0+0x24d6/0x2dd0 [ 192.756435][T13804] ? ip_reply_glue_bits+0xc0/0xc0 [ 192.761487][T13804] ? __ip_flush_pending_frames.isra.0+0x2d0/0x2d0 [ 192.767919][T13804] ? mark_held_locks+0xf0/0xf0 [ 192.772685][T13804] ? retint_kernel+0x2d/0x2d [ 192.777279][T13804] ? ip_reply_glue_bits+0xc0/0xc0 [ 192.782308][T13804] ip_append_data.part.0+0xf2/0x170 [ 192.787514][T13804] ? ip_reply_glue_bits+0xc0/0xc0 [ 192.792552][T13804] ip_append_data+0x6e/0x90 [ 192.797063][T13804] udp_sendmsg+0x8e7/0x2820 [ 192.801571][T13804] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 192.801586][T13804] ? __lock_acquire+0x548/0x3fb0 [ 192.801600][T13804] ? ip_reply_glue_bits+0xc0/0xc0 [ 192.801620][T13804] ? udp4_lib_lookup_skb+0x440/0x440 [ 192.801640][T13804] ? is_bpf_text_address+0xac/0x170 [ 192.801655][T13804] ? find_held_lock+0x35/0x130 [ 192.801672][T13804] ? is_bpf_text_address+0xac/0x170 [ 192.801694][T13804] ? ___might_sleep+0x163/0x280 [ 192.828334][T13804] ? __might_sleep+0x95/0x190 [ 192.828353][T13804] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 192.828366][T13804] ? aa_sk_perm+0x288/0x880 [ 192.828390][T13804] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 192.828408][T13804] inet_sendmsg+0x147/0x5e0 [ 192.828438][T13804] ? udp4_lib_lookup_skb+0x440/0x440 [ 192.828448][T13804] ? inet_sendmsg+0x147/0x5e0 [ 192.828459][T13804] ? ipip_gro_receive+0x100/0x100 [ 192.828474][T13804] sock_sendmsg+0xdd/0x130 [ 192.828488][T13804] sock_write_iter+0x27c/0x3e0 [ 192.828504][T13804] ? sock_sendmsg+0x130/0x130 [ 192.843397][T13804] ? aa_path_link+0x460/0x460 [ 192.853670][T13804] ? find_held_lock+0x35/0x130 [ 192.853686][T13804] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 16:39:11 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x2, 0xf, 0x449b, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000580)={r1}) recvmsg$kcm(r3, &(0x7f00000002c0)={&(0x7f0000000180)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast1}}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000380)=""/224, 0xe0}, {&(0x7f0000000480)=""/178, 0xb2}], 0x2, &(0x7f0000000200)=""/109, 0x6d}, 0x40) r4 = socket$kcm(0x2, 0x200000001, 0x84) sendmsg$kcm(r4, &(0x7f0000000340)={&(0x7f0000000100)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000080)='\'', 0x1}], 0x1}, 0x0) recvmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) 16:39:11 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x400c80, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'ifb0\x00', 0x2}) ioctl$TUNATTACHFILTER(r0, 0x401054d6, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x20000, 0x0) ioctl$TUNSETLINK(r1, 0x400454cd, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000100)=r2) 16:39:11 executing program 0: r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0xf6ac, &(0x7f0000002580)=[{&(0x7f0000000000), 0xfdde}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:11 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) [ 192.853700][T13804] ? iov_iter_init+0xee/0x220 [ 192.853719][T13804] new_sync_write+0x4c7/0x760 [ 192.853738][T13804] ? default_llseek+0x2e0/0x2e0 [ 192.853755][T13804] ? __fget+0x47c/0x550 [ 192.853774][T13804] ? common_file_perm+0x238/0x720 [ 192.873545][T13804] ? __fget+0x381/0x550 [ 192.873572][T13804] ? apparmor_file_permission+0x25/0x30 [ 192.897044][T13804] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 192.897062][T13804] ? security_file_permission+0x94/0x380 [ 192.897082][T13804] __vfs_write+0xe4/0x110 [ 192.897102][T13804] vfs_write+0x20c/0x580 [ 192.897123][T13804] ksys_write+0xea/0x1f0 [ 192.897145][T13804] ? __ia32_sys_read+0xb0/0xb0 [ 192.897162][T13804] ? do_syscall_64+0x26/0x610 [ 192.897178][T13804] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 192.912908][T13804] ? do_syscall_64+0x26/0x610 [ 192.912930][T13804] __x64_sys_write+0x73/0xb0 [ 192.912947][T13804] do_syscall_64+0x103/0x610 [ 192.912965][T13804] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 192.912977][T13804] RIP: 0033:0x4582f9 [ 192.912992][T13804] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 192.913000][T13804] RSP: 002b:00007f6dcf2fbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 192.913014][T13804] RAX: ffffffffffffffda RBX: 00007f6dcf2fbc90 RCX: 00000000004582f9 [ 192.913022][T13804] RDX: 000000000000fdef RSI: 0000000020000280 RDI: 0000000000000005 [ 192.913030][T13804] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 16:39:11 executing program 4 (fault-call:5 fault-nth:39): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) 16:39:11 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) 16:39:11 executing program 0: r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0xf6ac, &(0x7f0000002580)=[{&(0x7f0000000000), 0xfdde}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) [ 192.913039][T13804] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6dcf2fc6d4 [ 192.913046][T13804] R13: 00000000004c7ad0 R14: 00000000004ddba8 R15: 0000000000000006 [ 193.089039][T13833] FAULT_INJECTION: forcing a failure. [ 193.089039][T13833] name failslab, interval 1, probability 0, space 0, times 0 [ 193.110463][T13833] CPU: 0 PID: 13833 Comm: syz-executor.4 Not tainted 5.1.0-rc2+ #82 [ 193.119059][T13833] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 193.129126][T13833] Call Trace: [ 193.132442][T13833] dump_stack+0x172/0x1f0 [ 193.136792][T13833] should_fail.cold+0xa/0x15 [ 193.141403][T13833] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 193.147245][T13833] ? ___might_sleep+0x163/0x280 [ 193.152107][T13833] __should_failslab+0x121/0x190 [ 193.157053][T13833] should_failslab+0x9/0x14 [ 193.161567][T13833] kmem_cache_alloc_node+0x264/0x710 16:39:11 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) [ 193.166860][T13833] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 193.173117][T13833] __alloc_skb+0xd5/0x5e0 [ 193.177468][T13833] ? skb_trim+0x190/0x190 [ 193.181812][T13833] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 193.187546][T13833] ? skb_put+0x177/0x1d0 [ 193.191800][T13833] __ip_append_data.isra.0+0x24d6/0x2dd0 [ 193.197452][T13833] ? ip_reply_glue_bits+0xc0/0xc0 [ 193.202498][T13833] ? __ip_flush_pending_frames.isra.0+0x2d0/0x2d0 [ 193.208923][T13833] ? mark_held_locks+0xf0/0xf0 [ 193.208941][T13833] ? lock_sock_nested+0xac/0x120 [ 193.208957][T13833] ? ip_reply_glue_bits+0xc0/0xc0 [ 193.208972][T13833] ip_append_data.part.0+0xf2/0x170 [ 193.208993][T13833] ? ip_reply_glue_bits+0xc0/0xc0 [ 193.209009][T13833] ip_append_data+0x6e/0x90 [ 193.209032][T13833] udp_sendmsg+0x8e7/0x2820 [ 193.209053][T13833] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 193.209066][T13833] ? __lock_acquire+0x548/0x3fb0 [ 193.209078][T13833] ? ip_reply_glue_bits+0xc0/0xc0 [ 193.209098][T13833] ? udp4_lib_lookup_skb+0x440/0x440 [ 193.209114][T13833] ? trace_hardirqs_on_caller+0x6a/0x220 [ 193.209136][T13833] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 193.209163][T13833] ? retint_kernel+0x2d/0x2d [ 193.209188][T13833] ? aa_sk_perm+0x17b/0x880 [ 193.209209][T13833] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 193.209222][T13833] ? aa_sk_perm+0x288/0x880 [ 193.209234][T13833] ? lockdep_hardirqs_on+0x418/0x5d0 [ 193.209248][T13833] ? retint_kernel+0x2d/0x2d [ 193.209275][T13833] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 193.229157][T13833] inet_sendmsg+0x147/0x5e0 [ 193.229174][T13833] ? udp4_lib_lookup_skb+0x440/0x440 [ 193.229185][T13833] ? inet_sendmsg+0x147/0x5e0 [ 193.229199][T13833] ? ipip_gro_receive+0x100/0x100 [ 193.229215][T13833] sock_sendmsg+0xdd/0x130 [ 193.229232][T13833] sock_write_iter+0x27c/0x3e0 [ 193.229249][T13833] ? sock_sendmsg+0x130/0x130 [ 193.229275][T13833] ? aa_path_link+0x460/0x460 [ 193.229289][T13833] ? find_held_lock+0x35/0x130 [ 193.229303][T13833] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 193.229318][T13833] ? iov_iter_init+0xee/0x220 [ 193.229338][T13833] new_sync_write+0x4c7/0x760 [ 193.229356][T13833] ? default_llseek+0x2e0/0x2e0 [ 193.229377][T13833] ? common_file_perm+0x238/0x720 [ 193.229392][T13833] ? __fget+0x381/0x550 [ 193.229419][T13833] ? apparmor_file_permission+0x25/0x30 [ 193.254585][T13833] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 193.254605][T13833] ? security_file_permission+0x94/0x380 [ 193.254626][T13833] __vfs_write+0xe4/0x110 [ 193.254646][T13833] vfs_write+0x20c/0x580 [ 193.254668][T13833] ksys_write+0xea/0x1f0 [ 193.254687][T13833] ? __ia32_sys_read+0xb0/0xb0 [ 193.254705][T13833] ? do_syscall_64+0x26/0x610 [ 193.254727][T13833] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 193.265020][T13833] ? do_syscall_64+0x26/0x610 [ 193.265044][T13833] __x64_sys_write+0x73/0xb0 [ 193.265064][T13833] do_syscall_64+0x103/0x610 [ 193.276151][T13833] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 193.276164][T13833] RIP: 0033:0x4582f9 [ 193.276180][T13833] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 193.276188][T13833] RSP: 002b:00007f6dcf2fbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 193.276203][T13833] RAX: ffffffffffffffda RBX: 00007f6dcf2fbc90 RCX: 00000000004582f9 [ 193.276212][T13833] RDX: 000000000000fdef RSI: 0000000020000280 RDI: 0000000000000005 [ 193.276221][T13833] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 193.276230][T13833] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6dcf2fc6d4 [ 193.276245][T13833] R13: 00000000004c7ad0 R14: 00000000004ddba8 R15: 0000000000000006 [ 193.592134][T13818] __nla_parse: 3 callbacks suppressed [ 193.592164][T13818] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 16:39:12 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x200000, 0x0) recvmsg(r0, &(0x7f0000001980)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000003180)={0x0, 0x0, &(0x7f0000002ec0)=[{&(0x7f0000001a40)="e0", 0x1}], 0x1}, 0x0) 16:39:12 executing program 4 (fault-call:5 fault-nth:40): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) 16:39:12 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) 16:39:12 executing program 0: r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0xf6ac, &(0x7f0000002580)=[{&(0x7f0000000000), 0xfdde}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) [ 193.710977][T13855] FAULT_INJECTION: forcing a failure. [ 193.710977][T13855] name failslab, interval 1, probability 0, space 0, times 0 [ 193.757073][T13855] CPU: 1 PID: 13855 Comm: syz-executor.4 Not tainted 5.1.0-rc2+ #82 [ 193.765110][T13855] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 193.775176][T13855] Call Trace: [ 193.778487][T13855] dump_stack+0x172/0x1f0 [ 193.782838][T13855] should_fail.cold+0xa/0x15 [ 193.787472][T13855] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 193.793307][T13855] ? ___might_sleep+0x163/0x280 [ 193.798169][T13855] __should_failslab+0x121/0x190 [ 193.803115][T13855] should_failslab+0x9/0x14 [ 193.807631][T13855] kmem_cache_alloc_node+0x264/0x710 [ 193.812937][T13855] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 193.819196][T13855] __alloc_skb+0xd5/0x5e0 [ 193.819215][T13855] ? skb_trim+0x190/0x190 [ 193.819235][T13855] ? skb_page_frag_refill+0x127/0x460 [ 193.827895][T13855] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 193.838960][T13855] ? skb_put+0x177/0x1d0 [ 193.843221][T13855] __ip_append_data.isra.0+0x24d6/0x2dd0 [ 193.848871][T13855] ? ip_reply_glue_bits+0xc0/0xc0 [ 193.853923][T13855] ? __ip_flush_pending_frames.isra.0+0x2d0/0x2d0 [ 193.860355][T13855] ? mark_held_locks+0xf0/0xf0 [ 193.865139][T13855] ? lock_sock_nested+0xac/0x120 [ 193.870090][T13855] ? ip_reply_glue_bits+0xc0/0xc0 [ 193.875127][T13855] ip_append_data.part.0+0xf2/0x170 [ 193.880332][T13855] ? ip_reply_glue_bits+0xc0/0xc0 [ 193.885344][T13855] ip_append_data+0x6e/0x90 [ 193.889836][T13855] udp_sendmsg+0x8e7/0x2820 [ 193.894324][T13855] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 193.900554][T13855] ? __lock_acquire+0x548/0x3fb0 [ 193.905476][T13855] ? ip_reply_glue_bits+0xc0/0xc0 [ 193.910490][T13855] ? udp4_lib_lookup_skb+0x440/0x440 [ 193.915766][T13855] ? is_bpf_text_address+0xac/0x170 [ 193.920947][T13855] ? find_held_lock+0x35/0x130 [ 193.925698][T13855] ? is_bpf_text_address+0xac/0x170 [ 193.930885][T13855] ? ___might_sleep+0x163/0x280 [ 193.935727][T13855] ? __might_sleep+0x95/0x190 [ 193.940393][T13855] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 193.946035][T13855] ? aa_sk_perm+0x288/0x880 [ 193.950532][T13855] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 193.956066][T13855] inet_sendmsg+0x147/0x5e0 [ 193.960556][T13855] ? udp4_lib_lookup_skb+0x440/0x440 [ 193.965819][T13855] ? inet_sendmsg+0x147/0x5e0 [ 193.970488][T13855] ? ipip_gro_receive+0x100/0x100 [ 193.975514][T13855] sock_sendmsg+0xdd/0x130 [ 193.979921][T13855] sock_write_iter+0x27c/0x3e0 [ 193.984671][T13855] ? sock_sendmsg+0x130/0x130 [ 193.989340][T13855] ? aa_path_link+0x460/0x460 [ 193.994007][T13855] ? find_held_lock+0x35/0x130 [ 193.998771][T13855] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 194.005006][T13855] ? iov_iter_init+0xee/0x220 [ 194.009688][T13855] new_sync_write+0x4c7/0x760 [ 194.014380][T13855] ? default_llseek+0x2e0/0x2e0 [ 194.019216][T13855] ? common_file_perm+0x238/0x720 [ 194.024274][T13855] ? __fget+0x381/0x550 [ 194.028435][T13855] ? apparmor_file_permission+0x25/0x30 [ 194.033959][T13855] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 194.040178][T13855] ? security_file_permission+0x94/0x380 [ 194.045790][T13855] __vfs_write+0xe4/0x110 [ 194.050118][T13855] vfs_write+0x20c/0x580 [ 194.054355][T13855] ksys_write+0xea/0x1f0 [ 194.058577][T13855] ? __ia32_sys_read+0xb0/0xb0 [ 194.063321][T13855] ? do_syscall_64+0x26/0x610 [ 194.067978][T13855] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 194.074030][T13855] ? do_syscall_64+0x26/0x610 [ 194.078693][T13855] __x64_sys_write+0x73/0xb0 [ 194.083262][T13855] do_syscall_64+0x103/0x610 [ 194.087936][T13855] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 194.093814][T13855] RIP: 0033:0x4582f9 [ 194.097725][T13855] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 194.117308][T13855] RSP: 002b:00007f6dcf2fbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 194.125713][T13855] RAX: ffffffffffffffda RBX: 00007f6dcf2fbc90 RCX: 00000000004582f9 [ 194.133665][T13855] RDX: 000000000000fdef RSI: 0000000020000280 RDI: 0000000000000005 [ 194.141620][T13855] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 194.149591][T13855] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6dcf2fc6d4 16:39:12 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x12, 0x3, &(0x7f0000000040)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0xf, 0x54, 0x6c000000}}, &(0x7f0000000240)='GPL\x00', 0x1, 0x438, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x8}, 0x23e) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r0, 0xffffffffffffff55) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000300)=r0, 0x4) r3 = perf_event_open$cgroup(&(0x7f0000000280)={0x5, 0x70, 0x9a0b, 0x35, 0x6, 0x1, 0x0, 0x1, 0x800, 0x0, 0x3, 0x5, 0x200, 0x2add, 0x8, 0x7, 0x10000, 0x6, 0x8, 0x71a, 0x2, 0x5, 0x4, 0x7, 0x10001, 0x8, 0x3ff, 0x4, 0x0, 0x96, 0x8001, 0x40, 0x3, 0x51, 0xee, 0x81, 0x100, 0x1, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000100), 0x8}, 0x1000, 0x40, 0x7ff, 0x6, 0x0, 0x8000, 0x8}, r0, 0x8, 0xffffffffffffff9c, 0xa) ioctl$PERF_EVENT_IOC_ID(r3, 0x80082407, &(0x7f0000000140)) 16:39:12 executing program 1: socketpair$unix(0x1, 0x400000000008, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x2) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup(r2, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) r3 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r0, &(0x7f00000004c0)='cgroup.events\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40086602, 0x400007) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r6, &(0x7f0000000380)=ANY=[@ANYPTR64=&(0x7f0000000240)=ANY=[@ANYRES32=r3, @ANYPTR64=&(0x7f0000000080)=ANY=[@ANYPTR, @ANYRESDEC=r0, @ANYPTR, @ANYRES64=r3, @ANYPTR64, @ANYPTR], @ANYRES64=r3, @ANYRES32, @ANYRES32=r1, @ANYBLOB="5c0f0cc69106a767c094fd4d3fa59d0c746a61a9fc9b9f3cf011131e3e14dcc54aee8e89620b0ce9492ec6376b5191118272e6083f319bf3edb1eac500b6370e7b15a09fe5ddbb532029bea6b3f4162f3800a3efa12f94941220923da1a9a0e0169fa790756278be21f29d78750955f9be140fa5a16787fff80424877df638ebde5d5bcc02c8730c85958278b9ba2ae15dc263bccdbeef3f325fa73ca2b0cda1a5ca5bf14704d90046c87ad9ebc06ebc774e18366de9998611b1eecd177e146bc3ce0a7ad4eef38092bde646a625ea129b3b479e03dfcc255a39eb979fbee0d89b", @ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES16=r4, @ANYRES64=r5, @ANYRESHEX=r6], @ANYRES16=r4, @ANYRES64=r5], @ANYRESOCT=r1, @ANYRES16=r1, @ANYRESDEC=r4, @ANYRESHEX=r1], 0x47) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(r5, &(0x7f0000000500)='cpu\xe4\xa21\xaf\t\x00\x15acc', 0x0, 0x0) write$cgroup_subtree(r6, &(0x7f0000000400)=ANY=[@ANYBLOB="1f5dcff7968b788c45445352caeb9ba36c7d0ee16bfb014e300fe4faa28ddb191a0c55dc274c4f59182952bb80ff5bd3a9dbdad54ea2c790997ee81eb565be7ef98d390a9a4be9f75df735fa92aa661f0476a4a627db000c5bc773de4af40aeb84334bcd956df24a8cd8a46addb46b22618f20ed14100a86f9fe0dc7b222cd9fd8"], 0xda00) write$cgroup_int(r7, &(0x7f0000000200), 0x42400) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000115c0), 0x4) close(r4) 16:39:12 executing program 0: perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0xf6ac, &(0x7f0000002580)=[{&(0x7f0000000000), 0xfdde}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:12 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) 16:39:12 executing program 3: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x10) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000006e40)={&(0x7f0000005b40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000006d80)=[{&(0x7f0000005bc0)=""/133, 0x85}, {&(0x7f0000005c80)=""/241, 0xf1}, {&(0x7f0000005d80)=""/4096, 0x1000}], 0x3, &(0x7f0000006dc0)=""/72, 0x48}, 0x2) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000007100)={&(0x7f0000006e80)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x64, 0x7c, 0x7dc5, {"34530c3b71325fb4db75dad6478f84131e713c3fa8195665a9fa89b5364659bd1f8cba30c41f698d54edfe1ba51e7b39ac246c376e9546db7a943a4b1f9abb8a48a0ca26ec5e886443e4d11a5af6e8be296fa75c6d97b8e7c2df0d17bbe9c3cff3"}}, {0x0, "16f700ee97b83d16b270e46eb00fb2482d769a2178dfca9842c2048d0dc3e5bcb6502731de5d456e4d433e3d09c0b9d0d9196ed88deb02279e0835745a5213b735cc617f7b646dd0b841ad80e9b33a8e0fb60210003faaabf5b0ad7aa4adaf502d789e15d32d0f2267c84da1e0e127c5e706ecc144e0c116c15575795bae3db96cd1410af29f75ddff1090417ceb43ef425657e5e425e489f46e5f52f676d0e8660f2ccde2012c318451626412132a4f16245fecc2608ffdaad7e2600ae0ca65fb33c741c000"}}, &(0x7f0000007000)=""/225, 0x144, 0xe1, 0x1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000071c0)={0xf, 0x9, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x8}, [@jmp={0x5, 0x3, 0xf, 0x0, 0x0, 0x56}, @generic={0x80, 0x952, 0xe80, 0x2, 0x10000}, @map={0x18, 0x2, 0x1, 0x0, r0}, @jmp={0x5, 0x7fffffff, 0x5, 0xb, 0x9, 0xc, 0xffffffffffffffff}, @jmp={0x5, 0x1, 0xa, 0x0, 0x8, 0x80, 0x10}]}, &(0x7f0000000180)='syzkaller\x00', 0x61, 0xb5, &(0x7f00000001c0)=""/181, 0x40f00, 0x1, [], r1, 0xe, r2, 0x8, &(0x7f0000007140)={0x9, 0xdc}, 0x8, 0x10, &(0x7f0000007180)={0x10001, 0x6, 0x3, 0x7fff}, 0x10}, 0x70) r3 = socket$kcm(0x10, 0x2, 0x4) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000280)={r3}) r4 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r4, &(0x7f0000000700)={&(0x7f0000000dc0)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80, 0x0}, 0x20004040) sendmsg$kcm(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000600)="4c000000120081ae08060c0f006b10007f03e3f702000000000000ca1b4e0906a6bd7c493872f750375ed08a56331dbf64700169381ad6e74703c48f93b8446b9bbc7a461eb886a5e54e8ff5", 0x4c}], 0x1}, 0x0) [ 194.157546][T13855] R13: 00000000004c7ad0 R14: 00000000004ddba8 R15: 0000000000000006 16:39:12 executing program 0: perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0xf6ac, &(0x7f0000002580)=[{&(0x7f0000000000), 0xfdde}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:12 executing program 4 (fault-call:5 fault-nth:41): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) 16:39:12 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) 16:39:12 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.swap.current\x00', 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, r1, 0xa, 0x3}, 0x14) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x7, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000000240)='GPL\x00', 0x2, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) 16:39:13 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffff9c, &(0x7f00000000c0)='notify_on_release\x00', 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000640)={0xffffffffffffff9c}) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0xf, 0x2, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x2f, 0xe, 0x6, 0xf, 0x70, 0xfffffffffffffffc}, @ldst={0x2, 0x0, 0x2, 0x5, 0x6, 0x0, 0x8}], &(0x7f00000003c0)='syzkaller\x00', 0x8001, 0x84, &(0x7f0000000580)=""/132, 0x41f00, 0x1, [], 0x0, 0xf, r0, 0x8, &(0x7f0000000400)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000700)={0xffffffffffffffff, 0x6, 0x0, 0x8}, 0x10}, 0x70) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x1a, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000009a2b78d2fb3a24796715af10010000000093ef221abfa5f21d3331"], 0x0, 0x4, 0x3, &(0x7f0000000240)=""/3, 0x0, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x7}, 0x8, 0x10, &(0x7f00000002c0)={0x0, 0xfffffffffffff800, 0x4}, 0x10}, 0x70) r2 = openat$cgroup_ro(r0, &(0x7f0000002000)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r2, &(0x7f0000000080), 0x297ef) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000001fc0)='/dev/net/tun\x00', 0x10000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x84, 0x6, {"9472a28f09180777ab6e2c70bea976d2bb93bc3eb62d0672666221115bec7ecd10f3847acc9b6691562a1ed8eb74a5c2bfbc50e76f5eefbf1ed70a75ae2a850c2d8c53fe2008f4567d13a313f28e3b7fdfba131cb9c76f41060dfdf7ee804ddbcb9e9fc9e908d757771e1718"}}, {0x0, "922f1df3ed31631eed3836dd471b07ddc25eaf98b44353999fa189bbe565d9aeba304ad03141215b3e172ca1d2a43331c8a8f97dbecc645eda1ba9ebf3b04ef7ab9a19b2a5ab896ea836a02adf7ed828b374dab290e0d3ed45e3f9a3a705229db86968f058996f405940f5089c275e8a404684edcaa90580fce3931df5a60eff2b84131d48cb6e2ea76a3ffd5bf3027e9bbf747f207f157e55735baf2d8ef92a6b16a60cc9f768"}}, 0x0, 0x12d, 0x0, 0x1}, 0x20) recvmsg(r0, &(0x7f0000006f00)={&(0x7f0000005a80)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000006e00)=[{&(0x7f0000005b00)=""/4096, 0x1000}, {&(0x7f0000006b00)=""/237, 0xed}, {&(0x7f0000006c00)=""/251, 0xfb}, {&(0x7f0000006d00)=""/249, 0xf9}], 0x4, &(0x7f0000006e40)=""/130, 0x82}, 0x40000002) sendmsg(r2, &(0x7f0000001f80)={&(0x7f0000000680)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x1, 0x3, 0x1, 0x1, {0xa, 0x4e24, 0x7fffffff, @local, 0x7fffffff}}}, 0x80, &(0x7f0000000c40)=[{&(0x7f0000000c00)="1aae7c58bcddd7ef0c927eb87b51c74e551a", 0x12}], 0x1}, 0x880) bpf$MAP_CREATE(0x0, &(0x7f0000006f40)={0x16, 0x7fc0000, 0x80000001, 0xce, 0x15, r0, 0x6, [], r3, r0, 0x7, 0x2}, 0x3c) [ 194.388993][T13886] FAULT_INJECTION: forcing a failure. [ 194.388993][T13886] name failslab, interval 1, probability 0, space 0, times 0 [ 194.459550][T13886] CPU: 1 PID: 13886 Comm: syz-executor.4 Not tainted 5.1.0-rc2+ #82 [ 194.467569][T13886] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 194.477636][T13886] Call Trace: [ 194.480943][T13886] dump_stack+0x172/0x1f0 [ 194.485302][T13886] should_fail.cold+0xa/0x15 [ 194.489905][T13886] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 194.495728][T13886] ? ___might_sleep+0x163/0x280 [ 194.500765][T13886] __should_failslab+0x121/0x190 [ 194.505706][T13886] should_failslab+0x9/0x14 [ 194.510242][T13886] kmem_cache_alloc_node+0x264/0x710 [ 194.515524][T13886] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 194.521768][T13886] __alloc_skb+0xd5/0x5e0 [ 194.526096][T13886] ? skb_trim+0x190/0x190 [ 194.530446][T13886] ? skb_page_frag_refill+0x127/0x460 [ 194.535910][T13886] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 194.541626][T13886] ? skb_put+0x177/0x1d0 [ 194.545867][T13886] __ip_append_data.isra.0+0x24d6/0x2dd0 [ 194.551502][T13886] ? ip_reply_glue_bits+0xc0/0xc0 [ 194.556534][T13886] ? __ip_flush_pending_frames.isra.0+0x2d0/0x2d0 [ 194.562945][T13886] ? mark_held_locks+0xf0/0xf0 [ 194.567704][T13886] ? lock_sock_nested+0xac/0x120 [ 194.572642][T13886] ? ip_reply_glue_bits+0xc0/0xc0 [ 194.577665][T13886] ip_append_data.part.0+0xf2/0x170 [ 194.582861][T13886] ? ip_reply_glue_bits+0xc0/0xc0 [ 194.587881][T13886] ip_append_data+0x6e/0x90 [ 194.592386][T13886] udp_sendmsg+0x8e7/0x2820 [ 194.596891][T13886] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 194.603132][T13886] ? __lock_acquire+0x548/0x3fb0 [ 194.608066][T13886] ? ip_reply_glue_bits+0xc0/0xc0 [ 194.613089][T13886] ? udp4_lib_lookup_skb+0x440/0x440 [ 194.618371][T13886] ? is_bpf_text_address+0xac/0x170 [ 194.623565][T13886] ? find_held_lock+0x35/0x130 [ 194.628324][T13886] ? is_bpf_text_address+0xac/0x170 [ 194.633547][T13886] ? ___might_sleep+0x163/0x280 [ 194.638396][T13886] ? __might_sleep+0x95/0x190 [ 194.643078][T13886] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 194.648701][T13886] ? aa_sk_perm+0x288/0x880 [ 194.653209][T13886] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 194.658750][T13886] inet_sendmsg+0x147/0x5e0 [ 194.663250][T13886] ? udp4_lib_lookup_skb+0x440/0x440 [ 194.668527][T13886] ? inet_sendmsg+0x147/0x5e0 [ 194.673197][T13886] ? ipip_gro_receive+0x100/0x100 [ 194.678221][T13886] sock_sendmsg+0xdd/0x130 [ 194.682638][T13886] sock_write_iter+0x27c/0x3e0 [ 194.687402][T13886] ? sock_sendmsg+0x130/0x130 [ 194.692092][T13886] ? aa_path_link+0x460/0x460 [ 194.696775][T13886] ? find_held_lock+0x35/0x130 [ 194.701533][T13886] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 194.707766][T13886] ? iov_iter_init+0xee/0x220 [ 194.712451][T13886] new_sync_write+0x4c7/0x760 [ 194.717125][T13886] ? default_llseek+0x2e0/0x2e0 [ 194.721981][T13886] ? common_file_perm+0x238/0x720 [ 194.727001][T13886] ? __fget+0x381/0x550 [ 194.731162][T13886] ? apparmor_file_permission+0x25/0x30 [ 194.736705][T13886] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 194.742940][T13886] ? security_file_permission+0x94/0x380 [ 194.748572][T13886] __vfs_write+0xe4/0x110 [ 194.752900][T13886] vfs_write+0x20c/0x580 [ 194.757142][T13886] ksys_write+0xea/0x1f0 [ 194.761391][T13886] ? __ia32_sys_read+0xb0/0xb0 [ 194.766159][T13886] ? do_syscall_64+0x26/0x610 [ 194.770833][T13886] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 194.776891][T13886] ? do_syscall_64+0x26/0x610 [ 194.781571][T13886] __x64_sys_write+0x73/0xb0 [ 194.786159][T13886] do_syscall_64+0x103/0x610 [ 194.790746][T13886] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 194.796633][T13886] RIP: 0033:0x4582f9 [ 194.800539][T13886] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 194.820136][T13886] RSP: 002b:00007f6dcf2fbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 194.828556][T13886] RAX: ffffffffffffffda RBX: 00007f6dcf2fbc90 RCX: 00000000004582f9 [ 194.836535][T13886] RDX: 000000000000fdef RSI: 0000000020000280 RDI: 0000000000000005 [ 194.844514][T13886] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 194.852478][T13886] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6dcf2fc6d4 16:39:13 executing program 3: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x10, &(0x7f0000000140)={&(0x7f00000000c0)=""/4, 0x4, 0x0}}, 0x10) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r0, 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={r1, 0x10, &(0x7f0000000600)={&(0x7f0000000500)=""/226, 0xe2, r0}}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001800)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x600, 0x0) ioctl$TUNDETACHFILTER(r3, 0x401054d6, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={'ifb0\x00', 0x2}) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000000100)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff004}, {0x16}]}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0xb, &(0x7f0000000280)=@raw=[@alu={0x4, 0x2f, 0x4, 0x7, 0x1, 0xfffffffffffffffc, 0xfffffffffffffffc}, @map={0x18, 0x3, 0x1, 0x0, 0x1}, @generic={0x1, 0x9, 0x200, 0x3, 0x3}, @ldst={0x2, 0x1, 0x3, 0x3, 0x7, 0x18}, @alu={0x4, 0x8000000, 0x9, 0x5, 0xf, 0xfffffffffffffff6, 0x1}, @alu={0x7, 0x3, 0x7, 0x0, 0xf}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, @call={0x85, 0x0, 0x0, 0x39}, @generic={0xfffffffffffffffc, 0x8, 0xff, 0x2, 0x4}], &(0x7f0000000300)='GPL\x00', 0x8, 0x5d, &(0x7f0000000340)=""/93, 0x0, 0x1, [], 0x0, 0x4, r1, 0x8, &(0x7f00000003c0)={0x8, 0x40}, 0x8, 0x10, &(0x7f0000000400)={0x8001, 0x2, 0x8000, 0x7}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000004c0)=r5, 0x4) r6 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r6, &(0x7f0000000200)={&(0x7f0000000680)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="9e4301000080000000211fe4ac14140ceb", 0x11}], 0x1}, 0x4) 16:39:13 executing program 0: perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0xf6ac, &(0x7f0000002580)=[{&(0x7f0000000000), 0xfdde}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) [ 194.860448][T13886] R13: 00000000004c7ad0 R14: 00000000004ddba8 R15: 0000000000000006 16:39:13 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) 16:39:13 executing program 1: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000a80)={0xffffffffffffffff}) close(r0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="2e0000002c008151e00f80ecdb4cb904014865160b00010006000000000009000e0006001500cd5edc2976d153b4", 0x2e}], 0x1}, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000100)={r0}) 16:39:13 executing program 4 (fault-call:5 fault-nth:42): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) 16:39:13 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000012540), 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0xa0003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0xa0008000]}, 0x2c) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000040)) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000880)={r0}) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x9, 0x20d, 0x9, 0x452, 0x0, 0x35be3d95, 0x80, 0x2, 0x200, 0x7147, 0xfe00000000000000, 0x8000, 0x7fff, 0x2, 0x4, 0x80000001, 0x1000, 0x0, 0x6, 0x2, 0x7ff6, 0x3, 0x2, 0x2, 0x9, 0xfff, 0x6, 0x3ff, 0xfc, 0x6, 0x0, 0x1, 0xb1, 0x7, 0x3, 0x0, 0x0, 0x8db, 0x6, @perf_bp={&(0x7f0000000080), 0x2}, 0x10010, 0x8, 0x6, 0x7, 0xfffffffffffffffd, 0x100000001, 0xb0ed}, 0x0, 0x7, r1, 0x9) 16:39:13 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0xf6ac, &(0x7f0000002580)=[{&(0x7f0000000000), 0xfdde}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:13 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) 16:39:13 executing program 1: socket$kcm(0x11, 0x7, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'nr0\x01\x00', 0x1132}) close(r0) [ 195.108720][T13916] FAULT_INJECTION: forcing a failure. [ 195.108720][T13916] name failslab, interval 1, probability 0, space 0, times 0 16:39:13 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x11a34a2, 0xddc, 0xfffffffffffffff8, 0xc, 0xffffffffffffffff, 0x5, [], 0x0, 0xffffffffffffffff, 0x7f, 0x8}, 0x3c) recvmsg(0xffffffffffffff9c, &(0x7f0000007e80)={&(0x7f0000007c00)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000007e40)=[{&(0x7f0000007c80)=""/128, 0x80}, {&(0x7f0000007d00)=""/62, 0x3e}, {&(0x7f0000007d40)=""/247, 0xf7}], 0x3}, 0x40) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000007ec0)='cpuacct.usage_all\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000007f80)={0xcf603968c71c00db, 0xa, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x9}, [@exit, @map={0x18, 0xb, 0x1, 0x0, r0}, @exit, @exit, @ldst={0x1, 0x3, 0x7, 0x8, 0x9, 0x139, 0x9}, @generic={0x1, 0xffffffffffff0000, 0x7, 0x2, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0x100000001, 0xf1, &(0x7f0000000180)=""/241, 0x41f00, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000007f00)={0xfff, 0x9}, 0x8, 0x10, &(0x7f0000007f40)={0xffff, 0xe2, 0xfffffffffffffff9, 0x7fff}, 0x10}, 0x70) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x5, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x54}, [@ldst={0x3, 0x0, 0x3, 0x1c10a1, 0x0, 0x4c}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x18f}, 0x48) openat$cgroup_int(r2, &(0x7f0000000280)='cpuset.mems\x00', 0x2, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000003c0)={r0, &(0x7f00000002c0)="88a7c0b62b349128bb7d0efb9bb7c7f554fb344129803533b2b0a611c8a98ea1590d008d6acc0c6be0b64b15a4c39e6ed53054b79c650676d22ca3ea56fb73a62b48ba440b6a959b33a5110053b07a0f156d22a08a814a0e4b834c34308be9b48798c192a9b954bb39e2d57bef3e6c14b1b87f62df914c3883d8e56379903f5e95b2368e9d2d5cf3366aea8565d6", &(0x7f0000000380)=""/54}, 0x18) [ 195.212441][T13916] CPU: 0 PID: 13916 Comm: syz-executor.4 Not tainted 5.1.0-rc2+ #82 [ 195.220475][T13916] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 195.230547][T13916] Call Trace: [ 195.233858][T13916] dump_stack+0x172/0x1f0 [ 195.238211][T13916] should_fail.cold+0xa/0x15 [ 195.242822][T13916] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 195.248648][T13916] ? ___might_sleep+0x163/0x280 [ 195.253604][T13916] __should_failslab+0x121/0x190 [ 195.258561][T13916] should_failslab+0x9/0x14 [ 195.263085][T13916] kmem_cache_alloc_node_trace+0x270/0x720 [ 195.268915][T13916] __kmalloc_node_track_caller+0x3d/0x70 [ 195.268936][T13916] __kmalloc_reserve.isra.0+0x40/0xf0 [ 195.268957][T13916] __alloc_skb+0x10b/0x5e0 [ 195.279953][T13916] ? skb_trim+0x190/0x190 [ 195.279974][T13916] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 195.279987][T13916] ? skb_put+0x177/0x1d0 [ 195.280006][T13916] __ip_append_data.isra.0+0x24d6/0x2dd0 [ 195.280026][T13916] ? ip_reply_glue_bits+0xc0/0xc0 [ 195.280051][T13916] ? __ip_flush_pending_frames.isra.0+0x2d0/0x2d0 [ 195.280067][T13916] ? mark_held_locks+0xf0/0xf0 [ 195.280087][T13916] ? lock_sock_nested+0xac/0x120 [ 195.325464][T13916] ? ip_reply_glue_bits+0xc0/0xc0 [ 195.330497][T13916] ip_append_data.part.0+0xf2/0x170 [ 195.335713][T13916] ? ip_reply_glue_bits+0xc0/0xc0 [ 195.340743][T13916] ip_append_data+0x6e/0x90 [ 195.345258][T13916] udp_sendmsg+0x8e7/0x2820 [ 195.349798][T13916] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 195.356042][T13916] ? __lock_acquire+0x548/0x3fb0 [ 195.360986][T13916] ? ip_reply_glue_bits+0xc0/0xc0 [ 195.366018][T13916] ? udp4_lib_lookup_skb+0x440/0x440 [ 195.371302][T13916] ? retint_kernel+0x2d/0x2d [ 195.375900][T13916] ? trace_hardirqs_on_caller+0x6a/0x220 [ 195.381551][T13916] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 195.387029][T13916] ? ___might_sleep+0x163/0x280 [ 195.391892][T13916] ? __might_sleep+0x95/0x190 [ 195.396579][T13916] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 195.402219][T13916] ? aa_sk_perm+0x288/0x880 [ 195.406736][T13916] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 195.412293][T13916] inet_sendmsg+0x147/0x5e0 [ 195.416804][T13916] ? udp4_lib_lookup_skb+0x440/0x440 [ 195.422093][T13916] ? inet_sendmsg+0x147/0x5e0 [ 195.426901][T13916] ? ipip_gro_receive+0x100/0x100 [ 195.431937][T13916] sock_sendmsg+0xdd/0x130 [ 195.436372][T13916] sock_write_iter+0x27c/0x3e0 [ 195.441148][T13916] ? sock_sendmsg+0x130/0x130 [ 195.445844][T13916] ? lockdep_hardirqs_on+0x418/0x5d0 [ 195.451138][T13916] ? retint_kernel+0x2d/0x2d [ 195.455736][T13916] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 195.461985][T13916] ? iov_iter_init+0xee/0x220 [ 195.466673][T13916] new_sync_write+0x4c7/0x760 [ 195.471358][T13916] ? default_llseek+0x2e0/0x2e0 [ 195.476227][T13916] ? security_file_permission+0x10c/0x380 [ 195.481957][T13916] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 195.488203][T13916] ? security_file_permission+0x94/0x380 [ 195.493849][T13916] __vfs_write+0xe4/0x110 [ 195.498191][T13916] vfs_write+0x20c/0x580 [ 195.502452][T13916] ksys_write+0xea/0x1f0 [ 195.506706][T13916] ? __ia32_sys_read+0xb0/0xb0 [ 195.511474][T13916] ? do_syscall_64+0x26/0x610 [ 195.516217][T13916] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 195.522292][T13916] ? do_syscall_64+0x26/0x610 [ 195.526978][T13916] __x64_sys_write+0x73/0xb0 [ 195.531588][T13916] do_syscall_64+0x103/0x610 [ 195.536186][T13916] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 195.542078][T13916] RIP: 0033:0x4582f9 16:39:14 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0xf6ac, &(0x7f0000002580)=[{&(0x7f0000000000), 0xfdde}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) [ 195.546005][T13916] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 195.565619][T13916] RSP: 002b:00007f6dcf2fbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 195.574068][T13916] RAX: ffffffffffffffda RBX: 00007f6dcf2fbc90 RCX: 00000000004582f9 [ 195.582045][T13916] RDX: 000000000000fdef RSI: 0000000020000280 RDI: 0000000000000005 [ 195.590056][T13916] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 195.598051][T13916] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6dcf2fc6d4 [ 195.606050][T13916] R13: 00000000004c7ad0 R14: 00000000004ddba8 R15: 0000000000000006 16:39:14 executing program 3: r0 = socket$kcm(0x10, 0x400000400000003, 0x0) socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="2e0000001c008104e00f80ecdb4cb91a02c804a001000000810007fb120001000e00da1b40d819a906000500000f", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) 16:39:14 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) 16:39:14 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0xf6ac, &(0x7f0000002580)=[{&(0x7f0000000000), 0xfdde}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:14 executing program 1: r0 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={&(0x7f0000000100)=@llc={0x1a, 0xffffa888, 0xa, 0x0, 0x0, 0x0, @random="16b29a3288a8"}, 0x80, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000580)=@rxrpc=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x4e23, 0x8c0d, @mcast2, 0x6}}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000180)="ce7c56980513580f10db2b6aed08cb0b21d73d8d69acaed1a7d97b5e8f2bfd5dbcc8ec89f03432e7ad9cae225febbddc1e141031cbb2f28c88bafd388816e3452fb6f5cf2675374f5e59b2b64c2915927238d188442d5f8620a387f0d38bad7c8623c441791fcb86e5a0cb0e7aacfa3957ab0e39d63f314f8710cd7b2fda68bc72a2827f812ac2305e20aa5b431e5a", 0x8f}], 0x1, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0xffffffffffffffe7}, 0x801) sendmsg$kcm(r0, &(0x7f0000001bc0)={&(0x7f0000000080)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes128\x00'}, 0x80, &(0x7f0000000a40)=[{&(0x7f0000000600)="71f825c83eaf6273e4c9c97b106dfc2a1ad9d4d8581c70945a134427a332274d4d0014759a6128b78b4e46c3912deda5762c55b8ba5d13b1549f5353de2a17a59eb84b852cdbf0671f9a359e53ca4339c6eff563983c0b2a6de7da55e383366ae113bc842b4085def06532727a24fc5c7471820ee51c3474422ecd1ea4b5e2646e34a7fb163712f76d21ea2e6df90688f32ee1642981abe4d81b553f96d699f688", 0xa1}, {&(0x7f00000006c0)="4201cd367c709de67395f5f420ae88363937a9a10b8598dc833f9262f1f292393bfa39d39417ea7de5990ff0d6e3d2c73913374e86c27723f6742b23299bc6fcb2861a4b63238cc0d34700166da1", 0x4e}, {&(0x7f0000000740)="3fb581ce962774045b37d5ba03641ac5d337485c958d0292b5af6e6a160fa0e7", 0x20}, {&(0x7f0000000780)="023e058abc18a347e5dc857106722c849a1d6ee1d4d2ede114b8f921c3c43a", 0x1f}, {&(0x7f00000007c0)="8b31162e77507702a36010cd441b168a7d7a010b67f860bc614eb7a446f0cb3b89b2ed5ff5767887f5c9c03918a6ead46f7c5b46b6e106eb1db86ea6f64d19fc1396f679462e06fb6a24baf3f7d7a3aad6064f437bc7dbfa5655a9e450f6ab0b9043ea6c6cdbd107a11ca6f26b26a1ecbf4d4091242930de1f0ec55a2f748349bb503ff3ffc46c879922d78fef5c9ee79352e592f9e3e8a9e6603726a365c497b26f0ce041b81ee9789ce00e735dce2449bd08d2bce739cb778c", 0xba}, {&(0x7f0000000880)="3d6f792c9c2c7eb7b9d529fa3d5021c8df16ef33c24953ce0723388117adc7073c9e1e0a2de6d99bc4b793998e389b27a85eba072c33214b7180075dd2b8b4d1137b1e1faee59d26b82f590272de0f93de34158ece551eae9667f263f19d380e2f9b8a1d04330aacd9f186849ffe19182bba95b6991fea890f4f4d604ee530ce73b92efc12af839404e11b61b819965d819c60bfa5c3e31fbc5a5cb42482cea54c77f6fdb53167e81a80267f82319a4c6f91e1a9e40d2da532cbc76b3959b21dd90e7c41a3d176fb053cec624a4f4a3820dab5bc35743b507336ee957f3e0c04328a6c063708c7f668178fa5fd98491d", 0xf0}, {&(0x7f0000000980)="c61f68126834e7004ea11e8cf34c782363e094a1c9454c3219b98e7a5a6cae0c5f9f322172d7675e603475f9c2d364afccb701dcb6c0fab571bd12e69b9b54899befc7f6c971a8895bd2a270e9ad6bd5ddfda15e45750d46040f59d300353608def2f5e6b3935ab56422b1939161745c8992298cf46899cc0c28c5d4816bc4298db0b9e37817ef01276b3ea0391a6ac02073b1c3316febd5bf66c112b56990270fd0e59c64a8bdda3c257c53e48f", 0xae}], 0x7, &(0x7f0000000ac0)=[{0x1010, 0x114, 0x5, "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"}, {0xc0, 0x10b, 0x5, "9be00f3ddfc4b6d9fb7ee1e354291a16268c5ff1fa9bb44e8c1cc981bf4a2fd5fb5c333f296f834286f86ce0c1061e7969c6a67077d3f9e228abd5d27a70bb7724652627ebddb0209bf7d75c98859e86eeb58231f4542ae2307f88c4929f8204587c4bbf832369fa5e463838153a45ae5ff5a901ef5e5c5091dc668cdc4d7b6f586e0b1a33c0ba918945f942dbb1cc1de5a3eb806dc9abf5bad5073155cfa5bb9fb91ff40ea9e460f9983f31f19f95"}], 0x10d0}, 0x20008004) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000540)={r0}) 16:39:14 executing program 4 (fault-call:5 fault-nth:43): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) 16:39:14 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r4) recvmsg(r0, &(0x7f0000001840)={&(0x7f0000001480)=@can={0x1d, 0x0}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001500)=""/10, 0xa}, {&(0x7f0000001580)=""/73, 0x49}, {&(0x7f0000001600)=""/184, 0xb8}, {&(0x7f00000016c0)=""/101, 0x65}, {&(0x7f0000001740)=""/81, 0x51}], 0x5}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], r6, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x33c) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xfffffffffffffffc, 0x3}, 0xffb8) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x127) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r7) setsockopt$sock_attach_bpf(r8, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r8, &(0x7f0000001540)={&(0x7f0000000040), 0x10, 0x0}, 0x0) close(r8) 16:39:14 executing program 2: r0 = socket$kcm(0x2, 0x1000000000000801, 0x84) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f00000006c0)=@in={0x2, 0x0, @loopback=0xa1414aa}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000400), 0xe218}], 0x1}, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x400) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000200)=""/211) [ 195.885609][T13964] FAULT_INJECTION: forcing a failure. [ 195.885609][T13964] name failslab, interval 1, probability 0, space 0, times 0 [ 195.931070][T13964] CPU: 1 PID: 13964 Comm: syz-executor.4 Not tainted 5.1.0-rc2+ #82 [ 195.939105][T13964] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 195.949166][T13964] Call Trace: [ 195.949193][T13964] dump_stack+0x172/0x1f0 [ 195.949220][T13964] should_fail.cold+0xa/0x15 [ 195.956822][T13964] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 195.956849][T13964] ? ___might_sleep+0x163/0x280 [ 195.972078][T13964] __should_failslab+0x121/0x190 [ 195.977063][T13964] should_failslab+0x9/0x14 [ 195.981578][T13964] kmem_cache_alloc_node+0x264/0x710 [ 195.986883][T13964] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 195.995144][T13964] __alloc_skb+0xd5/0x5e0 [ 195.999492][T13964] ? skb_trim+0x190/0x190 [ 196.003829][T13964] ? skb_page_frag_refill+0x127/0x460 [ 196.009215][T13964] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 196.014940][T13964] ? skb_put+0x177/0x1d0 [ 196.019199][T13964] __ip_append_data.isra.0+0x24d6/0x2dd0 [ 196.024845][T13964] ? ip_reply_glue_bits+0xc0/0xc0 [ 196.029908][T13964] ? __ip_flush_pending_frames.isra.0+0x2d0/0x2d0 [ 196.036343][T13964] ? mark_held_locks+0xf0/0xf0 [ 196.041131][T13964] ? lock_sock_nested+0xac/0x120 [ 196.046087][T13964] ? ip_reply_glue_bits+0xc0/0xc0 [ 196.051118][T13964] ip_append_data.part.0+0xf2/0x170 [ 196.056332][T13964] ? ip_reply_glue_bits+0xc0/0xc0 [ 196.061370][T13964] ip_append_data+0x6e/0x90 [ 196.061394][T13964] udp_sendmsg+0x8e7/0x2820 [ 196.061420][T13964] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 196.070453][T13964] ? __lock_acquire+0x548/0x3fb0 [ 196.070468][T13964] ? ip_reply_glue_bits+0xc0/0xc0 [ 196.070487][T13964] ? udp4_lib_lookup_skb+0x440/0x440 [ 196.070507][T13964] ? is_bpf_text_address+0xac/0x170 [ 196.070526][T13964] ? find_held_lock+0x35/0x130 [ 196.101912][T13964] ? is_bpf_text_address+0xac/0x170 [ 196.107143][T13964] ? ___might_sleep+0x163/0x280 [ 196.112018][T13964] ? __might_sleep+0x95/0x190 [ 196.118116][T13964] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 196.123761][T13964] ? aa_sk_perm+0x288/0x880 16:39:14 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) 16:39:14 executing program 2: socketpair(0xf, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000008c0)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x22f, &(0x7f0000000440)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ', 0xffffffffffffffff}, 0x30) r5 = perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x4, 0x2, 0x2, 0x8, 0x0, 0x7ff, 0x20200, 0x0, 0x2, 0x3, 0x8, 0x100000001, 0x6, 0x5, 0x7, 0x6, 0xfd05, 0x5, 0x0, 0x6, 0xffffffff, 0x1, 0x2, 0x7, 0x4, 0x35, 0x7, 0x40, 0xb18b, 0x3, 0xe0, 0x40, 0x20, 0x0, 0x7fffffff, 0x400, 0x0, 0x6, 0x4, @perf_bp={&(0x7f0000000380), 0xc}, 0x8000, 0x401, 0xff, 0x8, 0x60, 0x7fff, 0x1fa8}, r1, 0xc, r3, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000b40)={r2, r5, 0x0, 0x22f, &(0x7f0000000900)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ', r4}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x22f, &(0x7f0000000140)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ'}, 0x30) perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0x8, 0x7, 0x6, 0x101, 0x0, 0x101, 0x40000, 0x3, 0xfff, 0x4, 0x1, 0xf1, 0x3, 0x5, 0x1, 0x3cd25ee7, 0x4, 0x4, 0x8, 0x1, 0x2, 0x3f, 0x7, 0x9, 0x5, 0x5, 0x0, 0x9, 0xfffffffffffffff9, 0x6, 0xff, 0x3, 0x9, 0x5, 0xffffffff7fffffff, 0x7c6, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000000), 0xc}, 0x20, 0x1, 0x3ff, 0x6, 0x6, 0x39b0, 0x5}, r6, 0xa, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8971, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') 16:39:14 executing program 2: socket$kcm(0x10, 0x5, 0x10) r0 = socket$kcm(0xa, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0xffffffffffffffff}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000340)='pids.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x8000) openat$tun(0xffffffffffffff9c, 0x0, 0x4, 0x0) perf_event_open(&(0x7f0000000280)={0x7, 0x70, 0x4, 0x5, 0x1000, 0x3, 0x0, 0x4, 0x0, 0x8, 0x0, 0x9e, 0xe9, 0x2, 0x8, 0x0, 0x6, 0x5, 0x5, 0x7fffffff, 0xffff, 0x4, 0x7, 0x9b, 0x6fc8, 0x4, 0x0, 0x0, 0x7, 0xdc9, 0x5, 0xff, 0x6, 0x7, 0x27f, 0x2, 0x9, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0x8, 0x4}, 0x2001, 0x1, 0x0, 0x7, 0x5, 0xff, 0x8001}, 0x0, 0x0, r1, 0xb) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') [ 196.128280][T13964] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 196.133839][T13964] inet_sendmsg+0x147/0x5e0 [ 196.138355][T13964] ? udp4_lib_lookup_skb+0x440/0x440 [ 196.143646][T13964] ? inet_sendmsg+0x147/0x5e0 [ 196.148328][T13964] ? ipip_gro_receive+0x100/0x100 [ 196.153372][T13964] sock_sendmsg+0xdd/0x130 [ 196.157808][T13964] sock_write_iter+0x27c/0x3e0 [ 196.162580][T13964] ? sock_sendmsg+0x130/0x130 [ 196.167277][T13964] ? aa_path_link+0x460/0x460 [ 196.171962][T13964] ? find_held_lock+0x35/0x130 [ 196.176735][T13964] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 196.182993][T13964] ? iov_iter_init+0xee/0x220 [ 196.187692][T13964] new_sync_write+0x4c7/0x760 [ 196.192381][T13964] ? default_llseek+0x2e0/0x2e0 [ 196.197258][T13964] ? common_file_perm+0x238/0x720 [ 196.202295][T13964] ? __fget+0x381/0x550 [ 196.206474][T13964] ? apparmor_file_permission+0x25/0x30 [ 196.212039][T13964] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 196.218295][T13964] ? security_file_permission+0x94/0x380 [ 196.223948][T13964] __vfs_write+0xe4/0x110 [ 196.228297][T13964] vfs_write+0x20c/0x580 16:39:14 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000062000, 0x500001c) openat$cgroup(r1, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) [ 196.232553][T13964] ksys_write+0xea/0x1f0 [ 196.236811][T13964] ? __ia32_sys_read+0xb0/0xb0 [ 196.241585][T13964] ? do_syscall_64+0x26/0x610 [ 196.246271][T13964] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 196.252351][T13964] ? do_syscall_64+0x26/0x610 [ 196.257054][T13964] __x64_sys_write+0x73/0xb0 [ 196.261663][T13964] do_syscall_64+0x103/0x610 [ 196.266274][T13964] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 196.272175][T13964] RIP: 0033:0x4582f9 16:39:14 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) [ 196.276081][T13964] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 196.295698][T13964] RSP: 002b:00007f6dcf2fbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 196.304129][T13964] RAX: ffffffffffffffda RBX: 00007f6dcf2fbc90 RCX: 00000000004582f9 [ 196.312113][T13964] RDX: 000000000000fdef RSI: 0000000020000280 RDI: 0000000000000005 [ 196.320095][T13964] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 16:39:14 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0xf6ac, &(0x7f0000002580)=[{&(0x7f0000000000), 0xfdde}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:14 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='rdma.current\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8, 0x0, 0x9, 0x0, 0x8d, 0x200, 0xa, 0x1ff, 0x3, 0x80, 0x1, 0x0, 0x7, 0x9, 0x0, 0x9, 0x9, 0xa0e, 0x100000000, 0x8, 0x8, 0x0, 0x1, 0x8, 0xffffffff, 0x2, 0x3, 0x8, 0x0, 0x7, 0x3, 0x7f, 0xffffffffffffffdd, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x2, @perf_config_ext={0x8000, 0x8}, 0x400, 0x0, 0x1, 0x7, 0x3f, 0x9, 0x8bfd}, r0, 0xb, 0xffffffffffffffff, 0x1) socketpair$unix(0x1, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'erspan0\x00', 0x400}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) [ 196.320104][T13964] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6dcf2fc6d4 [ 196.320111][T13964] R13: 00000000004c7ad0 R14: 00000000004ddba8 R15: 0000000000000006 [ 196.347638][ T26] audit: type=1804 audit(1555000754.955:77): pid=13993 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir009754399/syzkaller.vcRCHp/199/memory.events" dev="sda1" ino=16981 res=1 16:39:15 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) 16:39:15 executing program 4 (fault-call:5 fault-nth:44): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) 16:39:15 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0xf6ac, &(0x7f0000002580)=[{&(0x7f0000000000), 0xfdde}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) [ 196.611897][T14011] FAULT_INJECTION: forcing a failure. [ 196.611897][T14011] name failslab, interval 1, probability 0, space 0, times 0 [ 196.652021][T14011] CPU: 0 PID: 14011 Comm: syz-executor.4 Not tainted 5.1.0-rc2+ #82 [ 196.660055][T14011] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 196.670124][T14011] Call Trace: [ 196.673442][T14011] dump_stack+0x172/0x1f0 [ 196.677796][T14011] should_fail.cold+0xa/0x15 [ 196.682419][T14011] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 196.688255][T14011] ? ___might_sleep+0x163/0x280 [ 196.693122][T14011] __should_failslab+0x121/0x190 [ 196.698074][T14011] should_failslab+0x9/0x14 [ 196.702603][T14011] kmem_cache_alloc_node_trace+0x270/0x720 [ 196.708458][T14011] __kmalloc_node_track_caller+0x3d/0x70 [ 196.714109][T14011] __kmalloc_reserve.isra.0+0x40/0xf0 [ 196.719500][T14011] __alloc_skb+0x10b/0x5e0 [ 196.723930][T14011] ? skb_trim+0x190/0x190 [ 196.728321][T14011] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 196.734056][T14011] ? skb_put+0x177/0x1d0 [ 196.738309][T14011] __ip_append_data.isra.0+0x24d6/0x2dd0 [ 196.743964][T14011] ? ip_reply_glue_bits+0xc0/0xc0 [ 196.743990][T14011] ? __ip_flush_pending_frames.isra.0+0x2d0/0x2d0 [ 196.744005][T14011] ? mark_held_locks+0xf0/0xf0 [ 196.744022][T14011] ? lock_sock_nested+0xac/0x120 [ 196.744036][T14011] ? ip_reply_glue_bits+0xc0/0xc0 [ 196.744050][T14011] ip_append_data.part.0+0xf2/0x170 [ 196.744067][T14011] ? ip_reply_glue_bits+0xc0/0xc0 [ 196.744090][T14011] ip_append_data+0x6e/0x90 [ 196.755531][T14011] udp_sendmsg+0x8e7/0x2820 [ 196.789409][T14011] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 196.795667][T14011] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 196.801921][T14011] ? ip_reply_glue_bits+0xc0/0xc0 [ 196.806964][T14011] ? udp4_lib_lookup_skb+0x440/0x440 [ 196.812254][T14011] ? perf_event_pid_type+0xf0/0xf0 [ 196.812277][T14011] ? __perf_event_task_sched_in+0x640/0x820 [ 196.812300][T14011] ? ___might_sleep+0x163/0x280 [ 196.812317][T14011] ? __might_sleep+0x95/0x190 [ 196.812335][T14011] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 196.812348][T14011] ? aa_sk_perm+0x288/0x880 [ 196.812380][T14011] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 196.812396][T14011] inet_sendmsg+0x147/0x5e0 [ 196.812409][T14011] ? udp4_lib_lookup_skb+0x440/0x440 [ 196.812439][T14011] ? inet_sendmsg+0x147/0x5e0 [ 196.823439][T14011] ? ipip_gro_receive+0x100/0x100 [ 196.868024][T14011] sock_sendmsg+0xdd/0x130 [ 196.872475][T14011] sock_write_iter+0x27c/0x3e0 [ 196.877257][T14011] ? sock_sendmsg+0x130/0x130 [ 196.881957][T14011] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 196.888203][T14011] ? iov_iter_init+0xee/0x220 [ 196.892895][T14011] new_sync_write+0x4c7/0x760 [ 196.897601][T14011] ? default_llseek+0x2e0/0x2e0 [ 196.902476][T14011] ? common_file_perm+0x238/0x720 [ 196.907514][T14011] ? __fget+0x381/0x550 [ 196.911664][T14011] ? apparmor_file_permission+0x25/0x30 [ 196.917190][T14011] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 196.923430][T14011] ? security_file_permission+0x94/0x380 [ 196.929072][T14011] __vfs_write+0xe4/0x110 [ 196.933398][T14011] vfs_write+0x20c/0x580 [ 196.937634][T14011] ksys_write+0xea/0x1f0 [ 196.941876][T14011] ? __ia32_sys_read+0xb0/0xb0 [ 196.946636][T14011] ? do_syscall_64+0x26/0x610 [ 196.951295][T14011] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 196.957344][T14011] ? do_syscall_64+0x26/0x610 [ 196.962128][T14011] __x64_sys_write+0x73/0xb0 [ 196.966722][T14011] do_syscall_64+0x103/0x610 [ 196.971306][T14011] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 196.977180][T14011] RIP: 0033:0x4582f9 [ 196.981092][T14011] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 197.001490][T14011] RSP: 002b:00007f6dcf2fbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 197.009920][T14011] RAX: ffffffffffffffda RBX: 00007f6dcf2fbc90 RCX: 00000000004582f9 [ 197.017891][T14011] RDX: 000000000000fdef RSI: 0000000020000280 RDI: 0000000000000005 [ 197.025853][T14011] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 197.033827][T14011] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6dcf2fc6d4 [ 197.041809][T14011] R13: 00000000004c7ad0 R14: 00000000004ddba8 R15: 0000000000000006 [ 197.063805][ T26] audit: type=1804 audit(1555000755.675:78): pid=13990 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir009754399/syzkaller.vcRCHp/199/memory.events" dev="sda1" ino=16981 res=1 16:39:15 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r4) recvmsg(r0, &(0x7f0000001840)={&(0x7f0000001480)=@can={0x1d, 0x0}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001500)=""/10, 0xa}, {&(0x7f0000001580)=""/73, 0x49}, {&(0x7f0000001600)=""/184, 0xb8}, {&(0x7f00000016c0)=""/101, 0x65}, {&(0x7f0000001740)=""/81, 0x51}], 0x5}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], r6, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x33c) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xfffffffffffffffc, 0x3}, 0xffb8) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x127) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r7) setsockopt$sock_attach_bpf(r8, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r8, &(0x7f0000001540)={&(0x7f0000000040), 0x10, 0x0}, 0x0) close(r8) 16:39:15 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) 16:39:15 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0xf6ac, &(0x7f0000002580)=[{&(0x7f0000000000), 0xfdde}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:15 executing program 1: socketpair(0x1, 0x20001000000005, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) socket$kcm(0x2, 0xa, 0x2) r1 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)='posix_acl_access\x00'}, 0x30) perf_event_open(&(0x7f00000001c0)={0x4, 0x70, 0x100000000, 0x1, 0x2, 0x7, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0xffffffffffff4743, 0x6ed, 0x401, 0x8, 0x2, 0x3f, 0x8000, 0x7ff, 0x4, 0x4, 0x7, 0x4, 0x824, 0xffffffffffff8000, 0x8, 0x3, 0x5, 0x7, 0x0, 0x0, 0x874, 0x1, 0xd68, 0x100, 0x80000000, 0x0, 0x0, 0xfffffffffffffffe, 0x5, @perf_config_ext={0x6e, 0x9}, 0x1002, 0x8, 0x7f, 0x7, 0x40, 0x4, 0x800}, r1, 0x9, r2, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5411, &(0x7f0000000000)='lo::!\xd6\xc0\xf8U\xc4\xc8J,\x00\xd2\x97\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02?\xfa\xf3W\x14\xf9\x92N2\xde\xf8\xff\tz\xf3\xb8\xb4\xd2\xaf\x99\x97r\xe1v\xb2]W\xe4\xc3\xd9\xa7\xa4 \x90\x87\xa4\x1c\x95=\xa2\xee\xd0\xe3vY\xbc1\xdff4\x93O\xc6`%P\\c\xe7`;V\xfc7\xec\xd9,[\xc2\xeaL\xceg&\x1e7\xb9,\xe4\xf79i\xe2\xad\xf9\xf2\x85Z\x85\x15\xd8I&\x9e}\xeb\xb1\xa6Zf\x11\xdd\xf12\xa1\x03\xa114\xaa\xff-\xfcU\x1c\x85\x9f\x8d\xc17l\xa5\xb9\xca\x9ej\xcf\xeeWpP\xd5\xda\x95V\xe2w\xe8\x17\xad\x9eR?{\x1d\x8eW\x7f6c\xa6Daxak\x1b\xb4c\xc8\xcb\xd60\xd8\xae\'\xf6\x88J\xfd\a\xfb\x13\xc9\xd2\x10!\xbe\x8e\xf1\xdb\xa9o?\x93-Q\x04@N\x03va\xce\xa4\xb8\xef\x93N\x01\xad\xb0J+\xd9$\xeb^\xe1\x0f\xe8\x9d\x9e \xd3\x13\xf7-\x10i\xb7\x1e\x11\xac\x982\xa8\xf2\xbcz4g\xc0\x80S\xc4\x9a\xbe8\xbd\x12\xc2\x00\xdd:\x7f(\xc1\xe8\xad@\xd8)vDw\r\x00\xc4&\xdc\xc9\xd5\xd0\x11_\x85>3L5\xcd\xa9\xdc;\xc7\xcfZ*\v\xa0\x0e\xf2R\x81\xd4\x9e\xcaV\xd1\x16\xa6\xf6\x895\x0f\xe2\x94\xf1Wf\xb8\xd5\xb1\xf4\x95\xe8\x80\x1e\xd8\xe8h\xd6@g\xb8\xb8b\x94tS\x8c\xba\x83\xa2\xef\xd3\xab') r3 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000300)={[{0x2d, 'io'}]}, 0x4) 16:39:15 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000001380)={0xffffffffffffffff}) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000001400)={r2}) close(r0) sendmsg$tipc(r0, &(0x7f0000001940)={&(0x7f0000001440)=@nameseq={0x1e, 0x1, 0x3, {0x42}}, 0x10, &(0x7f0000001800)=[{&(0x7f0000001480)="5ef3043cfc0fb82096518b1d5d829e521365313951452440c4afa07aaaa56fc3d875ed27cfc0fd13de38a79f1b8c30fd2a2986c683f041dd83fe115b3c3fac8f8e9c684338876abe252575b684a483e1b23d86ca8402d4d7d9f9ff3a2b3e1406b1e9dd7f", 0x64}, {&(0x7f0000001500)="b8debeee353937c611865c02835c2f87168dbb78291112998cc2b3c9db3b9f3e40b3c3bfd4f99ec4c46893bb75505e1ded576a39c050e3c7593e158b057d727985d9acdd601e9627e9a12d3c8b8e1ef5cfa44101a5f01a15b6629b270f34fe8f5436e65f88ef43d343390b3ee4493cf082d7ef7b3d610f0f68cf3645b21205a23310ee153672bd7ba6e2dbe68d0fa855788f89c5d8aa770678c99413f8ecee4827730b248d77decf43499d1acfe7ab6231f7099b2ad47927a3c4cf1a7cdcdade6ec5b886c110d89bd9fe", 0xca}, {&(0x7f0000001600)="6ed60638c8cb4972c61ba7351f779fba93e81ca97b2221979fdb00d6a78fdfc6283c0183a9a51acd98a553163d484226ba68524298d92e5287026b7c1c9e3e9634ed5cf4c25d07b74666258df174fd8d5ebb470b945bc5a672854e2726e75e1e15ade47fe7c5ca96ed243f6066da64061926aaef71627e5d70c384cb1bed7a8b588f90506aef8897bc1467a150cb319c24239f98eef415a38afbc583319e8797ed621499fba3deca826eca15e22ef4a3", 0xb0}, {&(0x7f00000016c0)="8dfadeb0952e1e0f3716051f272467ae520de814673f1d6566e5fec4c7633af86cdc1a5f918d1071f6da15a0089f1bc0ae2f66da51b92a02cbb7209e52176cd79507cc66fd823ef84554b6a94a77f853ff5c9571bba1d9e5846e56b116507b16ff3a93a9a90ec60ec9099c21cb7f22136d324de9aae79c3f5fcaacccdcd5e05d98d534c2784f36f8667c6e82936bdfa817f13954d8f7f6c644f109c50e5732003b2c6afd2244776450b7783a817ea098ca0aa5b602e61e15dcc48f2a96a6806c0aa55c7b4f3b7006f19eeda4e809eefd83e9709daa9c85c936b4f86dd09e23476f0e5824c1ce8225edfd534f8dccab392c53661d26b624", 0xf7}, {&(0x7f00000017c0)="fb7ac2362ca3c85cbb77d869463232a89da4440223354ff8349f0179f6784d4da20b9c999eec87ffeb4933fe66070693218952e6590a", 0x36}], 0x5, &(0x7f0000001880)="4faba3c7d4910125d4072f6ff6948fefc9948d6e3cd6f604e88f08efae84820ac70d91a7c87b9a68bb4f192c64ed72cbe3781c7fc85f55e3c0bfa5f3a588ff6b5420153ed75e1d940eb9c749877856db6188b6e088fce47bb487381255a2705e97f177dabc3596ea5e6e4a4d6ed077fb64b093cfc48119b933e45d6bc90676dcc33debad84c75732cd6a9a4a14ec2b3d56dde6f5bc6ca35552d3a80315afbf2914f48e86433ae0135e505c30965d17c324ac0801e6d4f28fa2bdfb170acc16", 0xbf, 0x880}, 0x4000) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000001980)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f00000019c0)={r4}) sendmsg(r5, &(0x7f0000005280)={0x0, 0x0, &(0x7f0000003e80)=[{&(0x7f0000001a00)="65fda8a6990d0da4bd6aac12a6b276910fc4fec1933bc82d642b2aee567787820547650757d2c5beae7685f1f891c381494a7127f873199912371bc86b99735971385fa3516acb9a0a308796ea8d341838", 0x51}, {&(0x7f0000001a80)="bdcd9ac18d22fe6c394c02d90b00dd8365c6241c47fbb812d0bfe891f964920b19edfe25342a797579ed53a8958c8b8298a99b3792205ecd1921086ee0d6eabc2e72dfe06157c149a90341329c3d96173e1b32300aaefa5da55db01fea894cb5b720e922b1f07d087c62d6d624f31c46bf68387f2b333140d9497238794bedf403b1bc747e3df97322cfb1efbb1b734cf2ef9900e6d5be364474ca3954e28c44c78f9c7c5e4ee1ddc1743d1bf3aec1e10f3d992bc010dd2652e60a768cd5039a4486b1f5aeab6730fc", 0xc9}, {&(0x7f0000001b80)="2e958e35768ca998cc877299fdaf9b4851886c5304aa22528a59b0b1455faee9", 0x20}, {&(0x7f0000001bc0)="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", 0x1000}, {&(0x7f0000002bc0)="ae62d6fd28bb90a9389e4f28f29dd48260bdd7eeac419629c6526d2a2c45571415215eb3add1757f2f6fd9d0555c69aa35475cb1a62f8497701523c443b99dd299d8850f5b81cf87d688cfe2e7a0a5f649f6a213b507b4c19bd0e061c706d8002d6ceebf316c70bf47417fc85c37c567754a131d9e161a7188a7fa4721", 0x7d}, {&(0x7f0000002c40)="c5e2a5c6ec02cebc1791c50bb7db5050b08cd4337a9c2dc243813aa83434552a7f99a1bffe23799d2949b0c762c64b13ece7bb8c8f071ac8ef0313c057b6dfbebd689952c112bcc4f7dee840ac6a0eda57967dd71438a08fb11c043e4cbb3bd864e20e7abde5919f7b6d2e3892d266ca3f83ebb2637985e433d38bea5bfd362700213f596449a91998622a86efa92f662350960f1f5ea4abe3d036d82f372cc4a14a3a9b6437a3b9d6b397d2e94ff74c982798bdeb101df55f5df3f58c43104425bb78736e218eba1bd96f688aa6e21927103aa9dd4659f5e939c2a955897d58", 0xe0}, {&(0x7f0000002d40)="e428b5ddd7352c2e320ea98ee5892451da9cf8ad7283ce4f05a2596766b626aa8b291d384a2603200f43998e791908711d0e438d98336cce46afbe727b4c8ad276e3c45699b5f784f564786114b18a954f42a6dd2196ad5b7c6070f21220b68b87533c732de66f4e", 0x68}, {&(0x7f0000002dc0)="0745361c153399e5976777ba8e62d169d128895d9c64d777fb66f6c2165d1dce223148107b141f538b9e97ad517f0bd18d940ad8d13b02da9cd10df710d29dc28755cba10564a4e748d3806fbc0c2832e45fd7290666a0b6fd06f508522570f561edc77bfa664d5af9a201095c6762b405a4862957825015da11e470f97ac8d001da43a7ac4b612b98352df5453910cd24917cfd0e63656df091933862b446290bdd1513981426bfdfa42aa2565b7766bea406e7d8feab1277dce25d9ea5620b049cae12d850baadb4a9604ac864c9e16b28519e17cc9fdecb6320024eb5e754b4bc72ef9e887e9886f16995594cfc3d798e80a049c7bcb36525621575b7b426d8675d34d42a9d6eaefcd4e0b77060fdadcc28dce3013568a1aef93cc6463e21ba81b45e91160004393fe8316b4a9272f9a1cbe9cf793798f1b4e84774b44657e57a7bc56560421da38bd521b767897d8144be64f3c77760ac40b268b06977360c3cf554011a9e4145ae22fa479fe1abcec6cfd6f5b84cdffa74102f42ee39c87f442771dbbafbd5f90de4705a5478fff801fc820111950a443097577b35e3403447e1120d2dc10919d361ca1091ec73eeac2750aefd4cc978b557c1753faa6fb257cb9fa4c40fc807d63ad5522be8724f2a57278646714968d082d0b2530bacfa93398c48f412f8d3b49de3aba33f64acf066dbd4c63d5b70bb1d98c767f58a2202b3d17ae5bf6925e9f3b21b18111b8d8f8d07bffd47d5b9d4fff5f0fb09ef77c7d499f9f145c300d51ac7837504b09d070b87d574db579def376d27d0c2f387aa2b6039112015ba876243c4d52538690531074cb99db64a89fb2416863590c2b760d4988dac0ec823fb40ca81d3485f969991b9d8919aa83c713857646e03dd17d64aea150bd87d912261ae4ec0c75d891df9adde9597a70704f542f817ff55c3a302e7a6f8dddec4a05463a367c79f0b70e778aee4be0f0fdcb4ef81874d60b62822b6fc57456c79bfb329d7f3af1339802221f4d9e9d9eb4733501bfcea4d93d20472e771097e95c6c809c3202f3d769047efad62038a67edff98f2cd4a41c203ffeffa861dff9a5e73f43fcdb32e29e98bd025f83745084692577d2316b73ca265577aabfc7e191fc75ab9dd7517c966ec6599cf112621d7697c6ac9b96d10f7aa0f530d6248078490b9230d3b81084b7527f5c4863a1d9dd7fb78fcfda0c6390531e9274bb21e69b2947784e35dea9343d6cef64ebcc160c18708a38dc914f52aa8badccbda906ddd82e9d767a5a801a5c422adfc8d65d99616f4a5a541d84f825af0fb38237d28bc5dcc759843142897c95e06a51d902d50bedada74049460710217ef2a6d31092354d02c5514308c1eda02db51ba7ca902a263a073f43baa5cdd1ccad3f7be5ba188c81bf4ec4915d31508f2b63a16ec41feec0454771f899e75b0b67bd6ec31fe918465bbf76912b2fc3cc4fed3575cd3b29eae800afac88e4fe0eeff0e80dd99be40f073400e6329acc9c413cd01ead21b6566d8085055aee17891a3c5c404830cbbcf76a9d3ebcb704daf7e1d66a04cf8aead303e34dac55be75eea6f2ecfb8ef0d93898d2dcef90279bfe020b21359ae9d66fbaa32838d351b91f623d788e3378bb94195d59bca9f84127aba11fd94ad45dd5f12d1083ab7e5376784efa99d6c3b2d0fab72e09b3bf8a645c11ea13f43935d3850a4e8c025766ccec819d1f7d29122390a9d261a4a93b29867df6a6188c2d3096ceb7b7633e6db59e3dcde5751622afdfc1134583b72b471dbfcb49e999fc771b78f4cfc790ee5d07bda6a50e566b4a360e706024c596ec68bb2a0217f18d2c6711f8cc9ae53823078920a85aba64ec2ba8b1de98229cac8eb55b32db4ba2a3e061213d6101ed343a893caf3963b94a44f9997455c437b1c0ab2c49c75da061038acd2dbc6f66aaf197bda948bc662dc5927c0abeb531fa4f2b6c0273613244ac62f932573ae763efa407a6d138b137ec4101ee926052cb817fb40054e014426528c7faa1eade65b823fa2b7b8bb815f675d46302f7c6b718421c7a4156939cdd6e5781185634459642bd135b7c776ba23e4e7be8e1bc4298f28db5800761fec4e00c7cfd5265f8c29d5bced4b602a79b26e914098e1e368bfbc73f44cf6086cd64c938f4836abd7ee03b8116b0f380b85df27155b80b30361a82b292ac0dab838c15908193c84dbf895d6f5f1ab6ee6f7fd3d66cb8aa53cad2195ace84c1942fd64e7fa064dfcc28747f73cf6cfae16881ce628de03d40d5995d5c8e09a900bc3d8370cf612bf51083cb15520db95fe7a4a5ece178af53d06754f8d333a476cd622b50f8bd9532d24d04f7e672687645929583fee38c14440e41295d37a641bce1abeff61b8a8f27c1c7e4cc11d78eef93d58f0f8ce2b04c1228c9b6566ebbf934222a1188e67dba054d9b7b2a8f2c6fba4de7b8b4543650b77857fd31ec320eca7721dda1f12e800180c12e4b9b8b5c2e9cb6753e7a11a9d27696a3328bf3c4abba84825cf4867576859e0307a06b3dfb6e7cf87ef7c6cf59043fba4c84789af6ea04c8bc74e7c1c32a0fdbb4dfae5565fdca39ccbd5ebba62f65fb7c5b5dbd17274714da6e388198b79e60f1349165432bd236dbabed7be3be690dcbe4166a6d4196037c4d450e8c4e5bb2f953ef1f3cada846665d94a04a95d306ef3a2071e06130d2299ba6dd010fbfb3481fd01f8f40c383956a13e83d8fe043992658d776c00695ec27b6ad70ad8a8d0681eb3b4665f1b43dcd4b3a540b8f427c72eb09acc181ee7637d44809cb61861c74245e754ed0ef537335991607b10cad6f2b9f68fc9522902833da586e5990be69c88310b90992207d72ae3401d5a1428e00a424294e9143a42235a40de2225b487279990ecd8c59041cd891e0d6e496a47dc9857c86d32cb48e098c7c5fac31b826b6d972d2e6850f0dea5f78aa073db3a48e51e2eb2cafc57fec0774f41bfe13e684962b20c52300ea3458d80c6dd177f1f62e8c105591892addb764d51a014c9c646cde974e0eac735f813ed107c094e76b34dd2f4c0ea41d1dfdb9e4fdcdcd999055c6ddf97c8d6688e66bde4474ec4fb66e0ee1385351828867a14f4d4e8a9edaa5e95de6d32cfd4ffadd3b9436174e18bec72562e022edcef5696d9d0bdc6a8fbf99b30a8dca083bad029ea52a93419689d6479e74864572ae1dfe337513b4ce24fceb88aea46c422b71bb81370026ba2f00af251cbf95446628dde788c16d9479a328cb8403f0445e6db448810741b69bc3204672c6ce12263d5c0173c31438077d254b2763054581d479918873b6f12dfb4074e7a39f1f6b10a6e592c90fd32b08582996c17f5262ae1836a7f1e8923f1abd8dc9b98660b9e6db140e3cb5ed64ab749f4d684873d1f72f119e89e7935e61a753c2f67e4689911a85e77eea4d68ff16fc096d6fc34d63a561491b7ab0c79cdba867b51eff3084cccf79164192d23035bce440dd6646c0bf0b2154e4fc1c3becca24183b799e569024e815367ab6670d9bb074d33864d8604cd73c4e4af0f07bec9634a7193b6cb5e6b50aa2d0e74d69dcf8987e73028e519759cdfb3b8e2b92d7a06541dcffa60ec203123b6d1020b4ecf267e9f94ff57b4a6a63db1a660b81aef3585bfa0fcff3c0ccb565c7056ca273b9a86fd429d73a0960af528d24acafb5636b3d6da3eb65380b50f6d7aa378d70f26a41d31140c1f973936d23fc69a9abddc8f7135044c0637f2a7b8190fca71681e682184190db71b88bf64b69fb8ea153db71d4f0319360d9c530b10621582c62d0e0cdcf239858399bfd4c20541bc6c179497738418fa3853f9010ebf861fea951e967d74ce29e377b1c701ef285d7460f1e94db1bdab057cdc951dab389fb76a777bcb86f6e50c9df806b57e5a31c3fcd92d0f249c62e0a60cca401cef9e86a0cbd9d7519a13ac304b100dfc885cd3e8b10d62451db9011e8989114ec1265f4ada54cba2b4a34d9512aea244583951fe036ef52bd927716c4f38ab419161f790b83f8fcae652e640e4bef9d4cfb26f9ff2b0df2281aaf1d156d777a10354e59cfad68df6f7cac38220b15d8595caa2087aeb80bef284abae137e6c725352dafce0d5581049d517ac0e10754c13319dd4ff8a855ad924f34ccb40db88f36a604692103a969c32bd480b66ebc56a63fcff1e05bee66193b11496f2844887db28830dbbc15407837a56dc1df2ba9763ba83fc2a35ea250e0dafd68712b9391d34f9e82f08c0a3d694a4f5117b372074ce1e4edf14dc2f555cfb41ce95a6ee1ac79af80d044a7ab0f4985219440ed6751ad78fbfe1241d92a411497834105856a0e0bf15796d36d0cf506e4a4dd01a6368e202733a34a50225a0fcbe15131d13409e3189bb7c2fa69b3651fe47b3005ac541024cf55b2952a2906df232d0719f3bf68722d9c43bf746d1850fba31ce7e5b3abac9d0eee218fbe639f2b468d364f020a70fead772982be860bade258c43885fbc81d1574d55a06d087e6740734ecb23d24228f9fa702ee8759e8aa68449a1141c6d4ef1e91de8cdb68509649c798aa11c4f19ca06f9cde7e6d6b81fe245b7b8f443bf0e5b3f75210ff62cbd2b008123a5804442a14197cd138c26caa44e5beb16373222f7b072e7b0057391bae6a2dc2a2ad24e61b3ee1ccf04d3d7635a325c316b921c45b304ee9961d9cb2ec10b386e0c33af4e010955d94b685d6eccb692ca0cc637193c4cabe58cf6856fd1cedf5ecdfa311ab2a01da7b23c6f44e1101acc41ae57de104da701921b365286fb901ada9e906ed582eda17befbb2c4587ed04e967f67e3d16d05a965d7b582ec8358f856c859130ad0e95dc360ca12462f48f9d3ac3ffe4057a210cfc6f8683d3409f4b4cb8a93395852b025337f2e3eebdd4b165aaa3ec4285c0ed3f8dfb69e59beaa96346bcaca0097e130b9e2f3f82058c9c0e0b4fb1a7e16553480c72bd41988d4d5309e373eb8432844240eec8d581ae2adb1e67958e620def1519350494eefb51cdcf54b5f87e4d9bcbdef5b6e6c1e1e81133e112c7840e544c5bb28bdd4017f3c0999fbf0ae10b8c1c702ee8450763a3f759be5bb1e0ddeb04a17aa2c59ec1d2cd690eade041bc61c417fa3df01cbe73a92a8676ade1eb3c592a8a0b7b0827d08b2908d3a8a0c145a0f1ac6c5e8a50fcfebb2213e7cc66d58b4811cd2646027e579ec64d8e841ba76777dfc011caa9cab91287b6d1aacdaaef5420e2c3947d4a196a6a9a1b567969bffcca4bc5d68d95a7750a4bc403785ed2c5d62eda76e0ad76a1a1eabdc7947b1e0d0b56a49f64bb97465eb793d9fb337bde0320602a15777480a47a9a089b4478d54ffa1dfd1a5fa4a15e83e0f40399c4b68fbaeca7c4d623d58e967e030197959963d619b05b4a42b7ec3d82ae03560068587f580310fab3172daef9ad5bc7732fa06a44d283d7011cd915e119d838494771b00cea88a7e6999a5528c46d03b6a8f0d68ddbd5f3f5c4198194904730f27efe9c1a1a4791c10add74937de6bf14bc84bd67ad74baecd0dc0cc142019a10ceb3b8a5cc9783ab4dbd2c68c017cf32fa14c75ff053c9b570da12f97311112dd649ada07097a4fbd4c427d3785c091a333630fc90d52ba1f87ab7421ce894a01182c5dce0b02b25154b8d39667e6719ff0a5e1bde6048a4f5deb7bb185ef1f7773cd48b3425d14029760cc628b5323f1d036614efc74f3a7365aaf5bc1498b4ff59233bbc4966174ed5f4080cf756", 0x1000}, {&(0x7f0000003dc0)="7e77c0592980c7c2d01b3ff0402590034872045abf91fe648c4601c20ff52fa7da84e49f1f0602c9d58f5f01a3d3e6ece203d11fd7e0e58fc49a139d1b7938104631ba1563c54d2f28b836b3821decad84c4892ca3c2497912ffe22c120ee735e45dfb0359c4a31ca4f9a2d1321ac74862fd7fa034538c90e6eecdce1d0b3fb7f8bf086f8fdd6aa96e0d45ab1c70ad9cda6620c32033c41dba", 0x99}], 0x9, &(0x7f0000003f40)=[{0x98, 0x0, 0xc7, "4a7209bfb5b634a53fb13924606154a9cb2257036189864d7de1502cdcafe74828325a9f3b0ab02bcc30a51d5cb8e66a436c3cd6c0c569d6384d9e35fedfe3c8df47b693d3a4876000c7fa9139e1baa40e80016e25d3947f4a1ef9c851f0db229a9af7806bca1ba7e573f5586ed0ca22b27f98b0bb0e4e31e6a8e8d6bff105f0b6f7"}, {0x18, 0x0, 0x0, "995b139f"}, {0x38, 0x107, 0x2, "e00ae01d31c3783e6870b99dad62d108f2fdeef591393953e4ad2cb9cd481b80c2c635"}, {0x108, 0x1ff, 0xfffffffffffffffa, "b770f2521652546a4562bb328c348056a1502da271ffc60618657cefc3e347af562977bfd2337a4962c561842ab63c14b8e54d45b24b9be6c75326c32e5411f0a54babf6deefef7fc972b962a65eadde4d3231b68d65599e7257390523ade8b088fca57591f2726e6e04c5f22b20f8e71228c17d3ce04de8ed9bb283d8bd36d9fab3a8f0b3bf139deed8bd91fd57d0bddbd9345c509cea02c6e5174527ffa9f4770627b0d30076e885c92506005155a012c6a9d96d98f6a1b2868a0572dc0da8001b7cfc7d1f1c74745cf25e63f6cce9968705567220f2c35878d2461bc6298448124e32717cb0f47e196a876abd481f1201fb2400ed"}, {0x78, 0x0, 0x7fffffff, "6ebf3ccdfd84122f5b2241eb72878dfdba3ac7e27653f83e2b4f9d355e53573686e0f23c849de17f5175c3207ef8ab74a458a07808e6fc674e72e548b3e3dfd7025f60449577aef5af880b212a586ab549684ff081c1229990bb1b6026fee132dac217a45a"}, {0x1010, 0x111, 0x2, "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"}, {0xc8, 0x105, 0x3f, "0a0c0f4afae222da87be94bf4415140eee066305303d0beb3a2598100b84fb8b0e52671f8deaa78b62c4e150852bfef416230ffa8ce70beafae3cb30e5635ac881bf026f69a1cd549619901dc9fdfa83b93c2922d67c86de56257458b89d0849f781a314d94822dc0e3757df256ce86b741ca6d68c9e1b3542bf016a9c0b27332b3d09651eb34fd202cb3ebf164f9d374de28b1ed0343001c7bbe3c82504225da2275538a15d764a62cb1c66100ce9515944"}], 0x1340}, 0x880) sendmsg(r3, &(0x7f0000006500)={&(0x7f00000052c0)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f00000064c0)=[{&(0x7f0000005340)="f8851713106061324ab1ac8b18a976c914a37deb3ca39b3e99d6593c9287bffe74a4be52f436fc50b0787e62de9c7ee8e5da8301622f05747898c0c755f496759fddc3a6a0c27a38fa0011f8", 0x4c}, {&(0x7f00000053c0)="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", 0x1000}, {0xffffffffffffffff}, {&(0x7f00000063c0)="9e3833003e1c9d00f6c5e85f4f3d80ccc7716c2f30c25533b679dd1d0a143f17fa609d01bba13d4495c41f0609ede72ce2a7a86b89c8fe6406717d6538f319bff53c87c4ba7131288b73650eac4411a72ffbc12da1e425388719acfba6b71a3265bc15086fc216f5a1e1b4cc9533c8794171301c4f5577a0fb69ab0bb171bc423fcea5f8cc4cc922f8bf3311958a57bed5c763105687f3f4fa913ca82d61c2b7b5c19ddcdcccb6de3d82e26dc66276d4bb5c9ab2f538530d8441781813a8a2bacac349e42e49592473e8809443ffde275f059c8aa764", 0xd6}], 0x4}, 0x1) r7 = socket$kcm(0x29, 0x5, 0x0) sendmsg$tipc(r4, &(0x7f0000006d80)={0x0, 0x0, &(0x7f0000006cc0)=[{&(0x7f0000006540)="b3924eefff4803642f36198bb323d1caf1c4c6431992913ec3c0038552458eea7924d21c65cc5c2add9ee3b070e460d99514b59abd86cabb08b217370ba2f7d1fc64317c2f30ed8c11d9dcfadf7e5137d94863433973a6de5e1a9ab469f5c2790583011720acd85dc5224312686eb09ba8e35059035dad05c08e4be6593a30f715c476632eaaec568d20da9a7c0ec3375ced28952c703d070064066ae3078b3f0de2399414c291d6cf272cce8183b456700b43926ced30161bed", 0xba}, {&(0x7f0000006600)="34913da5556255bdfc271c9780aed1c915054be2aec21815c82390eb47523bbabf2186c89b248a9a658354f7d677c22d26fcc78dc8b69d7f02dcba7586705928dc2d826350bacdc42778db642f24a2716d87f6b41dc83a47daaeab9516fbed5b6f6c29b7ecd1197dc4290007f3e84e69b83c73bba1379f0e1608f2c931d13db5de369dff3654936d93c4cf87e70ae7fe2e0b690d7ca3f472fa4d02b70288cc505bc9bd9e28ebafe7498807e7ceeb0cd23f93fbad06c11eb521a39e462471819335352207d71413ae371427e3de99602570349194167f18a0723fb1769329c882a9f16adfc876f1949176af85669dfa84a2", 0xf1}, {&(0x7f0000006700)="d19caac63d4e053cddd371e029b2af179eac27b8a4754ac31793647823994d52adc4246bb29e09d06315e2994256777cfefe188fb5c38c3bf7f8c4f8fcfeef2cc1677053bd5d4387086b0119ebfbc42a9d1f3e9074fc6ef61db3d21be091ef20402c8684a264fabed2f687194629e4906613018d555eef24ad2aa49015392f729b1b1a72a13812819c36e82c9018420f45499b18eb4cb6b9e72055def8287276f055c868d60eccad3102de1c8ee9befb5c6ba23c765e7c39d08d3cef2225bb82646c044179874b", 0xc7}, {&(0x7f0000006800)="3d5161290d20802326ea114c803d2ad5e265f40ecb37bc72d19978f31cd9fa15a4031c4131f6c693ae488eff518a538e0946d3e0cab3430bb0643b70d5c9201a07ef461c024ac8e9bd579f9a13277ff03cdf90c4", 0x54}, {&(0x7f0000006880)="f7b08466aa35d80ffded9ea91aae12c911f2cf58092b29abfd91f05d79b264a4942a88ccbdc4f14262dbcb833c0bd165557c33e4932d6bb4d7ec84cd426ccf6e308b2bc18a185ca37ba506ac1d37448395ea83acbefb7a6ca3bf9c1e920c92537e29c9b1e54936", 0x67}, {&(0x7f0000006900)="63b19c02cb9625b67ff6f530e8f95e640e2858a50bc6e3c89ef5a6c13d2a4049310c7b8bc331be19f0e0b273fbd2d3734ca4849ddbc496b37cea22f39235bee9ab5b4bdca8537de9c96a7a8e3faf39bef58ed4e5ae5820313df20315b10f678bc09c910e018b50df655d477a03e3e214d30e864fad9aba05a89691b653131fde6510917ff39ef2f2f9ed4257a4b42ced468342ca090ce79edffa3ee1389900847115b2cb32a77ba6e7998d8e14716f225dd33bafc591e1b2650e0a80bf53737f3be1c7597adb9529bcff7b432a8f3ce67ec94a03dd6e101cb982eacf0a3e25b716377d59", 0xe4}, {&(0x7f0000006a00)="e830a00b4d2ff007f4c8a0fa70e408a7019d22b58f5f904f3c02f2960e0a906b0ede8d3d21412f3ae1e161a0c8c333077873dd3a7d3853fa78500aec83432a05733c9a639cdef1fc5c29c3fb9cccefb743bc54db7045f159ecba76881404efc62408dbda46a1bdd94effe58bbe78c46ef08b017cfb2b7598654f0dd1e42af8f3391d89a9bdfdd2644684e90e08ff5653b9b57429f5", 0x95}, {&(0x7f0000006ac0)="ffa2bccd82ab193cf77c0712ca87e14f0e008bcc13e35fa3336c80390a42f8f27d4e7090624a2c33d1b02b7b7b0b0e7c65787fe0e988a479141edbb566892916723f9f04317558402a40646094d34e5dba531bac7b9c868bfa642cd4456344962c2c9bcc95ccc62c67bc5396124ffb7a0548da9211c1022c1a4edbd6e35c2cdda59ee34e0c3af6fa775aa74edf3a5d223f997ca5fab29fbbf3da9c522f64a30b06651d6c722e19af3b5d070aa53210407f469276bcf173b63035c7b3c0405a960308", 0xc2}, {&(0x7f0000006bc0)="1f62da3bef7b5056dde9b1f50b4c821b67831890d5ee2511bd8ba13c009ce856559e7aede6813264f489daa68ea7b3dcab0dc1922ec34be6e73e1c9552ff75", 0x3f}, {&(0x7f0000006c00)="6f439967e825c77f790fa32659a84642cdb9e29efba5ff46cbfb6a4c67746661496c9ee60f78ba7cb7e70c23553fba6b5e70c4b3412d8a72993d020a8ee175d983df726655b94a6c3ee981c6eeb2cb305ee8c1d11bb3a8f32cc3cae49b9f1a8f7985e7a78479f98f31ddb06e65d5a2b3640b61fa34ceac4f7feb1bfba6c4b83ca814b4dc69eb55cc4f3b78da92149d1ca8608564270d33addc5d2161d520d648c878f356e07cbea08989cfb02049e03e3668bd48d715e358c756b7c3eb81", 0xbe}], 0xa, 0x0, 0x0, 0x20000000}, 0x40) socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000006dc0)={r7, r2}) sendmsg(r6, &(0x7f0000009740)={&(0x7f0000006e00)=@rxrpc=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e20, 0x1, @local, 0x100000000}}, 0x80, &(0x7f00000091c0)=[{&(0x7f0000006e80)="fd2c926029d8e49a46584e9b41c1f1012c9875d72d16206c33862c3b5d970d66d595bde49c62d994cbe1f50ae038d451d56e1ae23aed52e106f5dd078038aea47bfa6e713e00eeb81d2611128d38c89238539c5b01bf0d6be0a64e489acb0827daefd39ca395f8022d4e96f77effbdc3e50520b1c772ec0d804e41d1b002d58415", 0x81}, {&(0x7f0000006f40)="40dd28b5f76bfce52e683250c7f06943f3146c3f8fda7d0b086cde46e8c5e6f9fb5b91673079cedd72a662422da4c89c43c155cdb5259c45ec100ca5f3bc545a26105e5d10304ad4ac8465a2abc1a824710f8deeed42f20ff2d4433ebe1eab84450c086cbf2f8e9d0d2c68c66b93704274094cfed2a0", 0x76}, {&(0x7f0000006fc0)="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", 0x1000}, {&(0x7f0000007fc0)="bfe0e20e17a1990af835ce239d0ad5489ca61733a419dcc7a3710d0308abbdca899526a79a7337f58c0cb0913af328274020a37d0965d0143fb7e8dc4dcc10ccdd81770f6e0a24e62c737cd37a2ec15a469a34c533a24ef63c68de290afd6ed7e0fe316de851", 0x66}, {&(0x7f0000008040)="622da9bde648b7da3b", 0x9}, {&(0x7f0000008080)="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", 0x1000}, {&(0x7f0000009080)="b73441374efec014b5e9044083af7078d38d95d12ffac7411471d73b741a4f302b8b7c6b8db2d9d85407fab5ffcd870ffa451575cc39", 0x36}, {&(0x7f00000090c0)="780b51b5c1951899f085cd4941a57f12e5ac7b18dfb3d32a6e9e8b8187a595930b4f098e4c58a39f84c520e5cd563ee89e1bac2e20cc7db3f110643e17ec7335bccf87b08a04f9e9a7adc856f9f2bc3e70896d8566582d7e7e4c7545df96afd863ec221f2841b78ea4eaed11d445cdfffbc0a88fb217d7c9d48847368594e64ee59f535e646a4eba4225f8f0e3293d8588a8efd504e0e9eef376468bc68e23e80215688ce851120b58c3a91666b52a07a04df3363200870ec6af4c9c6aa56e09f916931f1e755a921fdf9db7174e8b8c7c7494201c99311493cb0466a9220bba55fe", 0xe2}], 0x8, &(0x7f0000009240)=[{0xe8, 0x11b, 0x2, "e2f9dd03769c9818bb57bc884fbb39319e4075f0559a28cda98aefe7192d6994d6e92ba8d146ad7b1e31b2040c4a2d7aa49dd7d900d514407187c49808641305265d0484666dc978feb7de1add37ac283c35b7e0e6bb7e811c9822c0f3769fa8c33fdeaaa0eba1836ef5b1c028d5fe90d09ae189c98c8ccc24195d82736d5fc2c2fe4b0f010f2a7c1c161972b30b92ea31c2731f581f57fae9a3d1f845cc5f09325a63d56fffb473b7dbb3b2d2ccb3e590eda90601785aa54b3b0f9e00676484e8e942cd8f20f6c38ecf06d995f30c71dcc4aad6"}, {0x98, 0x1, 0xf0, "2b48b107e272559afb088a2edd8f3199963c1a3e7c689c1011799e3b8015275182b9fa7469867c95dc5a9058142a2faddf2a83d9aaa564af535f716c79efdf530571d79cf2dd8987361b8859d9c064ac4d0e6dbb62600688e5ca1cf2c7b9f54f6dfd530e4fac8d6be56f6b4e05ad793b4f7940ac35aff2ea3406b191b76fe43262270abc"}, {0xe8, 0x11, 0x3, "a36b82f15d85d4f74490706fccaf9b31d30d8179a8af4db5b4382b184dabbff3167ebc69510e57eeaf86d44a61ea6c575a52273e19518ff1d34a30bc38018f442e029be7babd5f5cbe17ac7ccab1ce6ff04356206bf745d6847fc4cfeb2ad2bf77635487a4102bfa5c340ae3d56315d3d991b3b5018edb82a0ea34278dc3a4e5d2a5fad789ac1c569cb47a93ececb36c6217da886c40fa276b5c13569c402c5e69183dba0fa14b8774de3f3ff2c145821cca7da1155c8361b86c13fcefc917da82e8f6e7258f4df785fc6824ed33d7e5653dd9406e2b06"}, {0x110, 0x11f, 0xfffffffffffffffd, "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"}, {0xa8, 0x10c, 0x10000, "add2525cb1aafc8d583f43c7c15666fd79a22200e987809b6a17f93b28c0c6ae86a83f8fd89be83a1502d817fef5b15a0ec696eb8eadc6d6d6ab92476d9dcc6e867925cf36dbf6aee808ee17f1419379fd23728a43b046ad048493f8732ec169a16e30970da17d451aa3cb3264ee3ebe08e4fb8fab90b8cf67c90dae4504c6697cd6080235478f299894a93cc3c4e84076"}, {0x58, 0x113, 0x100000001, "301b07aa95360767817ed1b31d1f59a3eaec4d1969ea924940a202cdf3e33d0e8fca8f366862bcebcc7b6494ed89646a56901a554136cf4bcb0fb24e773224cd746d29de3de8"}, {0x38, 0x129, 0x8, "7d30de9debb5830e74c7b3e45c6388737df1883f5655d413cb9ddea18c58e55d6d"}, {0x50, 0x114, 0xfffffffffffffff7, "801984c5e48cd40812d62584b9569a7d8b342fd4be11b6aed316f63615d4030d2748dabe7d3bcff2c939cd8362817f53214aea90c97c91a44c79a4"}], 0x500}, 0x48001) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000009780)={0xffffffffffffffff, 0x6, 0x8}, 0xc) recvmsg(r1, &(0x7f00000099c0)={&(0x7f00000097c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f00000098c0)=[{&(0x7f0000009840)=""/72, 0x48}], 0x1, &(0x7f0000009900)=""/185, 0xb9}, 0x1) r10 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000009a00)='cpu.stat\x00', 0x0, 0x0) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000009a40)={0x9, 0x100000001, 0x4, 0x9, 0x11, r8, 0x5, [], r9, r10, 0x5, 0x1}, 0x3c) close(r4) openat$cgroup(r10, &(0x7f0000009a80)='syz1\x00', 0x200002, 0x0) sendmsg$tipc(r5, &(0x7f0000009c40)={&(0x7f0000009ac0)=@id={0x1e, 0x3, 0x7bd1fc9727f59c45, {0x4e20, 0x4}}, 0x10, &(0x7f0000009bc0)=[{&(0x7f0000009b00)="9674e3cb68608aafd29c85542c5d118a6c41d95f9cf92284fbe9c1897b5cff559e5174d8cdfb704c6b84ab2b0a8832f2bdf8813c32b84a79b4603b0dc82d6dd209bf925219ec8a7a83060ac525f5480187b68236cd74bc445940d57d0fe54d76e13c0de986cb7fa83e40b59d0d3e779fd656fd347431e4db63616c370d0954e454511ddc2727043303e63432caca3a4bce41dde04bb0fa9c70e052e9cbfd5e307ca04e947374f3022dea52f7b41265a6cc9531", 0xb3}], 0x1, &(0x7f0000009c00)="b8c1cab3276745ef7956fc4c81f6b635664d89df97a237da4efd771e911864c2d4ab45ca9d779f913b91fd234870a4e64c1e9a37", 0x34, 0x810}, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000009c80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000009cc0)=0x10001, 0x4) sendmsg(r10, &(0x7f000000c640)={0x0, 0x0, &(0x7f000000a300)=[{&(0x7f0000009d00)="f2b57f8680e452bd89d26e9647a3d3ade3db2c90dd5f938a", 0x18}, {&(0x7f0000009d40)="e3bebc406accd96dba85d4b7c114c6804cbf013e8908338aaaeb6f4729cd65ec0615ad14dd43d51269023c4ea5843aa3c2e0fd84962b49eab1d11fcdcdbec7064e3ca34af407aac72757d78e9bad182cae8d9479a7e6e770f54b69a147ee41401fdf7a690ea7b859b35b3308c1f8ebe19ee03181e416e1ed73f8d45aee1b22db94372bb3df22cee795bedd93f766e39b018c0afa047c0b294544d4ce92da43d92a995610b288096e317ef2dab8a6232aaf764391f688b989dcbda431e3b7b936", 0xc0}, {&(0x7f0000009e00)="dd5f9ac190e08b630149e0c4066817eb504516d50bd009bb9806e8b64b74f812544b6f61e4f629006183719e21a9e4aeda2eeb3cd487ff61c0b175217faf989935634d21f86b003293e6085206b299a18890489327ebf1bb7f4eefcaf95b7d17fe93dbca0dd311f35cf409b67342b9ac21f7a9ab369d19d5d8d3fab197b54c4d3e5ef5c8430c36cc098f56392305a3daf4bfcdd5a53874c25c39c6b8a15ea14a8dfae3", 0xa3}, {&(0x7f0000009ec0)="6effc9dd54b66eadf1e939fc60c0a5e32ddf3a12861de0299f68e7041ae356aab85215306b2a08290a1867c0c8a899663dfd1e4895742212a06260f738f13c0e21a8363bcae74d2e0eeea82d8eaf30736581d90eeb71ed65fa44856fd7d46a83792e8484cd82b79441ad442cf40e3583e3b94e534095d66b0ee48182c9c27e3f88cb864b2e50fc3bee4e0fa1cd6618195d768a401b14d5fbf8e226f9bf03a1965caaa78b4fedc010ea2a9659acbdc5dfb81ecdcb01ef6d92ad51", 0xba}, {&(0x7f0000009f80)="4ff2091263b6edce5cf752138d3eadc6ff9ff884bf2c65a99435b9a0d4c414ad2831b6816b9262a56847de581ffa223a2258206cc956bde0171de2c1e445c0993a902a0d2b8470004704615fdfd4962e6ec48b2ab629974241bd845b05c77cd1732aa7207c85bf4c2adfc12724fe12", 0x6f}, {&(0x7f000000a000)}, {&(0x7f000000a040)="1fd3f7717944cc550d6f6b90cff03ecc98cb61c122afa71a0947dfa8e68777c2ef247c0a072da878fd4fe5e8628ca66d42d1facd0fcd967c299c50c4486358d41ca0a6a817eec0f48c66fadba3f46176b0b437dc96637509e8fe8df208c314565d608f077a9692ff0197aa3c97960c382f316345c34c3f89d8aeb349e05e3b8d8e5e4585fd", 0x85}, {&(0x7f000000a100)="89311a3c9e5143b968ad8f0758857dfd96d0717a20fcc4ab6a9fa41ad1ef6568d9ad0fabf5c9f9e5429e04ca3e19687b02af5081b03017421d08832417e0778e834743328e585200b05f10e7c9b7834a758e54c02681e68c7a733bf9a281785e73af603c42d57f86aa334db68477307cfd70280710437df94f7f70e4df2c0e6682f4db9111cbf4d314760d1b771d1fc015db4511c843b29a055f84021fc4fa3414ed608063558741a044dbeab7f817e1745d0f8acc906be17fc9efdaf6af367e81437fa76f01b56d", 0xc8}, {&(0x7f000000a200)="afd2220728b5550e9342e1f17fbe462859ee37c5d50020efca00296b4a922848dd3689843a2c8f47dbaffc18e6471ba250aabe90c5f8af831dcc598dc0115be1fd1a3e9ef8f57d404fc0810a910da8426672666aff806093f0baa8c74af798efa056c03e7409a61427c4534083265db2dac636fc8e75c2b3f1180cdbbecd6df54435020a0ee730050912467720cbb14f7d7976083ee7e4de47c939e59c7949d0324bb60fb60b3aae0034c694abec54c78370244bf591aa995abd91af105bf5e8b8c3384c0888bd1733b17e", 0xcb}], 0x9, &(0x7f000000a3c0)=[{0x48, 0x11f, 0x7, "0b06a689637fa3cecb435b240b8d0bb0d8e385986f12fede5e46d03a32ec0cf0a0ccf3ce9b1ed33591cf4815ce3886d541fcfa45f39e78"}, {0x60, 0x10c, 0x8671, "099651cf1ce0c9d65178eb5b6e0e324f0ade0281891178a96756695ab741e8b21e403bba614974cc80242ea960b804f8ebdb332b5ff059e34421f7bb454584d9c9e87052fd0e539bb3ceff"}, {0xf8, 0x10b, 0xfffffffffffffff9, "abbed08b70b589a3762605bfd53d280b93505399691c13f2f335e9cb9340026da35a5600dfcd5ab8a703f7749f0e595ffe438ee44f3c1e64a222b01ee9641be5a4c92dabd749f01f059dd8a04da5e12b498ad5d4cc18df1a00983bc6d050ccf0a58b047e45aaa0dc57e2818377f3d56f3c562262eaaa4600490bdcdd177e2b7f9dfa8a14b6e32699090fa08ffc4f864de17dafe65c7011b0d3fbaa84562a6c6059e0c30b9b4b4e187262135f8ef0dd31af22371ab3e9d022270f03cb66bc7d602c2bd9b98c9f49f9ea4821bf76df999c443ad237e924a71bdf6154bebcfee1f0e3cd36"}, {0x18, 0x112, 0x7, "e9806e"}, {0x1010, 0x1bf, 0x246, "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"}, {0x50, 0x119, 0x3, "a5943e064d76ad59d2211fb2bfb9f5a7b23a038cbc2a4f87e034c380755d07323507b3c3393398302a7174521767bb45b9f271896cb1fd5777"}, {0x1010, 0x0, 0x5, "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"}, {0x20, 0x0, 0x8, "fd332f544c7a84a8f064"}], 0x2248}, 0x0) close(r11) recvmsg$kcm(r0, &(0x7f000000ca80)={&(0x7f000000c680)=@nfc, 0x80, &(0x7f000000c940)=[{&(0x7f000000c700)=""/226, 0xe2}, {&(0x7f000000c800)=""/225, 0xe1}, {&(0x7f000000c900)=""/18, 0x12}], 0x3, &(0x7f000000c980)=""/240, 0xf0}, 0x100) r13 = gettid() perf_event_open(&(0x7f000000cac0)={0x5, 0x70, 0x9, 0x101, 0x7, 0xa1, 0x0, 0x100, 0x80, 0x4, 0x4, 0x80000001, 0x8000, 0xe9e4, 0x1f, 0x8, 0x401, 0x0, 0xff, 0xb08c, 0x7, 0x4, 0x10000, 0x1000, 0x100000000, 0x6, 0x7fff, 0x1e, 0x7, 0x9, 0x7, 0x5, 0x5, 0x5, 0x5, 0x1, 0x5, 0x5, 0x0, 0x4, 0x0, @perf_config_ext={0x7fff, 0x8}, 0x0, 0x401, 0x9, 0x7, 0x2, 0x2c, 0xfffffffffffffffb}, r13, 0x3, r10, 0x1) openat$cgroup_ro(r10, &(0x7f000000cb40)='cpuset.memory_pressure\x00', 0x0, 0x0) openat$cgroup_procs(r12, &(0x7f000000cb80)='cgroup.procs\x00', 0x2, 0x0) 16:39:15 executing program 4 (fault-call:5 fault-nth:45): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) [ 197.227420][T14031] FAULT_INJECTION: forcing a failure. [ 197.227420][T14031] name failslab, interval 1, probability 0, space 0, times 0 [ 197.251311][T14031] CPU: 1 PID: 14031 Comm: syz-executor.4 Not tainted 5.1.0-rc2+ #82 [ 197.259332][T14031] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 197.269386][T14031] Call Trace: [ 197.272712][T14031] dump_stack+0x172/0x1f0 [ 197.277049][T14031] should_fail.cold+0xa/0x15 [ 197.281640][T14031] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 197.287461][T14031] ? ___might_sleep+0x163/0x280 [ 197.292356][T14031] __should_failslab+0x121/0x190 [ 197.297291][T14031] should_failslab+0x9/0x14 [ 197.301802][T14031] kmem_cache_alloc_node_trace+0x270/0x720 [ 197.307612][T14031] __kmalloc_node_track_caller+0x3d/0x70 [ 197.313231][T14031] __kmalloc_reserve.isra.0+0x40/0xf0 [ 197.318604][T14031] __alloc_skb+0x10b/0x5e0 [ 197.323038][T14031] ? skb_trim+0x190/0x190 [ 197.327369][T14031] ? skb_page_frag_refill+0x127/0x460 [ 197.332739][T14031] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 197.338458][T14031] ? skb_put+0x177/0x1d0 [ 197.342699][T14031] __ip_append_data.isra.0+0x24d6/0x2dd0 [ 197.348331][T14031] ? ip_reply_glue_bits+0xc0/0xc0 [ 197.353348][T14031] ? __ip_flush_pending_frames.isra.0+0x2d0/0x2d0 [ 197.359748][T14031] ? mark_held_locks+0xf0/0xf0 [ 197.364498][T14031] ? lock_sock_nested+0xac/0x120 [ 197.369435][T14031] ? ip_reply_glue_bits+0xc0/0xc0 [ 197.374452][T14031] ip_append_data.part.0+0xf2/0x170 [ 197.379640][T14031] ? ip_reply_glue_bits+0xc0/0xc0 [ 197.384669][T14031] ip_append_data+0x6e/0x90 [ 197.389168][T14031] udp_sendmsg+0x8e7/0x2820 [ 197.393673][T14031] ? finish_task_switch+0x146/0x780 [ 197.398872][T14031] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 197.405120][T14031] ? ip_reply_glue_bits+0xc0/0xc0 [ 197.410148][T14031] ? udp4_lib_lookup_skb+0x440/0x440 [ 197.415444][T14031] ? trace_hardirqs_on+0x67/0x230 [ 197.420463][T14031] ? kasan_check_read+0x11/0x20 [ 197.425303][T14031] ? _raw_spin_unlock_irq+0x5e/0x90 [ 197.430502][T14031] ? finish_task_switch+0x146/0x780 [ 197.435703][T14031] ? finish_task_switch+0x118/0x780 [ 197.440887][T14031] ? __switch_to_asm+0x34/0x70 [ 197.445637][T14031] ? __switch_to_asm+0x40/0x70 [ 197.450390][T14031] ? ___might_sleep+0x163/0x280 [ 197.455230][T14031] ? __might_sleep+0x95/0x190 [ 197.459909][T14031] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 197.465550][T14031] ? aa_sk_perm+0x288/0x880 [ 197.470075][T14031] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 197.475531][T14031] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 197.481069][T14031] inet_sendmsg+0x147/0x5e0 [ 197.485557][T14031] ? udp4_lib_lookup_skb+0x440/0x440 [ 197.490822][T14031] ? inet_sendmsg+0x147/0x5e0 [ 197.495484][T14031] ? ipip_gro_receive+0x100/0x100 [ 197.500496][T14031] sock_sendmsg+0xdd/0x130 [ 197.504916][T14031] sock_write_iter+0x27c/0x3e0 [ 197.509677][T14031] ? sock_sendmsg+0x130/0x130 [ 197.514344][T14031] ? aa_path_link+0x460/0x460 [ 197.519003][T14031] ? find_held_lock+0x35/0x130 [ 197.523754][T14031] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 197.529974][T14031] ? iov_iter_init+0xee/0x220 [ 197.534638][T14031] new_sync_write+0x4c7/0x760 [ 197.539301][T14031] ? default_llseek+0x2e0/0x2e0 [ 197.544145][T14031] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 197.549598][T14031] ? common_file_perm+0x238/0x720 [ 197.554624][T14031] ? apparmor_file_permission+0x25/0x30 [ 197.560166][T14031] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 197.566407][T14031] ? security_file_permission+0x94/0x380 [ 197.572040][T14031] __vfs_write+0xe4/0x110 [ 197.576358][T14031] vfs_write+0x20c/0x580 [ 197.580605][T14031] ksys_write+0xea/0x1f0 [ 197.584859][T14031] ? __ia32_sys_read+0xb0/0xb0 [ 197.589636][T14031] ? do_syscall_64+0x26/0x610 [ 197.594310][T14031] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 197.600369][T14031] ? do_syscall_64+0x26/0x610 [ 197.605052][T14031] __x64_sys_write+0x73/0xb0 [ 197.609644][T14031] do_syscall_64+0x103/0x610 [ 197.614221][T14031] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 197.620142][T14031] RIP: 0033:0x4582f9 [ 197.624046][T14031] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 197.643657][T14031] RSP: 002b:00007f6dcf2fbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 197.652083][T14031] RAX: ffffffffffffffda RBX: 00007f6dcf2fbc90 RCX: 00000000004582f9 [ 197.660056][T14031] RDX: 000000000000fdef RSI: 0000000020000280 RDI: 0000000000000005 [ 197.668015][T14031] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 16:39:16 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0xf6ac, &(0x7f0000002580)=[{&(0x7f0000000000), 0xfdde}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:16 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) [ 197.675985][T14031] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6dcf2fc6d4 [ 197.683972][T14031] R13: 00000000004c7ad0 R14: 00000000004ddba8 R15: 0000000000000006 16:39:16 executing program 1: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r4) recvmsg(r0, &(0x7f0000001840)={&(0x7f0000001480)=@can={0x1d, 0x0}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001500)=""/10, 0xa}, {&(0x7f0000001580)=""/73, 0x49}, {&(0x7f0000001600)=""/184, 0xb8}, {&(0x7f00000016c0)=""/101, 0x65}, {&(0x7f0000001740)=""/81, 0x51}], 0x5}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], r6, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x33c) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xfffffffffffffffc, 0x3}, 0xffb8) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x127) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r7) setsockopt$sock_attach_bpf(r8, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r8, &(0x7f0000001540)={&(0x7f0000000040), 0x10, 0x0}, 0x0) close(r8) 16:39:16 executing program 4 (fault-call:5 fault-nth:46): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) 16:39:16 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) 16:39:16 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0xf6ac, &(0x7f0000002580)=[{&(0x7f0000000000), 0xfdde}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) [ 197.912545][T14053] FAULT_INJECTION: forcing a failure. [ 197.912545][T14053] name failslab, interval 1, probability 0, space 0, times 0 [ 197.952114][T14053] CPU: 1 PID: 14053 Comm: syz-executor.4 Not tainted 5.1.0-rc2+ #82 [ 197.962836][T14053] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 197.972904][T14053] Call Trace: [ 197.976218][T14053] dump_stack+0x172/0x1f0 [ 197.980566][T14053] should_fail.cold+0xa/0x15 [ 197.985169][T14053] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 197.990994][T14053] ? ___might_sleep+0x163/0x280 [ 197.995865][T14053] __should_failslab+0x121/0x190 [ 198.000813][T14053] should_failslab+0x9/0x14 [ 198.005325][T14053] kmem_cache_alloc_node_trace+0x270/0x720 [ 198.011151][T14053] __kmalloc_node_track_caller+0x3d/0x70 [ 198.011176][T14053] __kmalloc_reserve.isra.0+0x40/0xf0 [ 198.011193][T14053] __alloc_skb+0x10b/0x5e0 [ 198.011224][T14053] ? skb_trim+0x190/0x190 [ 198.030965][T14053] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 198.036694][T14053] ? skb_put+0x177/0x1d0 [ 198.040962][T14053] __ip_append_data.isra.0+0x24d6/0x2dd0 [ 198.046688][T14053] ? ip_reply_glue_bits+0xc0/0xc0 [ 198.051741][T14053] ? __ip_flush_pending_frames.isra.0+0x2d0/0x2d0 [ 198.058168][T14053] ? mark_held_locks+0xf0/0xf0 [ 198.062944][T14053] ? lock_sock_nested+0xac/0x120 [ 198.067926][T14053] ? ip_reply_glue_bits+0xc0/0xc0 [ 198.072961][T14053] ip_append_data.part.0+0xf2/0x170 [ 198.078175][T14053] ? ip_reply_glue_bits+0xc0/0xc0 [ 198.083204][T14053] ip_append_data+0x6e/0x90 [ 198.083227][T14053] udp_sendmsg+0x8e7/0x2820 [ 198.083251][T14053] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 198.097689][T14053] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 198.097707][T14053] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 16:39:16 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r4) recvmsg(r0, &(0x7f0000001840)={&(0x7f0000001480)=@can={0x1d, 0x0}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001500)=""/10, 0xa}, {&(0x7f0000001580)=""/73, 0x49}, {&(0x7f0000001600)=""/184, 0xb8}, {&(0x7f00000016c0)=""/101, 0x65}, {&(0x7f0000001740)=""/81, 0x51}], 0x5}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], r6, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x33c) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xfffffffffffffffc, 0x3}, 0xffb8) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x127) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r7) setsockopt$sock_attach_bpf(r8, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r8, &(0x7f0000001540)={&(0x7f0000000040), 0x10, 0x0}, 0x0) close(r8) 16:39:16 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) 16:39:16 executing program 2: r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0x9) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000280)='cpuset.sched_load_balance\x00', 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000000)=0xf4, 0x11) 16:39:16 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0xf6ac, &(0x7f0000002580)=[{&(0x7f0000000000), 0xfdde}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) [ 198.097731][T14053] ? retint_kernel+0x2d/0x2d [ 198.114007][T14053] ? ip_reply_glue_bits+0xc0/0xc0 [ 198.119058][T14053] ? udp4_lib_lookup_skb+0x440/0x440 [ 198.124360][T14053] ? retint_kernel+0x2d/0x2d [ 198.128971][T14053] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 198.134453][T14053] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 198.139926][T14053] ? lockdep_hardirqs_on+0x418/0x5d0 [ 198.145218][T14053] ? retint_kernel+0x2d/0x2d [ 198.149811][T14053] ? trace_hardirqs_on_caller+0x6a/0x220 [ 198.149831][T14053] ? trace_hardirqs_on_thunk+0x1a/0x1c 16:39:16 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x100000000) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x20000054) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x400002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000140)=[{0x3, 0x1, 0x1ff, 0x9}, {0x80, 0x6, 0x6, 0x8}]}) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="2e0000002300817ee45de087185082cf0124b0eba06ec4a86e8f32e00586f9835b3f00009148790000f8de84c5e2", 0x2e}], 0x1}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) r3 = openat$cgroup_ro(r0, &(0x7f0000000000)='rdma.current\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)={r1, r3}) [ 198.149851][T14053] ? retint_kernel+0x2d/0x2d [ 198.149878][T14053] inet_sendmsg+0x147/0x5e0 [ 198.170021][T14053] ? udp4_lib_lookup_skb+0x440/0x440 [ 198.175330][T14053] ? inet_sendmsg+0x147/0x5e0 [ 198.180035][T14053] ? ipip_gro_receive+0x100/0x100 [ 198.185080][T14053] sock_sendmsg+0xdd/0x130 [ 198.189511][T14053] sock_write_iter+0x27c/0x3e0 [ 198.194303][T14053] ? sock_sendmsg+0x130/0x130 [ 198.199003][T14053] ? aa_path_link+0x460/0x460 [ 198.203701][T14053] ? find_held_lock+0x35/0x130 [ 198.208480][T14053] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 198.214729][T14053] ? iov_iter_init+0xee/0x220 [ 198.214751][T14053] new_sync_write+0x4c7/0x760 [ 198.214771][T14053] ? default_llseek+0x2e0/0x2e0 [ 198.214792][T14053] ? common_file_perm+0x238/0x720 [ 198.224132][T14053] ? __fget+0x381/0x550 [ 198.224156][T14053] ? apparmor_file_permission+0x25/0x30 [ 198.224172][T14053] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 198.224195][T14053] ? security_file_permission+0x94/0x380 [ 198.253806][T14074] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 198.255591][T14053] __vfs_write+0xe4/0x110 [ 198.255613][T14053] vfs_write+0x20c/0x580 [ 198.255634][T14053] ksys_write+0xea/0x1f0 [ 198.255653][T14053] ? __ia32_sys_read+0xb0/0xb0 [ 198.255671][T14053] ? do_syscall_64+0x26/0x610 [ 198.255695][T14053] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 198.271253][T14073] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 198.273520][T14053] ? do_syscall_64+0x26/0x610 [ 198.273545][T14053] __x64_sys_write+0x73/0xb0 [ 198.273564][T14053] do_syscall_64+0x103/0x610 [ 198.273585][T14053] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 198.273603][T14053] RIP: 0033:0x4582f9 [ 198.282794][T14076] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.2'. [ 198.287249][T14053] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 198.287259][T14053] RSP: 002b:00007f6dcf2fbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 16:39:17 executing program 4 (fault-call:5 fault-nth:47): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) 16:39:17 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) 16:39:17 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0xf6ac, &(0x7f0000002580)=[{&(0x7f0000000000), 0xfdde}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) [ 198.287274][T14053] RAX: ffffffffffffffda RBX: 00007f6dcf2fbc90 RCX: 00000000004582f9 [ 198.287283][T14053] RDX: 000000000000fdef RSI: 0000000020000280 RDI: 0000000000000005 [ 198.287291][T14053] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 198.287299][T14053] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6dcf2fc6d4 [ 198.287316][T14053] R13: 00000000004c7ad0 R14: 00000000004ddba8 R15: 0000000000000006 [ 198.295473][T14073] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 198.514167][T14088] FAULT_INJECTION: forcing a failure. [ 198.514167][T14088] name failslab, interval 1, probability 0, space 0, times 0 [ 198.538765][T14088] CPU: 1 PID: 14088 Comm: syz-executor.4 Not tainted 5.1.0-rc2+ #82 [ 198.546794][T14088] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 198.556855][T14088] Call Trace: [ 198.560166][T14088] dump_stack+0x172/0x1f0 [ 198.564508][T14088] should_fail.cold+0xa/0x15 [ 198.569098][T14088] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 198.574919][T14088] ? ___might_sleep+0x163/0x280 [ 198.579754][T14088] __should_failslab+0x121/0x190 [ 198.584678][T14088] should_failslab+0x9/0x14 [ 198.589183][T14088] kmem_cache_alloc_node+0x264/0x710 [ 198.594459][T14088] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 198.600696][T14088] __alloc_skb+0xd5/0x5e0 [ 198.605007][T14088] ? skb_trim+0x190/0x190 [ 198.609320][T14088] ? skb_page_frag_refill+0x127/0x460 [ 198.614690][T14088] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 198.620389][T14088] ? skb_put+0x177/0x1d0 [ 198.624612][T14088] __ip_append_data.isra.0+0x24d6/0x2dd0 [ 198.630232][T14088] ? ip_reply_glue_bits+0xc0/0xc0 [ 198.635243][T14088] ? __ip_flush_pending_frames.isra.0+0x2d0/0x2d0 [ 198.641639][T14088] ? mark_held_locks+0xf0/0xf0 [ 198.646384][T14088] ? lock_sock_nested+0xac/0x120 [ 198.651303][T14088] ? ip_reply_glue_bits+0xc0/0xc0 [ 198.656312][T14088] ip_append_data.part.0+0xf2/0x170 [ 198.661496][T14088] ? ip_reply_glue_bits+0xc0/0xc0 [ 198.666504][T14088] ip_append_data+0x6e/0x90 [ 198.670990][T14088] udp_sendmsg+0x8e7/0x2820 [ 198.675506][T14088] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 198.681729][T14088] ? __lock_acquire+0x548/0x3fb0 [ 198.686661][T14088] ? ip_reply_glue_bits+0xc0/0xc0 [ 198.691669][T14088] ? udp4_lib_lookup_skb+0x440/0x440 [ 198.696937][T14088] ? is_bpf_text_address+0xac/0x170 [ 198.702129][T14088] ? find_held_lock+0x35/0x130 [ 198.706877][T14088] ? is_bpf_text_address+0xac/0x170 [ 198.712064][T14088] ? ___might_sleep+0x163/0x280 [ 198.716985][T14088] ? __might_sleep+0x95/0x190 [ 198.721642][T14088] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 198.727254][T14088] ? aa_sk_perm+0x288/0x880 [ 198.731740][T14088] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 198.737268][T14088] inet_sendmsg+0x147/0x5e0 [ 198.741751][T14088] ? udp4_lib_lookup_skb+0x440/0x440 [ 198.747037][T14088] ? inet_sendmsg+0x147/0x5e0 [ 198.751695][T14088] ? ipip_gro_receive+0x100/0x100 [ 198.756703][T14088] sock_sendmsg+0xdd/0x130 [ 198.761109][T14088] sock_write_iter+0x27c/0x3e0 [ 198.765861][T14088] ? sock_sendmsg+0x130/0x130 [ 198.770527][T14088] ? aa_path_link+0x460/0x460 [ 198.775206][T14088] ? find_held_lock+0x35/0x130 [ 198.779970][T14088] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 198.786206][T14088] ? iov_iter_init+0xee/0x220 [ 198.790866][T14088] new_sync_write+0x4c7/0x760 [ 198.795532][T14088] ? default_llseek+0x2e0/0x2e0 [ 198.800367][T14088] ? common_file_perm+0x238/0x720 [ 198.805372][T14088] ? __fget+0x381/0x550 [ 198.809513][T14088] ? apparmor_file_permission+0x25/0x30 [ 198.815046][T14088] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 198.821270][T14088] ? security_file_permission+0x94/0x380 [ 198.826887][T14088] __vfs_write+0xe4/0x110 [ 198.831219][T14088] vfs_write+0x20c/0x580 [ 198.835461][T14088] ksys_write+0xea/0x1f0 [ 198.839701][T14088] ? __ia32_sys_read+0xb0/0xb0 [ 198.844455][T14088] ? do_syscall_64+0x26/0x610 [ 198.849119][T14088] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 198.855170][T14088] ? do_syscall_64+0x26/0x610 [ 198.859831][T14088] __x64_sys_write+0x73/0xb0 [ 198.864406][T14088] do_syscall_64+0x103/0x610 [ 198.868985][T14088] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 198.874855][T14088] RIP: 0033:0x4582f9 [ 198.878730][T14088] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 198.898318][T14088] RSP: 002b:00007f6dcf2fbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 198.906726][T14088] RAX: ffffffffffffffda RBX: 00007f6dcf2fbc90 RCX: 00000000004582f9 16:39:17 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040), 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe7d, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) close(r1) sendmsg$tipc(0xffffffffffffffff, 0x0, 0xc000) socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x20004050) close(0xffffffffffffffff) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) r3 = socket$kcm(0x2, 0x1000000000000002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_pid(r2, &(0x7f0000000240)=r0, 0x12) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r3, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) openat$cgroup_ro(r5, &(0x7f0000000200)='cpuacct.usage_percpu\x00', 0x0, 0x0) write$cgroup_subtree(r3, &(0x7f0000000080)=ANY=[@ANYBLOB="008620e3dda90cad8a6fb174ca4d32bcf3fccf4bcf5e62b1031451419790cd5c12c7643ea5e2184c6ed10f8e9360bed13d326fda1222503ed0625baa5554fce7845efb659d8c55442b88ab093ccebf8ccded101a4a4dc206e49bb10a59c0308d5983013acf523399cf066571d8804d56c536438bc22f70d4686eadd76c1ae6dcb4da5f7ede56584e3ce398f01b7f616eb5d15794b351f254e87031ba35377693d1990881d9b16eb983e5ee83c075259a224a0440630bfdd0e383dcdb850450fc7c8e258a0a4cc98f795836d09321249d42c8773f"], 0xde) 16:39:17 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) 16:39:17 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0xf6ac, &(0x7f0000002580)=[{&(0x7f0000000000), 0xfdde}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:17 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000001c0)=r3, 0x4) sendmsg(r1, &(0x7f0000002400)={&(0x7f0000000000)=@ethernet={0x307, @link_local}, 0x80, 0x0}, 0x0) sendmsg(r0, &(0x7f00000005c0)={&(0x7f0000000280)=@pptp={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000300)="9180bbce32591fdae269afa03cc2d3c3f375f8d4e84d177f70ebee9dad50d7dba7b1a1c399728924a5f261f1116181cf873f99d411d0027a12dd6560fb0fc166634f5d72397b72", 0x47}, {&(0x7f0000000380)="a09590109b", 0x5}], 0x2, &(0x7f0000000400)=[{0x88, 0x0, 0x5, "c60f6db3644bc6d3f0463a07d875643f253fa0181723eb0b912f73ffc7e03d9975aebca6f0915fbc8b921cba4c60680e65360ec515a4ac628c6d90d9c6d2236f6c4b897568e56f94e9011a6c9b7ee6768f9a99169719b94117c2b3a3712dcd8fecbaa48cb9d67af428c82f382f47c06dbecffbaa0c5dfa"}, {0xd8, 0x12f, 0x7, "9403ab691254791b81acf0cd965bb88db644c5dd42014c57e41dc4b248bf02359ed38565ba5975fa10e7610e030da16b13d9c1ce25926c26b07870235fccb0967656530410e2b7fa9f772df9e22a2d6cace8c4035375929f329e80dd14732f9f2e9f31f66b081e815531e941ba8bb91661f08c10604624a2e18f87e13dddaab9b85988f38747611b479746554aac6bc8a18cbfbc6a9a96275fad065aa6c0b10509ce39e46e9c1ecc974895e576ba71a9063b1b03eabf5ce436189bb6be3014540cec"}, {0x60, 0x102, 0xffff, "db724b0a0e7be59b19c867275be583e1d3dd3cd904dcf9a978a3b152c570af8af70bc4bf68503fd7332bed22bfa769e2d16ac2b69aee914a0ba46636a1270f6f4488d04e9f375c6f93ab"}], 0x1c0}, 0x20000000) openat$cgroup_type(r0, &(0x7f00000000c0)='cgroup.type\x00', 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r2, &(0x7f0000000100)="2ee6442af0ad55b3e7c230ba866837e51cf9d91abddb5c3271266b649cc939a687a24140458ad78c69a32f0cebebbdca10e5db41bd7fe088513513ada0", &(0x7f0000000200)=""/73}, 0x18) [ 198.914683][T14088] RDX: 000000000000fdef RSI: 0000000020000280 RDI: 0000000000000005 [ 198.922642][T14088] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 198.930597][T14088] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6dcf2fc6d4 [ 198.938553][T14088] R13: 00000000004c7ad0 R14: 00000000004ddba8 R15: 0000000000000006 16:39:17 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r4) recvmsg(r0, &(0x7f0000001840)={&(0x7f0000001480)=@can={0x1d, 0x0}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001500)=""/10, 0xa}, {&(0x7f0000001580)=""/73, 0x49}, {&(0x7f0000001600)=""/184, 0xb8}, {&(0x7f00000016c0)=""/101, 0x65}, {&(0x7f0000001740)=""/81, 0x51}], 0x5}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], r6, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x33c) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xfffffffffffffffc, 0x3}, 0xffb8) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x127) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r7) setsockopt$sock_attach_bpf(r8, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r8, &(0x7f0000001540)={&(0x7f0000000040), 0x10, 0x0}, 0x0) close(r8) 16:39:17 executing program 4 (fault-call:5 fault-nth:48): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) 16:39:17 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) [ 199.114530][T14110] FAULT_INJECTION: forcing a failure. [ 199.114530][T14110] name failslab, interval 1, probability 0, space 0, times 0 16:39:17 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0xffffffffffffffff, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000200)={'veth0_to_bridge\x00', 0x200}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000240)={0x0, 0x0}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x3, 0x44, 0x5, 0x0, 0x1, 0x8000, 0x0, 0xfffffffffffffff7, 0x0, 0x1, 0x0, 0xfffffffffffffff7, 0x8, 0x7, 0x7, 0x0, 0x6, 0x2, 0x5, 0x4, 0x6, 0x4, 0x38b, 0x7ff, 0x7, 0x2, 0x0, 0x5, 0x4, 0x9, 0x4, 0x2, 0xd5, 0x94, 0x8, 0x8, 0xd880, 0x1000000000000000, 0x0, 0xfff, 0x2, @perf_bp={0x0, 0x6}, 0x40, 0x5, 0x7ff, 0x2, 0xae, 0x2, 0x9}, 0xffffffffffffffff, 0x40000000001, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x526) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@ethernet={0x306, @local}, 0x80, 0x0, 0x429b2d922a086600}, 0x80) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) write$cgroup_int(r0, &(0x7f00000000c0)=0x80, 0x12) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) openat$cgroup_ro(r3, &(0x7f0000000100)='cpu.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000400)) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) [ 199.188525][T14110] CPU: 1 PID: 14110 Comm: syz-executor.4 Not tainted 5.1.0-rc2+ #82 [ 199.196582][T14110] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 199.206647][T14110] Call Trace: [ 199.209960][T14110] dump_stack+0x172/0x1f0 [ 199.214308][T14110] should_fail.cold+0xa/0x15 [ 199.218929][T14110] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 199.224753][T14110] ? ___might_sleep+0x163/0x280 [ 199.229613][T14110] __should_failslab+0x121/0x190 [ 199.234561][T14110] should_failslab+0x9/0x14 [ 199.239076][T14110] kmem_cache_alloc_node_trace+0x270/0x720 [ 199.244906][T14110] __kmalloc_node_track_caller+0x3d/0x70 [ 199.250561][T14110] __kmalloc_reserve.isra.0+0x40/0xf0 [ 199.255960][T14110] __alloc_skb+0x10b/0x5e0 [ 199.260395][T14110] ? skb_trim+0x190/0x190 [ 199.264747][T14110] ? skb_page_frag_refill+0x127/0x460 [ 199.270133][T14110] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 199.275859][T14110] ? skb_put+0x177/0x1d0 [ 199.280115][T14110] __ip_append_data.isra.0+0x24d6/0x2dd0 [ 199.285782][T14110] ? ip_reply_glue_bits+0xc0/0xc0 [ 199.290835][T14110] ? __ip_flush_pending_frames.isra.0+0x2d0/0x2d0 [ 199.297258][T14110] ? mark_held_locks+0xf0/0xf0 [ 199.302037][T14110] ? lock_sock_nested+0xac/0x120 [ 199.306982][T14110] ? ip_reply_glue_bits+0xc0/0xc0 [ 199.312014][T14110] ip_append_data.part.0+0xf2/0x170 [ 199.317235][T14110] ? ip_reply_glue_bits+0xc0/0xc0 [ 199.322269][T14110] ip_append_data+0x6e/0x90 [ 199.326789][T14110] udp_sendmsg+0x8e7/0x2820 [ 199.331332][T14110] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 199.337584][T14110] ? __lock_acquire+0x548/0x3fb0 [ 199.342533][T14110] ? ip_reply_glue_bits+0xc0/0xc0 [ 199.347571][T14110] ? udp4_lib_lookup_skb+0x440/0x440 [ 199.352869][T14110] ? is_bpf_text_address+0xac/0x170 [ 199.358074][T14110] ? find_held_lock+0x35/0x130 [ 199.362852][T14110] ? is_bpf_text_address+0xac/0x170 [ 199.368073][T14110] ? ___might_sleep+0x163/0x280 [ 199.372961][T14110] ? __might_sleep+0x95/0x190 [ 199.377649][T14110] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 199.383291][T14110] ? aa_sk_perm+0x288/0x880 [ 199.387812][T14110] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 199.393368][T14110] inet_sendmsg+0x147/0x5e0 [ 199.397878][T14110] ? udp4_lib_lookup_skb+0x440/0x440 [ 199.403176][T14110] ? inet_sendmsg+0x147/0x5e0 [ 199.407860][T14110] ? ipip_gro_receive+0x100/0x100 [ 199.412894][T14110] sock_sendmsg+0xdd/0x130 [ 199.417323][T14110] sock_write_iter+0x27c/0x3e0 [ 199.422130][T14110] ? sock_sendmsg+0x130/0x130 [ 199.426822][T14110] ? aa_path_link+0x460/0x460 [ 199.431503][T14110] ? find_held_lock+0x35/0x130 16:39:18 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0xffffffffffffffff, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000200)={'veth0_to_bridge\x00', 0x200}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000240)={0x0, 0x0}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x0) perf_event_open(&(0x7f0000000440)={0x3, 0x44, 0x5, 0x0, 0x1, 0x8000, 0x0, 0xfffffffffffffff7, 0x0, 0x1, 0x0, 0xfffffffffffffff7, 0x8, 0x7, 0x7, 0x0, 0x6, 0x2, 0x5, 0x4, 0x6, 0x4, 0x38b, 0x7ff, 0x7, 0x2, 0x0, 0x5, 0x4, 0x9, 0x4, 0x2, 0xd5, 0x94, 0x8, 0x8, 0xd880, 0x1000000000000000, 0x0, 0xfff, 0x2, @perf_bp={0x0, 0x6}, 0x40, 0x5, 0x7ff, 0x2, 0xae, 0x2, 0x9}, 0xffffffffffffffff, 0x40000000001, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x526) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@ethernet={0x306, @local}, 0x80, 0x0, 0x429b2d922a086600}, 0x80) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) write$cgroup_int(r0, &(0x7f00000000c0)=0x80, 0x12) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000280)) openat$cgroup_ro(r3, &(0x7f0000000100)='cpu.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000400)) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) [ 199.436277][T14110] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 199.442528][T14110] ? iov_iter_init+0xee/0x220 [ 199.447218][T14110] new_sync_write+0x4c7/0x760 [ 199.451910][T14110] ? default_llseek+0x2e0/0x2e0 [ 199.456781][T14110] ? common_file_perm+0x238/0x720 [ 199.461810][T14110] ? __fget+0x381/0x550 [ 199.465978][T14110] ? apparmor_file_permission+0x25/0x30 [ 199.471538][T14110] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 199.477790][T14110] ? security_file_permission+0x94/0x380 [ 199.483449][T14110] __vfs_write+0xe4/0x110 [ 199.487792][T14110] vfs_write+0x20c/0x580 [ 199.492054][T14110] ksys_write+0xea/0x1f0 [ 199.496306][T14110] ? __ia32_sys_read+0xb0/0xb0 [ 199.501077][T14110] ? do_syscall_64+0x26/0x610 [ 199.505762][T14110] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 199.511836][T14110] ? do_syscall_64+0x26/0x610 [ 199.516529][T14110] __x64_sys_write+0x73/0xb0 [ 199.521133][T14110] do_syscall_64+0x103/0x610 [ 199.525735][T14110] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 199.531628][T14110] RIP: 0033:0x4582f9 [ 199.535528][T14110] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 199.555142][T14110] RSP: 002b:00007f6dcf2fbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 199.563562][T14110] RAX: ffffffffffffffda RBX: 00007f6dcf2fbc90 RCX: 00000000004582f9 [ 199.571814][T14110] RDX: 000000000000fdef RSI: 0000000020000280 RDI: 0000000000000005 [ 199.579800][T14110] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 16:39:18 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x0, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0xf6ac, &(0x7f0000002580)=[{&(0x7f0000000000), 0xfdde}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:18 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) 16:39:18 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r5) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3}, 0x2c) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x33c) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xfffffffffffffffc, 0x3}, 0xffb8) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x127) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) r9 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x18, &(0x7f0000000100)='.wlan1keyringmd5sumeth1\x00'}, 0x30) perf_event_open(&(0x7f00000001c0)={0x4, 0x70, 0xfffffffffffff001, 0x10001, 0x0, 0x9, 0x0, 0x9, 0x12000, 0x4, 0x4, 0x1f8, 0xd0, 0x401, 0x1, 0x80000000, 0x5, 0x2, 0x8, 0x2, 0x6, 0x5, 0x1, 0x3e2, 0x2c, 0x5, 0x40, 0x1, 0x3, 0x3f, 0x9, 0xfff, 0x4, 0x7ff, 0x7f, 0x8, 0x2, 0x20, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000000c0), 0x1}, 0x181, 0x800, 0x3, 0x0, 0x7, 0x2}, r9, 0xf, r10, 0x0) close(r7) setsockopt$sock_attach_bpf(r8, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r8, &(0x7f0000001540)={&(0x7f0000000040), 0x10, 0x0}, 0x0) [ 199.587784][T14110] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6dcf2fc6d4 [ 199.595763][T14110] R13: 00000000004c7ad0 R14: 00000000004ddba8 R15: 0000000000000006 16:39:18 executing program 2: r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x4, 0x70, 0x2, 0x4, 0x8001, 0x1000, 0x0, 0x7f, 0x8000, 0x8, 0x80000001, 0x0, 0x1000, 0x2, 0x10001, 0x0, 0x6, 0x1b26, 0x7, 0x557, 0x9, 0x2, 0x1f, 0x0, 0x4, 0x9, 0x9, 0x7f, 0x3, 0x80000000, 0x3ff, 0x3, 0x0, 0x4, 0x9, 0xff, 0x3, 0x2, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000000), 0x2}, 0x20000, 0xac3d, 0x100000000, 0x2, 0x8001, 0x1, 0x4}, 0xffffffffffffffff, 0xf, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000140)={0x0, 0x70, 0x8343, 0x20, 0x2, 0x716d, 0x0, 0x1ff, 0x2, 0x3, 0x7, 0xc5, 0x9, 0x8, 0x0, 0x7ff, 0x4, 0x5, 0x0, 0x1, 0x804, 0x8964, 0x8, 0x7, 0x6, 0x3d0, 0x6, 0x4b8, 0x1245, 0x3, 0x0, 0x2, 0x0, 0x4, 0x100000001, 0x8, 0x0, 0x40, 0x0, 0x2, 0x0, @perf_config_ext, 0x94, 0x200000000000000, 0x6, 0x7, 0x7, 0xfffffffffffffffd, 0x2}) r1 = socket$kcm(0xa, 0x6, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x8901, &(0x7f0000000100)) 16:39:18 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) 16:39:18 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0xf6ac, &(0x7f0000002580)=[{&(0x7f0000000000), 0xfdde}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:18 executing program 4 (fault-call:5 fault-nth:49): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) 16:39:18 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r4) recvmsg(r0, &(0x7f0000001840)={&(0x7f0000001480)=@can={0x1d, 0x0}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001500)=""/10, 0xa}, {&(0x7f0000001580)=""/73, 0x49}, {&(0x7f0000001600)=""/184, 0xb8}, {&(0x7f00000016c0)=""/101, 0x65}, {&(0x7f0000001740)=""/81, 0x51}], 0x5}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], r6, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x33c) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xfffffffffffffffc, 0x3}, 0xffb8) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x127) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r7) setsockopt$sock_attach_bpf(r8, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r8) 16:39:18 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18, 0xae3}}, 0x0, 0x1a}, 0x20) r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x4, 0x9, 0x9, 0x1, 0x0, 0x0, 0x8, 0x1, 0x7f, 0x4, 0x80000001, 0x4, 0x4, 0xfffffffffffffffd, 0x8d5a, 0x9, 0x3, 0x1, 0x18, 0x7, 0x800, 0xfff, 0x0, 0x6a, 0x9, 0x6, 0xffff, 0x8, 0x1, 0x10001, 0x4, 0x0, 0x8000, 0x0, 0x176, 0x8, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040), 0xa}, 0x8000, 0x0, 0x8, 0x5, 0xfffffffffffff800, 0x7fffffff, 0x6}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x50) 16:39:18 executing program 2: recvmsg$kcm(0xffffffffffffff9c, &(0x7f000000c680)={&(0x7f000000b540)=@hci={0x1f, 0x0}, 0x80, &(0x7f000000c640)=[{&(0x7f000000b5c0)=""/4096, 0x1000}, {&(0x7f000000c5c0)=""/91, 0x5b}, {&(0x7f000000d000)=""/4096, 0x1000}], 0x3}, 0x2) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000000c6c0)=0xffffffffffffffff, 0x4) bpf$PROG_LOAD(0x5, &(0x7f000000c780)={0x13, 0x2, &(0x7f0000000040)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x7}], &(0x7f0000000080)='GPL\x00', 0xb40e, 0x0, 0x0, 0x41000, 0x1, [], r0, 0xf, r1, 0x8, &(0x7f000000c700)={0x428e, 0x1}, 0x8, 0x10, &(0x7f000000c740)={0x63b, 0x5, 0x200, 0x8000}, 0x10}, 0x70) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x5c}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 16:39:18 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) 16:39:18 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0xf6ac, &(0x7f0000002580)=[{&(0x7f0000000000), 0xfdde}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) [ 199.921081][T14158] FAULT_INJECTION: forcing a failure. [ 199.921081][T14158] name failslab, interval 1, probability 0, space 0, times 0 [ 199.953721][T14158] CPU: 1 PID: 14158 Comm: syz-executor.4 Not tainted 5.1.0-rc2+ #82 [ 199.961757][T14158] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 199.971821][T14158] Call Trace: [ 199.975148][T14158] dump_stack+0x172/0x1f0 [ 199.979500][T14158] should_fail.cold+0xa/0x15 [ 199.984109][T14158] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 199.989926][T14158] ? ___might_sleep+0x163/0x280 [ 199.995562][T14158] __should_failslab+0x121/0x190 [ 200.000510][T14158] should_failslab+0x9/0x14 [ 200.005018][T14158] kmem_cache_alloc_node+0x264/0x710 [ 200.010314][T14158] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 200.016571][T14158] __alloc_skb+0xd5/0x5e0 [ 200.020908][T14158] ? skb_trim+0x190/0x190 [ 200.025240][T14158] ? skb_page_frag_refill+0x127/0x460 [ 200.030614][T14158] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 200.036333][T14158] ? skb_put+0x177/0x1d0 [ 200.040577][T14158] __ip_append_data.isra.0+0x24d6/0x2dd0 [ 200.046219][T14158] ? ip_reply_glue_bits+0xc0/0xc0 [ 200.051260][T14158] ? __ip_flush_pending_frames.isra.0+0x2d0/0x2d0 [ 200.057674][T14158] ? mark_held_locks+0xf0/0xf0 [ 200.062447][T14158] ? lock_sock_nested+0xac/0x120 [ 200.067384][T14158] ? ip_reply_glue_bits+0xc0/0xc0 [ 200.072408][T14158] ip_append_data.part.0+0xf2/0x170 [ 200.077618][T14158] ? ip_reply_glue_bits+0xc0/0xc0 [ 200.082657][T14158] ip_append_data+0x6e/0x90 [ 200.087167][T14158] udp_sendmsg+0x8e7/0x2820 [ 200.091677][T14158] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 200.097921][T14158] ? __lock_acquire+0x548/0x3fb0 [ 200.102859][T14158] ? ip_reply_glue_bits+0xc0/0xc0 [ 200.107891][T14158] ? udp4_lib_lookup_skb+0x440/0x440 [ 200.113182][T14158] ? is_bpf_text_address+0xac/0x170 [ 200.118389][T14158] ? find_held_lock+0x35/0x130 [ 200.123165][T14158] ? is_bpf_text_address+0xac/0x170 [ 200.128375][T14158] ? ___might_sleep+0x163/0x280 [ 200.133229][T14158] ? __might_sleep+0x95/0x190 [ 200.137908][T14158] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 200.143553][T14158] ? aa_sk_perm+0x288/0x880 [ 200.148069][T14158] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 200.153639][T14158] inet_sendmsg+0x147/0x5e0 [ 200.158138][T14158] ? udp4_lib_lookup_skb+0x440/0x440 [ 200.163420][T14158] ? inet_sendmsg+0x147/0x5e0 [ 200.168106][T14158] ? ipip_gro_receive+0x100/0x100 [ 200.173134][T14158] sock_sendmsg+0xdd/0x130 [ 200.177553][T14158] sock_write_iter+0x27c/0x3e0 [ 200.182321][T14158] ? sock_sendmsg+0x130/0x130 [ 200.187004][T14158] ? aa_path_link+0x460/0x460 [ 200.191682][T14158] ? find_held_lock+0x35/0x130 [ 200.196452][T14158] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 200.202696][T14158] ? iov_iter_init+0xee/0x220 [ 200.207374][T14158] new_sync_write+0x4c7/0x760 [ 200.212063][T14158] ? default_llseek+0x2e0/0x2e0 [ 200.216919][T14158] ? common_file_perm+0x238/0x720 [ 200.221946][T14158] ? __fget+0x381/0x550 [ 200.226112][T14158] ? apparmor_file_permission+0x25/0x30 [ 200.231657][T14158] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 200.237896][T14158] ? security_file_permission+0x94/0x380 [ 200.243532][T14158] __vfs_write+0xe4/0x110 [ 200.247894][T14158] vfs_write+0x20c/0x580 [ 200.252145][T14158] ksys_write+0xea/0x1f0 [ 200.256391][T14158] ? __ia32_sys_read+0xb0/0xb0 [ 200.261166][T14158] ? do_syscall_64+0x26/0x610 [ 200.265842][T14158] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 200.271910][T14158] ? do_syscall_64+0x26/0x610 [ 200.276592][T14158] __x64_sys_write+0x73/0xb0 [ 200.281188][T14158] do_syscall_64+0x103/0x610 [ 200.285781][T14158] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 200.291684][T14158] RIP: 0033:0x4582f9 [ 200.295582][T14158] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 200.315185][T14158] RSP: 002b:00007f6dcf2fbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 200.323601][T14158] RAX: ffffffffffffffda RBX: 00007f6dcf2fbc90 RCX: 00000000004582f9 [ 200.331580][T14158] RDX: 000000000000fdef RSI: 0000000020000280 RDI: 0000000000000005 [ 200.339554][T14158] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 200.347539][T14158] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6dcf2fc6d4 [ 200.355519][T14158] R13: 00000000004c7ad0 R14: 00000000004ddba8 R15: 0000000000000006 16:39:19 executing program 1: r0 = socket$kcm(0xa, 0x7ec52efd55c8e645, 0x0) recvmsg(r0, &(0x7f0000003300)={0x0, 0xfffffffffffffff4, 0x0, 0x0, 0x0, 0xfffffde6}, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000640)={0xffffffffffffff9c}) recvmsg(0xffffffffffffffff, 0x0, 0x40000000) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x1a, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000700000000000000ff00000000f031fffffdffffff070e0000030000009500000000000000"], &(0x7f0000000200)='syzkaller\x00', 0x4, 0x3, &(0x7f0000000240)=""/3, 0x41f00, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x7, 0x9}, 0x8, 0x10, &(0x7f00000002c0)={0x3, 0xfffffffffffff800, 0x4, 0x5}, 0x10}, 0x70) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) close(0xffffffffffffffff) write$cgroup_int(r2, &(0x7f0000000080), 0x12) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={r3, 0x3, 0x1, 0x8, &(0x7f0000000000)=[0x0], 0x1}, 0x20) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000100)={r0}) 16:39:19 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0xf6ac, &(0x7f0000002580)=[{&(0x7f0000000000), 0xfdde}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:19 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) 16:39:19 executing program 4 (fault-call:5 fault-nth:50): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) 16:39:19 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x3c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffff9c, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fff8, 0x0, 0x820004, 0x0}, 0x2c) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) 16:39:19 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) 16:39:19 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, 0x0, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0xf6ac, &(0x7f0000002580)=[{&(0x7f0000000000), 0xfdde}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) [ 200.637602][T14185] FAULT_INJECTION: forcing a failure. [ 200.637602][T14185] name failslab, interval 1, probability 0, space 0, times 0 [ 200.669975][T14185] CPU: 0 PID: 14185 Comm: syz-executor.4 Not tainted 5.1.0-rc2+ #82 [ 200.678025][T14185] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 200.688138][T14185] Call Trace: [ 200.691459][T14185] dump_stack+0x172/0x1f0 [ 200.695808][T14185] should_fail.cold+0xa/0x15 [ 200.700419][T14185] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 200.706257][T14185] ? ___might_sleep+0x163/0x280 [ 200.711129][T14185] __should_failslab+0x121/0x190 [ 200.716137][T14185] should_failslab+0x9/0x14 [ 200.720652][T14185] kmem_cache_alloc_node_trace+0x270/0x720 [ 200.726490][T14185] __kmalloc_node_track_caller+0x3d/0x70 [ 200.732142][T14185] __kmalloc_reserve.isra.0+0x40/0xf0 [ 200.737535][T14185] __alloc_skb+0x10b/0x5e0 [ 200.741960][T14185] ? skb_trim+0x190/0x190 [ 200.746298][T14185] ? __ip_append_data.isra.0+0x18bd/0x2dd0 [ 200.752121][T14185] __ip_append_data.isra.0+0x24d6/0x2dd0 [ 200.757776][T14185] ? ip_reply_glue_bits+0xc0/0xc0 [ 200.762826][T14185] ? __ip_flush_pending_frames.isra.0+0x2d0/0x2d0 [ 200.769258][T14185] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 200.774739][T14185] ? ip_reply_glue_bits+0xc0/0xc0 [ 200.774756][T14185] ip_append_data.part.0+0xf2/0x170 [ 200.774776][T14185] ? ip_reply_glue_bits+0xc0/0xc0 [ 200.774795][T14185] ip_append_data+0x6e/0x90 [ 200.785008][T14185] udp_sendmsg+0x8e7/0x2820 [ 200.799012][T14185] ? lock_downgrade+0x880/0x880 [ 200.803872][T14185] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 200.810130][T14185] ? ip_reply_glue_bits+0xc0/0xc0 [ 200.815172][T14185] ? udp4_lib_lookup_skb+0x440/0x440 [ 200.820479][T14185] ? trace_hardirqs_on_caller+0x6a/0x220 [ 200.826165][T14185] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 200.831646][T14185] ? ___might_sleep+0x163/0x280 [ 200.836545][T14185] ? __might_sleep+0x95/0x190 [ 200.841247][T14185] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 200.846881][T14185] ? aa_sk_perm+0x288/0x880 [ 200.851382][T14185] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 200.856851][T14185] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 200.862397][T14185] inet_sendmsg+0x147/0x5e0 [ 200.866908][T14185] ? udp4_lib_lookup_skb+0x440/0x440 [ 200.872189][T14185] ? inet_sendmsg+0x147/0x5e0 [ 200.876867][T14185] ? ipip_gro_receive+0x100/0x100 [ 200.881895][T14185] sock_sendmsg+0xdd/0x130 [ 200.886317][T14185] sock_write_iter+0x27c/0x3e0 [ 200.891081][T14185] ? sock_sendmsg+0x130/0x130 [ 200.895784][T14185] ? aa_path_link+0x460/0x460 [ 200.900461][T14185] ? find_held_lock+0x35/0x130 [ 200.905223][T14185] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 200.911471][T14185] ? iov_iter_init+0xee/0x220 [ 200.916161][T14185] new_sync_write+0x4c7/0x760 [ 200.920842][T14185] ? default_llseek+0x2e0/0x2e0 [ 200.925696][T14185] ? common_file_perm+0x238/0x720 [ 200.930718][T14185] ? __fget+0x381/0x550 [ 200.934874][T14185] ? apparmor_file_permission+0x25/0x30 [ 200.940444][T14185] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 200.946694][T14185] ? security_file_permission+0x94/0x380 [ 200.952329][T14185] __vfs_write+0xe4/0x110 [ 200.956661][T14185] vfs_write+0x20c/0x580 [ 200.960906][T14185] ksys_write+0xea/0x1f0 [ 200.965149][T14185] ? __ia32_sys_read+0xb0/0xb0 [ 200.969926][T14185] __x64_sys_write+0x73/0xb0 [ 200.974514][T14185] ? do_syscall_64+0x5b/0x610 [ 200.979195][T14185] do_syscall_64+0x103/0x610 [ 200.983787][T14185] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 200.991152][T14185] RIP: 0033:0x4582f9 [ 200.995047][T14185] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 201.014661][T14185] RSP: 002b:00007f6dcf2fbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 201.023080][T14185] RAX: ffffffffffffffda RBX: 00007f6dcf2fbc90 RCX: 00000000004582f9 [ 201.031057][T14185] RDX: 000000000000fdef RSI: 0000000020000280 RDI: 0000000000000005 [ 201.039032][T14185] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 201.047008][T14185] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6dcf2fc6d4 [ 201.054982][T14185] R13: 00000000004c7ad0 R14: 00000000004ddba8 R15: 0000000000000006 16:39:19 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r4) recvmsg(r0, &(0x7f0000001840)={&(0x7f0000001480)=@can={0x1d, 0x0}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001500)=""/10, 0xa}, {&(0x7f0000001580)=""/73, 0x49}, {&(0x7f0000001600)=""/184, 0xb8}, {&(0x7f00000016c0)=""/101, 0x65}, {&(0x7f0000001740)=""/81, 0x51}], 0x5}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], r6, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x33c) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xfffffffffffffffc, 0x3}, 0xffb8) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x127) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r7) close(r8) 16:39:19 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x4, 0x70, 0x0, 0x8, 0x8, 0x100, 0x0, 0x3f, 0x20340, 0x5, 0xaba9, 0xd3, 0x2, 0x0, 0x9, 0xc0, 0x0, 0x0, 0x30d7, 0xffffffffc9055641, 0x3, 0x7, 0x7fffffff, 0x0, 0x8b47000000000, 0x401, 0x6, 0xfffffffffffffffa, 0x100000000, 0x80000000, 0x7, 0xdb32, 0x10001, 0x9, 0x80200000, 0x8, 0xfff, 0x9, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x8000, 0x2, 0x1, 0xd, 0x59, 0xffff, 0x10000000}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0xb) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000005c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_cpus\x00', 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xa, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x6}, [@alu={0x0, 0x6e53, 0x6, 0x2, 0x1, 0xffffffffffffffff, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, @alu={0x7, 0x849c, 0xb, 0x0, 0xa, 0xfffffffffffffffc, 0xffffffffffffffff}, @alu={0x7, 0x3, 0xf, 0x3, 0x7, 0x40, 0x4eaebb767b7c0baf}, @map={0x18, 0xb, 0x1, 0x0, 0xffffffffffffff9c}]}, &(0x7f0000000100)='GPL\x00', 0x10001, 0xdc, &(0x7f0000000340)=""/220, 0x40f00, 0x1, [], 0x0, 0xf, 0xffffffffffffff9c, 0x8, &(0x7f0000000440)={0x3, 0xc25}, 0x8, 0x10, &(0x7f0000000480)={0x0, 0x7, 0x1, 0x72}, 0x10}, 0x70) ioctl$TUNSETFILTEREBPF(r2, 0x800454e1, &(0x7f0000000540)=r3) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000240)='cpu\t&-6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='cpu\t&-6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') 16:39:19 executing program 4 (fault-call:5 fault-nth:51): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) 16:39:19 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, 0x0, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0xf6ac, &(0x7f0000002580)=[{&(0x7f0000000000), 0xfdde}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:19 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) 16:39:19 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2100, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.swap.current\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000580)={r1, &(0x7f0000000100)="9ff77ea95f17a7d0357c1974bdfc50deb21101", &(0x7f00000004c0)=""/152}, 0x18) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000400)={0x1, 0x3, [@dev={[], 0x14}, @random="d0c87d5f2b2f", @empty]}) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380)=0xffffffffffffffff, 0x4) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f00000003c0)=r2) r3 = socket$kcm(0x10, 0x2, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x1, &(0x7f0000000080)=@raw=[@alu={0x7, 0x2, 0x7, 0x8, 0x7, 0x86, 0xfffffffffffffffd}], &(0x7f00000000c0)='GPL\x00', 0xfffffffffffffff9, 0x4e, &(0x7f0000000180)=""/78, 0x4000000041f00, 0x1, [], 0x0, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x7, 0x8001}, 0x8, 0x10, &(0x7f0000000240)={0xc8, 0x1, 0x3da, 0x9}, 0x10}, 0x70) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000300)={&(0x7f0000000040)='./file0\x00', r4}, 0x10) sendmsg$kcm(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000440)="2e0000002b008163e45ae087000000000d0f0000000000bc4cc91b4dd65b2f0580cb7023072a556d1c958c000000", 0x2e}], 0x1}, 0x0) 16:39:19 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, 0x0, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0xf6ac, &(0x7f0000002580)=[{&(0x7f0000000000), 0xfdde}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:19 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) [ 201.284149][T14217] FAULT_INJECTION: forcing a failure. [ 201.284149][T14217] name failslab, interval 1, probability 0, space 0, times 0 [ 201.343521][T14217] CPU: 1 PID: 14217 Comm: syz-executor.4 Not tainted 5.1.0-rc2+ #82 [ 201.351526][T14217] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 201.351533][T14217] Call Trace: [ 201.351559][T14217] dump_stack+0x172/0x1f0 [ 201.351583][T14217] should_fail.cold+0xa/0x15 [ 201.351604][T14217] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 201.351625][T14217] ? ___might_sleep+0x163/0x280 [ 201.351646][T14217] __should_failslab+0x121/0x190 [ 201.351662][T14217] should_failslab+0x9/0x14 [ 201.351686][T14217] kmem_cache_alloc_node+0x264/0x710 [ 201.399221][T14217] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 201.399246][T14217] __alloc_skb+0xd5/0x5e0 [ 201.399263][T14217] ? skb_trim+0x190/0x190 [ 201.399278][T14217] ? skb_page_frag_refill+0x127/0x460 [ 201.399293][T14217] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 201.399312][T14217] ? skb_put+0x177/0x1d0 [ 201.414442][T14217] __ip_append_data.isra.0+0x24d6/0x2dd0 [ 201.425548][T14217] ? ip_reply_glue_bits+0xc0/0xc0 16:39:20 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x10001, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000080)=r1) r2 = socket$kcm(0x2, 0x1, 0x0) sendmsg(r2, &(0x7f0000000700)={0x0, 0x0, 0x0}, 0x44804) 16:39:20 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) [ 201.425578][T14217] ? __ip_flush_pending_frames.isra.0+0x2d0/0x2d0 [ 201.425594][T14217] ? mark_held_locks+0xf0/0xf0 [ 201.425612][T14217] ? perf_trace_lock+0x510/0x510 [ 201.456535][T14217] ? lock_sock_nested+0xac/0x120 [ 201.461484][T14217] ? ip_reply_glue_bits+0xc0/0xc0 [ 201.466516][T14217] ip_append_data.part.0+0xf2/0x170 [ 201.471724][T14217] ? ip_reply_glue_bits+0xc0/0xc0 [ 201.476752][T14217] ip_append_data+0x6e/0x90 [ 201.481268][T14217] udp_sendmsg+0x8e7/0x2820 [ 201.485783][T14217] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 16:39:20 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0xf6ac, &(0x7f0000002580)=[{&(0x7f0000000000), 0xfdde}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) [ 201.492036][T14217] ? __lock_acquire+0x548/0x3fb0 [ 201.496976][T14217] ? ip_reply_glue_bits+0xc0/0xc0 [ 201.502019][T14217] ? udp4_lib_lookup_skb+0x440/0x440 [ 201.507323][T14217] ? is_bpf_text_address+0xac/0x170 [ 201.512538][T14217] ? find_held_lock+0x35/0x130 [ 201.517300][T14217] ? is_bpf_text_address+0xac/0x170 [ 201.522501][T14217] ? ___might_sleep+0x163/0x280 [ 201.522519][T14217] ? __might_sleep+0x95/0x190 [ 201.522537][T14217] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 201.522556][T14217] ? aa_sk_perm+0x288/0x880 16:39:20 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0xf6ac, &(0x7f0000002580)=[{&(0x7f0000000000), 0xfdde}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) [ 201.542180][T14217] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 201.547733][T14217] inet_sendmsg+0x147/0x5e0 [ 201.552241][T14217] ? udp4_lib_lookup_skb+0x440/0x440 [ 201.557530][T14217] ? inet_sendmsg+0x147/0x5e0 [ 201.562210][T14217] ? ipip_gro_receive+0x100/0x100 [ 201.567237][T14217] sock_sendmsg+0xdd/0x130 [ 201.571660][T14217] sock_write_iter+0x27c/0x3e0 [ 201.576439][T14217] ? sock_sendmsg+0x130/0x130 [ 201.581133][T14217] ? aa_path_link+0x460/0x460 [ 201.585809][T14217] ? find_held_lock+0x35/0x130 [ 201.590578][T14217] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 201.596827][T14217] ? iov_iter_init+0xee/0x220 [ 201.601515][T14217] new_sync_write+0x4c7/0x760 [ 201.606203][T14217] ? default_llseek+0x2e0/0x2e0 [ 201.611075][T14217] ? common_file_perm+0x238/0x720 [ 201.616109][T14217] ? __fget+0x381/0x550 [ 201.620273][T14217] ? apparmor_file_permission+0x25/0x30 [ 201.625822][T14217] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 201.632073][T14217] ? security_file_permission+0x94/0x380 [ 201.637718][T14217] __vfs_write+0xe4/0x110 [ 201.642059][T14217] vfs_write+0x20c/0x580 [ 201.646315][T14217] ksys_write+0xea/0x1f0 [ 201.650573][T14217] ? __ia32_sys_read+0xb0/0xb0 [ 201.655342][T14217] ? do_syscall_64+0x26/0x610 [ 201.660033][T14217] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 201.666100][T14217] ? do_syscall_64+0x26/0x610 [ 201.670784][T14217] __x64_sys_write+0x73/0xb0 [ 201.675386][T14217] do_syscall_64+0x103/0x610 [ 201.675407][T14217] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 201.675418][T14217] RIP: 0033:0x4582f9 [ 201.675446][T14217] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 201.685896][T14217] RSP: 002b:00007f6dcf2dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 201.685912][T14217] RAX: ffffffffffffffda RBX: 00007f6dcf2dac90 RCX: 00000000004582f9 [ 201.685921][T14217] RDX: 000000000000fdef RSI: 0000000020000280 RDI: 0000000000000005 [ 201.685930][T14217] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 201.685938][T14217] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6dcf2db6d4 [ 201.685953][T14217] R13: 00000000004c7ad0 R14: 00000000004ddba8 R15: 0000000000000006 16:39:20 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r4) recvmsg(r0, &(0x7f0000001840)={&(0x7f0000001480)=@can={0x1d, 0x0}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001500)=""/10, 0xa}, {&(0x7f0000001580)=""/73, 0x49}, {&(0x7f0000001600)=""/184, 0xb8}, {&(0x7f00000016c0)=""/101, 0x65}, {&(0x7f0000001740)=""/81, 0x51}], 0x5}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], r6, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x33c) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xfffffffffffffffc, 0x3}, 0xffb8) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x127) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r7) close(r8) 16:39:20 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) 16:39:20 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0xf6ac, &(0x7f0000002580)=[{&(0x7f0000000000), 0xfdde}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:20 executing program 1: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) socket$kcm(0x29, 0x2, 0x0) socket$kcm(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000000)=r1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) sendmsg$kcm(r3, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r3, &(0x7f0000000500)=ANY=[@ANYBLOB="0100000000000000bb55a7e95475421b1199719a7e62d4afcbef923167dbc0969d59d519ac1a7c0a575e9fd8f53dc96a5c11664127171422a33fca464eb241342c0c8cec98085a6233db8c54f9c7db152768534612dd5707044f3ffa4ab76d9ba2aa34af52376c13007d23fb39000000000000000000000000643d000000000000000000000000000000000000aec9478031ef5cbdba81d9ac828bc7e434914327"], 0xa1) 16:39:20 executing program 4 (fault-call:5 fault-nth:52): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) 16:39:20 executing program 2: getpid() ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x100000000000001) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x10) socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x300) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$tipc(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000240)}, 0x0) socket$kcm(0x2, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) socket$kcm(0x29, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000440), 0x12) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000012c0)={0x0, 0x0, 0x0}, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) [ 202.185838][T14251] FAULT_INJECTION: forcing a failure. [ 202.185838][T14251] name failslab, interval 1, probability 0, space 0, times 0 [ 202.225311][T14251] CPU: 0 PID: 14251 Comm: syz-executor.4 Not tainted 5.1.0-rc2+ #82 [ 202.233306][T14251] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 202.243360][T14251] Call Trace: [ 202.246659][T14251] dump_stack+0x172/0x1f0 [ 202.251002][T14251] should_fail.cold+0xa/0x15 [ 202.251025][T14251] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 202.251050][T14251] ? ___might_sleep+0x163/0x280 [ 202.251073][T14251] __should_failslab+0x121/0x190 [ 202.251092][T14251] should_failslab+0x9/0x14 [ 202.251112][T14251] kmem_cache_alloc_node_trace+0x270/0x720 [ 202.251142][T14251] __kmalloc_node_track_caller+0x3d/0x70 [ 202.261516][T14251] __kmalloc_reserve.isra.0+0x40/0xf0 [ 202.261541][T14251] __alloc_skb+0x10b/0x5e0 [ 202.261559][T14251] ? skb_trim+0x190/0x190 [ 202.261577][T14251] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 202.261591][T14251] ? skb_put+0x177/0x1d0 [ 202.261611][T14251] __ip_append_data.isra.0+0x24d6/0x2dd0 [ 202.261633][T14251] ? ip_reply_glue_bits+0xc0/0xc0 [ 202.261658][T14251] ? __ip_flush_pending_frames.isra.0+0x2d0/0x2d0 [ 202.328299][T14251] ? mark_held_locks+0xf0/0xf0 [ 202.333066][T14251] ? lock_sock_nested+0xac/0x120 [ 202.338002][T14251] ? ip_reply_glue_bits+0xc0/0xc0 [ 202.343029][T14251] ip_append_data.part.0+0xf2/0x170 [ 202.348233][T14251] ? ip_reply_glue_bits+0xc0/0xc0 [ 202.353256][T14251] ip_append_data+0x6e/0x90 [ 202.357766][T14251] udp_sendmsg+0x8e7/0x2820 [ 202.362279][T14251] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 202.368530][T14251] ? __lock_acquire+0x548/0x3fb0 [ 202.373468][T14251] ? ip_reply_glue_bits+0xc0/0xc0 [ 202.378494][T14251] ? udp4_lib_lookup_skb+0x440/0x440 [ 202.383865][T14251] ? retint_kernel+0x2d/0x2d [ 202.388459][T14251] ? trace_hardirqs_on_caller+0x6a/0x220 [ 202.394096][T14251] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 202.399560][T14251] ? retint_kernel+0x2d/0x2d [ 202.404159][T14251] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 202.409790][T14251] ? aa_sk_perm+0x288/0x880 [ 202.414290][T14251] ? lockdep_hardirqs_on+0x418/0x5d0 [ 202.419570][T14251] ? retint_kernel+0x2d/0x2d [ 202.424167][T14251] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 202.429713][T14251] inet_sendmsg+0x147/0x5e0 [ 202.434244][T14251] ? udp4_lib_lookup_skb+0x440/0x440 [ 202.439532][T14251] ? inet_sendmsg+0x147/0x5e0 [ 202.444206][T14251] ? ipip_gro_receive+0x100/0x100 [ 202.449235][T14251] sock_sendmsg+0xdd/0x130 [ 202.453657][T14251] sock_write_iter+0x27c/0x3e0 [ 202.458420][T14251] ? sock_sendmsg+0x130/0x130 [ 202.463114][T14251] ? aa_path_link+0x460/0x460 [ 202.467787][T14251] ? find_held_lock+0x35/0x130 [ 202.472552][T14251] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 202.478789][T14251] ? iov_iter_init+0xee/0x220 [ 202.483476][T14251] new_sync_write+0x4c7/0x760 [ 202.488157][T14251] ? default_llseek+0x2e0/0x2e0 [ 202.493008][T14251] ? common_file_perm+0x238/0x720 [ 202.498040][T14251] ? __fget+0x381/0x550 [ 202.502207][T14251] ? apparmor_file_permission+0x25/0x30 [ 202.507750][T14251] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 202.513990][T14251] ? security_file_permission+0x94/0x380 [ 202.519624][T14251] __vfs_write+0xe4/0x110 [ 202.523954][T14251] vfs_write+0x20c/0x580 [ 202.528200][T14251] ksys_write+0xea/0x1f0 [ 202.532468][T14251] ? __ia32_sys_read+0xb0/0xb0 [ 202.537235][T14251] ? do_syscall_64+0x26/0x610 [ 202.541910][T14251] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 202.547992][T14251] ? do_syscall_64+0x26/0x610 [ 202.552670][T14251] __x64_sys_write+0x73/0xb0 [ 202.557259][T14251] do_syscall_64+0x103/0x610 [ 202.561848][T14251] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 202.567735][T14251] RIP: 0033:0x4582f9 [ 202.571626][T14251] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 202.591222][T14251] RSP: 002b:00007f6dcf2fbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 202.599632][T14251] RAX: ffffffffffffffda RBX: 00007f6dcf2fbc90 RCX: 00000000004582f9 [ 202.607599][T14251] RDX: 000000000000fdef RSI: 0000000020000280 RDI: 0000000000000005 [ 202.615567][T14251] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 202.623540][T14251] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6dcf2fc6d4 16:39:20 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() socketpair$unix(0x1, 0x4, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x1dc3, 0x9, 0xec7, 0x5, 0x0, 0x3ff, 0xc, 0xd, 0x2, 0x10000000, 0x4, 0xd967, 0x1, 0x101, 0xe2, 0x8, 0x2a, 0x239, 0x8, 0x4, 0x1f, 0x35fb, 0xfffffffffffffffd, 0x7, 0x800, 0x0, 0xfffffffffffff523, 0x5, 0x0, 0x2, 0x4, 0x7fffffff, 0x8, 0xc97, 0x1, 0x1, 0x0, 0x3097, 0x2, @perf_config_ext={0x5, 0x7f}, 0x200, 0x1, 0xfffffffffffffffc, 0x9, 0x2, 0xfffffffffffffff7, 0x3}, r1, 0x2, r0, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x10, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, r1, 0x0, 0xffffffffffffffff, 0x2) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) socket$kcm(0x2, 0x0, 0x0) 16:39:21 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) recvmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000140)=""/8, 0x8}, 0x100) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.usage_user\x00', 0x0, 0x0) close(r0) perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x3, 0x3, 0x9, 0x0, 0x4, 0x20000, 0x2, 0xf6b, 0x9, 0x8, 0x401, 0x1, 0x3ff, 0x6, 0xe5, 0x2, 0x9, 0xec, 0x50d72d48, 0x5, 0x9b2, 0x0, 0x0, 0x1, 0x80000001, 0x9, 0x800, 0x1ff, 0x1, 0xff, 0x8, 0x1, 0x100000001, 0xffffffffffffffea, 0x3, 0x0, 0x9, 0x1, @perf_config_ext={0x50, 0x1f}, 0x400a, 0x1, 0x5, 0x9, 0x1, 0x6, 0x100000000}, r1, 0x4, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) r2 = getpid() perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x5, 0x4, 0x6, 0x5, 0x0, 0x5, 0x20, 0x0, 0xfffffffffffffff9, 0x3, 0xfffffffffffff001, 0x7, 0x8, 0x34, 0x8, 0x7fff, 0x5c, 0x200, 0x1f, 0x3f6e0000, 0x6, 0xffffffffffffc809, 0x3, 0x100, 0xffffffff, 0x3, 0x1, 0x1, 0x8, 0x3, 0xffff, 0x80, 0x4, 0xc0, 0x9, 0x8, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000100)}, 0x800, 0x1000, 0x0, 0xf, 0x5, 0x80000001, 0x1000000}, r2, 0x4, r1, 0x1) r3 = perf_event_open$cgroup(&(0x7f0000000080)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa009, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x5, 0x70, 0x7, 0x8, 0x100000001, 0x461, 0x0, 0xaf, 0x8100, 0x0, 0x7, 0x8001, 0x0, 0x1, 0x5, 0x80, 0x6, 0x3, 0xbb, 0x7f, 0x0, 0x7fff, 0x733f4397, 0x9, 0x0, 0x1, 0x400000000000000, 0x800, 0x0, 0x2, 0x8, 0x9b3, 0x7ff, 0x80000001, 0x2, 0x8, 0x0, 0xd97, 0x0, 0x6, 0x4, @perf_config_ext={0x1, 0xee7}, 0x10, 0xc1, 0x6, 0x7, 0x2, 0xfffffffffffffe01}, 0xffffffffffffffff, 0x7, r3, 0x2) 16:39:21 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0xf6ac, &(0x7f0000002580)=[{&(0x7f0000000000), 0xfdde}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:21 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) [ 202.631507][T14251] R13: 00000000004c7ad0 R14: 00000000004ddba8 R15: 0000000000000006 16:39:21 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0xf6ac, &(0x7f0000002580)=[{&(0x7f0000000000), 0xfdde}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:21 executing program 4 (fault-call:5 fault-nth:53): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) [ 202.904603][T14291] FAULT_INJECTION: forcing a failure. [ 202.904603][T14291] name failslab, interval 1, probability 0, space 0, times 0 [ 202.917994][T14291] CPU: 1 PID: 14291 Comm: syz-executor.4 Not tainted 5.1.0-rc2+ #82 [ 202.925978][T14291] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 202.936031][T14291] Call Trace: [ 202.936058][T14291] dump_stack+0x172/0x1f0 [ 202.936082][T14291] should_fail.cold+0xa/0x15 [ 202.936109][T14291] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 202.954073][T14291] ? ___might_sleep+0x163/0x280 [ 202.958922][T14291] __should_failslab+0x121/0x190 [ 202.963840][T14291] should_failslab+0x9/0x14 [ 202.968323][T14291] kmem_cache_alloc_node+0x264/0x710 [ 202.973764][T14291] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 202.979984][T14291] __alloc_skb+0xd5/0x5e0 [ 202.984747][T14291] ? skb_trim+0x190/0x190 [ 202.989060][T14291] ? skb_page_frag_refill+0x127/0x460 [ 202.994431][T14291] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 203.000125][T14291] ? skb_put+0x177/0x1d0 [ 203.004345][T14291] __ip_append_data.isra.0+0x24d6/0x2dd0 [ 203.009973][T14291] ? ip_reply_glue_bits+0xc0/0xc0 [ 203.014979][T14291] ? __ip_flush_pending_frames.isra.0+0x2d0/0x2d0 [ 203.021369][T14291] ? mark_held_locks+0xf0/0xf0 [ 203.026106][T14291] ? lock_sock_nested+0xac/0x120 [ 203.031020][T14291] ? ip_reply_glue_bits+0xc0/0xc0 [ 203.036023][T14291] ip_append_data.part.0+0xf2/0x170 [ 203.041203][T14291] ? ip_reply_glue_bits+0xc0/0xc0 [ 203.046202][T14291] ip_append_data+0x6e/0x90 [ 203.050686][T14291] udp_sendmsg+0x8e7/0x2820 [ 203.055168][T14291] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 203.061382][T14291] ? __lock_acquire+0x548/0x3fb0 [ 203.066292][T14291] ? ip_reply_glue_bits+0xc0/0xc0 [ 203.071293][T14291] ? udp4_lib_lookup_skb+0x440/0x440 [ 203.076556][T14291] ? is_bpf_text_address+0xac/0x170 [ 203.081730][T14291] ? find_held_lock+0x35/0x130 [ 203.086490][T14291] ? is_bpf_text_address+0xac/0x170 [ 203.091669][T14291] ? ___might_sleep+0x163/0x280 [ 203.096497][T14291] ? __might_sleep+0x95/0x190 [ 203.101165][T14291] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 203.106778][T14291] ? aa_sk_perm+0x288/0x880 [ 203.111265][T14291] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 203.117140][T14291] inet_sendmsg+0x147/0x5e0 [ 203.121621][T14291] ? udp4_lib_lookup_skb+0x440/0x440 [ 203.126901][T14291] ? inet_sendmsg+0x147/0x5e0 [ 203.131560][T14291] ? ipip_gro_receive+0x100/0x100 [ 203.136563][T14291] sock_sendmsg+0xdd/0x130 [ 203.140986][T14291] sock_write_iter+0x27c/0x3e0 [ 203.145759][T14291] ? sock_sendmsg+0x130/0x130 [ 203.150441][T14291] ? aa_path_link+0x460/0x460 [ 203.155095][T14291] ? find_held_lock+0x35/0x130 [ 203.159843][T14291] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 203.166060][T14291] ? iov_iter_init+0xee/0x220 [ 203.170719][T14291] new_sync_write+0x4c7/0x760 [ 203.175374][T14291] ? default_llseek+0x2e0/0x2e0 [ 203.180207][T14291] ? common_file_perm+0x238/0x720 [ 203.185207][T14291] ? __fget+0x381/0x550 [ 203.189343][T14291] ? apparmor_file_permission+0x25/0x30 [ 203.194867][T14291] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 203.201086][T14291] ? security_file_permission+0x94/0x380 [ 203.206695][T14291] __vfs_write+0xe4/0x110 [ 203.211004][T14291] vfs_write+0x20c/0x580 [ 203.215231][T14291] ksys_write+0xea/0x1f0 [ 203.219458][T14291] ? __ia32_sys_read+0xb0/0xb0 [ 203.224214][T14291] ? do_syscall_64+0x26/0x610 [ 203.228874][T14291] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 203.234929][T14291] ? do_syscall_64+0x26/0x610 [ 203.239593][T14291] __x64_sys_write+0x73/0xb0 [ 203.244158][T14291] do_syscall_64+0x103/0x610 [ 203.248741][T14291] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 203.254610][T14291] RIP: 0033:0x4582f9 [ 203.258482][T14291] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 203.278059][T14291] RSP: 002b:00007f6dcf2fbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 203.286445][T14291] RAX: ffffffffffffffda RBX: 00007f6dcf2fbc90 RCX: 00000000004582f9 [ 203.294390][T14291] RDX: 000000000000fdef RSI: 0000000020000280 RDI: 0000000000000005 [ 203.302338][T14291] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 203.310307][T14291] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6dcf2fc6d4 [ 203.318251][T14291] R13: 00000000004c7ad0 R14: 00000000004ddba8 R15: 0000000000000006 16:39:21 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r4) recvmsg(r0, &(0x7f0000001840)={&(0x7f0000001480)=@can={0x1d, 0x0}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001500)=""/10, 0xa}, {&(0x7f0000001580)=""/73, 0x49}, {&(0x7f0000001600)=""/184, 0xb8}, {&(0x7f00000016c0)=""/101, 0x65}, {&(0x7f0000001740)=""/81, 0x51}], 0x5}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], r6, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x33c) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xfffffffffffffffc, 0x3}, 0xffb8) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x127) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r7) close(r8) 16:39:21 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair(0x0, 0x1, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8638, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000000)) r5 = gettid() perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xffffffffffffffff, 0x3, 0x3f, 0x2, 0x0, 0x2, 0x801, 0x4, 0x80000000, 0x3, 0x34c00000000, 0x3, 0x400, 0x6, 0x2, 0x5dd, 0x8, 0x401, 0x100000001, 0xaaa2, 0x1f, 0xab5, 0xfe41, 0x200, 0x9, 0xff, 0x5f, 0x10000, 0x8, 0x9, 0x5, 0x9, 0xde36, 0x80, 0x7f, 0x401, 0x0, 0x9, 0x4, @perf_config_ext={0x2, 0x9}, 0x28, 0x9, 0x7f, 0x7, 0x7fffffff, 0x6, 0x1f}, r5, 0x0, r3, 0x9) write$cgroup_int(r1, &(0x7f00000000c0)=0x80, 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r2}, 0x10) write$cgroup_subtree(r0, 0x0, 0x0) 16:39:21 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) 16:39:21 executing program 2: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x80, &(0x7f0000000000), 0x0, &(0x7f00000001c0)=""/17, 0x11}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r2, &(0x7f0000000240)="1ab5f99f65bfed906448d11a3834b2ff116a4a3e7d7fcef9c7a54ed390246eadcefde2ec3a678ef1ce5e29a059c2772d876f53cc01f0d7466656bc6787b245c165a4a56bed0412239c8016122221473df004f1c5909a8f0ec74adc47e7fdcad6d17723c830f7fa45b131a2f13cbfc6c3c61faae5f2a5c1fa8a4d63a3437285498a1a221271", &(0x7f0000000300)="31053d2eb4136846f055bf2d4159d65f2467139809884046d000ece6a73b01902c3c223a632ebdcc1ccbef8c69c38ed13acaa66a1ef795ee8104aef3de895f29ca3c9cfde8a73b497f2a1039090cbd95f2a90820743754d5459660c0e0e9842d892216ab49873d49370dd26732546031124aeb21aae1a0ba5e04d6e004c2dc82f69a", 0x2}, 0x20) close(r0) close(r1) 16:39:21 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0xf6ac, &(0x7f0000002580)=[{&(0x7f0000000000), 0xfdde}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:21 executing program 4 (fault-call:5 fault-nth:54): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) 16:39:22 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) [ 203.426255][T14304] FAULT_INJECTION: forcing a failure. [ 203.426255][T14304] name failslab, interval 1, probability 0, space 0, times 0 [ 203.463508][T14304] CPU: 1 PID: 14304 Comm: syz-executor.4 Not tainted 5.1.0-rc2+ #82 16:39:22 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x0) sendmsg(r0, &(0x7f00000027c0)={0x0, 0xf6ac, &(0x7f0000002580)=[{&(0x7f0000000000), 0xfdde}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) [ 203.471510][T14304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 203.471517][T14304] Call Trace: [ 203.471545][T14304] dump_stack+0x172/0x1f0 [ 203.471569][T14304] should_fail.cold+0xa/0x15 [ 203.471593][T14304] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 203.499619][T14304] ? ___might_sleep+0x163/0x280 [ 203.504481][T14304] __should_failslab+0x121/0x190 [ 203.509416][T14304] should_failslab+0x9/0x14 [ 203.509446][T14304] kmem_cache_alloc_node_trace+0x270/0x720 [ 203.509473][T14304] __kmalloc_node_track_caller+0x3d/0x70 [ 203.509493][T14304] __kmalloc_reserve.isra.0+0x40/0xf0 [ 203.509511][T14304] __alloc_skb+0x10b/0x5e0 [ 203.509531][T14304] ? skb_trim+0x190/0x190 [ 203.539558][T14304] ? ip_reply_glue_bits+0xc0/0xc0 [ 203.544583][T14304] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 203.550296][T14304] ? skb_put+0x177/0x1d0 [ 203.554539][T14304] __ip_append_data.isra.0+0x24d6/0x2dd0 [ 203.560176][T14304] ? ip_reply_glue_bits+0xc0/0xc0 [ 203.565207][T14304] ? __ip_flush_pending_frames.isra.0+0x2d0/0x2d0 [ 203.571614][T14304] ? mark_held_locks+0xf0/0xf0 [ 203.576372][T14304] ? lock_sock_nested+0xac/0x120 [ 203.581307][T14304] ? ip_reply_glue_bits+0xc0/0xc0 [ 203.586324][T14304] ip_append_data.part.0+0xf2/0x170 [ 203.591526][T14304] ? ip_reply_glue_bits+0xc0/0xc0 [ 203.596552][T14304] ip_append_data+0x6e/0x90 [ 203.601059][T14304] udp_sendmsg+0x8e7/0x2820 [ 203.605565][T14304] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 203.611799][T14304] ? __lock_acquire+0x548/0x3fb0 [ 203.616727][T14304] ? ip_reply_glue_bits+0xc0/0xc0 [ 203.621770][T14304] ? udp4_lib_lookup_skb+0x440/0x440 [ 203.627056][T14304] ? is_bpf_text_address+0xac/0x170 [ 203.632247][T14304] ? find_held_lock+0x35/0x130 [ 203.637005][T14304] ? is_bpf_text_address+0xac/0x170 [ 203.642212][T14304] ? ___might_sleep+0x163/0x280 [ 203.647060][T14304] ? __might_sleep+0x95/0x190 [ 203.651732][T14304] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 203.657354][T14304] ? aa_sk_perm+0x288/0x880 [ 203.661860][T14304] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 203.667403][T14304] inet_sendmsg+0x147/0x5e0 [ 203.671911][T14304] ? udp4_lib_lookup_skb+0x440/0x440 [ 203.677183][T14304] ? inet_sendmsg+0x147/0x5e0 [ 203.681862][T14304] ? ipip_gro_receive+0x100/0x100 [ 203.686882][T14304] sock_sendmsg+0xdd/0x130 [ 203.691299][T14304] sock_write_iter+0x27c/0x3e0 [ 203.696065][T14304] ? sock_sendmsg+0x130/0x130 [ 203.700755][T14304] ? aa_path_link+0x460/0x460 [ 203.705423][T14304] ? find_held_lock+0x35/0x130 [ 203.710198][T14304] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 203.716436][T14304] ? iov_iter_init+0xee/0x220 [ 203.721118][T14304] new_sync_write+0x4c7/0x760 [ 203.725790][T14304] ? default_llseek+0x2e0/0x2e0 [ 203.730642][T14304] ? common_file_perm+0x238/0x720 [ 203.735661][T14304] ? __fget+0x381/0x550 [ 203.739819][T14304] ? apparmor_file_permission+0x25/0x30 [ 203.745357][T14304] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 203.751597][T14304] ? security_file_permission+0x94/0x380 [ 203.757229][T14304] __vfs_write+0xe4/0x110 [ 203.761563][T14304] vfs_write+0x20c/0x580 [ 203.765817][T14304] ksys_write+0xea/0x1f0 [ 203.770063][T14304] ? __ia32_sys_read+0xb0/0xb0 [ 203.774824][T14304] ? do_syscall_64+0x26/0x610 [ 203.779492][T14304] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 203.785553][T14304] ? do_syscall_64+0x26/0x610 [ 203.790233][T14304] __x64_sys_write+0x73/0xb0 [ 203.794818][T14304] do_syscall_64+0x103/0x610 [ 203.799423][T14304] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 203.805319][T14304] RIP: 0033:0x4582f9 16:39:22 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0xe1f, 0x200000004, 0x400}, 0x3c) recvmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000000)=@rc, 0x80, &(0x7f0000000200)=[{&(0x7f0000000080)=""/134, 0x86}, {&(0x7f0000000140)=""/171, 0xab}, {&(0x7f00000002c0)=""/146, 0x92}], 0x3, &(0x7f0000000380)=""/243, 0xf3}, 0x10140) [ 203.809208][T14304] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 203.828815][T14304] RSP: 002b:00007f6dcf2fbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 203.837228][T14304] RAX: ffffffffffffffda RBX: 00007f6dcf2fbc90 RCX: 00000000004582f9 [ 203.845204][T14304] RDX: 000000000000fdef RSI: 0000000020000280 RDI: 0000000000000005 [ 203.853170][T14304] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 203.861332][T14304] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6dcf2fc6d4 [ 203.869304][T14304] R13: 00000000004c7ad0 R14: 00000000004ddba8 R15: 0000000000000006 16:39:22 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x0) sendmsg(r0, &(0x7f00000027c0)={0x0, 0xf6ac, &(0x7f0000002580)=[{&(0x7f0000000000), 0xfdde}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:22 executing program 4 (fault-call:5 fault-nth:55): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) 16:39:22 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) 16:39:22 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r4) recvmsg(r0, &(0x7f0000001840)={&(0x7f0000001480)=@can={0x1d, 0x0}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001500)=""/10, 0xa}, {&(0x7f0000001580)=""/73, 0x49}, {&(0x7f0000001600)=""/184, 0xb8}, {&(0x7f00000016c0)=""/101, 0x65}, {&(0x7f0000001740)=""/81, 0x51}], 0x5}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], r6, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x33c) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xfffffffffffffffc, 0x3}, 0xffb8) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x127) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r7) 16:39:22 executing program 2: recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000400)=""/244, 0xf4}], 0x1}, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000000000), 0x4) recvmsg$kcm(r1, &(0x7f0000001280)={0x0, 0xffffffffffffffec, &(0x7f0000000100), 0x1df}, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, 0x0}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x600, 0x0) 16:39:22 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x0) sendmsg(r0, &(0x7f00000027c0)={0x0, 0xf6ac, &(0x7f0000002580)=[{&(0x7f0000000000), 0xfdde}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:22 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f0000000040)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="8aa17403dd0000fdff83df0c88a8"], 0xe) 16:39:22 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) [ 204.228824][T14335] FAULT_INJECTION: forcing a failure. [ 204.228824][T14335] name failslab, interval 1, probability 0, space 0, times 0 16:39:22 executing program 1: r0 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000080)='\x00'}, 0x30) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x800, 0x55, 0x2, 0x7, 0x0, 0x3b, 0x81, 0x9, 0x7, 0x0, 0x200, 0x1, 0x3, 0x4, 0x400, 0x1f, 0x8001, 0x2, 0x1, 0x2, 0x7ff, 0x6, 0x1, 0x7fff, 0x80000000, 0x100000000, 0xfffffffffffffff8, 0x4, 0x40, 0x3, 0x4, 0x80000000, 0x2, 0x900000000000000, 0x401, 0x101, 0x0, 0x8001, 0x2, @perf_config_ext={0x5f}, 0x8000, 0xfffffffffffffff9, 0x7fff, 0x5, 0x1, 0x40, 0x8}, r0, 0x10, r1, 0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x24, 0x0, 0x0) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) 16:39:22 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) 16:39:22 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(0xffffffffffffffff, &(0x7f00000027c0)={0x0, 0xf6ac, &(0x7f0000002580)=[{&(0x7f0000000000), 0xfdde}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) [ 204.351208][T14335] CPU: 0 PID: 14335 Comm: syz-executor.4 Not tainted 5.1.0-rc2+ #82 [ 204.359228][T14335] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 204.359235][T14335] Call Trace: [ 204.359262][T14335] dump_stack+0x172/0x1f0 [ 204.359288][T14335] should_fail.cold+0xa/0x15 [ 204.359309][T14335] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 204.359333][T14335] ? ___might_sleep+0x163/0x280 [ 204.359354][T14335] __should_failslab+0x121/0x190 [ 204.359370][T14335] should_failslab+0x9/0x14 [ 204.359389][T14335] kmem_cache_alloc_node+0x264/0x710 [ 204.359408][T14335] ? retint_kernel+0x2d/0x2d [ 204.359445][T14335] __alloc_skb+0xd5/0x5e0 [ 204.359467][T14335] ? skb_trim+0x190/0x190 [ 204.420178][T14335] ? write_comp_data+0x1e/0x70 [ 204.420197][T14335] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 204.420212][T14335] ? skb_put+0x177/0x1d0 [ 204.420232][T14335] __ip_append_data.isra.0+0x24d6/0x2dd0 [ 204.420254][T14335] ? ip_reply_glue_bits+0xc0/0xc0 [ 204.420284][T14335] ? __ip_flush_pending_frames.isra.0+0x2d0/0x2d0 [ 204.451978][T14335] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 204.457460][T14335] ? ip_reply_glue_bits+0xc0/0xc0 [ 204.462494][T14335] ip_append_data.part.0+0xf2/0x170 [ 204.467711][T14335] ? ip_reply_glue_bits+0xc0/0xc0 [ 204.472744][T14335] ip_append_data+0x6e/0x90 [ 204.477258][T14335] udp_sendmsg+0x8e7/0x2820 [ 204.477281][T14335] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 204.477297][T14335] ? ip_reply_glue_bits+0xc0/0xc0 [ 204.477317][T14335] ? udp4_lib_lookup_skb+0x440/0x440 16:39:23 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) [ 204.498320][T14335] ? lock_is_held_type+0x272/0x320 [ 204.498341][T14335] ? trace_hardirqs_on_caller+0x6a/0x220 [ 204.498358][T14335] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 204.498378][T14335] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 204.519982][T14335] ? lockdep_hardirqs_on+0x418/0x5d0 [ 204.525277][T14335] ? retint_kernel+0x2d/0x2d [ 204.529873][T14335] ? trace_hardirqs_on_caller+0x6a/0x220 [ 204.535510][T14335] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 204.540985][T14335] ? retint_kernel+0x2d/0x2d [ 204.545583][T14335] ? ipip_gro_receive+0x100/0x100 [ 204.550613][T14335] inet_sendmsg+0x147/0x5e0 [ 204.555119][T14335] ? udp4_lib_lookup_skb+0x440/0x440 [ 204.560610][T14335] ? inet_sendmsg+0x147/0x5e0 [ 204.565291][T14335] ? ipip_gro_receive+0x100/0x100 [ 204.570327][T14335] sock_sendmsg+0xdd/0x130 [ 204.574752][T14335] sock_write_iter+0x27c/0x3e0 [ 204.579525][T14335] ? sock_sendmsg+0x130/0x130 [ 204.584223][T14335] ? sock_sendmsg+0x130/0x130 [ 204.588914][T14335] new_sync_write+0x4c7/0x760 [ 204.593601][T14335] ? default_llseek+0x2e0/0x2e0 16:39:23 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) [ 204.598461][T14335] ? retint_kernel+0x2d/0x2d [ 204.603066][T14335] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 204.608539][T14335] ? retint_kernel+0x2d/0x2d [ 204.613140][T14335] __vfs_write+0xe4/0x110 [ 204.617479][T14335] vfs_write+0x20c/0x580 [ 204.621734][T14335] ksys_write+0xea/0x1f0 [ 204.625986][T14335] ? __ia32_sys_read+0xb0/0xb0 [ 204.630764][T14335] __x64_sys_write+0x73/0xb0 [ 204.635356][T14335] ? do_syscall_64+0x5b/0x610 [ 204.640038][T14335] do_syscall_64+0x103/0x610 [ 204.644637][T14335] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 204.650537][T14335] RIP: 0033:0x4582f9 [ 204.654445][T14335] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 204.674075][T14335] RSP: 002b:00007f6dcf2fbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 204.682509][T14335] RAX: ffffffffffffffda RBX: 00007f6dcf2fbc90 RCX: 00000000004582f9 [ 204.690489][T14335] RDX: 000000000000fdef RSI: 0000000020000280 RDI: 0000000000000005 [ 204.698464][T14335] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 204.706447][T14335] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6dcf2fc6d4 [ 204.714450][T14335] R13: 00000000004c7ad0 R14: 00000000004ddba8 R15: 0000000000000006 16:39:23 executing program 4 (fault-call:5 fault-nth:56): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) 16:39:23 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) [ 204.890369][T14381] FAULT_INJECTION: forcing a failure. [ 204.890369][T14381] name failslab, interval 1, probability 0, space 0, times 0 [ 204.903413][T14381] CPU: 1 PID: 14381 Comm: syz-executor.4 Not tainted 5.1.0-rc2+ #82 [ 204.911402][T14381] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 204.921447][T14381] Call Trace: [ 204.924720][T14381] dump_stack+0x172/0x1f0 [ 204.929040][T14381] should_fail.cold+0xa/0x15 [ 204.933649][T14381] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 204.939469][T14381] ? ___might_sleep+0x163/0x280 [ 204.944305][T14381] __should_failslab+0x121/0x190 [ 204.949222][T14381] should_failslab+0x9/0x14 [ 204.953709][T14381] kmem_cache_alloc_node_trace+0x270/0x720 [ 204.959499][T14381] __kmalloc_node_track_caller+0x3d/0x70 [ 204.965115][T14381] __kmalloc_reserve.isra.0+0x40/0xf0 [ 204.970492][T14381] __alloc_skb+0x10b/0x5e0 [ 204.974901][T14381] ? skb_trim+0x190/0x190 [ 204.979225][T14381] ? skb_page_frag_refill+0x127/0x460 [ 204.984947][T14381] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 204.990646][T14381] ? skb_put+0x177/0x1d0 [ 204.994873][T14381] __ip_append_data.isra.0+0x24d6/0x2dd0 [ 205.000504][T14381] ? ip_reply_glue_bits+0xc0/0xc0 [ 205.005515][T14381] ? __ip_flush_pending_frames.isra.0+0x2d0/0x2d0 [ 205.011914][T14381] ? mark_held_locks+0xf0/0xf0 [ 205.016675][T14381] ? lock_sock_nested+0xac/0x120 [ 205.021595][T14381] ? ip_reply_glue_bits+0xc0/0xc0 [ 205.026611][T14381] ip_append_data.part.0+0xf2/0x170 [ 205.031805][T14381] ? ip_reply_glue_bits+0xc0/0xc0 [ 205.036825][T14381] ip_append_data+0x6e/0x90 [ 205.041316][T14381] udp_sendmsg+0x8e7/0x2820 [ 205.045805][T14381] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 205.052024][T14381] ? __lock_acquire+0x548/0x3fb0 [ 205.056945][T14381] ? ip_reply_glue_bits+0xc0/0xc0 [ 205.061967][T14381] ? udp4_lib_lookup_skb+0x440/0x440 [ 205.067248][T14381] ? is_bpf_text_address+0xac/0x170 [ 205.072479][T14381] ? find_held_lock+0x35/0x130 [ 205.077248][T14381] ? is_bpf_text_address+0xac/0x170 [ 205.082453][T14381] ? ___might_sleep+0x163/0x280 [ 205.087296][T14381] ? __might_sleep+0x95/0x190 [ 205.091971][T14381] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 205.097595][T14381] ? aa_sk_perm+0x288/0x880 [ 205.102107][T14381] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 205.107672][T14381] inet_sendmsg+0x147/0x5e0 [ 205.112240][T14381] ? udp4_lib_lookup_skb+0x440/0x440 [ 205.118017][T14381] ? inet_sendmsg+0x147/0x5e0 [ 205.122707][T14381] ? ipip_gro_receive+0x100/0x100 [ 205.127737][T14381] sock_sendmsg+0xdd/0x130 [ 205.132161][T14381] sock_write_iter+0x27c/0x3e0 [ 205.136937][T14381] ? sock_sendmsg+0x130/0x130 [ 205.141626][T14381] ? aa_path_link+0x460/0x460 [ 205.146307][T14381] ? find_held_lock+0x35/0x130 [ 205.151081][T14381] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 205.157332][T14381] ? iov_iter_init+0xee/0x220 [ 205.162022][T14381] new_sync_write+0x4c7/0x760 [ 205.162048][T14381] ? default_llseek+0x2e0/0x2e0 [ 205.162071][T14381] ? common_file_perm+0x238/0x720 [ 205.162086][T14381] ? __fget+0x381/0x550 [ 205.162106][T14381] ? apparmor_file_permission+0x25/0x30 [ 205.176722][T14381] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 205.192613][T14381] ? security_file_permission+0x94/0x380 [ 205.198255][T14381] __vfs_write+0xe4/0x110 [ 205.202603][T14381] vfs_write+0x20c/0x580 [ 205.206869][T14381] ksys_write+0xea/0x1f0 [ 205.211126][T14381] ? __ia32_sys_read+0xb0/0xb0 [ 205.215907][T14381] ? do_syscall_64+0x26/0x610 [ 205.220593][T14381] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 205.226666][T14381] ? do_syscall_64+0x26/0x610 [ 205.231357][T14381] __x64_sys_write+0x73/0xb0 [ 205.235954][T14381] do_syscall_64+0x103/0x610 16:39:23 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r4) recvmsg(r0, &(0x7f0000001840)={&(0x7f0000001480)=@can={0x1d, 0x0}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001500)=""/10, 0xa}, {&(0x7f0000001580)=""/73, 0x49}, {&(0x7f0000001600)=""/184, 0xb8}, {&(0x7f00000016c0)=""/101, 0x65}, {&(0x7f0000001740)=""/81, 0x51}], 0x5}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], r6, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x33c) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xfffffffffffffffc, 0x3}, 0xffb8) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x127) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r7) 16:39:23 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(0xffffffffffffffff, &(0x7f00000027c0)={0x0, 0xf6ac, &(0x7f0000002580)=[{&(0x7f0000000000), 0xfdde}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:23 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) socket$kcm(0x2, 0x3, 0x84) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000015c0)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f00000000c0)='memory.swap.current\x00'}, 0x30) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuset.memory_pressure\x00', 0x0, 0x0) r0 = perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x1, 0x7, 0x7, 0x10001, 0x0, 0x101, 0x200, 0xe, 0x71, 0x100, 0xd14, 0x8, 0x153e, 0xfffffffffffffffc, 0x7fffffff, 0x6, 0x6, 0x49cf, 0x4, 0x2, 0x8000, 0x7, 0xffffffe000000000, 0x45, 0x4a4, 0x3, 0x1c000, 0x5, 0x2, 0x8, 0xe6, 0x6, 0x80000001, 0x1, 0x940, 0x7, 0x0, 0xb98, 0x0, @perf_config_ext={0x5, 0x5}, 0x20000, 0x1, 0x4, 0x8, 0x0, 0x3, 0x6}, 0xffffffffffffff9c, 0xffffffffffffffff, 0xffffffffffffffff, 0x6) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x2000005866fd92) socket$kcm(0x11, 0x2, 0x300) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000200)=0x2) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) 16:39:23 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) 16:39:23 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)={[{0x0, 'rdma'}, {0x2d, 'rdma'}]}, 0xc) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = perf_event_open$cgroup(&(0x7f0000000040)={0x3, 0x70, 0x7fff, 0x9, 0x100000001, 0xe44, 0x0, 0xba, 0x2040, 0xf, 0x1, 0x200, 0x5, 0x7, 0x80, 0x800, 0x4, 0x200, 0x3, 0x7, 0x200, 0xfffffffffffffffa, 0x2d40b793, 0xf8, 0x8000, 0xffffffff, 0xfd93, 0x5, 0x5f, 0x0, 0x75f0, 0x5, 0x8, 0x5, 0x7, 0xffffffff00000000, 0x10001, 0x2, 0x0, 0xb843, 0x6, @perf_bp={&(0x7f0000000000), 0xe}, 0x4000, 0x2c1, 0x5, 0x3, 0x2, 0x80, 0xf94f}, r1, 0xa, r1, 0x4) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000580)) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_ro(r3, &(0x7f0000000280)='cpu.stat\x00\xeb\xcb\xf8\xa4\xb8\xfb\xf8\xb9\x96\xcb\r\xfd\xc5\xaa\x8f\x18N\x03h\vBy\x19\xadR\x00\x00\x00\x00\xf2\x9er\xee\x04\x1f\xdd5>-n \x1e\xe3\xed\xc8\x84$\xd0-q;\xd2\x9a\x1d\x84\xe4=eZ\"Z\xf0\x8d\x87,\xd5?p\xb1\x17D\xfb\xec\xc4\xf2 \x9b[\x8bd\xe3h\x8f%eX\xa8\xfd h\xf4\r\xcf\x1a4i\x13.\xe8\x8316\xf4\x90\xf9m\x9b\x12\xfa\xbf{\x12\x8f[\x9a,\xd4{?\xba_\x81\xade$\x17#j\xe1+\xa7\xcc\xd8G[\x0f\xe0s\rg\xe9)IJ\x85\xdb\x03,\xd6dZX\x1db\x1a\x90\x19:0\x1bT\xec\x16E\x88-v\xd4\xeb\xfc!\xa3\xe2\xe9\x96[C\xb6\vnW\x05H\x93\xd3 m0\xf7\xb6\x17\xf9M\x96\x03o\x17\x8e\xd4rG\t\xf50\x80\xac\x1c\xf4\xfa\x1b\xa9\xdb=%', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0xda00) write$cgroup_int(r4, &(0x7f0000000200), 0x2000) r5 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xa4, 0x7fff, 0x7, 0x1, 0x0, 0x3d1d9ecb, 0x901, 0x4, 0x5, 0x7, 0x0, 0x5, 0x3, 0x4b, 0x955, 0x9, 0xfffffffffffffffd, 0x4, 0xffffffff, 0x0, 0xdaa, 0x3f, 0x1, 0x80, 0x186, 0x8, 0x1f, 0x35, 0x0, 0x9, 0x7fff, 0x100000001, 0x1, 0x5, 0x6, 0x3, 0x0, 0x0, 0x5, @perf_config_ext={0x40}, 0x3580, 0x8, 0x1, 0x8, 0x1000, 0x1, 0x78}, r5, 0x1, r2, 0x8) 16:39:23 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(0xffffffffffffffff, &(0x7f00000027c0)={0x0, 0xf6ac, &(0x7f0000002580)=[{&(0x7f0000000000), 0xfdde}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) [ 205.235974][T14381] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 205.235987][T14381] RIP: 0033:0x4582f9 [ 205.236002][T14381] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 205.236011][T14381] RSP: 002b:00007f6dcf2fbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 205.236024][T14381] RAX: ffffffffffffffda RBX: 00007f6dcf2fbc90 RCX: 00000000004582f9 16:39:23 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) [ 205.236039][T14381] RDX: 000000000000fdef RSI: 0000000020000280 RDI: 0000000000000005 [ 205.246490][T14381] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 205.246499][T14381] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6dcf2fc6d4 [ 205.246508][T14381] R13: 00000000004c7ad0 R14: 00000000004ddba8 R15: 0000000000000006 16:39:24 executing program 4 (fault-call:5 fault-nth:57): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) 16:39:24 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) 16:39:24 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, 0x0, 0x0) 16:39:24 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) socket$kcm(0x29, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'nlmon0\x00', 0x8000}) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)="2e000000120081aee4050cecff0e00fa048b5bdb4cb904e473730e55cff26d1b0e001d80fffffff05e510befccd7", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001800)=[{&(0x7f0000000380)=""/141, 0x8d}, {&(0x7f0000000440)=""/97, 0xfffffeb6}, {&(0x7f00000004c0)=""/251, 0xfb}, {&(0x7f0000000140)=""/58, 0x3a}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f0000001600)=""/202, 0xca}, {&(0x7f0000000040)=""/76, 0x3f18}, {&(0x7f0000001780)=""/94, 0x5e}], 0x8}, 0x0) recvmsg(r0, &(0x7f0000004000)={0x0, 0x0, 0x0}, 0x0) 16:39:24 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xe, 0x4, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180500"/25], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 205.499417][T14417] FAULT_INJECTION: forcing a failure. [ 205.499417][T14417] name failslab, interval 1, probability 0, space 0, times 0 [ 205.529008][T14416] netlink: 'syz-executor.1': attribute type 29 has an invalid length. [ 205.541518][T14417] CPU: 0 PID: 14417 Comm: syz-executor.4 Not tainted 5.1.0-rc2+ #82 [ 205.548351][T14416] netlink: 'syz-executor.1': attribute type 29 has an invalid length. [ 205.549540][T14417] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 205.549548][T14417] Call Trace: [ 205.549573][T14417] dump_stack+0x172/0x1f0 [ 205.549598][T14417] should_fail.cold+0xa/0x15 [ 205.549621][T14417] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 205.549644][T14417] ? ___might_sleep+0x163/0x280 [ 205.549666][T14417] __should_failslab+0x121/0x190 [ 205.549681][T14417] should_failslab+0x9/0x14 [ 205.549700][T14417] kmem_cache_alloc_node+0x264/0x710 [ 205.549720][T14417] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 205.549744][T14417] __alloc_skb+0xd5/0x5e0 [ 205.549770][T14417] ? skb_trim+0x190/0x190 [ 205.563886][T14416] netlink: 'syz-executor.1': attribute type 29 has an invalid length. [ 205.567952][T14417] ? skb_page_frag_refill+0x127/0x460 [ 205.567969][T14417] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 205.567983][T14417] ? skb_put+0x177/0x1d0 [ 205.568005][T14417] __ip_append_data.isra.0+0x24d6/0x2dd0 [ 205.597001][T14416] netlink: 'syz-executor.1': attribute type 29 has an invalid length. [ 205.600229][T14417] ? ip_reply_glue_bits+0xc0/0xc0 [ 205.600259][T14417] ? __ip_flush_pending_frames.isra.0+0x2d0/0x2d0 [ 205.600275][T14417] ? mark_held_locks+0xf0/0xf0 [ 205.600290][T14417] ? lock_sock_nested+0xac/0x120 [ 205.600306][T14417] ? ip_reply_glue_bits+0xc0/0xc0 [ 205.600321][T14417] ip_append_data.part.0+0xf2/0x170 [ 205.600340][T14417] ? ip_reply_glue_bits+0xc0/0xc0 [ 205.618097][T14416] netlink: 'syz-executor.1': attribute type 29 has an invalid length. [ 205.620473][T14417] ip_append_data+0x6e/0x90 [ 205.620498][T14417] udp_sendmsg+0x8e7/0x2820 [ 205.620518][T14417] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 205.620540][T14417] ? __lock_acquire+0x548/0x3fb0 [ 205.620554][T14417] ? ip_reply_glue_bits+0xc0/0xc0 [ 205.620574][T14417] ? udp4_lib_lookup_skb+0x440/0x440 [ 205.620603][T14417] ? is_bpf_text_address+0xac/0x170 [ 205.631565][T14416] netlink: 'syz-executor.1': attribute type 29 has an invalid length. [ 205.634098][T14417] ? find_held_lock+0x35/0x130 [ 205.634117][T14417] ? is_bpf_text_address+0xac/0x170 [ 205.634142][T14417] ? ___might_sleep+0x163/0x280 [ 205.634161][T14417] ? __might_sleep+0x95/0x190 [ 205.640528][T14422] netlink: 'syz-executor.1': attribute type 29 has an invalid length. [ 205.644093][T14417] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 205.644109][T14417] ? aa_sk_perm+0x288/0x880 [ 205.644133][T14417] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 205.644152][T14417] inet_sendmsg+0x147/0x5e0 [ 205.662920][T14417] ? udp4_lib_lookup_skb+0x440/0x440 [ 205.674080][T14417] ? inet_sendmsg+0x147/0x5e0 [ 205.674095][T14417] ? ipip_gro_receive+0x100/0x100 [ 205.674113][T14417] sock_sendmsg+0xdd/0x130 [ 205.674131][T14417] sock_write_iter+0x27c/0x3e0 [ 205.674151][T14417] ? sock_sendmsg+0x130/0x130 [ 205.732885][T14417] ? aa_path_link+0x460/0x460 [ 205.746282][T14417] ? find_held_lock+0x35/0x130 [ 205.746297][T14417] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 205.746321][T14417] ? iov_iter_init+0xee/0x220 [ 205.746340][T14417] new_sync_write+0x4c7/0x760 [ 205.746359][T14417] ? default_llseek+0x2e0/0x2e0 [ 205.746387][T14417] ? common_file_perm+0x238/0x720 [ 205.766038][T14417] ? __fget+0x381/0x550 [ 205.766061][T14417] ? apparmor_file_permission+0x25/0x30 [ 205.766078][T14417] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 205.766096][T14417] ? security_file_permission+0x94/0x380 [ 205.766117][T14417] __vfs_write+0xe4/0x110 [ 205.789892][T14417] vfs_write+0x20c/0x580 [ 205.789914][T14417] ksys_write+0xea/0x1f0 [ 205.789933][T14417] ? __ia32_sys_read+0xb0/0xb0 [ 205.789951][T14417] ? do_syscall_64+0x26/0x610 [ 205.789967][T14417] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 205.789980][T14417] ? do_syscall_64+0x26/0x610 [ 205.790000][T14417] __x64_sys_write+0x73/0xb0 [ 205.790014][T14417] do_syscall_64+0x103/0x610 [ 205.790036][T14417] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 205.927280][T14417] RIP: 0033:0x4582f9 [ 205.931152][T14417] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 205.950734][T14417] RSP: 002b:00007f6dcf2fbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 205.959129][T14417] RAX: ffffffffffffffda RBX: 00007f6dcf2fbc90 RCX: 00000000004582f9 [ 205.967093][T14417] RDX: 000000000000fdef RSI: 0000000020000280 RDI: 0000000000000005 [ 205.975046][T14417] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 205.983007][T14417] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6dcf2fc6d4 16:39:24 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r4) recvmsg(r0, &(0x7f0000001840)={&(0x7f0000001480)=@can={0x1d, 0x0}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001500)=""/10, 0xa}, {&(0x7f0000001580)=""/73, 0x49}, {&(0x7f0000001600)=""/184, 0xb8}, {&(0x7f00000016c0)=""/101, 0x65}, {&(0x7f0000001740)=""/81, 0x51}], 0x5}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], r6, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x33c) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xfffffffffffffffc, 0x3}, 0xffb8) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x127) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r7) 16:39:24 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x6c, 0x101, {"210cf88e281b6b884d0c00109230a5f4d69a128e26b76c88f949035daa2d89f9311eaab7bfb7aeb383c1f35b6635c1a17e60cab7e6eabe5ee2de2ca7bd7fb97ed5709fbb70762d0db3fa00256146028062b1"}}, {0x0, "5f07bbaeea55eacd25d5d3af38513cde432bf7a1f77122c4a33159f6d53460e527374c7063998df1cc059309e071e3a29afdda00009dd79afd75452c915c8905ba159813af3f24dae0e354c4e5e6040af0b7f794581c03aa36a98eedd7a5fcf69c3156347be33ecffa213b1f9dcd0a5ffe5b8acb3b38440cbd56aba7bfcfdd043b720a049fd9d619f5c9864014c14f193f451d8983c6e9444c791cb8acdb0c36f970f1339884da9337f4f492a061a78ac7980bbe7718a71336"}}, &(0x7f0000000340)=""/32, 0x127, 0x20}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000240)={0xffffffffffffff9c, 0x10, &(0x7f0000000200)={&(0x7f0000000100)=""/128, 0x80, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300)=r0, 0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) recvmsg$kcm(r1, &(0x7f0000001600)={&(0x7f0000001140)=@can={0x1d, 0x0}, 0x80, &(0x7f0000001540)=[{&(0x7f00000011c0)=""/105, 0x69}, {&(0x7f0000001240)=""/199, 0xc7}, {&(0x7f0000001340)=""/110, 0x6e}, {&(0x7f00000013c0)=""/166, 0xa6}, {&(0x7f0000001480)=""/21, 0x15}, {&(0x7f00000014c0)=""/34, 0x22}, {&(0x7f0000001500)=""/6, 0x6}], 0x7, &(0x7f00000015c0)}, 0x10020) bpf$MAP_CREATE(0x0, &(0x7f0000001640)={0x10, 0x9, 0x9, 0x6, 0x33, r1, 0x1, [], r2, r1, 0x1a29, 0x7}, 0x3c) r3 = socket$kcm(0x2, 0x7, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) sendmsg$kcm(r3, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000000c0)) write$cgroup_subtree(r3, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) recvmsg$kcm(r3, &(0x7f0000000980)={&(0x7f0000000580)=@caif=@rfm, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000600)=""/39, 0x27}, {&(0x7f0000000640)=""/6, 0x6}, {&(0x7f0000000680)=""/88, 0x58}, {&(0x7f0000000700)=""/251, 0xfb}, {&(0x7f0000000800)=""/154, 0x9a}], 0x5, &(0x7f0000000940)=""/53, 0x35}, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) 16:39:24 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) 16:39:24 executing program 1: socketpair$unix(0x1, 0x800000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x200000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.events\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'ip6tnl0\x00', 0x1020}) ioctl$TUNSETSNDBUF(r3, 0x400454d4, &(0x7f0000000080)=0xfffffffffffffff8) ioctl$TUNSETVNETBE(r2, 0x400454de, &(0x7f0000000180)) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000140)=r3) close(r1) 16:39:24 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, 0x0, 0x0) 16:39:24 executing program 4 (fault-call:5 fault-nth:58): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) [ 205.994619][T14417] R13: 00000000004c7ad0 R14: 00000000004ddba8 R15: 0000000000000006 16:39:24 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) 16:39:24 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, 0x0, 0x0) [ 206.145136][T14446] FAULT_INJECTION: forcing a failure. [ 206.145136][T14446] name failslab, interval 1, probability 0, space 0, times 0 [ 206.187332][T14446] CPU: 1 PID: 14446 Comm: syz-executor.4 Not tainted 5.1.0-rc2+ #82 [ 206.195365][T14446] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 206.205442][T14446] Call Trace: [ 206.208748][T14446] dump_stack+0x172/0x1f0 [ 206.213102][T14446] should_fail.cold+0xa/0x15 [ 206.217713][T14446] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 206.223536][T14446] ? ___might_sleep+0x163/0x280 [ 206.228403][T14446] __should_failslab+0x121/0x190 [ 206.233363][T14446] should_failslab+0x9/0x14 [ 206.237875][T14446] kmem_cache_alloc_node_trace+0x270/0x720 [ 206.243705][T14446] __kmalloc_node_track_caller+0x3d/0x70 [ 206.249354][T14446] __kmalloc_reserve.isra.0+0x40/0xf0 [ 206.254740][T14446] __alloc_skb+0x10b/0x5e0 [ 206.259177][T14446] ? skb_trim+0x190/0x190 [ 206.263521][T14446] ? skb_page_frag_refill+0x127/0x460 [ 206.268904][T14446] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 206.274636][T14446] ? skb_put+0x177/0x1d0 [ 206.278892][T14446] __ip_append_data.isra.0+0x24d6/0x2dd0 [ 206.284546][T14446] ? ip_reply_glue_bits+0xc0/0xc0 [ 206.289605][T14446] ? __ip_flush_pending_frames.isra.0+0x2d0/0x2d0 [ 206.296045][T14446] ? mark_held_locks+0xf0/0xf0 [ 206.300830][T14446] ? lock_sock_nested+0xac/0x120 [ 206.305782][T14446] ? ip_reply_glue_bits+0xc0/0xc0 [ 206.310822][T14446] ip_append_data.part.0+0xf2/0x170 [ 206.316044][T14446] ? ip_reply_glue_bits+0xc0/0xc0 [ 206.321084][T14446] ip_append_data+0x6e/0x90 [ 206.325608][T14446] udp_sendmsg+0x8e7/0x2820 [ 206.330125][T14446] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 16:39:24 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:24 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:24 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e43dbf6}, 0x0) [ 206.336371][T14446] ? __lock_acquire+0x548/0x3fb0 [ 206.341322][T14446] ? ip_reply_glue_bits+0xc0/0xc0 [ 206.346361][T14446] ? udp4_lib_lookup_skb+0x440/0x440 [ 206.346384][T14446] ? is_bpf_text_address+0xac/0x170 [ 206.346400][T14446] ? find_held_lock+0x35/0x130 [ 206.346420][T14446] ? is_bpf_text_address+0xac/0x170 [ 206.356936][T14446] ? ___might_sleep+0x163/0x280 [ 206.356955][T14446] ? __might_sleep+0x95/0x190 [ 206.356980][T14446] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 206.382058][T14446] ? aa_sk_perm+0x288/0x880 16:39:25 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x0, &(0x7f0000002580), 0x0, 0x0, 0x0, 0x3e43dbf6}, 0x0) [ 206.386585][T14446] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 206.392154][T14446] inet_sendmsg+0x147/0x5e0 [ 206.396669][T14446] ? udp4_lib_lookup_skb+0x440/0x440 [ 206.401970][T14446] ? inet_sendmsg+0x147/0x5e0 [ 206.406662][T14446] ? ipip_gro_receive+0x100/0x100 [ 206.411703][T14446] sock_sendmsg+0xdd/0x130 [ 206.416138][T14446] sock_write_iter+0x27c/0x3e0 [ 206.420920][T14446] ? sock_sendmsg+0x130/0x130 [ 206.425617][T14446] ? aa_path_link+0x460/0x460 [ 206.430303][T14446] ? find_held_lock+0x35/0x130 [ 206.435075][T14446] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 206.441330][T14446] ? iov_iter_init+0xee/0x220 [ 206.446034][T14446] new_sync_write+0x4c7/0x760 [ 206.450728][T14446] ? default_llseek+0x2e0/0x2e0 [ 206.455593][T14446] ? common_file_perm+0x238/0x720 [ 206.460629][T14446] ? __fget+0x381/0x550 [ 206.464803][T14446] ? apparmor_file_permission+0x25/0x30 [ 206.470360][T14446] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 206.476615][T14446] ? security_file_permission+0x94/0x380 [ 206.482261][T14446] __vfs_write+0xe4/0x110 [ 206.486612][T14446] vfs_write+0x20c/0x580 [ 206.490873][T14446] ksys_write+0xea/0x1f0 [ 206.495129][T14446] ? __ia32_sys_read+0xb0/0xb0 [ 206.499909][T14446] ? do_syscall_64+0x26/0x610 [ 206.504595][T14446] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 206.504611][T14446] ? do_syscall_64+0x26/0x610 [ 206.504633][T14446] __x64_sys_write+0x73/0xb0 [ 206.515369][T14446] do_syscall_64+0x103/0x610 [ 206.524530][T14446] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 206.530436][T14446] RIP: 0033:0x4582f9 [ 206.534339][T14446] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 206.553946][T14446] RSP: 002b:00007f6dcf2dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 206.562343][T14446] RAX: ffffffffffffffda RBX: 00007f6dcf2dac90 RCX: 00000000004582f9 [ 206.570304][T14446] RDX: 000000000000fdef RSI: 0000000020000280 RDI: 0000000000000005 [ 206.578264][T14446] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 206.586224][T14446] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6dcf2db6d4 [ 206.594356][T14446] R13: 00000000004c7ad0 R14: 00000000004ddba8 R15: 0000000000000006 16:39:25 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r4) recvmsg(r0, &(0x7f0000001840)={&(0x7f0000001480)=@can={0x1d, 0x0}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001500)=""/10, 0xa}, {&(0x7f0000001580)=""/73, 0x49}, {&(0x7f0000001600)=""/184, 0xb8}, {&(0x7f00000016c0)=""/101, 0x65}, {&(0x7f0000001740)=""/81, 0x51}], 0x5}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], r6, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x33c) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xfffffffffffffffc, 0x3}, 0xffb8) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(0xffffffffffffffff) 16:39:25 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x0, &(0x7f0000002580), 0x0, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:25 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, r0, 0x0, 0x1d, &(0x7f00000000c0)='#:selinux:system{nodevcpuset\x00'}, 0x30) perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x6, 0x258bc710, 0x2, 0xb38a, 0x0, 0x800, 0x8098, 0x8, 0x8000, 0x1, 0x3ff, 0x6, 0x2, 0x7b, 0x5, 0xfffffffffffff001, 0x4, 0x3, 0xa, 0x101, 0x5, 0x4, 0xc3e, 0x8, 0xfffffffffffffffd, 0x9, 0x100, 0x1, 0x1, 0x20, 0x3, 0x400, 0x7fff, 0x9, 0x34, 0x2, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000080), 0x5}, 0x8884, 0x8, 0xac, 0x6, 0x7, 0x8}, r1, 0xe, r0, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001780)='cpuacct.stat\x00', 0x0, 0x0) recvmsg(r2, &(0x7f0000001b40)={&(0x7f00000017c0), 0x80, &(0x7f0000001a00)=[{&(0x7f0000001840)=""/132, 0x84}, {&(0x7f0000001900)=""/217, 0xd9}], 0x2, &(0x7f0000001a40)=""/226, 0xe2}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000180)=0x1000) 16:39:25 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) 16:39:25 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.events\x00', 0x0, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x40000000100, 0x0, 0x551}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc020660b, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x6) 16:39:25 executing program 4 (fault-call:5 fault-nth:59): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) [ 206.953534][T14480] FAULT_INJECTION: forcing a failure. [ 206.953534][T14480] name failslab, interval 1, probability 0, space 0, times 0 [ 206.979636][T14480] CPU: 1 PID: 14480 Comm: syz-executor.4 Not tainted 5.1.0-rc2+ #82 [ 206.988372][T14480] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 206.998476][T14480] Call Trace: [ 207.001791][T14480] dump_stack+0x172/0x1f0 [ 207.006143][T14480] should_fail.cold+0xa/0x15 [ 207.010751][T14480] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 207.016571][T14480] ? ___might_sleep+0x163/0x280 [ 207.021442][T14480] __should_failslab+0x121/0x190 [ 207.026394][T14480] should_failslab+0x9/0x14 [ 207.030915][T14480] kmem_cache_alloc_node+0x264/0x710 [ 207.036225][T14480] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 207.042482][T14480] __alloc_skb+0xd5/0x5e0 [ 207.046823][T14480] ? skb_trim+0x190/0x190 [ 207.051155][T14480] ? skb_page_frag_refill+0x127/0x460 [ 207.056535][T14480] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 207.062266][T14480] ? skb_put+0x177/0x1d0 [ 207.066517][T14480] __ip_append_data.isra.0+0x24d6/0x2dd0 [ 207.072165][T14480] ? ip_reply_glue_bits+0xc0/0xc0 [ 207.077237][T14480] ? __ip_flush_pending_frames.isra.0+0x2d0/0x2d0 [ 207.083655][T14480] ? mark_held_locks+0xf0/0xf0 [ 207.088422][T14480] ? lock_sock_nested+0xac/0x120 [ 207.093375][T14480] ? ip_reply_glue_bits+0xc0/0xc0 [ 207.098400][T14480] ip_append_data.part.0+0xf2/0x170 [ 207.103620][T14480] ? ip_reply_glue_bits+0xc0/0xc0 [ 207.108652][T14480] ip_append_data+0x6e/0x90 [ 207.113171][T14480] udp_sendmsg+0x8e7/0x2820 [ 207.118596][T14480] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 207.124846][T14480] ? __lock_acquire+0x548/0x3fb0 [ 207.129788][T14480] ? ip_reply_glue_bits+0xc0/0xc0 [ 207.134859][T14480] ? udp4_lib_lookup_skb+0x440/0x440 [ 207.140152][T14480] ? is_bpf_text_address+0xac/0x170 [ 207.145353][T14480] ? find_held_lock+0x35/0x130 [ 207.150118][T14480] ? is_bpf_text_address+0xac/0x170 [ 207.155341][T14480] ? ___might_sleep+0x163/0x280 [ 207.160247][T14480] ? __might_sleep+0x95/0x190 [ 207.164939][T14480] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 207.170612][T14480] ? aa_sk_perm+0x288/0x880 [ 207.175123][T14480] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 207.180746][T14480] inet_sendmsg+0x147/0x5e0 [ 207.185264][T14480] ? udp4_lib_lookup_skb+0x440/0x440 [ 207.190562][T14480] ? inet_sendmsg+0x147/0x5e0 [ 207.195238][T14480] ? ipip_gro_receive+0x100/0x100 [ 207.200263][T14480] sock_sendmsg+0xdd/0x130 [ 207.204682][T14480] sock_write_iter+0x27c/0x3e0 [ 207.209465][T14480] ? sock_sendmsg+0x130/0x130 [ 207.214151][T14480] ? aa_path_link+0x460/0x460 [ 207.218821][T14480] ? find_held_lock+0x35/0x130 [ 207.223582][T14480] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 207.229855][T14480] ? iov_iter_init+0xee/0x220 [ 207.234565][T14480] new_sync_write+0x4c7/0x760 [ 207.239262][T14480] ? default_llseek+0x2e0/0x2e0 [ 207.244134][T14480] ? common_file_perm+0x238/0x720 [ 207.249248][T14480] ? __fget+0x381/0x550 [ 207.253409][T14480] ? apparmor_file_permission+0x25/0x30 [ 207.258961][T14480] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 207.265203][T14480] ? security_file_permission+0x94/0x380 [ 207.270844][T14480] __vfs_write+0xe4/0x110 [ 207.275183][T14480] vfs_write+0x20c/0x580 [ 207.279455][T14480] ksys_write+0xea/0x1f0 [ 207.283704][T14480] ? __ia32_sys_read+0xb0/0xb0 [ 207.288470][T14480] ? do_syscall_64+0x26/0x610 [ 207.293145][T14480] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 207.299238][T14480] ? do_syscall_64+0x26/0x610 [ 207.303921][T14480] __x64_sys_write+0x73/0xb0 [ 207.308520][T14480] do_syscall_64+0x103/0x610 [ 207.313115][T14480] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 207.319002][T14480] RIP: 0033:0x4582f9 [ 207.322898][T14480] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 207.342512][T14480] RSP: 002b:00007f6dcf2fbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 16:39:26 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) 16:39:26 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x0, &(0x7f0000002580), 0x0, 0x0, 0x0, 0x3e43dbf6}, 0x0) [ 207.350922][T14480] RAX: ffffffffffffffda RBX: 00007f6dcf2fbc90 RCX: 00000000004582f9 [ 207.358888][T14480] RDX: 000000000000fdef RSI: 0000000020000280 RDI: 0000000000000005 [ 207.366857][T14480] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 207.374843][T14480] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6dcf2fc6d4 [ 207.382843][T14480] R13: 00000000004c7ad0 R14: 00000000004ddba8 R15: 0000000000000006 16:39:26 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000080)=0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x4, 0x4, 0xffffffffffffff81}, 0x3c) 16:39:26 executing program 4 (fault-call:5 fault-nth:60): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) 16:39:26 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x0, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:26 executing program 2: socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x40000000002, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) socketpair$unix(0x1, 0x7, 0x0, &(0x7f00000000c0)) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="01003a1e2410"}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x8001, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000240)=0x3f8) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cgroup.events\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f0000000180)={0x0, 0x70, 0x7fffffff, 0x9, 0x1a, 0x9, 0x0, 0xffffffff00000000, 0x10000, 0x2, 0x5, 0x5, 0x3e, 0x8, 0x7, 0x3, 0xb2, 0x6, 0xab87, 0x1ff, 0x400, 0x9f3, 0x6, 0x7f, 0x3, 0x0, 0x0, 0x7, 0x7, 0x897, 0x4, 0x8, 0x6, 0x1ff, 0x7, 0x101, 0x4, 0xfe, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x8, 0x3ff, 0x2a98, 0x1, 0xffff, 0x1, 0x2}) [ 207.590396][T14507] FAULT_INJECTION: forcing a failure. [ 207.590396][T14507] name failslab, interval 1, probability 0, space 0, times 0 [ 207.657290][T14507] CPU: 0 PID: 14507 Comm: syz-executor.4 Not tainted 5.1.0-rc2+ #82 [ 207.665292][T14507] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 207.675348][T14507] Call Trace: [ 207.678650][T14507] dump_stack+0x172/0x1f0 [ 207.682999][T14507] should_fail.cold+0xa/0x15 [ 207.687600][T14507] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 207.693422][T14507] ? ___might_sleep+0x163/0x280 [ 207.698298][T14507] __should_failslab+0x121/0x190 [ 207.703240][T14507] should_failslab+0x9/0x14 [ 207.707745][T14507] kmem_cache_alloc_node_trace+0x270/0x720 [ 207.713563][T14507] ? lock_is_held_type+0x287/0x320 [ 207.718674][T14507] __kmalloc_node_track_caller+0x3d/0x70 [ 207.724305][T14507] __kmalloc_reserve.isra.0+0x40/0xf0 [ 207.729686][T14507] __alloc_skb+0x10b/0x5e0 [ 207.734113][T14507] ? skb_trim+0x190/0x190 [ 207.738452][T14507] ? __sanitizer_cov_trace_pc+0x50/0x50 [ 207.743996][T14507] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 207.744010][T14507] ? skb_put+0x177/0x1d0 [ 207.744030][T14507] __ip_append_data.isra.0+0x24d6/0x2dd0 [ 207.744051][T14507] ? ip_reply_glue_bits+0xc0/0xc0 [ 207.744079][T14507] ? __ip_flush_pending_frames.isra.0+0x2d0/0x2d0 [ 207.744096][T14507] ? retint_kernel+0x2d/0x2d [ 207.744115][T14507] ? ip_reply_glue_bits+0xc0/0xc0 [ 207.776047][T14507] ip_append_data.part.0+0xf2/0x170 [ 207.776068][T14507] ? ip_reply_glue_bits+0xc0/0xc0 [ 207.776087][T14507] ip_append_data+0x6e/0x90 [ 207.795787][T14507] udp_sendmsg+0x8e7/0x2820 [ 207.795814][T14507] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 207.806533][T14507] ? __lock_acquire+0x548/0x3fb0 [ 207.811477][T14507] ? ip_reply_glue_bits+0xc0/0xc0 [ 207.816511][T14507] ? udp4_lib_lookup_skb+0x440/0x440 [ 207.821817][T14507] ? is_bpf_text_address+0xac/0x170 [ 207.827019][T14507] ? find_held_lock+0x35/0x130 [ 207.831803][T14507] ? ___might_sleep+0x163/0x280 [ 207.836663][T14507] ? __might_sleep+0x95/0x190 [ 207.841349][T14507] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 207.846982][T14507] ? aa_sk_perm+0x288/0x880 [ 207.851483][T14507] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 207.857027][T14507] inet_sendmsg+0x147/0x5e0 [ 207.861533][T14507] ? udp4_lib_lookup_skb+0x440/0x440 [ 207.866819][T14507] ? inet_sendmsg+0x147/0x5e0 [ 207.871498][T14507] ? ipip_gro_receive+0x100/0x100 [ 207.876545][T14507] sock_sendmsg+0xdd/0x130 [ 207.880973][T14507] sock_write_iter+0x27c/0x3e0 [ 207.885728][T14507] ? sock_sendmsg+0x130/0x130 [ 207.890402][T14507] ? sock_sendmsg+0x130/0x130 [ 207.895088][T14507] new_sync_write+0x4c7/0x760 [ 207.899760][T14507] ? default_llseek+0x2e0/0x2e0 [ 207.904601][T14507] ? common_file_perm+0x73/0x720 [ 207.909537][T14507] ? common_file_perm+0x238/0x720 [ 207.914555][T14507] ? __fget+0x381/0x550 [ 207.918690][T14507] ? apparmor_file_permission+0x25/0x30 [ 207.924229][T14507] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 207.930468][T14507] ? security_file_permission+0x94/0x380 [ 207.936109][T14507] __vfs_write+0xe4/0x110 [ 207.940443][T14507] vfs_write+0x20c/0x580 [ 207.944683][T14507] ksys_write+0xea/0x1f0 [ 207.948910][T14507] ? __ia32_sys_read+0xb0/0xb0 [ 207.953716][T14507] ? do_syscall_64+0x26/0x610 [ 207.959599][T14507] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 207.965654][T14507] ? do_syscall_64+0x26/0x610 [ 207.970339][T14507] __x64_sys_write+0x73/0xb0 [ 207.974920][T14507] do_syscall_64+0x103/0x610 [ 207.979520][T14507] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 207.985406][T14507] RIP: 0033:0x4582f9 [ 207.989301][T14507] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 16:39:26 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r4) recvmsg(r0, &(0x7f0000001840)={&(0x7f0000001480)=@can={0x1d, 0x0}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001500)=""/10, 0xa}, {&(0x7f0000001580)=""/73, 0x49}, {&(0x7f0000001600)=""/184, 0xb8}, {&(0x7f00000016c0)=""/101, 0x65}, {&(0x7f0000001740)=""/81, 0x51}], 0x5}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], r6, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x33c) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xfffffffffffffffc, 0x3}, 0xffb8) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(0xffffffffffffffff) 16:39:26 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d020076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) 16:39:26 executing program 1: bpf$OBJ_GET_PROG(0x7, 0x0, 0xfffffffffffffe98) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x22, 0x2, 0x2, &(0x7f0000000040)) 16:39:26 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x0, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:26 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x9, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="8500000840b97b200000000000000000ae70ef9faafb668fff68aa1e90fb490f40fe6521c4261eab0d324e7fbb0294df75bb7c8d3f40f719778515872047b77ebde1a0302eda49b4f5c34d7033ee6d5e5d43ea4c991319d8b4be7dae1838a2e6e252faf8529e889a433738f6dd49f627f531bc57ae5c1d2b3695062227b0dfa30a6ce378b53477e7d17c9aaf0ea79b9df658faacd6b22444c3ab52d0d127de55f85fecf65dad567a3e1da98598e9d8a8af6f2f983347fc381d089e"], &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2'}, 0x48) recvmsg(0xffffffffffffff9c, &(0x7f000000b580)={&(0x7f000000b240)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f000000b4c0)=[{&(0x7f000000b2c0)=""/31, 0x1f}, {&(0x7f000000b300)=""/208, 0xd0}, {&(0x7f000000b400)=""/163, 0xa3}], 0x3, &(0x7f000000b500)=""/126, 0x7e}, 0x2022) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f000000b5c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000b680)={0xc, 0xa, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x6}, [@generic={0x3, 0x7d3, 0x0, 0x100, 0xfffffffffffffffb}, @generic={0xa5c, 0xffffffffffffc056, 0x4, 0x1, 0x7}, @initr0={0x18, 0x0, 0x0, 0x0, 0x323, 0x0, 0x0, 0x0, 0x100000001}, @call={0x85, 0x0, 0x0, 0x1d}, @generic={0x0, 0x7f, 0x6, 0x81, 0x64b69af2}, @exit]}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x65, &(0x7f0000000300)=""/101, 0x41100, 0x1, [], r0, 0xf, r1, 0x8, &(0x7f000000b600)={0x2, 0x4}, 0x8, 0x10, &(0x7f000000b640)={0x800, 0x401, 0x1}, 0x10}, 0x70) [ 208.008891][T14507] RSP: 002b:00007f6dcf2fbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 208.017276][T14507] RAX: ffffffffffffffda RBX: 00007f6dcf2fbc90 RCX: 00000000004582f9 [ 208.025243][T14507] RDX: 000000000000fdef RSI: 0000000020000280 RDI: 0000000000000005 [ 208.033209][T14507] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 208.041170][T14507] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6dcf2fc6d4 [ 208.049138][T14507] R13: 00000000004c7ad0 R14: 00000000004ddba8 R15: 0000000000000006 16:39:26 executing program 4 (fault-call:5 fault-nth:61): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) 16:39:26 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d030076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) 16:39:26 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x0, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:26 executing program 2: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r4) recvmsg(r0, &(0x7f0000001840)={&(0x7f0000001480)=@can={0x1d, 0x0}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001500)=""/10, 0xa}, {&(0x7f0000001580)=""/73, 0x49}, {&(0x7f0000001600)=""/184, 0xb8}, {&(0x7f00000016c0)=""/101, 0x65}, {&(0x7f0000001740)=""/81, 0x51}], 0x5}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], r6, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x33c) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xfffffffffffffffc, 0x3}, 0xffb8) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(0xffffffffffffffff) [ 208.238357][T14538] FAULT_INJECTION: forcing a failure. [ 208.238357][T14538] name failslab, interval 1, probability 0, space 0, times 0 [ 208.259618][T14538] CPU: 0 PID: 14538 Comm: syz-executor.4 Not tainted 5.1.0-rc2+ #82 [ 208.267613][T14538] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 208.277668][T14538] Call Trace: [ 208.281000][T14538] dump_stack+0x172/0x1f0 [ 208.285341][T14538] should_fail.cold+0xa/0x15 [ 208.289973][T14538] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 208.295800][T14538] ? ___might_sleep+0x163/0x280 [ 208.300662][T14538] __should_failslab+0x121/0x190 [ 208.305602][T14538] should_failslab+0x9/0x14 [ 208.310111][T14538] kmem_cache_alloc_node_trace+0x270/0x720 [ 208.315939][T14538] __kmalloc_node_track_caller+0x3d/0x70 [ 208.321558][T14538] __kmalloc_reserve.isra.0+0x40/0xf0 [ 208.326932][T14538] __alloc_skb+0x10b/0x5e0 [ 208.331345][T14538] ? skb_trim+0x190/0x190 [ 208.335677][T14538] ? skb_page_frag_refill+0x127/0x460 [ 208.341052][T14538] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 208.346775][T14538] ? skb_put+0x177/0x1d0 [ 208.351030][T14538] __ip_append_data.isra.0+0x24d6/0x2dd0 [ 208.356676][T14538] ? ip_reply_glue_bits+0xc0/0xc0 [ 208.361716][T14538] ? __ip_flush_pending_frames.isra.0+0x2d0/0x2d0 [ 208.368130][T14538] ? mark_held_locks+0xf0/0xf0 [ 208.372919][T14538] ? lock_sock_nested+0xac/0x120 [ 208.377858][T14538] ? ip_reply_glue_bits+0xc0/0xc0 [ 208.382927][T14538] ip_append_data.part.0+0xf2/0x170 [ 208.388147][T14538] ? ip_reply_glue_bits+0xc0/0xc0 [ 208.393179][T14538] ip_append_data+0x6e/0x90 [ 208.397694][T14538] udp_sendmsg+0x8e7/0x2820 [ 208.397716][T14538] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 208.397731][T14538] ? __lock_acquire+0x548/0x3fb0 [ 208.397746][T14538] ? ip_reply_glue_bits+0xc0/0xc0 [ 208.397773][T14538] ? udp4_lib_lookup_skb+0x440/0x440 [ 208.413415][T14538] ? is_bpf_text_address+0xac/0x170 [ 208.413441][T14538] ? find_held_lock+0x35/0x130 [ 208.413459][T14538] ? is_bpf_text_address+0xac/0x170 [ 208.413484][T14538] ? ___might_sleep+0x163/0x280 [ 208.413504][T14538] ? __might_sleep+0x95/0x190 [ 208.448413][T14538] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 208.454064][T14538] ? aa_sk_perm+0x288/0x880 [ 208.458609][T14538] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 208.464165][T14538] inet_sendmsg+0x147/0x5e0 [ 208.468673][T14538] ? udp4_lib_lookup_skb+0x440/0x440 [ 208.473958][T14538] ? inet_sendmsg+0x147/0x5e0 [ 208.478631][T14538] ? ipip_gro_receive+0x100/0x100 [ 208.483646][T14538] sock_sendmsg+0xdd/0x130 [ 208.488048][T14538] sock_write_iter+0x27c/0x3e0 [ 208.492803][T14538] ? sock_sendmsg+0x130/0x130 [ 208.497467][T14538] ? aa_path_link+0x460/0x460 [ 208.502156][T14538] ? find_held_lock+0x35/0x130 [ 208.506949][T14538] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 208.513197][T14538] ? iov_iter_init+0xee/0x220 [ 208.517883][T14538] new_sync_write+0x4c7/0x760 [ 208.522573][T14538] ? default_llseek+0x2e0/0x2e0 [ 208.527451][T14538] ? common_file_perm+0x238/0x720 [ 208.532470][T14538] ? __fget+0x381/0x550 [ 208.536636][T14538] ? apparmor_file_permission+0x25/0x30 [ 208.542188][T14538] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 208.548423][T14538] ? security_file_permission+0x94/0x380 [ 208.554048][T14538] __vfs_write+0xe4/0x110 [ 208.558407][T14538] vfs_write+0x20c/0x580 [ 208.562692][T14538] ksys_write+0xea/0x1f0 [ 208.566960][T14538] ? __ia32_sys_read+0xb0/0xb0 [ 208.571720][T14538] ? do_syscall_64+0x26/0x610 [ 208.576376][T14538] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 208.582449][T14538] ? do_syscall_64+0x26/0x610 [ 208.587131][T14538] __x64_sys_write+0x73/0xb0 [ 208.591725][T14538] do_syscall_64+0x103/0x610 [ 208.596300][T14538] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 208.602201][T14538] RIP: 0033:0x4582f9 [ 208.606100][T14538] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 208.625711][T14538] RSP: 002b:00007f6dcf2fbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 16:39:27 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r4) recvmsg(r0, &(0x7f0000001840)={&(0x7f0000001480)=@can={0x1d, 0x0}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001500)=""/10, 0xa}, {&(0x7f0000001580)=""/73, 0x49}, {&(0x7f0000001600)=""/184, 0xb8}, {&(0x7f00000016c0)=""/101, 0x65}, {&(0x7f0000001740)=""/81, 0x51}], 0x5}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], r6, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x33c) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xfffffffffffffffc, 0x3}, 0xffb8) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(0xffffffffffffffff) 16:39:27 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d040076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) 16:39:27 executing program 1 (fault-call:3 fault-nth:0): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x0, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) [ 208.634099][T14538] RAX: ffffffffffffffda RBX: 00007f6dcf2fbc90 RCX: 00000000004582f9 [ 208.642059][T14538] RDX: 000000000000fdef RSI: 0000000020000280 RDI: 0000000000000005 [ 208.650053][T14538] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 208.658016][T14538] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6dcf2fc6d4 [ 208.665967][T14538] R13: 00000000004c7ad0 R14: 00000000004ddba8 R15: 0000000000000006 [ 208.774176][T14558] FAULT_INJECTION: forcing a failure. [ 208.774176][T14558] name failslab, interval 1, probability 0, space 0, times 0 [ 208.794391][T14558] CPU: 0 PID: 14558 Comm: syz-executor.1 Not tainted 5.1.0-rc2+ #82 [ 208.802409][T14558] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 208.812593][T14558] Call Trace: [ 208.815868][T14558] dump_stack+0x172/0x1f0 [ 208.820195][T14558] should_fail.cold+0xa/0x15 [ 208.824792][T14558] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 208.830606][T14558] ? lockdep_hardirqs_on+0x418/0x5d0 [ 208.835883][T14558] ? retint_kernel+0x2d/0x2d [ 208.840469][T14558] ? trace_hardirqs_on_caller+0x6a/0x220 [ 208.846114][T14558] __should_failslab+0x121/0x190 [ 208.851044][T14558] should_failslab+0x9/0x14 [ 208.855566][T14558] kmem_cache_alloc+0x47/0x6f0 [ 208.860338][T14558] ? retint_kernel+0x2d/0x2d [ 208.864951][T14558] __nf_conntrack_alloc+0xdb/0x680 [ 208.870074][T14558] init_conntrack.isra.0+0xe2c/0x1170 [ 208.875450][T14558] ? nf_conntrack_alloc+0x50/0x50 [ 208.880472][T14558] ? ip6t_do_table+0xde1/0x1cd0 [ 208.885338][T14558] nf_conntrack_in+0xd93/0x1410 [ 208.890204][T14558] ? nf_conntrack_update+0x960/0x960 [ 208.895478][T14558] ? ip6t_error+0x40/0x40 [ 208.899799][T14558] ? retint_kernel+0x2d/0x2d [ 208.904417][T14558] ipv6_conntrack_local+0x1e/0x30 [ 208.909467][T14558] nf_hook_slow+0xbf/0x1f0 [ 208.913877][T14558] __ip6_local_out+0x45e/0x8e0 [ 208.918631][T14558] ? dst_output+0x180/0x180 16:39:27 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r4) recvmsg(r0, &(0x7f0000001840)={&(0x7f0000001480)=@can={0x1d, 0x0}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001500)=""/10, 0xa}, {&(0x7f0000001580)=""/73, 0x49}, {&(0x7f0000001600)=""/184, 0xb8}, {&(0x7f00000016c0)=""/101, 0x65}, {&(0x7f0000001740)=""/81, 0x51}], 0x5}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], r6, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x33c) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xfffffffffffffffc, 0x3}, 0xffb8) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(0xffffffffffffffff) 16:39:27 executing program 4 (fault-call:5 fault-nth:62): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) [ 208.923127][T14558] ? __skb_checksum+0x576/0x880 [ 208.927982][T14558] ? ip6_dst_hoplimit+0x3f0/0x3f0 [ 208.932988][T14558] ip6_local_out+0x2d/0x1b0 [ 208.937502][T14558] ? __skb_checksum+0x880/0x880 [ 208.942374][T14558] ip6_send_skb+0xbb/0x350 [ 208.946801][T14558] udp_v6_send_skb.isra.0+0x839/0x14f0 [ 208.952274][T14558] udp_v6_push_pending_frames+0x295/0x3b0 [ 208.958033][T14558] ? udp_v6_send_skb.isra.0+0x14f0/0x14f0 [ 208.964984][T14558] ? udpv6_sendmsg+0x1b10/0x28d0 [ 208.969932][T14558] udpv6_sendmsg+0x1b18/0x28d0 [ 208.974699][T14558] ? trace_hardirqs_on_caller+0x6a/0x220 [ 208.974764][T14558] ? udpv6_setsockopt+0xb0/0xb0 [ 208.974789][T14558] ? udp6_unicast_rcv_skb.isra.0+0x2f0/0x2f0 [ 208.991604][T14558] ? aa_profile_af_perm+0x320/0x320 [ 208.996811][T14558] ? rw_copy_check_uvector+0xf7/0x330 [ 209.002189][T14558] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 209.007736][T14558] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 209.013468][T14558] ? rw_copy_check_uvector+0x2a6/0x330 [ 209.018932][T14558] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 209.024397][T14558] ? lockdep_hardirqs_on+0x418/0x5d0 [ 209.029699][T14558] ? ___might_sleep+0x163/0x280 [ 209.034561][T14558] ? __might_sleep+0x95/0x190 [ 209.039253][T14558] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 209.044875][T14558] ? aa_sk_perm+0x288/0x880 [ 209.049376][T14558] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 209.054929][T14558] inet_sendmsg+0x147/0x5e0 [ 209.059462][T14558] ? udp6_unicast_rcv_skb.isra.0+0x2f0/0x2f0 [ 209.065452][T14558] ? inet_sendmsg+0x147/0x5e0 [ 209.070133][T14558] ? ipip_gro_receive+0x100/0x100 16:39:27 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d050076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) [ 209.075166][T14558] sock_sendmsg+0xdd/0x130 [ 209.079605][T14558] ___sys_sendmsg+0x806/0x930 [ 209.084304][T14558] ? copy_msghdr_from_user+0x430/0x430 [ 209.089777][T14558] ? kasan_check_read+0x11/0x20 [ 209.094655][T14558] ? __fget+0x381/0x550 [ 209.098854][T14558] ? ksys_dup3+0x3e0/0x3e0 [ 209.103289][T14558] ? lock_downgrade+0x880/0x880 [ 209.108152][T14558] ? __fget_light+0x1a9/0x230 [ 209.112846][T14558] ? __fdget+0x1b/0x20 [ 209.117154][T14558] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 16:39:27 executing program 2: write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000b40), 0x12) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net////\x00', 0x400e10001, 0x0) close(r0) r1 = openat$cgroup_procs(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) r2 = gettid() write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) [ 209.123401][T14558] __sys_sendmsg+0x105/0x1d0 [ 209.128009][T14558] ? __ia32_sys_shutdown+0x80/0x80 [ 209.133129][T14558] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 209.138616][T14558] __x64_sys_sendmsg+0x78/0xb0 [ 209.143386][T14558] do_syscall_64+0x103/0x610 [ 209.147996][T14558] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 209.153895][T14558] RIP: 0033:0x4582f9 [ 209.157791][T14558] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 209.157800][T14558] RSP: 002b:00007fa4aeedec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 209.157815][T14558] RAX: ffffffffffffffda RBX: 00007fa4aeedec90 RCX: 00000000004582f9 [ 209.157825][T14558] RDX: 0000000000000000 RSI: 00000000200027c0 RDI: 0000000000000004 [ 209.157833][T14558] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 209.157843][T14558] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa4aeedf6d4 [ 209.157852][T14558] R13: 00000000004c52b9 R14: 00000000004d9438 R15: 0000000000000005 [ 209.215022][T14569] FAULT_INJECTION: forcing a failure. [ 209.215022][T14569] name failslab, interval 1, probability 0, space 0, times 0 [ 209.249324][T14569] CPU: 1 PID: 14569 Comm: syz-executor.4 Not tainted 5.1.0-rc2+ #82 [ 209.257318][T14569] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 209.267367][T14569] Call Trace: [ 209.270667][T14569] dump_stack+0x172/0x1f0 [ 209.275008][T14569] should_fail.cold+0xa/0x15 [ 209.279619][T14569] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 209.285449][T14569] ? ___might_sleep+0x163/0x280 [ 209.290310][T14569] __should_failslab+0x121/0x190 [ 209.295252][T14569] should_failslab+0x9/0x14 [ 209.299769][T14569] kmem_cache_alloc_node+0x264/0x710 [ 209.305078][T14569] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 209.311314][T14569] __alloc_skb+0xd5/0x5e0 [ 209.315644][T14569] ? skb_trim+0x190/0x190 [ 209.319974][T14569] ? skb_page_frag_refill+0x127/0x460 [ 209.325351][T14569] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 209.331061][T14569] ? skb_put+0x177/0x1d0 [ 209.335293][T14569] __ip_append_data.isra.0+0x24d6/0x2dd0 [ 209.340931][T14569] ? ip_reply_glue_bits+0xc0/0xc0 [ 209.345941][T14569] ? __ip_flush_pending_frames.isra.0+0x2d0/0x2d0 [ 209.352335][T14569] ? mark_held_locks+0xf0/0xf0 [ 209.357077][T14569] ? lock_sock_nested+0xac/0x120 [ 209.362005][T14569] ? ip_reply_glue_bits+0xc0/0xc0 [ 209.367044][T14569] ip_append_data.part.0+0xf2/0x170 [ 209.372226][T14569] ? ip_reply_glue_bits+0xc0/0xc0 [ 209.377229][T14569] ip_append_data+0x6e/0x90 [ 209.381716][T14569] udp_sendmsg+0x8e7/0x2820 [ 209.386202][T14569] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 209.392448][T14569] ? __lock_acquire+0x548/0x3fb0 [ 209.397365][T14569] ? ip_reply_glue_bits+0xc0/0xc0 [ 209.402393][T14569] ? udp4_lib_lookup_skb+0x440/0x440 [ 209.407679][T14569] ? is_bpf_text_address+0xac/0x170 [ 209.412872][T14569] ? find_held_lock+0x35/0x130 [ 209.417622][T14569] ? is_bpf_text_address+0xac/0x170 [ 209.422803][T14569] ? ___might_sleep+0x163/0x280 [ 209.427632][T14569] ? __might_sleep+0x95/0x190 [ 209.432292][T14569] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 209.437902][T14569] ? aa_sk_perm+0x288/0x880 [ 209.442399][T14569] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 209.447954][T14569] inet_sendmsg+0x147/0x5e0 [ 209.452472][T14569] ? udp4_lib_lookup_skb+0x440/0x440 [ 209.457763][T14569] ? inet_sendmsg+0x147/0x5e0 [ 209.462418][T14569] ? ipip_gro_receive+0x100/0x100 [ 209.467438][T14569] sock_sendmsg+0xdd/0x130 [ 209.471836][T14569] sock_write_iter+0x27c/0x3e0 [ 209.476578][T14569] ? sock_sendmsg+0x130/0x130 [ 209.481241][T14569] ? aa_path_link+0x460/0x460 [ 209.485896][T14569] ? find_held_lock+0x35/0x130 [ 209.490638][T14569] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 209.496870][T14569] ? iov_iter_init+0xee/0x220 [ 209.501583][T14569] new_sync_write+0x4c7/0x760 [ 209.506256][T14569] ? default_llseek+0x2e0/0x2e0 [ 209.511087][T14569] ? common_file_perm+0x238/0x720 [ 209.516090][T14569] ? __fget+0x381/0x550 [ 209.520228][T14569] ? apparmor_file_permission+0x25/0x30 [ 209.525754][T14569] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 209.531997][T14569] ? security_file_permission+0x94/0x380 [ 209.537630][T14569] __vfs_write+0xe4/0x110 [ 209.541957][T14569] vfs_write+0x20c/0x580 [ 209.546211][T14569] ksys_write+0xea/0x1f0 [ 209.550442][T14569] ? __ia32_sys_read+0xb0/0xb0 [ 209.555188][T14569] ? do_syscall_64+0x26/0x610 [ 209.559855][T14569] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 209.565931][T14569] ? do_syscall_64+0x26/0x610 [ 209.570609][T14569] __x64_sys_write+0x73/0xb0 [ 209.575179][T14569] do_syscall_64+0x103/0x610 [ 209.579767][T14569] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 209.585644][T14569] RIP: 0033:0x4582f9 [ 209.589535][T14569] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 209.609124][T14569] RSP: 002b:00007f6dcf2dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 209.617526][T14569] RAX: ffffffffffffffda RBX: 00007f6dcf2dac90 RCX: 00000000004582f9 16:39:28 executing program 1 (fault-call:3 fault-nth:1): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x0, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:28 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d060076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) 16:39:28 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000000c0)=0xffffffffffffed58, 0x4) recvmsg(r0, &(0x7f0000000340)={&(0x7f0000000040)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000d80)=""/4096, 0x1000}, {&(0x7f00000000c0)}, {&(0x7f0000000100)=""/32, 0x20}, {&(0x7f0000000200)=""/190, 0xbe}], 0x4, &(0x7f00000002c0)=""/82, 0x52}, 0x40010000) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001880)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) [ 209.625479][T14569] RDX: 000000000000fdef RSI: 0000000020000280 RDI: 0000000000000004 [ 209.633435][T14569] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 209.641384][T14569] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6dcf2db6d4 [ 209.649335][T14569] R13: 00000000004c7ad0 R14: 00000000004ddba8 R15: 0000000000000005 [ 209.750691][T14584] FAULT_INJECTION: forcing a failure. [ 209.750691][T14584] name failslab, interval 1, probability 0, space 0, times 0 [ 209.779543][T14584] CPU: 1 PID: 14584 Comm: syz-executor.1 Not tainted 5.1.0-rc2+ #82 [ 209.787545][T14584] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 209.797601][T14584] Call Trace: [ 209.797628][T14584] dump_stack+0x172/0x1f0 [ 209.797652][T14584] should_fail.cold+0xa/0x15 [ 209.797675][T14584] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 209.815648][T14584] __should_failslab+0x121/0x190 [ 209.820601][T14584] should_failslab+0x9/0x14 [ 209.825148][T14584] __kmalloc_track_caller+0x6d/0x740 [ 209.830457][T14584] ? lock_downgrade+0x880/0x880 [ 209.835316][T14584] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 209.841558][T14584] ? nf_ct_ext_add+0x2a9/0x640 [ 209.846327][T14584] __krealloc+0x71/0xc0 [ 209.846346][T14584] nf_ct_ext_add+0x2a9/0x640 [ 209.846368][T14584] init_conntrack.isra.0+0x439/0x1170 [ 209.860444][T14584] ? nf_conntrack_alloc+0x50/0x50 [ 209.860475][T14584] nf_conntrack_in+0xd93/0x1410 [ 209.860500][T14584] ? nf_conntrack_update+0x960/0x960 [ 209.860519][T14584] ? ip6t_error+0x40/0x40 [ 209.875644][T14584] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 209.885409][T14584] ipv6_conntrack_local+0x1e/0x30 [ 209.890458][T14584] nf_hook_slow+0xbf/0x1f0 [ 209.894889][T14584] __ip6_local_out+0x45e/0x8e0 [ 209.899660][T14584] ? dst_output+0x180/0x180 [ 209.904169][T14584] ? __skb_checksum+0x576/0x880 [ 209.909034][T14584] ? ip6_dst_hoplimit+0x3f0/0x3f0 [ 209.914108][T14584] ip6_local_out+0x2d/0x1b0 [ 209.918621][T14584] ? __skb_checksum+0x880/0x880 [ 209.923483][T14584] ip6_send_skb+0xbb/0x350 [ 209.927909][T14584] udp_v6_send_skb.isra.0+0x839/0x14f0 [ 209.933387][T14584] udp_v6_push_pending_frames+0x295/0x3b0 [ 209.939124][T14584] ? udp_v6_send_skb.isra.0+0x14f0/0x14f0 [ 209.944860][T14584] ? udpv6_setsockopt+0xb0/0xb0 [ 209.949737][T14584] udpv6_sendmsg+0x1b18/0x28d0 [ 209.954509][T14584] ? __might_fault+0x12b/0x1e0 [ 209.959293][T14584] ? udpv6_setsockopt+0xb0/0xb0 [ 209.964156][T14584] ? udp6_unicast_rcv_skb.isra.0+0x2f0/0x2f0 [ 209.964179][T14584] ? aa_profile_af_perm+0x320/0x320 [ 209.964198][T14584] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 209.964217][T14584] ? _copy_from_user+0xdd/0x150 [ 209.975399][T14584] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 209.975419][T14584] ? rw_copy_check_uvector+0x2a6/0x330 [ 209.975467][T14584] ? ___might_sleep+0x163/0x280 [ 210.004078][T14584] ? __might_sleep+0x95/0x190 [ 210.008769][T14584] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 210.014401][T14584] ? aa_sk_perm+0x288/0x880 [ 210.018960][T14584] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 210.024522][T14584] inet_sendmsg+0x147/0x5e0 [ 210.029068][T14584] ? udp6_unicast_rcv_skb.isra.0+0x2f0/0x2f0 [ 210.035053][T14584] ? inet_sendmsg+0x147/0x5e0 [ 210.039732][T14584] ? ipip_gro_receive+0x100/0x100 [ 210.044770][T14584] sock_sendmsg+0xdd/0x130 [ 210.049208][T14584] ___sys_sendmsg+0x806/0x930 [ 210.049228][T14584] ? copy_msghdr_from_user+0x430/0x430 [ 210.049254][T14584] ? kasan_check_read+0x11/0x20 [ 210.059388][T14584] ? __fget+0x381/0x550 [ 210.059410][T14584] ? ksys_dup3+0x3e0/0x3e0 [ 210.059423][T14584] ? lock_downgrade+0x880/0x880 [ 210.059455][T14584] ? __fget_light+0x1a9/0x230 [ 210.082333][T14584] ? __fdget+0x1b/0x20 [ 210.086422][T14584] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 210.092698][T14584] __sys_sendmsg+0x105/0x1d0 [ 210.097304][T14584] ? __ia32_sys_shutdown+0x80/0x80 [ 210.102445][T14584] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 210.107911][T14584] ? do_syscall_64+0x26/0x610 [ 210.112778][T14584] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 210.118845][T14584] ? do_syscall_64+0x26/0x610 [ 210.123546][T14584] __x64_sys_sendmsg+0x78/0xb0 [ 210.128320][T14584] do_syscall_64+0x103/0x610 [ 210.132917][T14584] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 210.138812][T14584] RIP: 0033:0x4582f9 [ 210.142711][T14584] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 210.162491][T14584] RSP: 002b:00007fa4aeedec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 210.170908][T14584] RAX: ffffffffffffffda RBX: 00007fa4aeedec90 RCX: 00000000004582f9 [ 210.174964][T14605] FAULT_INJECTION: forcing a failure. [ 210.174964][T14605] name failslab, interval 1, probability 0, space 0, times 0 [ 210.178918][T14584] RDX: 0000000000000000 RSI: 00000000200027c0 RDI: 0000000000000004 16:39:28 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r3) recvmsg(r0, &(0x7f0000001840)={&(0x7f0000001480)=@can={0x1d, 0x0}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001500)=""/10, 0xa}, {&(0x7f0000001580)=""/73, 0x49}, {&(0x7f0000001600)=""/184, 0xb8}, {&(0x7f00000016c0)=""/101, 0x65}, {&(0x7f0000001740)=""/81, 0x51}], 0x5}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], r5, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x33c) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xfffffffffffffffc, 0x3}, 0xffb8) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r6) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r7) 16:39:28 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d070076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) 16:39:28 executing program 0: socketpair$unix(0x1, 0x10000000000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080)={[{0x543, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0xf) 16:39:28 executing program 4 (fault-call:5 fault-nth:63): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) 16:39:28 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d080076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) 16:39:28 executing program 2: socket$kcm(0x2b, 0x200000000000001, 0x0) 16:39:28 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d090076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) 16:39:28 executing program 2: r0 = perf_event_open(&(0x7f0000000ac0)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) [ 210.178928][T14584] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 210.178936][T14584] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa4aeedf6d4 [ 210.178945][T14584] R13: 00000000004c52b9 R14: 00000000004d9438 R15: 0000000000000005 [ 210.279484][T14605] CPU: 1 PID: 14605 Comm: syz-executor.4 Not tainted 5.1.0-rc2+ #82 [ 210.287495][T14605] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 210.297550][T14605] Call Trace: [ 210.300858][T14605] dump_stack+0x172/0x1f0 [ 210.305201][T14605] should_fail.cold+0xa/0x15 [ 210.309854][T14605] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 210.315696][T14605] ? ___might_sleep+0x163/0x280 [ 210.320563][T14605] __should_failslab+0x121/0x190 [ 210.325511][T14605] should_failslab+0x9/0x14 [ 210.330022][T14605] kmem_cache_alloc_node_trace+0x270/0x720 [ 210.335865][T14605] __kmalloc_node_track_caller+0x3d/0x70 [ 210.341511][T14605] __kmalloc_reserve.isra.0+0x40/0xf0 [ 210.346889][T14605] __alloc_skb+0x10b/0x5e0 [ 210.351317][T14605] ? skb_trim+0x190/0x190 [ 210.355648][T14605] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 210.361365][T14605] ? skb_put+0x177/0x1d0 [ 210.365611][T14605] __ip_append_data.isra.0+0x24d6/0x2dd0 [ 210.371267][T14605] ? ip_reply_glue_bits+0xc0/0xc0 [ 210.376486][T14605] ? __ip_flush_pending_frames.isra.0+0x2d0/0x2d0 [ 210.382899][T14605] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 210.388363][T14605] ? ip_reply_glue_bits+0xc0/0xc0 [ 210.393388][T14605] ip_append_data.part.0+0xf2/0x170 [ 210.398595][T14605] ? ip_reply_glue_bits+0xc0/0xc0 [ 210.403621][T14605] ip_append_data+0x6e/0x90 [ 210.408133][T14605] udp_sendmsg+0x8e7/0x2820 [ 210.412638][T14605] ? find_held_lock+0x35/0x130 [ 210.417404][T14605] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 210.423651][T14605] ? ip_reply_glue_bits+0xc0/0xc0 [ 210.428680][T14605] ? udp4_lib_lookup_skb+0x440/0x440 [ 210.433966][T14605] ? finish_task_switch+0x146/0x780 [ 210.439163][T14605] ? find_held_lock+0x35/0x130 [ 210.443928][T14605] ? finish_task_switch+0x146/0x780 [ 210.449138][T14605] ? ___might_sleep+0x163/0x280 [ 210.453990][T14605] ? __might_sleep+0x95/0x190 [ 210.458671][T14605] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 210.464299][T14605] ? aa_sk_perm+0x288/0x880 [ 210.468812][T14605] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 210.474363][T14605] inet_sendmsg+0x147/0x5e0 [ 210.478867][T14605] ? udp4_lib_lookup_skb+0x440/0x440 [ 210.484148][T14605] ? inet_sendmsg+0x147/0x5e0 [ 210.488823][T14605] ? ipip_gro_receive+0x100/0x100 [ 210.493848][T14605] sock_sendmsg+0xdd/0x130 [ 210.498268][T14605] sock_write_iter+0x27c/0x3e0 [ 210.503041][T14605] ? sock_sendmsg+0x130/0x130 [ 210.507729][T14605] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 210.513185][T14605] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 210.518643][T14605] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 210.524909][T14605] ? iov_iter_init+0xee/0x220 [ 210.529609][T14605] new_sync_write+0x4c7/0x760 [ 210.534319][T14605] ? default_llseek+0x2e0/0x2e0 [ 210.539192][T14605] ? security_file_permission+0x34/0x380 [ 210.544818][T14605] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 210.551062][T14605] ? security_file_permission+0x94/0x380 [ 210.556699][T14605] __vfs_write+0xe4/0x110 [ 210.561043][T14605] vfs_write+0x20c/0x580 [ 210.565296][T14605] ksys_write+0xea/0x1f0 [ 210.569558][T14605] ? __ia32_sys_read+0xb0/0xb0 [ 210.574325][T14605] ? do_syscall_64+0x26/0x610 [ 210.579033][T14605] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 210.585098][T14605] ? do_syscall_64+0x26/0x610 [ 210.589782][T14605] __x64_sys_write+0x73/0xb0 [ 210.594376][T14605] do_syscall_64+0x103/0x610 [ 210.598969][T14605] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 210.605065][T14605] RIP: 0033:0x4582f9 [ 210.608960][T14605] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 16:39:29 executing program 0: r0 = socket$kcm(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0xffffffffffffff9c, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={r2, 0x7ff, 0x10}, 0xc) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, 0x0, 0x0) [ 210.628561][T14605] RSP: 002b:00007f6dcf2fbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 210.636968][T14605] RAX: ffffffffffffffda RBX: 00007f6dcf2fbc90 RCX: 00000000004582f9 [ 210.644934][T14605] RDX: 000000000000fdef RSI: 0000000020000280 RDI: 0000000000000005 [ 210.652898][T14605] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 210.660882][T14605] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6dcf2fc6d4 [ 210.668848][T14605] R13: 00000000004c7ad0 R14: 00000000004ddba8 R15: 0000000000000006 16:39:29 executing program 1 (fault-call:3 fault-nth:2): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x0, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:29 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d0a0076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) 16:39:29 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r3) recvmsg(r0, &(0x7f0000001840)={&(0x7f0000001480)=@can={0x1d, 0x0}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001500)=""/10, 0xa}, {&(0x7f0000001580)=""/73, 0x49}, {&(0x7f0000001600)=""/184, 0xb8}, {&(0x7f00000016c0)=""/101, 0x65}, {&(0x7f0000001740)=""/81, 0x51}], 0x5}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], r5, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x33c) close(r0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r6) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r7) 16:39:29 executing program 4 (fault-call:5 fault-nth:64): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) [ 210.873449][T14630] FAULT_INJECTION: forcing a failure. [ 210.873449][T14630] name failslab, interval 1, probability 0, space 0, times 0 [ 210.890625][T14630] CPU: 0 PID: 14630 Comm: syz-executor.1 Not tainted 5.1.0-rc2+ #82 [ 210.898632][T14630] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 210.908681][T14630] Call Trace: [ 210.908745][T14630] dump_stack+0x172/0x1f0 [ 210.908769][T14630] should_fail.cold+0xa/0x15 [ 210.908789][T14630] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 210.908812][T14630] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 210.932193][T14630] ? retint_kernel+0x2d/0x2d [ 210.936783][T14630] ? trace_hardirqs_on_caller+0x6a/0x220 [ 210.942425][T14630] __should_failslab+0x121/0x190 [ 210.947373][T14630] should_failslab+0x9/0x14 [ 210.951880][T14630] kmem_cache_alloc+0x47/0x6f0 [ 210.956656][T14630] skb_clone+0x150/0x3b0 [ 210.960905][T14630] ip6_finish_output2+0x1860/0x2550 [ 210.966103][T14630] ? find_held_lock+0x35/0x130 [ 210.970868][T14630] ? ip6_mtu+0x2e6/0x460 [ 210.975116][T14630] ? ip6_forward_finish+0x580/0x580 [ 210.980316][T14630] ? lock_downgrade+0x880/0x880 [ 210.985540][T14630] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 210.991873][T14630] ? kasan_check_read+0x11/0x20 [ 210.996734][T14630] ip6_finish_output+0x577/0xc30 [ 211.001681][T14630] ? ip6_finish_output+0x577/0xc30 [ 211.006798][T14630] ip6_output+0x235/0x7f0 [ 211.011172][T14630] ? ip6_finish_output+0xc30/0xc30 [ 211.016310][T14630] ? retint_kernel+0x2d/0x2d [ 211.020905][T14630] ? ip6_fragment+0x3760/0x3760 [ 211.025766][T14630] ip6_local_out+0xc4/0x1b0 [ 211.030278][T14630] ip6_send_skb+0xbb/0x350 [ 211.034701][T14630] udp_v6_send_skb.isra.0+0x839/0x14f0 [ 211.040172][T14630] udp_v6_push_pending_frames+0x295/0x3b0 [ 211.045889][T14630] ? udp_v6_send_skb.isra.0+0x14f0/0x14f0 [ 211.051621][T14630] ? udpv6_setsockopt+0xb0/0xb0 [ 211.056477][T14630] udpv6_sendmsg+0x1b18/0x28d0 [ 211.061239][T14630] ? __might_fault+0x12b/0x1e0 [ 211.066018][T14630] ? udpv6_setsockopt+0xb0/0xb0 [ 211.070878][T14630] ? udp6_unicast_rcv_skb.isra.0+0x2f0/0x2f0 [ 211.076964][T14630] ? aa_profile_af_perm+0x320/0x320 [ 211.082168][T14630] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 211.088403][T14630] ? _copy_from_user+0xdd/0x150 [ 211.093262][T14630] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 211.098980][T14630] ? rw_copy_check_uvector+0x2a6/0x330 [ 211.104466][T14630] ? ___might_sleep+0x163/0x280 [ 211.109320][T14630] ? __might_sleep+0x95/0x190 [ 211.114020][T14630] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 211.119949][T14630] ? aa_sk_perm+0x288/0x880 [ 211.124500][T14630] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 211.130071][T14630] inet_sendmsg+0x147/0x5e0 [ 211.134573][T14630] ? udp6_unicast_rcv_skb.isra.0+0x2f0/0x2f0 [ 211.140552][T14630] ? inet_sendmsg+0x147/0x5e0 [ 211.145244][T14630] ? ipip_gro_receive+0x100/0x100 [ 211.150299][T14630] sock_sendmsg+0xdd/0x130 [ 211.154718][T14630] ___sys_sendmsg+0x806/0x930 [ 211.159399][T14630] ? copy_msghdr_from_user+0x430/0x430 [ 211.164917][T14630] ? kasan_check_read+0x11/0x20 [ 211.169801][T14630] ? __fget+0x381/0x550 [ 211.173979][T14630] ? ksys_dup3+0x3e0/0x3e0 [ 211.178421][T14630] ? lock_downgrade+0x880/0x880 [ 211.183290][T14630] ? __fget_light+0x1a9/0x230 [ 211.187969][T14630] ? __fdget+0x1b/0x20 [ 211.192050][T14630] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 211.198299][T14630] __sys_sendmsg+0x105/0x1d0 [ 211.202901][T14630] ? __ia32_sys_shutdown+0x80/0x80 [ 211.208024][T14630] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 211.213520][T14630] __x64_sys_sendmsg+0x78/0xb0 [ 211.218286][T14630] ? do_syscall_64+0x5b/0x610 [ 211.222963][T14630] do_syscall_64+0x103/0x610 [ 211.227560][T14630] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 211.233481][T14630] RIP: 0033:0x4582f9 [ 211.237372][T14630] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 211.256976][T14630] RSP: 002b:00007fa4aeedec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 211.265388][T14630] RAX: ffffffffffffffda RBX: 00007fa4aeedec90 RCX: 00000000004582f9 16:39:29 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d090076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) [ 211.273356][T14630] RDX: 0000000000000000 RSI: 00000000200027c0 RDI: 0000000000000004 [ 211.281324][T14630] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 211.289291][T14630] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa4aeedf6d4 [ 211.297258][T14630] R13: 00000000004c52b9 R14: 00000000004d9438 R15: 0000000000000005 16:39:29 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d100076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) 16:39:30 executing program 1 (fault-call:3 fault-nth:3): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x0, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) [ 211.408609][T14643] FAULT_INJECTION: forcing a failure. [ 211.408609][T14643] name failslab, interval 1, probability 0, space 0, times 0 16:39:30 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d110076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) 16:39:30 executing program 0: r0 = bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000080)={0x6, 0x4, 0x0, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) recvmsg(0xffffffffffffff9c, &(0x7f0000008600)={&(0x7f00000081c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000008540)=[{&(0x7f0000008240)=""/180, 0xb4}, {&(0x7f0000008300)=""/219, 0xdb}, {&(0x7f0000008400)=""/132, 0x84}, {&(0x7f00000084c0)=""/80, 0x50}], 0x4, &(0x7f0000008580)=""/105, 0x69}, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x84, 0x81, {"4d02d31b946f1dfb297d4852d7d9e5e2c208eb1f668997eaa332ddf488e64eaf2533a787dd7c9439d7a3e4c7a1cde4bd62e472ba14ace8113fb00bdc247633785da982d3873775c4e78951877e91dd0d7e7061f74eee52580ad358f299609abcc0517aace55b8b9b2a0f"}}, {0x0, "852c42d9d5e3dcec6306894431c44b3e57e7985fc8e3ef38925a4a69ebc30d2d95e79299195bf3e37b1c76e25f09fc334219d54b2411a414557b"}}, &(0x7f0000008700)=""/68, 0xc0, 0x44}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000008840)={0xb, 0x11, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}, [@map={0x18, 0x7, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x62}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5}, @ldst={0x1, 0x0, 0x6, 0x2, 0xd, 0x2}, @map={0x18, 0x0, 0x1, 0x0, r0}, @map={0x18, 0x4, 0x1, 0x0, r0}, @initr0={0x18, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x139b957a}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1c0}]}, &(0x7f0000000000)='GPL\x00', 0x7, 0xe2, &(0x7f0000000180)=""/226, 0x41f00, 0x1, [], r1, 0xb, r2, 0x8, &(0x7f00000087c0)={0x1, 0x6}, 0x8, 0x10, &(0x7f0000008800)={0x7fff, 0x9, 0xb400}, 0x10}, 0x70) [ 211.490211][T14643] CPU: 0 PID: 14643 Comm: syz-executor.4 Not tainted 5.1.0-rc2+ #82 [ 211.498225][T14643] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 211.508280][T14643] Call Trace: [ 211.511580][T14643] dump_stack+0x172/0x1f0 [ 211.515919][T14643] should_fail.cold+0xa/0x15 [ 211.520524][T14643] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 211.526347][T14643] ? ___might_sleep+0x163/0x280 [ 211.531214][T14643] __should_failslab+0x121/0x190 [ 211.536198][T14643] should_failslab+0x9/0x14 [ 211.540725][T14643] kmem_cache_alloc_node_trace+0x270/0x720 [ 211.546554][T14643] __kmalloc_node_track_caller+0x3d/0x70 [ 211.552198][T14643] __kmalloc_reserve.isra.0+0x40/0xf0 [ 211.557583][T14643] __alloc_skb+0x10b/0x5e0 [ 211.562007][T14643] ? skb_trim+0x190/0x190 [ 211.566345][T14643] ? skb_page_frag_refill+0x127/0x460 [ 211.571720][T14643] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 211.577448][T14643] ? skb_put+0x177/0x1d0 [ 211.581701][T14643] __ip_append_data.isra.0+0x24d6/0x2dd0 16:39:30 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000376862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) [ 211.587337][T14643] ? ip_reply_glue_bits+0xc0/0xc0 [ 211.592382][T14643] ? __ip_flush_pending_frames.isra.0+0x2d0/0x2d0 [ 211.592399][T14643] ? mark_held_locks+0xf0/0xf0 [ 211.592434][T14643] ? perf_trace_lock+0x510/0x510 [ 211.592449][T14643] ? lock_sock_nested+0xac/0x120 [ 211.592464][T14643] ? ip_reply_glue_bits+0xc0/0xc0 [ 211.592478][T14643] ip_append_data.part.0+0xf2/0x170 [ 211.592497][T14643] ? ip_reply_glue_bits+0xc0/0xc0 [ 211.592515][T14643] ip_append_data+0x6e/0x90 [ 211.608606][T14643] udp_sendmsg+0x8e7/0x2820 [ 211.608628][T14643] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 211.608643][T14643] ? __lock_acquire+0x548/0x3fb0 [ 211.608658][T14643] ? ip_reply_glue_bits+0xc0/0xc0 [ 211.608684][T14643] ? udp4_lib_lookup_skb+0x440/0x440 [ 211.659211][T14643] ? is_bpf_text_address+0xac/0x170 [ 211.664411][T14643] ? find_held_lock+0x35/0x130 [ 211.664439][T14643] ? is_bpf_text_address+0xac/0x170 [ 211.664465][T14643] ? ___might_sleep+0x163/0x280 [ 211.664482][T14643] ? __might_sleep+0x95/0x190 [ 211.664503][T14643] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 211.689559][T14643] ? aa_sk_perm+0x288/0x880 [ 211.689585][T14643] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 211.689604][T14643] inet_sendmsg+0x147/0x5e0 [ 211.689618][T14643] ? udp4_lib_lookup_skb+0x440/0x440 [ 211.689629][T14643] ? inet_sendmsg+0x147/0x5e0 [ 211.689643][T14643] ? ipip_gro_receive+0x100/0x100 [ 211.689660][T14643] sock_sendmsg+0xdd/0x130 [ 211.689678][T14643] sock_write_iter+0x27c/0x3e0 [ 211.689697][T14643] ? sock_sendmsg+0x130/0x130 [ 211.689722][T14643] ? aa_path_link+0x460/0x460 [ 211.737689][T14643] ? find_held_lock+0x35/0x130 [ 211.742471][T14643] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 211.748717][T14643] ? iov_iter_init+0xee/0x220 [ 211.753407][T14643] new_sync_write+0x4c7/0x760 [ 211.758115][T14643] ? default_llseek+0x2e0/0x2e0 [ 211.762996][T14643] ? common_file_perm+0x238/0x720 [ 211.768072][T14643] ? __fget+0x381/0x550 [ 211.772238][T14643] ? apparmor_file_permission+0x25/0x30 [ 211.777790][T14643] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 211.784034][T14643] ? security_file_permission+0x94/0x380 [ 211.789675][T14643] __vfs_write+0xe4/0x110 [ 211.794026][T14643] vfs_write+0x20c/0x580 [ 211.798282][T14643] ksys_write+0xea/0x1f0 [ 211.802539][T14643] ? __ia32_sys_read+0xb0/0xb0 [ 211.807312][T14643] ? do_syscall_64+0x26/0x610 [ 211.811994][T14643] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 211.818082][T14643] ? do_syscall_64+0x26/0x610 [ 211.822771][T14643] __x64_sys_write+0x73/0xb0 [ 211.827363][T14643] do_syscall_64+0x103/0x610 [ 211.831991][T14643] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 211.837883][T14643] RIP: 0033:0x4582f9 [ 211.841970][T14643] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 211.861572][T14643] RSP: 002b:00007f6dcf2dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 211.870174][T14643] RAX: ffffffffffffffda RBX: 00007f6dcf2dac90 RCX: 00000000004582f9 [ 211.878185][T14643] RDX: 000000000000fdef RSI: 0000000020000280 RDI: 0000000000000005 16:39:30 executing program 2: r0 = socket$kcm(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x1f) perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x10001, 0x1, 0x8, 0x3, 0x0, 0x3, 0x8, 0x4, 0x1f, 0x6, 0x80000001, 0x6, 0x6, 0xc0, 0x6, 0x1d, 0x5, 0x40, 0x7, 0x67f2, 0x214, 0x7, 0x1, 0x3, 0x401, 0x6, 0x5, 0x31, 0x8, 0x0, 0x1780000000000000, 0x7aec3cec, 0x5, 0x2, 0x7, 0x2, 0x0, 0x1, 0x6, @perf_config_ext={0xfffffffffffffffc}, 0x2, 0x7fffffff, 0x10001, 0x7, 0x3, 0x1, 0x5}, 0xffffffffffffffff, 0x9, 0xffffffffffffff9c, 0xa) bpf$MAP_CREATE(0x0, &(0x7f0000214fd4)={0x10, 0x4, 0x4000000004, 0xffff, 0x2, 0xffffffffffffffff, 0x0, [0x305f, 0xa]}, 0x3c) recvmsg$kcm(r0, &(0x7f0000004b00)={&(0x7f0000004300)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000004a00)=[{&(0x7f0000004380)=""/203, 0xcb}, {&(0x7f0000004480)=""/230, 0xe6}, {&(0x7f0000004580)=""/167, 0xa7}, {&(0x7f0000004640)=""/252, 0xfc}, {&(0x7f0000004740)=""/156, 0x9c}, {&(0x7f0000004800)=""/67, 0x43}, {&(0x7f0000004880)=""/126, 0x7e}, {&(0x7f0000004900)=""/247, 0xf7}], 0x8, &(0x7f0000004a80)=""/106, 0x6a}, 0x40010120) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000180)='cgroup.stat\x00', 0x0, 0x0) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000004b40)=0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000004c00)={0xe, 0x3, &(0x7f0000000080)=@raw=[@alu={0x7, 0xffffffffffff0000, 0x0, 0x0, 0x3, 0xfffffffffffffffc, 0x1}, @jmp={0x5, 0x4, 0x2, 0x2, 0x2, 0xfffffffffffffffd, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x32}], &(0x7f00000000c0)='GPL\x00', 0x10001, 0x18, &(0x7f0000000100)=""/24, 0x41100, 0x1, [], r1, 0x7, r4, 0x8, &(0x7f0000004b80)={0x1, 0xffffffffffffffc9}, 0x8, 0x10, &(0x7f0000004bc0)={0xffffffffffff6fc9, 0x6, 0x8000, 0x5}, 0x10}, 0x70) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) 16:39:30 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000576862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) 16:39:30 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r3) recvmsg(r0, &(0x7f0000001840)={&(0x7f0000001480)=@can={0x1d, 0x0}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001500)=""/10, 0xa}, {&(0x7f0000001580)=""/73, 0x49}, {&(0x7f0000001600)=""/184, 0xb8}, {&(0x7f00000016c0)=""/101, 0x65}, {&(0x7f0000001740)=""/81, 0x51}], 0x5}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], r5, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x33c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r6) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r7) 16:39:30 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r3) recvmsg(r0, &(0x7f0000001840)={&(0x7f0000001480)=@can={0x1d, 0x0}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001500)=""/10, 0xa}, {&(0x7f0000001580)=""/73, 0x49}, {&(0x7f0000001600)=""/184, 0xb8}, {&(0x7f00000016c0)=""/101, 0x65}, {&(0x7f0000001740)=""/81, 0x51}], 0x5}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], r5, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x33c) close(r0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r6) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r7) 16:39:30 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x0, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) [ 211.886158][T14643] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 211.886173][T14643] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6dcf2db6d4 [ 211.902126][T14643] R13: 00000000004c7ad0 R14: 00000000004ddba8 R15: 0000000000000006 16:39:30 executing program 4 (fault-call:5 fault-nth:65): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) 16:39:30 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000676862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) 16:39:30 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x4, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:30 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x8}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x5, 0xfffffffffffffffc, 0x8000000001, 0x0, r0, 0x1000, [], 0x0, 0xffffffffffffffff, 0x3}, 0x3c) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/net/tun\x00', 0x8000, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x17, 0x7, &(0x7f0000000300)=@framed={{0x18, 0x0, 0x0, 0x0, 0xe070, 0x0, 0x0, 0x0, 0x20}, [@alu={0x7, 0xeaac, 0x0, 0xb, 0xf, 0x40, 0xffffffffffffffff}, @generic={0x6, 0xa804, 0xcec, 0x3}, @call={0x85, 0x0, 0x0, 0x3a}, @generic={0x6, 0x8e, 0x7000000000000000, 0x2, 0xf73}]}, &(0x7f0000000340)='syzkaller\x00', 0x3, 0x0, 0x0, 0x41000, 0x1, [], 0x0, 0xc, 0xffffffffffffff9c, 0x8, &(0x7f0000000380)={0x8f, 0x100000001}, 0x8, 0x10, &(0x7f00000003c0)={0x5, 0xffff, 0xfffffffffffffffe, 0x800}, 0x10}, 0x70) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000480)=r2) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2c) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuse_cpus\x00'/22, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r4, &(0x7f0000000100)="de5f510bb7b02c01ba3b48710a564f08aa1c8b1fdd00ef3f200c6e015bb746bc6743964d21ad4baaab05add2c61f", &(0x7f0000000200)="a00321dfa3fc51c5180cce20841d15e77dc3e382ae0847c7ba5ed5bdcf59a45d96e87b0cfac0ce6b3e4e48e57f9ae43f0c45ceb847d44d1511f35da63f651087f64804f00efa8a9642624a5beb8e39a2c57dba3173a61bc40caf9685331befa6eefb53f934037c9edc9ee511d58192cb56def2771097d26480dbc49a9b08dcb0431ebacf165b6fabee5a9a34c39c4a4909332d0a3be5237d3625b775d5c0645f35cafceacdd0b5994aa159ebfbfeba6673d27fd4", 0x2}, 0x20) perf_event_open$cgroup(&(0x7f0000000040)={0x1, 0x70, 0x9, 0x100, 0xc00000000000000, 0x1, 0x0, 0x0, 0x20080, 0x3, 0x3, 0x200, 0x7ff, 0xfffffffffffffffa, 0x2, 0x0, 0x800, 0x2, 0x70af, 0x252fa2ed, 0x6, 0x5d32, 0x1, 0xfffffffffffffff7, 0xf6, 0x8, 0x0, 0x9, 0x70, 0x1ff, 0xac0c, 0x6, 0x9047, 0x2, 0x5, 0x401, 0x5, 0x4, 0x0, 0x9, 0x4, @perf_config_ext={0x1, 0x4}, 0x20, 0x2, 0x6, 0x4, 0x8, 0x6, 0x8000}, r5, 0xb, r3, 0x4) 16:39:30 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x7, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:30 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000776862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) 16:39:30 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001780)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000017c0)='cpuacct.usage_sys\x00', 0x0, 0x0) recvmsg$kcm(r1, &(0x7f00000003c0)={&(0x7f0000000200)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000280)=""/240, 0xfe75}, 0x0) sendmsg$kcm(r1, &(0x7f0000000400)={&(0x7f0000000100)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000000380)=[{&(0x7f00000014c0)="a0b5dc604c074c006ba9f2ae99f2a97554158d996a70b007d0c240168c0ab7d3e8f45ca764a62952aa6091137f1aa62c640b56b17619b93b9f45427978fad856a6b25c9bd8b70257304b62a2df7afa9fb8880468c0aea2b1663f015f307202afc0dcc36a609f8a22f4cd12364a41c3b17c718f42735496f4ac526b941a0209b8c2bb961ceef80ff9ce1688cd09a8af3998b9ae2848135bc3ef46fcb9d3d72ab377f2ad3db91c95666c320e613de8adb9ba059eaab045256e1327db", 0xbb}], 0x1, &(0x7f0000001580)=[{0x100, 0x13b, 0x5, "f2e86416bb7798cee26877d2261315196f593a6c4a15f0a0060685c9e40c0ae33f35da6a64c42e42495ad744513bdc9e913a3b15776a70cb793224c51f0455533cd62a58dd8fafba5b1c5033ccdb8097ecfd3d3e5c54c00d167698c28e568bec9b82a418ba3b657692ebaa38b5790c4e1a944e22e84d4b29626d3e0f22b10254e11c0125b4bc01e3124ca74595f99372bb76d3188dd5fa8f4db71347e246ba4516451f7d2694373935eb08f1c140c1ee8c8bb7039552a029cd969d43fec8da7deb82f4621a58b46a41082e4244391b3b6587016cf11a7bd7bde410a94d2df01849c99cf4633674c242502ae938"}, {0xc8, 0x10d, 0xe4, "0ebff6e93112ede30746a587936363a113653c2e991b7cad492ed1b94d07eae5ad1a4e410dfcc04fd3bfe05df716e8771e2a2155b483011ad32d38908f29287be5cb40be47f38c9ec1320b3817603fbbfe7c8f097aa0dbb4ad901b2adf4cdb4f50ec374e7874517c83b893f57e164fc2a1d4b7162615d8aa4b3382613a7543a30fdbd96ee8c9530a5443bdf3631e185c905897a538403397a0a5d9705db6c07399af9196653d646a10c6c1032a101de72284f7e917"}], 0x1c8}, 0xc000) r2 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x2a0, 0x0, 0x0, 0x4000]}, 0x2a}, 0x80, &(0x7f0000000040)=[{&(0x7f0000001800)="5a07e0c5c1bac3c71cc37af1c1286256eb96847d81fd094f5e494ffa808f0b7535fdafa449b6f2dd0b5207b6132ec176113153f87922abe993d5eac326303ac087c2e7926357bcdaf14b94c8d32b2af1afd16fce875adfae3516b2f7a1f81ece8df66d893fcb6908b3f9c2b5522177004c68e8", 0x73}, {&(0x7f0000001880)="cecd8495841cd48b85e0c2f9654ab314aff7b1a483d01be86117b60c7a048e1fcbae2dbfdc503d21b05dedf974165ef07e34892ab9d210a6668a112d513aa1a86d1a82104086b5aab1da83d6b2fe2a458c659a700f173f150529276204b7cec1f31ff5ec181abe8e2f69ff8e493cc18ab0ab3c5412b36f2277dfd80e25dd711ff551622120bbef6d86050644ab753a2620a32e4c2c3c8f9e730a3548936c7cc55015684590108f05272a3169820771e4186203c98b5828c2d34590716237a5b6a80d59e20febc6bc7bef672a7a1d946e85e15d55173aee0f684ed23a4c571467c203e353ca49d79322", 0xe9}], 0x2, &(0x7f0000000180)}, 0x0) [ 212.188252][T14694] FAULT_INJECTION: forcing a failure. [ 212.188252][T14694] name failslab, interval 1, probability 0, space 0, times 0 [ 212.305007][T14704] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 212.307636][T14694] CPU: 1 PID: 14694 Comm: syz-executor.4 Not tainted 5.1.0-rc2+ #82 [ 212.331391][T14694] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 212.341462][T14694] Call Trace: [ 212.344771][T14694] dump_stack+0x172/0x1f0 [ 212.349110][T14694] should_fail.cold+0xa/0x15 [ 212.353706][T14694] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 212.359519][T14694] ? ___might_sleep+0x163/0x280 [ 212.364379][T14694] __should_failslab+0x121/0x190 [ 212.369321][T14694] should_failslab+0x9/0x14 [ 212.373831][T14694] kmem_cache_alloc_node_trace+0x270/0x720 [ 212.379650][T14694] __kmalloc_node_track_caller+0x3d/0x70 [ 212.385292][T14694] __kmalloc_reserve.isra.0+0x40/0xf0 [ 212.390671][T14694] __alloc_skb+0x10b/0x5e0 [ 212.395091][T14694] ? skb_trim+0x190/0x190 [ 212.399422][T14694] ? skb_page_frag_refill+0x127/0x460 [ 212.404807][T14694] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 212.410529][T14694] ? skb_put+0x177/0x1d0 [ 212.414776][T14694] __ip_append_data.isra.0+0x24d6/0x2dd0 [ 212.420416][T14694] ? ip_reply_glue_bits+0xc0/0xc0 [ 212.425468][T14694] ? __ip_flush_pending_frames.isra.0+0x2d0/0x2d0 [ 212.431885][T14694] ? mark_held_locks+0xf0/0xf0 [ 212.436660][T14694] ? lock_sock_nested+0xac/0x120 [ 212.441601][T14694] ? ip_reply_glue_bits+0xc0/0xc0 [ 212.446629][T14694] ip_append_data.part.0+0xf2/0x170 [ 212.451835][T14694] ? ip_reply_glue_bits+0xc0/0xc0 [ 212.456864][T14694] ip_append_data+0x6e/0x90 [ 212.461376][T14694] udp_sendmsg+0x8e7/0x2820 [ 212.465883][T14694] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 212.472126][T14694] ? __lock_acquire+0x548/0x3fb0 [ 212.477069][T14694] ? ip_reply_glue_bits+0xc0/0xc0 [ 212.482101][T14694] ? udp4_lib_lookup_skb+0x440/0x440 [ 212.487395][T14694] ? is_bpf_text_address+0xac/0x170 [ 212.492598][T14694] ? find_held_lock+0x35/0x130 [ 212.497366][T14694] ? is_bpf_text_address+0xac/0x170 [ 212.502575][T14694] ? ___might_sleep+0x163/0x280 [ 212.507436][T14694] ? __might_sleep+0x95/0x190 [ 212.512137][T14694] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 212.517806][T14694] ? aa_sk_perm+0x288/0x880 [ 212.522314][T14694] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 212.527860][T14694] inet_sendmsg+0x147/0x5e0 [ 212.532367][T14694] ? udp4_lib_lookup_skb+0x440/0x440 [ 212.537729][T14694] ? inet_sendmsg+0x147/0x5e0 [ 212.542404][T14694] ? ipip_gro_receive+0x100/0x100 [ 212.547439][T14694] sock_sendmsg+0xdd/0x130 [ 212.551883][T14694] sock_write_iter+0x27c/0x3e0 [ 212.556652][T14694] ? sock_sendmsg+0x130/0x130 [ 212.561346][T14694] ? aa_path_link+0x460/0x460 [ 212.566012][T14694] ? find_held_lock+0x35/0x130 [ 212.570873][T14694] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 212.577120][T14694] ? iov_iter_init+0xee/0x220 [ 212.581797][T14694] new_sync_write+0x4c7/0x760 [ 212.586480][T14694] ? default_llseek+0x2e0/0x2e0 [ 212.591334][T14694] ? common_file_perm+0x238/0x720 [ 212.596353][T14694] ? __fget+0x381/0x550 [ 212.600517][T14694] ? apparmor_file_permission+0x25/0x30 [ 212.606063][T14694] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 212.612309][T14694] ? security_file_permission+0x94/0x380 [ 212.617972][T14694] __vfs_write+0xe4/0x110 [ 212.622305][T14694] vfs_write+0x20c/0x580 [ 212.626552][T14694] ksys_write+0xea/0x1f0 [ 212.630793][T14694] ? __ia32_sys_read+0xb0/0xb0 [ 212.635559][T14694] ? do_syscall_64+0x26/0x610 [ 212.640233][T14694] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 212.646298][T14694] ? do_syscall_64+0x26/0x610 [ 212.650986][T14694] __x64_sys_write+0x73/0xb0 [ 212.655592][T14694] do_syscall_64+0x103/0x610 [ 212.660199][T14694] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 212.666086][T14694] RIP: 0033:0x4582f9 [ 212.669980][T14694] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 212.689584][T14694] RSP: 002b:00007f6dcf2fbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 212.698005][T14694] RAX: ffffffffffffffda RBX: 00007f6dcf2fbc90 RCX: 00000000004582f9 16:39:30 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000976862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) [ 212.706015][T14694] RDX: 000000000000fdef RSI: 0000000020000280 RDI: 0000000000000005 [ 212.714007][T14694] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 212.722022][T14694] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6dcf2fc6d4 [ 212.730003][T14694] R13: 00000000004c7ad0 R14: 00000000004ddba8 R15: 0000000000000006 16:39:31 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x8, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:31 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r2) recvmsg(r0, &(0x7f0000001840)={&(0x7f0000001480)=@can={0x1d, 0x0}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001500)=""/10, 0xa}, {&(0x7f0000001580)=""/73, 0x49}, {&(0x7f0000001600)=""/184, 0xb8}, {&(0x7f00000016c0)=""/101, 0x65}, {&(0x7f0000001740)=""/81, 0x51}], 0x5}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], r4, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r1) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r5) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r6) 16:39:31 executing program 4 (fault-call:5 fault-nth:66): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) 16:39:31 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r3) recvmsg(r0, &(0x7f0000001840)={&(0x7f0000001480)=@can={0x1d, 0x0}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001500)=""/10, 0xa}, {&(0x7f0000001580)=""/73, 0x49}, {&(0x7f0000001600)=""/184, 0xb8}, {&(0x7f00000016c0)=""/101, 0x65}, {&(0x7f0000001740)=""/81, 0x51}], 0x5}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], r5, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x33c) close(r0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r6) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r7) 16:39:31 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000a76862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) [ 212.926556][T14717] FAULT_INJECTION: forcing a failure. [ 212.926556][T14717] name failslab, interval 1, probability 0, space 0, times 0 [ 212.949365][T14717] CPU: 0 PID: 14717 Comm: syz-executor.4 Not tainted 5.1.0-rc2+ #82 [ 212.957398][T14717] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 212.968448][T14717] Call Trace: [ 212.971756][T14717] dump_stack+0x172/0x1f0 16:39:31 executing program 2: socket$kcm(0x11, 0x2, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.usage_user\x00', 0x0, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000240)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f00000004c0)='cpusa\xb6\xdd\x00\x00fe\xd7\x03\x11~\xe6\x82\x13\x04t\xaa\x16%\xd5\xa2\x02\x00\xe0i\xaf\\ve_cpu', 0x2761, 0x0) socket$kcm(0x29, 0x2, 0x0) socket$kcm(0x10, 0x3, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) sendmsg$kcm(r2, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r2, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) 16:39:31 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x9, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) [ 212.976127][T14717] should_fail.cold+0xa/0x15 [ 212.980744][T14717] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 212.988065][T14717] ? ___might_sleep+0x163/0x280 [ 212.992933][T14717] __should_failslab+0x121/0x190 [ 212.997899][T14717] should_failslab+0x9/0x14 [ 213.002449][T14717] kmem_cache_alloc_node+0x264/0x710 [ 213.007746][T14717] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 213.014002][T14717] __alloc_skb+0xd5/0x5e0 [ 213.018343][T14717] ? skb_trim+0x190/0x190 16:39:31 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d001176862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) [ 213.022682][T14717] ? skb_page_frag_refill+0x127/0x460 [ 213.028063][T14717] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 213.033807][T14717] ? skb_put+0x177/0x1d0 [ 213.038060][T14717] __ip_append_data.isra.0+0x24d6/0x2dd0 [ 213.043710][T14717] ? ip_reply_glue_bits+0xc0/0xc0 [ 213.048751][T14717] ? __ip_flush_pending_frames.isra.0+0x2d0/0x2d0 [ 213.055203][T14717] ? mark_held_locks+0xf0/0xf0 [ 213.059985][T14717] ? lock_sock_nested+0xac/0x120 [ 213.064977][T14717] ? ip_reply_glue_bits+0xc0/0xc0 [ 213.070008][T14717] ip_append_data.part.0+0xf2/0x170 [ 213.075216][T14717] ? ip_reply_glue_bits+0xc0/0xc0 [ 213.080265][T14717] ip_append_data+0x6e/0x90 [ 213.084795][T14717] udp_sendmsg+0x8e7/0x2820 [ 213.089316][T14717] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 213.095577][T14717] ? __lock_acquire+0x548/0x3fb0 [ 213.100545][T14717] ? ip_reply_glue_bits+0xc0/0xc0 [ 213.105583][T14717] ? udp4_lib_lookup_skb+0x440/0x440 [ 213.110882][T14717] ? is_bpf_text_address+0xac/0x170 [ 213.116744][T14717] ? find_held_lock+0x35/0x130 [ 213.121519][T14717] ? is_bpf_text_address+0xac/0x170 16:39:31 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x30, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) [ 213.126742][T14717] ? ___might_sleep+0x163/0x280 [ 213.131610][T14717] ? __might_sleep+0x95/0x190 [ 213.136301][T14717] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 213.141942][T14717] ? aa_sk_perm+0x288/0x880 [ 213.146470][T14717] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 213.152024][T14717] inet_sendmsg+0x147/0x5e0 [ 213.156539][T14717] ? udp4_lib_lookup_skb+0x440/0x440 [ 213.161835][T14717] ? inet_sendmsg+0x147/0x5e0 [ 213.166513][T14717] ? ipip_gro_receive+0x100/0x100 [ 213.171556][T14717] sock_sendmsg+0xdd/0x130 [ 213.175988][T14717] sock_write_iter+0x27c/0x3e0 [ 213.180778][T14717] ? sock_sendmsg+0x130/0x130 [ 213.185489][T14717] ? aa_path_link+0x460/0x460 [ 213.190194][T14717] ? find_held_lock+0x35/0x130 [ 213.194963][T14717] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 213.201227][T14717] ? iov_iter_init+0xee/0x220 [ 213.205919][T14717] new_sync_write+0x4c7/0x760 [ 213.210634][T14717] ? default_llseek+0x2e0/0x2e0 [ 213.215516][T14717] ? common_file_perm+0x238/0x720 [ 213.220580][T14717] ? __fget+0x381/0x550 [ 213.224775][T14717] ? apparmor_file_permission+0x25/0x30 [ 213.230320][T14717] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 213.236567][T14717] ? security_file_permission+0x94/0x380 [ 213.242207][T14717] __vfs_write+0xe4/0x110 [ 213.246546][T14717] vfs_write+0x20c/0x580 [ 213.250803][T14717] ksys_write+0xea/0x1f0 [ 213.255053][T14717] ? __ia32_sys_read+0xb0/0xb0 [ 213.259856][T14717] ? do_syscall_64+0x26/0x610 [ 213.264537][T14717] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 213.270605][T14717] ? do_syscall_64+0x26/0x610 [ 213.275289][T14717] __x64_sys_write+0x73/0xb0 [ 213.279903][T14717] do_syscall_64+0x103/0x610 [ 213.284514][T14717] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 213.290412][T14717] RIP: 0033:0x4582f9 [ 213.294316][T14717] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 213.313920][T14717] RSP: 002b:00007f6dcf2fbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 213.322337][T14717] RAX: ffffffffffffffda RBX: 00007f6dcf2fbc90 RCX: 00000000004582f9 [ 213.330442][T14717] RDX: 000000000000fdef RSI: 0000000020000280 RDI: 0000000000000005 [ 213.338418][T14717] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 213.346396][T14717] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6dcf2fc6d4 [ 213.354374][T14717] R13: 00000000004c7ad0 R14: 00000000004ddba8 R15: 0000000000000006 16:39:32 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d003f76862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) 16:39:32 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x1f4, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:32 executing program 4 (fault-call:5 fault-nth:67): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) 16:39:32 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d004076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) [ 213.633388][T14756] FAULT_INJECTION: forcing a failure. [ 213.633388][T14756] name failslab, interval 1, probability 0, space 0, times 0 [ 213.678804][T14756] CPU: 1 PID: 14756 Comm: syz-executor.4 Not tainted 5.1.0-rc2+ #82 [ 213.686816][T14756] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 213.686823][T14756] Call Trace: [ 213.686849][T14756] dump_stack+0x172/0x1f0 [ 213.686873][T14756] should_fail.cold+0xa/0x15 [ 213.686896][T14756] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 213.700220][T14756] ? ___might_sleep+0x163/0x280 [ 213.719761][T14756] __should_failslab+0x121/0x190 [ 213.724711][T14756] should_failslab+0x9/0x14 [ 213.729244][T14756] kmem_cache_alloc_node+0x264/0x710 [ 213.734540][T14756] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 213.740792][T14756] __alloc_skb+0xd5/0x5e0 [ 213.745129][T14756] ? skb_trim+0x190/0x190 [ 213.749490][T14756] ? skb_page_frag_refill+0x127/0x460 [ 213.749506][T14756] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 213.749520][T14756] ? skb_put+0x177/0x1d0 [ 213.749539][T14756] __ip_append_data.isra.0+0x24d6/0x2dd0 [ 213.749561][T14756] ? ip_reply_glue_bits+0xc0/0xc0 [ 213.749587][T14756] ? __ip_flush_pending_frames.isra.0+0x2d0/0x2d0 [ 213.760654][T14756] ? mark_held_locks+0xf0/0xf0 [ 213.760670][T14756] ? lock_sock_nested+0xac/0x120 [ 213.760687][T14756] ? ip_reply_glue_bits+0xc0/0xc0 [ 213.760718][T14756] ip_append_data.part.0+0xf2/0x170 [ 213.760738][T14756] ? ip_reply_glue_bits+0xc0/0xc0 [ 213.806824][T14756] ip_append_data+0x6e/0x90 [ 213.811412][T14756] udp_sendmsg+0x8e7/0x2820 [ 213.815908][T14756] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 213.822128][T14756] ? __lock_acquire+0x548/0x3fb0 [ 213.827059][T14756] ? ip_reply_glue_bits+0xc0/0xc0 [ 213.832067][T14756] ? udp4_lib_lookup_skb+0x440/0x440 [ 213.837334][T14756] ? is_bpf_text_address+0xac/0x170 [ 213.842512][T14756] ? find_held_lock+0x35/0x130 [ 213.847259][T14756] ? is_bpf_text_address+0xac/0x170 [ 213.852450][T14756] ? ___might_sleep+0x163/0x280 [ 213.857292][T14756] ? __might_sleep+0x95/0x190 [ 213.861954][T14756] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 213.867567][T14756] ? aa_sk_perm+0x288/0x880 [ 213.872079][T14756] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 213.877605][T14756] inet_sendmsg+0x147/0x5e0 [ 213.882102][T14756] ? udp4_lib_lookup_skb+0x440/0x440 [ 213.887380][T14756] ? inet_sendmsg+0x147/0x5e0 [ 213.892080][T14756] ? ipip_gro_receive+0x100/0x100 [ 213.897098][T14756] sock_sendmsg+0xdd/0x130 [ 213.901496][T14756] sock_write_iter+0x27c/0x3e0 [ 213.906265][T14756] ? sock_sendmsg+0x130/0x130 [ 213.910930][T14756] ? aa_path_link+0x460/0x460 [ 213.915596][T14756] ? find_held_lock+0x35/0x130 [ 213.920374][T14756] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 213.926596][T14756] ? iov_iter_init+0xee/0x220 [ 213.931270][T14756] new_sync_write+0x4c7/0x760 [ 213.935959][T14756] ? default_llseek+0x2e0/0x2e0 [ 213.940794][T14756] ? common_file_perm+0x238/0x720 [ 213.945813][T14756] ? __fget+0x381/0x550 [ 213.949966][T14756] ? apparmor_file_permission+0x25/0x30 [ 213.955490][T14756] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 213.961711][T14756] ? security_file_permission+0x94/0x380 [ 213.968461][T14756] __vfs_write+0xe4/0x110 [ 213.972785][T14756] vfs_write+0x20c/0x580 [ 213.977044][T14756] ksys_write+0xea/0x1f0 [ 213.981269][T14756] ? __ia32_sys_read+0xb0/0xb0 [ 213.986013][T14756] ? do_syscall_64+0x26/0x610 [ 213.990681][T14756] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 213.996773][T14756] ? do_syscall_64+0x26/0x610 [ 214.001437][T14756] __x64_sys_write+0x73/0xb0 [ 214.006007][T14756] do_syscall_64+0x103/0x610 [ 214.010580][T14756] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 214.016452][T14756] RIP: 0033:0x4582f9 [ 214.020331][T14756] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 214.039912][T14756] RSP: 002b:00007f6dcf2fbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 214.048317][T14756] RAX: ffffffffffffffda RBX: 00007f6dcf2fbc90 RCX: 00000000004582f9 [ 214.056282][T14756] RDX: 000000000000fdef RSI: 0000000020000280 RDI: 0000000000000005 [ 214.064231][T14756] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 214.072196][T14756] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6dcf2fc6d4 [ 214.080160][T14756] R13: 00000000004c7ad0 R14: 00000000004ddba8 R15: 0000000000000006 16:39:32 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90dfe8076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) 16:39:32 executing program 2: r0 = gettid() r1 = perf_event_open$cgroup(&(0x7f0000000280)={0x2, 0x70, 0x2, 0x6, 0x1, 0x101, 0x0, 0x2, 0x4000, 0x1, 0x0, 0x86, 0x6, 0x400, 0x7, 0x401, 0x9, 0x1, 0x1, 0x100, 0x0, 0x2, 0x101, 0x40, 0x6, 0x1, 0x3, 0x9, 0x80000000, 0x9, 0x5, 0x7, 0x9, 0xec, 0xfffffffffffffffa, 0x3f, 0x1, 0x1f, 0x0, 0x8001, 0x2, @perf_config_ext={0x2, 0xffff}, 0x40, 0x0, 0x400, 0x1, 0x4, 0x3}, 0xffffffffffffff9c, 0x3, 0xffffffffffffffff, 0x7) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x81, 0x8b, 0x4, 0x2, 0x0, 0x3, 0xc0100, 0x3, 0xcb5, 0x2, 0x3, 0xfb, 0x7, 0x2, 0x1, 0x7f, 0xf99f, 0x100000000, 0xfffffffffffeffff, 0x0, 0x2, 0xddb, 0x8, 0x3aba, 0x1c, 0x0, 0x61, 0x8000, 0x100000000, 0x7, 0xfffffffffffffff7, 0x7, 0xf41e, 0x8, 0x5a, 0xa5, 0x0, 0x80000001, 0x1, @perf_bp={&(0x7f0000000100), 0x4}, 0x4, 0x3, 0x9bd, 0x7, 0x2, 0x8, 0x4}, r0, 0x0, r1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x9, 0x0, 0x3, 0xfffffffffffff801, 0x0, 0x3, 0x0, 0xc, 0x7, 0xca, 0x9, 0x17c, 0x20, 0x7, 0x1000, 0x3, 0x7, 0x10001, 0x1000, 0x3f, 0x7, 0x0, 0x9, 0x9, 0x4, 0x32f, 0x4, 0x9, 0x6, 0x100000000, 0x1000, 0x3, 0x2, 0x8001, 0x80000000, 0x4, 0x0, 0x101, 0x2, @perf_config_ext={0x8, 0x2}, 0x2000, 0x81, 0x0, 0x7, 0x2, 0x6, 0x7}, r0, 0x6, r2, 0x3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/net/tun\xff', 0x4001, 0x0) write$cgroup_type(r3, &(0x7f0000000080)='threaded\x03', 0x6d000) gettid() 16:39:32 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f0000001840)={&(0x7f0000001480)=@can={0x1d, 0x0}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001500)=""/10, 0xa}, {&(0x7f0000001580)=""/73, 0x49}, {&(0x7f0000001600)=""/184, 0xb8}, {&(0x7f00000016c0)=""/101, 0x65}, {&(0x7f0000001740)=""/81, 0x51}], 0x5}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], r3, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r4) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r5) 16:39:32 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r3) recvmsg(r0, &(0x7f0000001840)={&(0x7f0000001480)=@can={0x1d, 0x0}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001500)=""/10, 0xa}, {&(0x7f0000001580)=""/73, 0x49}, {&(0x7f0000001600)=""/184, 0xb8}, {&(0x7f00000016c0)=""/101, 0x65}, {&(0x7f0000001740)=""/81, 0x51}], 0x5}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], r5, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x33c) close(r0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r6) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r7) 16:39:32 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x3e8, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:32 executing program 4 (fault-call:5 fault-nth:68): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) 16:39:32 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d80fe76862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) 16:39:32 executing program 2: socketpair(0x11, 0x4000000803, 0x1000, &(0x7f0000000080)) 16:39:32 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x700, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) [ 214.377156][T14790] FAULT_INJECTION: forcing a failure. [ 214.377156][T14790] name failslab, interval 1, probability 0, space 0, times 0 16:39:33 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x900, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:33 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000276862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) [ 214.457517][T14790] CPU: 1 PID: 14790 Comm: syz-executor.4 Not tainted 5.1.0-rc2+ #82 [ 214.465532][T14790] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 214.475594][T14790] Call Trace: [ 214.478902][T14790] dump_stack+0x172/0x1f0 [ 214.483249][T14790] should_fail.cold+0xa/0x15 [ 214.487860][T14790] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 214.493684][T14790] ? ___might_sleep+0x163/0x280 [ 214.498548][T14790] __should_failslab+0x121/0x190 [ 214.503491][T14790] should_failslab+0x9/0x14 16:39:33 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000376862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) [ 214.508005][T14790] kmem_cache_alloc_node_trace+0x270/0x720 [ 214.513835][T14790] __kmalloc_node_track_caller+0x3d/0x70 [ 214.519476][T14790] __kmalloc_reserve.isra.0+0x40/0xf0 [ 214.524852][T14790] __alloc_skb+0x10b/0x5e0 [ 214.529294][T14790] ? skb_trim+0x190/0x190 [ 214.533627][T14790] ? skb_page_frag_refill+0x127/0x460 [ 214.539087][T14790] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 214.539101][T14790] ? skb_put+0x177/0x1d0 [ 214.539121][T14790] __ip_append_data.isra.0+0x24d6/0x2dd0 16:39:33 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000476862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) [ 214.539143][T14790] ? ip_reply_glue_bits+0xc0/0xc0 [ 214.539167][T14790] ? __ip_flush_pending_frames.isra.0+0x2d0/0x2d0 [ 214.566559][T14790] ? mark_held_locks+0xf0/0xf0 [ 214.571330][T14790] ? lock_sock_nested+0xac/0x120 [ 214.576278][T14790] ? ip_reply_glue_bits+0xc0/0xc0 [ 214.581309][T14790] ip_append_data.part.0+0xf2/0x170 [ 214.586514][T14790] ? ip_reply_glue_bits+0xc0/0xc0 [ 214.591540][T14790] ip_append_data+0x6e/0x90 [ 214.596062][T14790] udp_sendmsg+0x8e7/0x2820 [ 214.600600][T14790] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 16:39:33 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x2000, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) [ 214.606847][T14790] ? __lock_acquire+0x548/0x3fb0 [ 214.611795][T14790] ? ip_reply_glue_bits+0xc0/0xc0 [ 214.616836][T14790] ? udp4_lib_lookup_skb+0x440/0x440 [ 214.622128][T14790] ? is_bpf_text_address+0xac/0x170 [ 214.627331][T14790] ? find_held_lock+0x35/0x130 [ 214.632114][T14790] ? is_bpf_text_address+0xac/0x170 [ 214.637336][T14790] ? ___might_sleep+0x163/0x280 [ 214.642189][T14790] ? __might_sleep+0x95/0x190 [ 214.646868][T14790] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 214.652502][T14790] ? aa_sk_perm+0x288/0x880 [ 214.657023][T14790] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 214.662582][T14790] inet_sendmsg+0x147/0x5e0 [ 214.667089][T14790] ? udp4_lib_lookup_skb+0x440/0x440 [ 214.672375][T14790] ? inet_sendmsg+0x147/0x5e0 [ 214.677065][T14790] ? ipip_gro_receive+0x100/0x100 [ 214.682101][T14790] sock_sendmsg+0xdd/0x130 [ 214.686526][T14790] sock_write_iter+0x27c/0x3e0 [ 214.691319][T14790] ? sock_sendmsg+0x130/0x130 [ 214.696010][T14790] ? aa_path_link+0x460/0x460 [ 214.700712][T14790] ? find_held_lock+0x35/0x130 [ 214.705496][T14790] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 214.711741][T14790] ? iov_iter_init+0xee/0x220 [ 214.716442][T14790] new_sync_write+0x4c7/0x760 [ 214.721129][T14790] ? default_llseek+0x2e0/0x2e0 [ 214.725991][T14790] ? common_file_perm+0x238/0x720 [ 214.731017][T14790] ? __fget+0x381/0x550 [ 214.735190][T14790] ? apparmor_file_permission+0x25/0x30 [ 214.740741][T14790] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 214.746989][T14790] ? security_file_permission+0x94/0x380 [ 214.752620][T14790] __vfs_write+0xe4/0x110 [ 214.756934][T14790] vfs_write+0x20c/0x580 [ 214.761160][T14790] ksys_write+0xea/0x1f0 [ 214.765399][T14790] ? __ia32_sys_read+0xb0/0xb0 [ 214.770170][T14790] ? do_syscall_64+0x26/0x610 [ 214.774826][T14790] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 214.780893][T14790] ? do_syscall_64+0x26/0x610 [ 214.785560][T14790] __x64_sys_write+0x73/0xb0 [ 214.790132][T14790] do_syscall_64+0x103/0x610 [ 214.794703][T14790] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 214.800578][T14790] RIP: 0033:0x4582f9 [ 214.804468][T14790] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 214.824054][T14790] RSP: 002b:00007f6dcf2dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 214.832468][T14790] RAX: ffffffffffffffda RBX: 00007f6dcf2dac90 RCX: 00000000004582f9 [ 214.840416][T14790] RDX: 000000000000fdef RSI: 0000000020000280 RDI: 0000000000000005 [ 214.848374][T14790] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 214.856323][T14790] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6dcf2db6d4 [ 214.864290][T14790] R13: 00000000004c7ad0 R14: 00000000004ddba8 R15: 0000000000000006 16:39:33 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f0000001840)={&(0x7f0000001480)=@can={0x1d, 0x0}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001500)=""/10, 0xa}, {&(0x7f0000001580)=""/73, 0x49}, {&(0x7f0000001600)=""/184, 0xb8}, {&(0x7f00000016c0)=""/101, 0x65}, {&(0x7f0000001740)=""/81, 0x51}], 0x5}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], r2, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r4) 16:39:33 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x3000, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:33 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000576862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) 16:39:33 executing program 4 (fault-call:5 fault-nth:69): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) 16:39:33 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r3) recvmsg(r0, &(0x7f0000001840)={&(0x7f0000001480)=@can={0x1d, 0x0}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001500)=""/10, 0xa}, {&(0x7f0000001580)=""/73, 0x49}, {&(0x7f0000001600)=""/184, 0xb8}, {&(0x7f00000016c0)=""/101, 0x65}, {&(0x7f0000001740)=""/81, 0x51}], 0x5}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], r5, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x33c) close(r0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r6) close(r7) 16:39:33 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1700) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) 16:39:33 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000676862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) [ 215.095490][T14830] FAULT_INJECTION: forcing a failure. [ 215.095490][T14830] name failslab, interval 1, probability 0, space 0, times 0 [ 215.132905][T14830] CPU: 1 PID: 14830 Comm: syz-executor.4 Not tainted 5.1.0-rc2+ #82 16:39:33 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000776862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) [ 215.140900][T14830] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 215.150957][T14830] Call Trace: [ 215.154259][T14830] dump_stack+0x172/0x1f0 [ 215.158605][T14830] should_fail.cold+0xa/0x15 [ 215.163219][T14830] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 215.169042][T14830] ? ___might_sleep+0x163/0x280 [ 215.173904][T14830] __should_failslab+0x121/0x190 [ 215.178851][T14830] should_failslab+0x9/0x14 [ 215.183386][T14830] kmem_cache_alloc_node+0x264/0x710 [ 215.188677][T14830] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 215.188701][T14830] __alloc_skb+0xd5/0x5e0 [ 215.188720][T14830] ? skb_trim+0x190/0x190 [ 215.188734][T14830] ? skb_page_frag_refill+0x127/0x460 [ 215.188754][T14830] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 215.199304][T14830] ? skb_put+0x177/0x1d0 [ 215.199326][T14830] __ip_append_data.isra.0+0x24d6/0x2dd0 [ 215.199348][T14830] ? ip_reply_glue_bits+0xc0/0xc0 [ 215.199375][T14830] ? __ip_flush_pending_frames.isra.0+0x2d0/0x2d0 [ 215.199397][T14830] ? mark_held_locks+0xf0/0xf0 [ 215.240827][T14830] ? lock_sock_nested+0xac/0x120 16:39:33 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000876862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) [ 215.245775][T14830] ? ip_reply_glue_bits+0xc0/0xc0 [ 215.250807][T14830] ip_append_data.part.0+0xf2/0x170 [ 215.256014][T14830] ? ip_reply_glue_bits+0xc0/0xc0 [ 215.258745][ T26] audit: type=1804 audit(1555000773.735:79): pid=14824 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir009754399/syzkaller.vcRCHp/230/memory.events" dev="sda1" ino=17059 res=1 [ 215.261053][T14830] ip_append_data+0x6e/0x90 [ 215.261077][T14830] udp_sendmsg+0x8e7/0x2820 [ 215.261100][T14830] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 215.261116][T14830] ? __lock_acquire+0x548/0x3fb0 [ 215.261130][T14830] ? ip_reply_glue_bits+0xc0/0xc0 [ 215.261149][T14830] ? udp4_lib_lookup_skb+0x440/0x440 [ 215.261172][T14830] ? is_bpf_text_address+0xac/0x170 [ 215.290923][T14830] ? find_held_lock+0x35/0x130 [ 215.301644][T14830] ? is_bpf_text_address+0xac/0x170 [ 215.301669][T14830] ? ___might_sleep+0x163/0x280 [ 215.301692][T14830] ? __might_sleep+0x95/0x190 16:39:33 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000976862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) [ 215.327842][ T26] audit: type=1800 audit(1555000773.745:80): pid=14824 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="memory.events" dev="sda1" ino=17059 res=0 [ 215.332003][T14830] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 215.332019][T14830] ? aa_sk_perm+0x288/0x880 [ 215.332049][T14830] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 215.332068][T14830] inet_sendmsg+0x147/0x5e0 [ 215.332083][T14830] ? udp4_lib_lookup_skb+0x440/0x440 [ 215.332100][T14830] ? inet_sendmsg+0x147/0x5e0 16:39:34 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000a76862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) [ 215.366561][ T26] audit: type=1804 audit(1555000773.745:81): pid=14824 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir009754399/syzkaller.vcRCHp/230/memory.events" dev="sda1" ino=17059 res=1 [ 215.368199][T14830] ? ipip_gro_receive+0x100/0x100 [ 215.368219][T14830] sock_sendmsg+0xdd/0x130 [ 215.368238][T14830] sock_write_iter+0x27c/0x3e0 [ 215.368257][T14830] ? sock_sendmsg+0x130/0x130 16:39:34 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d001076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) [ 215.376310][ T26] audit: type=1800 audit(1555000773.745:82): pid=14824 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="memory.events" dev="sda1" ino=17059 res=0 [ 215.378310][T14830] ? aa_path_link+0x460/0x460 [ 215.378326][T14830] ? find_held_lock+0x35/0x130 [ 215.378342][T14830] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 215.378357][T14830] ? iov_iter_init+0xee/0x220 [ 215.378378][T14830] new_sync_write+0x4c7/0x760 [ 215.424729][ T26] audit: type=1800 audit(1555000773.745:83): pid=14824 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="memory.events" dev="sda1" ino=17059 res=0 [ 215.427462][T14830] ? default_llseek+0x2e0/0x2e0 [ 215.508650][T14830] ? common_file_perm+0x238/0x720 [ 215.513684][T14830] ? __fget+0x381/0x550 [ 215.517846][T14830] ? apparmor_file_permission+0x25/0x30 [ 215.523394][T14830] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 215.529649][T14830] ? security_file_permission+0x94/0x380 [ 215.535293][T14830] __vfs_write+0xe4/0x110 [ 215.539634][T14830] vfs_write+0x20c/0x580 [ 215.543883][T14830] ksys_write+0xea/0x1f0 [ 215.543903][T14830] ? __ia32_sys_read+0xb0/0xb0 [ 215.543921][T14830] ? do_syscall_64+0x26/0x610 [ 215.543943][T14830] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 215.552917][T14830] ? do_syscall_64+0x26/0x610 [ 215.552938][T14830] __x64_sys_write+0x73/0xb0 [ 215.552956][T14830] do_syscall_64+0x103/0x610 [ 215.552975][T14830] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 215.552987][T14830] RIP: 0033:0x4582f9 [ 215.553002][T14830] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 215.553016][T14830] RSP: 002b:00007f6dcf2fbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 215.583406][T14830] RAX: ffffffffffffffda RBX: 00007f6dcf2fbc90 RCX: 00000000004582f9 [ 215.583416][T14830] RDX: 000000000000fdef RSI: 0000000020000280 RDI: 0000000000000005 [ 215.583424][T14830] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 215.583442][T14830] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6dcf2fc6d4 [ 215.583451][T14830] R13: 00000000004c7ad0 R14: 00000000004ddba8 R15: 0000000000000006 16:39:34 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f0000001840)={&(0x7f0000001480)=@can={0x1d, 0x0}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001500)=""/10, 0xa}, {&(0x7f0000001580)=""/73, 0x49}, {&(0x7f0000001600)=""/184, 0xb8}, {&(0x7f00000016c0)=""/101, 0x65}, {&(0x7f0000001740)=""/81, 0x51}], 0x5}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], r2, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r4) 16:39:34 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d001176862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) 16:39:34 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a0f, 0x1700) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) 16:39:34 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x3f00, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:34 executing program 4 (fault-call:5 fault-nth:70): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) 16:39:34 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r3) recvmsg(r0, &(0x7f0000001840)={&(0x7f0000001480)=@can={0x1d, 0x0}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001500)=""/10, 0xa}, {&(0x7f0000001580)=""/73, 0x49}, {&(0x7f0000001600)=""/184, 0xb8}, {&(0x7f00000016c0)=""/101, 0x65}, {&(0x7f0000001740)=""/81, 0x51}], 0x5}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], r5, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x33c) close(r0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r6) close(r7) 16:39:34 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d0000768633681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) [ 215.996988][T14872] FAULT_INJECTION: forcing a failure. [ 215.996988][T14872] name failslab, interval 1, probability 0, space 0, times 0 [ 216.043201][ T26] audit: type=1804 audit(1555000774.655:84): pid=14875 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir009754399/syzkaller.vcRCHp/231/memory.events" dev="sda1" ino=17055 res=1 [ 216.050791][T14872] CPU: 1 PID: 14872 Comm: syz-executor.4 Not tainted 5.1.0-rc2+ #82 [ 216.076474][T14872] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 216.086538][T14872] Call Trace: [ 216.089851][T14872] dump_stack+0x172/0x1f0 [ 216.094199][T14872] should_fail.cold+0xa/0x15 [ 216.098809][T14872] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 216.103963][ T26] audit: type=1800 audit(1555000774.665:85): pid=14875 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="memory.events" dev="sda1" ino=17055 res=0 [ 216.104627][T14872] ? ___might_sleep+0x163/0x280 [ 216.130817][T14872] __should_failslab+0x121/0x190 [ 216.135768][T14872] should_failslab+0x9/0x14 [ 216.137007][ T26] audit: type=1804 audit(1555000774.665:86): pid=14875 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir009754399/syzkaller.vcRCHp/231/memory.events" dev="sda1" ino=17055 res=1 [ 216.140288][T14872] kmem_cache_alloc_node_trace+0x270/0x720 [ 216.140315][T14872] __kmalloc_node_track_caller+0x3d/0x70 [ 216.140341][T14872] __kmalloc_reserve.isra.0+0x40/0xf0 [ 216.140364][T14872] __alloc_skb+0x10b/0x5e0 [ 216.166294][ T26] audit: type=1800 audit(1555000774.665:87): pid=14875 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="memory.events" dev="sda1" ino=17055 res=0 [ 216.171425][T14872] ? skb_trim+0x190/0x190 [ 216.171451][T14872] ? skb_page_frag_refill+0x127/0x460 [ 216.171467][T14872] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 216.171480][T14872] ? skb_put+0x177/0x1d0 [ 216.171505][T14872] __ip_append_data.isra.0+0x24d6/0x2dd0 [ 216.233056][T14872] ? ip_reply_glue_bits+0xc0/0xc0 [ 216.238076][T14872] ? __ip_flush_pending_frames.isra.0+0x2d0/0x2d0 [ 216.244475][T14872] ? mark_held_locks+0xf0/0xf0 [ 216.249537][T14872] ? lock_sock_nested+0xac/0x120 [ 216.254469][T14872] ? ip_reply_glue_bits+0xc0/0xc0 [ 216.259491][T14872] ip_append_data.part.0+0xf2/0x170 [ 216.264695][T14872] ? ip_reply_glue_bits+0xc0/0xc0 [ 216.269704][T14872] ip_append_data+0x6e/0x90 [ 216.274197][T14872] udp_sendmsg+0x8e7/0x2820 [ 216.278689][T14872] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 216.284917][T14872] ? __lock_acquire+0x548/0x3fb0 [ 216.289842][T14872] ? ip_reply_glue_bits+0xc0/0xc0 [ 216.294858][T14872] ? udp4_lib_lookup_skb+0x440/0x440 [ 216.300135][T14872] ? is_bpf_text_address+0xac/0x170 [ 216.305333][T14872] ? find_held_lock+0x35/0x130 [ 216.310110][T14872] ? is_bpf_text_address+0xac/0x170 [ 216.315306][T14872] ? ___might_sleep+0x163/0x280 [ 216.320157][T14872] ? __might_sleep+0x95/0x190 [ 216.324822][T14872] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 216.330446][T14872] ? aa_sk_perm+0x288/0x880 [ 216.334958][T14872] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 216.340491][T14872] inet_sendmsg+0x147/0x5e0 [ 216.344980][T14872] ? udp4_lib_lookup_skb+0x440/0x440 [ 216.350247][T14872] ? inet_sendmsg+0x147/0x5e0 [ 216.354932][T14872] ? ipip_gro_receive+0x100/0x100 [ 216.359949][T14872] sock_sendmsg+0xdd/0x130 [ 216.364358][T14872] sock_write_iter+0x27c/0x3e0 [ 216.369118][T14872] ? sock_sendmsg+0x130/0x130 [ 216.373791][T14872] ? aa_path_link+0x460/0x460 [ 216.378462][T14872] ? find_held_lock+0x35/0x130 [ 216.383219][T14872] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 216.389459][T14872] ? iov_iter_init+0xee/0x220 [ 216.394139][T14872] new_sync_write+0x4c7/0x760 [ 216.398816][T14872] ? default_llseek+0x2e0/0x2e0 [ 216.403680][T14872] ? common_file_perm+0x238/0x720 [ 216.408729][T14872] ? __fget+0x381/0x550 [ 216.412881][T14872] ? apparmor_file_permission+0x25/0x30 [ 216.418427][T14872] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 216.424669][T14872] ? security_file_permission+0x94/0x380 [ 216.430295][T14872] __vfs_write+0xe4/0x110 [ 216.434625][T14872] vfs_write+0x20c/0x580 [ 216.438862][T14872] ksys_write+0xea/0x1f0 [ 216.443103][T14872] ? __ia32_sys_read+0xb0/0xb0 [ 216.447880][T14872] ? do_syscall_64+0x26/0x610 [ 216.452554][T14872] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 216.458618][T14872] ? do_syscall_64+0x26/0x610 [ 216.463293][T14872] __x64_sys_write+0x73/0xb0 [ 216.467882][T14872] do_syscall_64+0x103/0x610 [ 216.472473][T14872] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 216.478353][T14872] RIP: 0033:0x4582f9 [ 216.482234][T14872] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 216.501828][T14872] RSP: 002b:00007f6dcf2fbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 216.510231][T14872] RAX: ffffffffffffffda RBX: 00007f6dcf2fbc90 RCX: 00000000004582f9 [ 216.518201][T14872] RDX: 000000000000fdef RSI: 0000000020000280 RDI: 0000000000000005 [ 216.526163][T14872] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 216.534125][T14872] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6dcf2fc6d4 16:39:35 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_int(0xffffffffffffff9c, &(0x7f00000000c0)='notify_on_release\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="0070696f2f80120000fa5f192104756d6f6ad72000696f2009cf95a8eb8ebb876fefce76147e2527ad9dde966210fad1b2206b100039a8749ddc6e05dacd2332a729f4c4a2e98afa6094edd3fa8b84651da0d116abb92ed4b5a3a3e0da6ca083841210b21df85dee47cc8bd7ee6ed3cebf0a5d0c06000000caef640238d1cc5004a2a781e78fcbeb589a479041648915d96f2bfbf7a3d48859e8a3d79f639c5c0000000000000000000000000050b52d557311ddf3cdff670d0cd0dfbf70c4a2e0d10be916a41f79fd253c0f89cb70ba3b1282502a2178f7b60ac9fd20d5a0"], 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r2, &(0x7f0000000080), 0x297ef) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000080)='memory.high\x00', 0x2, 0x0) write$cgroup_int(r4, 0x0, 0x40) write$cgroup_int(r0, &(0x7f0000000000)=0x7f, 0x12) 16:39:35 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0xe803, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:35 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d022f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) [ 216.542115][T14872] R13: 00000000004c7ad0 R14: 00000000004ddba8 R15: 0000000000000006 16:39:35 executing program 4 (fault-call:5 fault-nth:71): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) 16:39:35 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0xf401, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) [ 216.711553][T14900] FAULT_INJECTION: forcing a failure. [ 216.711553][T14900] name failslab, interval 1, probability 0, space 0, times 0 [ 216.735352][T14900] CPU: 1 PID: 14900 Comm: syz-executor.4 Not tainted 5.1.0-rc2+ #82 [ 216.743390][T14900] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 216.743397][T14900] Call Trace: [ 216.743423][T14900] dump_stack+0x172/0x1f0 [ 216.743457][T14900] should_fail.cold+0xa/0x15 [ 216.743478][T14900] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 216.743502][T14900] ? ___might_sleep+0x163/0x280 [ 216.743524][T14900] __should_failslab+0x121/0x190 [ 216.743541][T14900] should_failslab+0x9/0x14 [ 216.743559][T14900] kmem_cache_alloc_node+0x264/0x710 [ 216.743578][T14900] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 216.743602][T14900] __alloc_skb+0xd5/0x5e0 [ 216.743623][T14900] ? skb_trim+0x190/0x190 [ 216.806112][T14900] ? skb_page_frag_refill+0x127/0x460 [ 216.811501][T14900] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 216.817235][T14900] ? skb_put+0x177/0x1d0 [ 216.821496][T14900] __ip_append_data.isra.0+0x24d6/0x2dd0 [ 216.827146][T14900] ? ip_reply_glue_bits+0xc0/0xc0 [ 216.832185][T14900] ? __ip_flush_pending_frames.isra.0+0x2d0/0x2d0 [ 216.838611][T14900] ? mark_held_locks+0xf0/0xf0 [ 216.838630][T14900] ? lock_sock_nested+0xac/0x120 [ 216.838647][T14900] ? ip_reply_glue_bits+0xc0/0xc0 [ 216.838667][T14900] ip_append_data.part.0+0xf2/0x170 [ 216.853383][T14900] ? ip_reply_glue_bits+0xc0/0xc0 [ 216.853400][T14900] ip_append_data+0x6e/0x90 [ 216.853422][T14900] udp_sendmsg+0x8e7/0x2820 [ 216.872638][T14900] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 216.878903][T14900] ? __lock_acquire+0x548/0x3fb0 [ 216.883856][T14900] ? ip_reply_glue_bits+0xc0/0xc0 [ 216.888904][T14900] ? udp4_lib_lookup_skb+0x440/0x440 [ 216.894214][T14900] ? is_bpf_text_address+0xac/0x170 [ 216.899441][T14900] ? find_held_lock+0x35/0x130 [ 216.904216][T14900] ? is_bpf_text_address+0xac/0x170 [ 216.909443][T14900] ? ___might_sleep+0x163/0x280 [ 216.914305][T14900] ? __might_sleep+0x95/0x190 [ 216.918997][T14900] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 216.919012][T14900] ? aa_sk_perm+0x288/0x880 [ 216.919041][T14900] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 216.934691][T14900] inet_sendmsg+0x147/0x5e0 [ 216.934708][T14900] ? udp4_lib_lookup_skb+0x440/0x440 [ 216.934726][T14900] ? inet_sendmsg+0x147/0x5e0 [ 216.949166][T14900] ? ipip_gro_receive+0x100/0x100 [ 216.954214][T14900] sock_sendmsg+0xdd/0x130 [ 216.958646][T14900] sock_write_iter+0x27c/0x3e0 [ 216.963427][T14900] ? sock_sendmsg+0x130/0x130 [ 216.968126][T14900] ? aa_path_link+0x460/0x460 [ 216.972786][T14900] ? find_held_lock+0x35/0x130 [ 216.977537][T14900] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 216.983766][T14900] ? iov_iter_init+0xee/0x220 [ 216.989062][T14900] new_sync_write+0x4c7/0x760 [ 216.993743][T14900] ? default_llseek+0x2e0/0x2e0 [ 216.998584][T14900] ? common_file_perm+0x238/0x720 [ 217.003596][T14900] ? __fget+0x381/0x550 [ 217.007743][T14900] ? apparmor_file_permission+0x25/0x30 [ 217.013304][T14900] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 217.019546][T14900] ? security_file_permission+0x94/0x380 [ 217.025184][T14900] __vfs_write+0xe4/0x110 [ 217.029502][T14900] vfs_write+0x20c/0x580 [ 217.033740][T14900] ksys_write+0xea/0x1f0 [ 217.037975][T14900] ? __ia32_sys_read+0xb0/0xb0 [ 217.042729][T14900] ? do_syscall_64+0x26/0x610 [ 217.047393][T14900] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 217.053455][T14900] ? do_syscall_64+0x26/0x610 [ 217.058124][T14900] __x64_sys_write+0x73/0xb0 [ 217.062706][T14900] do_syscall_64+0x103/0x610 [ 217.067288][T14900] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 217.073177][T14900] RIP: 0033:0x4582f9 [ 217.077061][T14900] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 217.096652][T14900] RSP: 002b:00007f6dcf2fbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 217.105064][T14900] RAX: ffffffffffffffda RBX: 00007f6dcf2fbc90 RCX: 00000000004582f9 16:39:35 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f0000001840)={&(0x7f0000001480)=@can={0x1d, 0x0}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001500)=""/10, 0xa}, {&(0x7f0000001580)=""/73, 0x49}, {&(0x7f0000001600)=""/184, 0xb8}, {&(0x7f00000016c0)=""/101, 0x65}, {&(0x7f0000001740)=""/81, 0x51}], 0x5}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], r2, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r4) 16:39:35 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d032f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) 16:39:35 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r3) recvmsg(r0, &(0x7f0000001840)={&(0x7f0000001480)=@can={0x1d, 0x0}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001500)=""/10, 0xa}, {&(0x7f0000001580)=""/73, 0x49}, {&(0x7f0000001600)=""/184, 0xb8}, {&(0x7f00000016c0)=""/101, 0x65}, {&(0x7f0000001740)=""/81, 0x51}], 0x5}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], r5, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x33c) close(r0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r6) close(r7) 16:39:35 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0xf0ff7f, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) [ 217.113028][T14900] RDX: 000000000000fdef RSI: 0000000020000280 RDI: 0000000000000005 [ 217.120983][T14900] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 217.128934][T14900] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6dcf2fc6d4 [ 217.136885][T14900] R13: 00000000004c7ad0 R14: 00000000004ddba8 R15: 0000000000000006 16:39:35 executing program 4 (fault-call:5 fault-nth:72): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) 16:39:35 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x26e1, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0x9) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)={[{0x0, 'cpu'}]}, 0x5) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0xda00) write$cgroup_int(r3, &(0x7f0000000200), 0x42400) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x1f) 16:39:35 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x1000000, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:35 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d042f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) 16:39:35 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x4000000, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) [ 217.340514][T14929] FAULT_INJECTION: forcing a failure. [ 217.340514][T14929] name failslab, interval 1, probability 0, space 0, times 0 [ 217.354052][T14929] CPU: 1 PID: 14929 Comm: syz-executor.4 Not tainted 5.1.0-rc2+ #82 [ 217.362044][T14929] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 217.372096][T14929] Call Trace: [ 217.375406][T14929] dump_stack+0x172/0x1f0 [ 217.379775][T14929] should_fail.cold+0xa/0x15 [ 217.384386][T14929] ? fault_create_debugfs_attr+0x1e0/0x1e0 16:39:36 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x7000000, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) [ 217.390222][T14929] ? ___might_sleep+0x163/0x280 [ 217.395172][T14929] __should_failslab+0x121/0x190 [ 217.400116][T14929] should_failslab+0x9/0x14 [ 217.404633][T14929] kmem_cache_alloc_node_trace+0x270/0x720 [ 217.410488][T14929] __kmalloc_node_track_caller+0x3d/0x70 [ 217.416134][T14929] __kmalloc_reserve.isra.0+0x40/0xf0 [ 217.421530][T14929] __alloc_skb+0x10b/0x5e0 [ 217.425959][T14929] ? skb_trim+0x190/0x190 [ 217.430296][T14929] ? skb_page_frag_refill+0x127/0x460 16:39:36 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x8000000, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) [ 217.435674][T14929] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 217.441398][T14929] ? skb_put+0x177/0x1d0 [ 217.445664][T14929] __ip_append_data.isra.0+0x24d6/0x2dd0 [ 217.451311][T14929] ? ip_reply_glue_bits+0xc0/0xc0 [ 217.456353][T14929] ? __ip_flush_pending_frames.isra.0+0x2d0/0x2d0 [ 217.462775][T14929] ? mark_held_locks+0xf0/0xf0 [ 217.467547][T14929] ? lock_sock_nested+0xac/0x120 [ 217.472487][T14929] ? ip_reply_glue_bits+0xc0/0xc0 [ 217.477533][T14929] ip_append_data.part.0+0xf2/0x170 [ 217.482744][T14929] ? ip_reply_glue_bits+0xc0/0xc0 16:39:36 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x9000000, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) [ 217.487769][T14929] ip_append_data+0x6e/0x90 [ 217.492282][T14929] udp_sendmsg+0x8e7/0x2820 [ 217.496798][T14929] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 217.503051][T14929] ? __lock_acquire+0x548/0x3fb0 [ 217.508009][T14929] ? ip_reply_glue_bits+0xc0/0xc0 [ 217.513070][T14929] ? udp4_lib_lookup_skb+0x440/0x440 [ 217.518366][T14929] ? is_bpf_text_address+0xac/0x170 [ 217.523571][T14929] ? find_held_lock+0x35/0x130 [ 217.528347][T14929] ? is_bpf_text_address+0xac/0x170 [ 217.533568][T14929] ? ___might_sleep+0x163/0x280 [ 217.538422][T14929] ? __might_sleep+0x95/0x190 [ 217.543120][T14929] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 217.548786][T14929] ? aa_sk_perm+0x288/0x880 [ 217.553344][T14929] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 217.558895][T14929] inet_sendmsg+0x147/0x5e0 [ 217.563401][T14929] ? udp4_lib_lookup_skb+0x440/0x440 [ 217.568700][T14929] ? inet_sendmsg+0x147/0x5e0 [ 217.573412][T14929] ? ipip_gro_receive+0x100/0x100 [ 217.578467][T14929] sock_sendmsg+0xdd/0x130 [ 217.582934][T14929] sock_write_iter+0x27c/0x3e0 [ 217.587773][T14929] ? sock_sendmsg+0x130/0x130 [ 217.592471][T14929] ? aa_path_link+0x460/0x460 [ 217.597151][T14929] ? find_held_lock+0x35/0x130 [ 217.601905][T14929] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 217.608222][T14929] ? iov_iter_init+0xee/0x220 [ 217.612910][T14929] new_sync_write+0x4c7/0x760 [ 217.617584][T14929] ? default_llseek+0x2e0/0x2e0 [ 217.622418][T14929] ? common_file_perm+0x238/0x720 [ 217.627455][T14929] ? __fget+0x381/0x550 [ 217.631607][T14929] ? apparmor_file_permission+0x25/0x30 [ 217.637132][T14929] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 217.643365][T14929] ? security_file_permission+0x94/0x380 [ 217.649010][T14929] __vfs_write+0xe4/0x110 [ 217.653364][T14929] vfs_write+0x20c/0x580 [ 217.657605][T14929] ksys_write+0xea/0x1f0 [ 217.661832][T14929] ? __ia32_sys_read+0xb0/0xb0 [ 217.666582][T14929] ? do_syscall_64+0x26/0x610 [ 217.671240][T14929] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 217.677285][T14929] ? do_syscall_64+0x26/0x610 [ 217.681946][T14929] __x64_sys_write+0x73/0xb0 [ 217.686519][T14929] do_syscall_64+0x103/0x610 [ 217.691092][T14929] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 217.696962][T14929] RIP: 0033:0x4582f9 [ 217.700873][T14929] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 217.720475][T14929] RSP: 002b:00007f6dcf2fbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 217.728872][T14929] RAX: ffffffffffffffda RBX: 00007f6dcf2fbc90 RCX: 00000000004582f9 [ 217.736822][T14929] RDX: 000000000000fdef RSI: 0000000020000280 RDI: 0000000000000005 [ 217.744777][T14929] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 217.752727][T14929] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6dcf2fc6d4 [ 217.760686][T14929] R13: 00000000004c7ad0 R14: 00000000004ddba8 R15: 0000000000000006 16:39:36 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f0000001840)={&(0x7f0000001480)=@can, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001500)=""/10, 0xa}, {&(0x7f0000001580)=""/73, 0x49}, {&(0x7f0000001600)=""/184, 0xb8}, {&(0x7f00000016c0)=""/101, 0x65}, {&(0x7f0000001740)=""/81, 0x51}], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r4) 16:39:36 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x20000000, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:36 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d052f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) 16:39:36 executing program 4 (fault-call:5 fault-nth:73): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) 16:39:36 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x7, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x17, 0x2, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x18}, @generic={0x0, 0x7, 0x0, 0x20, 0x5e64}], &(0x7f0000000040)='syzkaller\x00', 0x101, 0x44, &(0x7f0000000100)=""/68, 0x41000, 0x1, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x3}, 0x8, 0x10, &(0x7f0000000200)={0x4a, 0x63, 0x2, 0x5a5}, 0x10}, 0x70) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000002c0)=r2, 0x4) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001600)="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", 0xe77}]}, 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x70, 0x425, 0xdb0, 0x9, 0x92e, 0x0, 0x2, 0x108, 0x1, 0x8000, 0x2, 0xd9, 0x0, 0xd6, 0x40000000400000, 0xfff, 0x7, 0x6, 0xca04, 0xff, 0xe289, 0xafb9, 0x3, 0x5, 0x3, 0x4, 0x7, 0x5, 0x35d6, 0xc8, 0x2, 0x4, 0x3, 0x3, 0xff, 0x9, 0x3, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000300), 0x8}, 0x900f84d7f64e447b, 0x100, 0x0, 0x9, 0xca, 0x5, 0x8001}, 0xffffffffffffffff, 0x6, r0, 0x1) perf_event_open(0x0, 0x0, 0x10, r0, 0x0) socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r1, &(0x7f0000009ac0)={&(0x7f0000008340)=@hci, 0x80, 0x0}, 0x0) 16:39:36 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r3) recvmsg(r0, &(0x7f0000001840)={&(0x7f0000001480)=@can={0x1d, 0x0}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001500)=""/10, 0xa}, {&(0x7f0000001580)=""/73, 0x49}, {&(0x7f0000001600)=""/184, 0xb8}, {&(0x7f00000016c0)=""/101, 0x65}, {&(0x7f0000001740)=""/81, 0x51}], 0x5}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], r5, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x33c) close(r0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r6) 16:39:36 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d062f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) 16:39:36 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x30000000, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) [ 218.117141][T14963] FAULT_INJECTION: forcing a failure. [ 218.117141][T14963] name failslab, interval 1, probability 0, space 0, times 0 16:39:36 executing program 2: r0 = socket$kcm(0x2, 0x3, 0x2) socket$kcm(0x2c, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0xc383) sendmsg$kcm(r2, &(0x7f0000000880)={0x0, 0x0, &(0x7f00000007c0), 0x0, 0x0, 0x0, 0x4}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x11b, 0x3, &(0x7f0000000000), 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000280)={r1}) [ 218.199983][T14963] CPU: 0 PID: 14963 Comm: syz-executor.4 Not tainted 5.1.0-rc2+ #82 [ 218.208002][T14963] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 218.218061][T14963] Call Trace: [ 218.221359][T14963] dump_stack+0x172/0x1f0 [ 218.225703][T14963] should_fail.cold+0xa/0x15 [ 218.230302][T14963] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 218.236115][T14963] ? ___might_sleep+0x163/0x280 [ 218.240975][T14963] __should_failslab+0x121/0x190 [ 218.240992][T14963] should_failslab+0x9/0x14 [ 218.241010][T14963] kmem_cache_alloc_node+0x264/0x710 [ 218.241041][T14963] __alloc_skb+0xd5/0x5e0 [ 218.241058][T14963] ? skb_trim+0x190/0x190 [ 218.241074][T14963] ? __sanitizer_cov_trace_cmp2+0x20/0x20 [ 218.241089][T14963] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 218.241108][T14963] ? skb_put+0x177/0x1d0 [ 218.250528][T14963] __ip_append_data.isra.0+0x24d6/0x2dd0 [ 218.250558][T14963] ? ip_reply_glue_bits+0xc0/0xc0 [ 218.250585][T14963] ? __ip_flush_pending_frames.isra.0+0x2d0/0x2d0 16:39:36 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d072f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) 16:39:36 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x3f000000, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) [ 218.250601][T14963] ? mark_held_locks+0xf0/0xf0 [ 218.250616][T14963] ? lock_sock_nested+0xac/0x120 [ 218.250632][T14963] ? ip_reply_glue_bits+0xc0/0xc0 [ 218.250646][T14963] ip_append_data.part.0+0xf2/0x170 [ 218.250666][T14963] ? ip_reply_glue_bits+0xc0/0xc0 [ 218.250688][T14963] ip_append_data+0x6e/0x90 [ 218.326829][T14963] udp_sendmsg+0x8e7/0x2820 [ 218.331344][T14963] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 218.337592][T14963] ? __lock_acquire+0x548/0x3fb0 [ 218.342540][T14963] ? ip_reply_glue_bits+0xc0/0xc0 [ 218.347576][T14963] ? udp4_lib_lookup_skb+0x440/0x440 [ 218.352868][T14963] ? is_bpf_text_address+0xac/0x170 [ 218.358094][T14963] ? find_held_lock+0x35/0x130 [ 218.358112][T14963] ? is_bpf_text_address+0xac/0x170 [ 218.358137][T14963] ? ___might_sleep+0x163/0x280 [ 218.358156][T14963] ? __might_sleep+0x95/0x190 [ 218.358175][T14963] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 218.358194][T14963] ? aa_sk_perm+0x288/0x880 [ 218.368141][T14963] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 218.368161][T14963] inet_sendmsg+0x147/0x5e0 16:39:37 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d082f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) [ 218.368176][T14963] ? udp4_lib_lookup_skb+0x440/0x440 [ 218.368188][T14963] ? inet_sendmsg+0x147/0x5e0 [ 218.368202][T14963] ? ipip_gro_receive+0x100/0x100 [ 218.368220][T14963] sock_sendmsg+0xdd/0x130 [ 218.368239][T14963] sock_write_iter+0x27c/0x3e0 [ 218.421930][T14963] ? sock_sendmsg+0x130/0x130 [ 218.426626][T14963] ? new_sync_write+0x5f8/0x760 [ 218.431479][T14963] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 218.437725][T14963] ? iov_iter_init+0xee/0x220 [ 218.442418][T14963] new_sync_write+0x4c7/0x760 [ 218.447114][T14963] ? default_llseek+0x2e0/0x2e0 [ 218.451974][T14963] ? common_file_perm+0x238/0x720 [ 218.457014][T14963] ? __fget+0x381/0x550 [ 218.461181][T14963] ? apparmor_file_permission+0x25/0x30 [ 218.466730][T14963] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 218.472995][T14963] ? security_file_permission+0x94/0x380 [ 218.478651][T14963] __vfs_write+0xe4/0x110 [ 218.482989][T14963] vfs_write+0x20c/0x580 [ 218.487243][T14963] ksys_write+0xea/0x1f0 [ 218.491497][T14963] ? __ia32_sys_read+0xb0/0xb0 [ 218.496273][T14963] ? do_syscall_64+0x26/0x610 [ 218.500955][T14963] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 218.507025][T14963] ? do_syscall_64+0x26/0x610 [ 218.511713][T14963] __x64_sys_write+0x73/0xb0 [ 218.516313][T14963] do_syscall_64+0x103/0x610 [ 218.520919][T14963] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 218.526813][T14963] RIP: 0033:0x4582f9 [ 218.530714][T14963] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 218.550353][T14963] RSP: 002b:00007f6dcf2fbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 218.558769][T14963] RAX: ffffffffffffffda RBX: 00007f6dcf2fbc90 RCX: 00000000004582f9 [ 218.566744][T14963] RDX: 000000000000fdef RSI: 0000000020000280 RDI: 0000000000000005 [ 218.574716][T14963] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 218.582685][T14963] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6dcf2fc6d4 [ 218.590656][T14963] R13: 00000000004c7ad0 R14: 00000000004ddba8 R15: 0000000000000006 16:39:37 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f0000001840)={&(0x7f0000001480)=@can, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001500)=""/10, 0xa}, {&(0x7f0000001580)=""/73, 0x49}, {&(0x7f0000001600)=""/184, 0xb8}, {&(0x7f00000016c0)=""/101, 0x65}, {&(0x7f0000001740)=""/81, 0x51}], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r4) 16:39:37 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d092f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) 16:39:37 executing program 4 (fault-call:5 fault-nth:74): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) 16:39:37 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x7ffff000, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:37 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r3) recvmsg(r0, &(0x7f0000001840)={&(0x7f0000001480)=@can={0x1d, 0x0}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001500)=""/10, 0xa}, {&(0x7f0000001580)=""/73, 0x49}, {&(0x7f0000001600)=""/184, 0xb8}, {&(0x7f00000016c0)=""/101, 0x65}, {&(0x7f0000001740)=""/81, 0x51}], 0x5}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], r5, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x33c) close(r0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r6) 16:39:37 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d0a2f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) [ 218.990053][T15007] FAULT_INJECTION: forcing a failure. [ 218.990053][T15007] name failslab, interval 1, probability 0, space 0, times 0 [ 219.019447][T15007] CPU: 0 PID: 15007 Comm: syz-executor.4 Not tainted 5.1.0-rc2+ #82 [ 219.027468][T15007] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 16:39:37 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d0b2f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) [ 219.037525][T15007] Call Trace: [ 219.040830][T15007] dump_stack+0x172/0x1f0 [ 219.045172][T15007] should_fail.cold+0xa/0x15 [ 219.049769][T15007] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 219.055588][T15007] ? ___might_sleep+0x163/0x280 [ 219.060562][T15007] __should_failslab+0x121/0x190 [ 219.065507][T15007] should_failslab+0x9/0x14 [ 219.070028][T15007] kmem_cache_alloc_node_trace+0x270/0x720 [ 219.075850][T15007] __kmalloc_node_track_caller+0x3d/0x70 [ 219.081498][T15007] __kmalloc_reserve.isra.0+0x40/0xf0 [ 219.086872][T15007] __alloc_skb+0x10b/0x5e0 [ 219.091270][T15007] ? skb_trim+0x190/0x190 [ 219.095582][T15007] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 219.101279][T15007] ? skb_put+0x177/0x1d0 [ 219.105503][T15007] __ip_append_data.isra.0+0x24d6/0x2dd0 [ 219.111149][T15007] ? ip_reply_glue_bits+0xc0/0xc0 [ 219.116468][T15007] ? __ip_flush_pending_frames.isra.0+0x2d0/0x2d0 [ 219.122931][T15007] ? mark_held_locks+0xf0/0xf0 [ 219.127704][T15007] ? lock_sock_nested+0xac/0x120 [ 219.132648][T15007] ? ip_reply_glue_bits+0xc0/0xc0 [ 219.137676][T15007] ip_append_data.part.0+0xf2/0x170 [ 219.142886][T15007] ? ip_reply_glue_bits+0xc0/0xc0 [ 219.147908][T15007] ip_append_data+0x6e/0x90 [ 219.152407][T15007] udp_sendmsg+0x8e7/0x2820 [ 219.156913][T15007] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 219.163138][T15007] ? ip_reply_glue_bits+0xc0/0xc0 [ 219.168178][T15007] ? udp4_lib_lookup_skb+0x440/0x440 [ 219.173455][T15007] ? flexible_sched_in+0xcb/0x9c0 [ 219.178464][T15007] ? visit_groups_merge+0x4c0/0x5d0 [ 219.183658][T15007] ? pinned_sched_in+0xa40/0xa40 [ 219.188580][T15007] ? ___might_sleep+0x163/0x280 [ 219.193424][T15007] ? __might_sleep+0x95/0x190 [ 219.198103][T15007] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 219.203716][T15007] ? aa_sk_perm+0x288/0x880 [ 219.208216][T15007] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 219.213744][T15007] inet_sendmsg+0x147/0x5e0 [ 219.218229][T15007] ? udp4_lib_lookup_skb+0x440/0x440 [ 219.223492][T15007] ? inet_sendmsg+0x147/0x5e0 [ 219.228146][T15007] ? ipip_gro_receive+0x100/0x100 [ 219.233152][T15007] sock_sendmsg+0xdd/0x130 [ 219.237570][T15007] sock_write_iter+0x27c/0x3e0 [ 219.242329][T15007] ? sock_sendmsg+0x130/0x130 [ 219.247006][T15007] ? sock_sendmsg+0x130/0x130 [ 219.251687][T15007] new_sync_write+0x4c7/0x760 [ 219.256362][T15007] ? default_llseek+0x2e0/0x2e0 [ 219.261211][T15007] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 219.266655][T15007] ? common_file_perm+0x238/0x720 [ 219.271672][T15007] ? trace_hardirqs_on_caller+0x6a/0x220 [ 219.277312][T15007] ? apparmor_file_permission+0x25/0x30 [ 219.282888][T15007] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 219.289128][T15007] ? security_file_permission+0x94/0x380 [ 219.294761][T15007] __vfs_write+0xe4/0x110 [ 219.299084][T15007] vfs_write+0x20c/0x580 [ 219.303326][T15007] ksys_write+0xea/0x1f0 [ 219.307552][T15007] ? __ia32_sys_read+0xb0/0xb0 [ 219.312318][T15007] ? do_syscall_64+0x26/0x610 [ 219.316990][T15007] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 219.323035][T15007] ? do_syscall_64+0x26/0x610 [ 219.327696][T15007] __x64_sys_write+0x73/0xb0 [ 219.332267][T15007] do_syscall_64+0x103/0x610 [ 219.336883][T15007] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 219.342783][T15007] RIP: 0033:0x4582f9 [ 219.346684][T15007] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 219.366292][T15007] RSP: 002b:00007f6dcf2fbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 219.374710][T15007] RAX: ffffffffffffffda RBX: 00007f6dcf2fbc90 RCX: 00000000004582f9 [ 219.382683][T15007] RDX: 000000000000fdef RSI: 0000000020000280 RDI: 0000000000000005 16:39:38 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x7ffffff7, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) [ 219.390656][T15007] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 219.398633][T15007] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6dcf2fc6d4 [ 219.406603][T15007] R13: 00000000004c7ad0 R14: 00000000004ddba8 R15: 0000000000000006 16:39:38 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x8955, &(0x7f0000000000)=0x2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0xffffffffffffff9c, 0x28, &(0x7f0000000040)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={r1}, 0xc) 16:39:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d0106629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) 16:39:38 executing program 4 (fault-call:5 fault-nth:75): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) 16:39:38 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x8dffffff, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) [ 219.597245][T15038] FAULT_INJECTION: forcing a failure. [ 219.597245][T15038] name failslab, interval 1, probability 0, space 0, times 0 [ 219.613238][T15038] CPU: 0 PID: 15038 Comm: syz-executor.4 Not tainted 5.1.0-rc2+ #82 [ 219.621229][T15038] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 219.631283][T15038] Call Trace: [ 219.631308][T15038] dump_stack+0x172/0x1f0 [ 219.631334][T15038] should_fail.cold+0xa/0x15 [ 219.631357][T15038] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 219.649298][T15038] ? ___might_sleep+0x163/0x280 [ 219.654152][T15038] __should_failslab+0x121/0x190 [ 219.659084][T15038] should_failslab+0x9/0x14 [ 219.663585][T15038] kmem_cache_alloc_node+0x264/0x710 [ 219.668890][T15038] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 219.675131][T15038] __alloc_skb+0xd5/0x5e0 [ 219.679466][T15038] ? skb_trim+0x190/0x190 [ 219.683793][T15038] ? skb_page_frag_refill+0x127/0x460 [ 219.689161][T15038] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 219.694873][T15038] ? skb_put+0x177/0x1d0 [ 219.699115][T15038] __ip_append_data.isra.0+0x24d6/0x2dd0 [ 219.704746][T15038] ? ip_reply_glue_bits+0xc0/0xc0 [ 219.709831][T15038] ? __ip_flush_pending_frames.isra.0+0x2d0/0x2d0 [ 219.716251][T15038] ? mark_held_locks+0xf0/0xf0 [ 219.721008][T15038] ? lock_sock_nested+0xac/0x120 [ 219.725949][T15038] ? ip_reply_glue_bits+0xc0/0xc0 [ 219.730966][T15038] ip_append_data.part.0+0xf2/0x170 [ 219.736161][T15038] ? ip_reply_glue_bits+0xc0/0xc0 [ 219.741180][T15038] ip_append_data+0x6e/0x90 [ 219.745687][T15038] udp_sendmsg+0x8e7/0x2820 [ 219.750189][T15038] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 219.756426][T15038] ? ip_reply_glue_bits+0xc0/0xc0 [ 219.761462][T15038] ? udp4_lib_lookup_skb+0x440/0x440 [ 219.766750][T15038] ? visit_groups_merge+0x4c0/0x5d0 [ 219.771947][T15038] ? pinned_sched_in+0xa40/0xa40 [ 219.776879][T15038] ? perf_event_pid_type+0xf0/0xf0 [ 219.781997][T15038] ? ___might_sleep+0x163/0x280 [ 219.786848][T15038] ? __might_sleep+0x95/0x190 [ 219.791521][T15038] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 219.797149][T15038] ? aa_sk_perm+0x288/0x880 [ 219.801655][T15038] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 219.807202][T15038] inet_sendmsg+0x147/0x5e0 [ 219.811701][T15038] ? udp4_lib_lookup_skb+0x440/0x440 [ 219.816978][T15038] ? inet_sendmsg+0x147/0x5e0 [ 219.821652][T15038] ? ipip_gro_receive+0x100/0x100 [ 219.826675][T15038] sock_sendmsg+0xdd/0x130 [ 219.831093][T15038] sock_write_iter+0x27c/0x3e0 [ 219.835853][T15038] ? sock_sendmsg+0x130/0x130 [ 219.840544][T15038] ? aa_path_link+0x460/0x460 [ 219.845216][T15038] ? find_held_lock+0x35/0x130 [ 219.849978][T15038] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 219.856231][T15038] ? iov_iter_init+0xee/0x220 [ 219.860908][T15038] new_sync_write+0x4c7/0x760 [ 219.865582][T15038] ? default_llseek+0x2e0/0x2e0 [ 219.870440][T15038] ? common_file_perm+0x238/0x720 [ 219.875465][T15038] ? __fget+0x381/0x550 [ 219.879619][T15038] ? apparmor_file_permission+0x25/0x30 [ 219.885162][T15038] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 219.891397][T15038] ? security_file_permission+0x94/0x380 [ 219.897033][T15038] __vfs_write+0xe4/0x110 [ 219.901366][T15038] vfs_write+0x20c/0x580 [ 219.905608][T15038] ksys_write+0xea/0x1f0 [ 219.909846][T15038] ? __ia32_sys_read+0xb0/0xb0 [ 219.914621][T15038] ? do_syscall_64+0x26/0x610 [ 219.919292][T15038] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 219.925351][T15038] ? do_syscall_64+0x26/0x610 [ 219.930033][T15038] __x64_sys_write+0x73/0xb0 [ 219.934620][T15038] do_syscall_64+0x103/0x610 [ 219.939205][T15038] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 219.945091][T15038] RIP: 0033:0x4582f9 [ 219.948980][T15038] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 219.968576][T15038] RSP: 002b:00007f6dcf2fbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 219.976998][T15038] RAX: ffffffffffffffda RBX: 00007f6dcf2fbc90 RCX: 00000000004582f9 [ 219.984959][T15038] RDX: 000000000000fdef RSI: 0000000020000280 RDI: 0000000000000005 [ 219.992938][T15038] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 220.000900][T15038] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6dcf2fc6d4 [ 220.008875][T15038] R13: 00000000004c7ad0 R14: 00000000004ddba8 R15: 0000000000000006 16:39:38 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f0000001840)={&(0x7f0000001480)=@can, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001500)=""/10, 0xa}, {&(0x7f0000001580)=""/73, 0x49}, {&(0x7f0000001600)=""/184, 0xb8}, {&(0x7f00000016c0)=""/101, 0x65}, {&(0x7f0000001740)=""/81, 0x51}], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r4) 16:39:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4202d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) 16:39:38 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0xe8030000, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:38 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r3) recvmsg(r0, &(0x7f0000001840)={&(0x7f0000001480)=@can={0x1d, 0x0}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001500)=""/10, 0xa}, {&(0x7f0000001580)=""/73, 0x49}, {&(0x7f0000001600)=""/184, 0xb8}, {&(0x7f00000016c0)=""/101, 0x65}, {&(0x7f0000001740)=""/81, 0x51}], 0x5}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], r5, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x33c) close(r0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r6) 16:39:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4203d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) 16:39:38 executing program 4 (fault-call:5 fault-nth:76): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) 16:39:38 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0xeffdffff, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4204d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) 16:39:38 executing program 2: r0 = socket$kcm(0xa, 0x4, 0x11) sendmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000100)=@in6={0xa, 0x4e20, 0x0, @mcast2}, 0x80, 0x0, 0x0, &(0x7f00000014c0)=ANY=[@ANYBLOB="10000002000000000000"], 0x10}, 0x0) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0x4) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) 16:39:38 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0xf4010000, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4205d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) [ 220.352339][T15074] FAULT_INJECTION: forcing a failure. [ 220.352339][T15074] name failslab, interval 1, probability 0, space 0, times 0 [ 220.382899][T15074] CPU: 0 PID: 15074 Comm: syz-executor.4 Not tainted 5.1.0-rc2+ #82 [ 220.390922][T15074] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 16:39:39 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4206d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) [ 220.401005][T15074] Call Trace: [ 220.404304][T15074] dump_stack+0x172/0x1f0 [ 220.408656][T15074] should_fail.cold+0xa/0x15 [ 220.413261][T15074] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 220.419082][T15074] ? ___might_sleep+0x163/0x280 [ 220.423944][T15074] __should_failslab+0x121/0x190 [ 220.428888][T15074] should_failslab+0x9/0x14 [ 220.433408][T15074] kmem_cache_alloc_node_trace+0x270/0x720 [ 220.439266][T15074] __kmalloc_node_track_caller+0x3d/0x70 [ 220.444910][T15074] __kmalloc_reserve.isra.0+0x40/0xf0 [ 220.450298][T15074] __alloc_skb+0x10b/0x5e0 [ 220.454727][T15074] ? skb_trim+0x190/0x190 [ 220.459062][T15074] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 220.464785][T15074] ? skb_put+0x177/0x1d0 [ 220.469042][T15074] __ip_append_data.isra.0+0x24d6/0x2dd0 [ 220.474690][T15074] ? ip_reply_glue_bits+0xc0/0xc0 [ 220.479733][T15074] ? __ip_flush_pending_frames.isra.0+0x2d0/0x2d0 [ 220.486161][T15074] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 220.491630][T15074] ? ip_reply_glue_bits+0xc0/0xc0 [ 220.496661][T15074] ip_append_data.part.0+0xf2/0x170 [ 220.501865][T15074] ? ip_reply_glue_bits+0xc0/0xc0 [ 220.506892][T15074] ip_append_data+0x6e/0x90 [ 220.511409][T15074] udp_sendmsg+0x8e7/0x2820 [ 220.515927][T15074] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 220.522170][T15074] ? __lock_acquire+0x548/0x3fb0 [ 220.527117][T15074] ? ip_reply_glue_bits+0xc0/0xc0 [ 220.532156][T15074] ? udp4_lib_lookup_skb+0x440/0x440 [ 220.537456][T15074] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 220.542919][T15074] ? lockdep_hardirqs_on+0x418/0x5d0 [ 220.542934][T15074] ? retint_kernel+0x2d/0x2d [ 220.542949][T15074] ? trace_hardirqs_on_caller+0x6a/0x220 [ 220.542967][T15074] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 220.542986][T15074] ? ___might_sleep+0x163/0x280 [ 220.543005][T15074] ? __might_sleep+0x95/0x190 [ 220.573420][T15074] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 220.579071][T15074] ? aa_sk_perm+0x288/0x880 [ 220.583584][T15074] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 220.589137][T15074] inet_sendmsg+0x147/0x5e0 [ 220.593644][T15074] ? udp4_lib_lookup_skb+0x440/0x440 [ 220.598924][T15074] ? inet_sendmsg+0x147/0x5e0 [ 220.603599][T15074] ? ipip_gro_receive+0x100/0x100 [ 220.608636][T15074] sock_sendmsg+0xdd/0x130 [ 220.613064][T15074] sock_write_iter+0x27c/0x3e0 [ 220.617841][T15074] ? sock_sendmsg+0x130/0x130 [ 220.622542][T15074] ? aa_path_link+0x460/0x460 [ 220.627226][T15074] ? find_held_lock+0x35/0x130 [ 220.631996][T15074] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 220.638243][T15074] ? iov_iter_init+0xee/0x220 [ 220.642935][T15074] new_sync_write+0x4c7/0x760 [ 220.647628][T15074] ? default_llseek+0x2e0/0x2e0 [ 220.652464][T15074] ? common_file_perm+0x238/0x720 [ 220.657469][T15074] ? retint_kernel+0x2d/0x2d [ 220.662042][T15074] ? apparmor_file_permission+0x25/0x30 [ 220.667596][T15074] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 220.673838][T15074] ? security_file_permission+0x94/0x380 [ 220.679471][T15074] ? rw_verify_area+0xb2/0x360 [ 220.684229][T15074] __vfs_write+0xe4/0x110 [ 220.688546][T15074] vfs_write+0x20c/0x580 [ 220.692810][T15074] ksys_write+0xea/0x1f0 [ 220.697041][T15074] ? __ia32_sys_read+0xb0/0xb0 [ 220.701790][T15074] ? do_syscall_64+0x26/0x610 [ 220.706462][T15074] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 220.712518][T15074] ? do_syscall_64+0x26/0x610 [ 220.717205][T15074] __x64_sys_write+0x73/0xb0 [ 220.721798][T15074] do_syscall_64+0x103/0x610 [ 220.726369][T15074] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 220.732242][T15074] RIP: 0033:0x4582f9 [ 220.736131][T15074] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 220.755712][T15074] RSP: 002b:00007f6dcf2fbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 220.764104][T15074] RAX: ffffffffffffffda RBX: 00007f6dcf2fbc90 RCX: 00000000004582f9 [ 220.772087][T15074] RDX: 000000000000fdef RSI: 0000000020000280 RDI: 0000000000000005 [ 220.780045][T15074] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 220.788004][T15074] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6dcf2fc6d4 [ 220.795986][T15074] R13: 00000000004c7ad0 R14: 00000000004ddba8 R15: 0000000000000006 16:39:39 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r3) 16:39:39 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4207d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) 16:39:39 executing program 2: recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x9, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001240)=[{&(0x7f0000000100)=""/119, 0x77}, {&(0x7f0000000200)=""/34, 0x22}, {&(0x7f0000000240)=""/4, 0x4}, {0xfffffffffffffffd}, {&(0x7f0000000f80)=""/82, 0x52}, {&(0x7f0000001000)=""/72, 0x48}, {&(0x7f0000001080)=""/105, 0x69}, {&(0x7f0000001100)=""/240, 0xf0}, {&(0x7f0000001200)=""/57, 0x39}], 0x9, &(0x7f0000001300)=""/56, 0x38}, 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000013c0)='./cgdo\a\x00\x00\x00yz1\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) r2 = openat$cgroup_ro(r1, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000280)="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", 0xcfa}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000001380)={r2}) 16:39:39 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r3) recvmsg(r0, &(0x7f0000001840)={&(0x7f0000001480)=@can={0x1d, 0x0}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001500)=""/10, 0xa}, {&(0x7f0000001580)=""/73, 0x49}, {&(0x7f0000001600)=""/184, 0xb8}, {&(0x7f00000016c0)=""/101, 0x65}, {&(0x7f0000001740)=""/81, 0x51}], 0x5}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], r5, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x33c) close(r0) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(0xffffffffffffffff) 16:39:39 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0xf7ffff7f, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:39 executing program 4 (fault-call:5 fault-nth:77): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) 16:39:39 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4209d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) 16:39:39 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r0, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r2) 16:39:39 executing program 2: socketpair(0xa, 0x803, 0x0, &(0x7f0000001580)) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='memory.swap.current\x00', 0x0, 0x0) [ 221.080229][T15115] FAULT_INJECTION: forcing a failure. [ 221.080229][T15115] name failslab, interval 1, probability 0, space 0, times 0 [ 221.133702][T15115] CPU: 0 PID: 15115 Comm: syz-executor.4 Not tainted 5.1.0-rc2+ #82 [ 221.141722][T15115] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 221.141729][T15115] Call Trace: [ 221.141756][T15115] dump_stack+0x172/0x1f0 [ 221.141780][T15115] should_fail.cold+0xa/0x15 [ 221.141801][T15115] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 221.141820][T15115] ? __should_failslab+0xe7/0x190 [ 221.141841][T15115] __should_failslab+0x121/0x190 16:39:39 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0xfffffdef, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:39 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0xffffff7f, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) [ 221.141858][T15115] should_failslab+0x9/0x14 [ 221.141875][T15115] kmem_cache_alloc_node+0x264/0x710 [ 221.141896][T15115] ? retint_kernel+0x2d/0x2d [ 221.174938][T15115] __alloc_skb+0xd5/0x5e0 [ 221.174959][T15115] ? skb_trim+0x190/0x190 [ 221.202900][T15115] ? write_comp_data+0x1e/0x70 [ 221.207696][T15115] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 221.213441][T15115] ? skb_put+0x177/0x1d0 [ 221.217693][T15115] __ip_append_data.isra.0+0x24d6/0x2dd0 [ 221.223334][T15115] ? ip_reply_glue_bits+0xc0/0xc0 16:39:39 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa420ad5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) [ 221.228369][T15115] ? __ip_flush_pending_frames.isra.0+0x2d0/0x2d0 [ 221.234787][T15115] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 221.240256][T15115] ? ip_reply_glue_bits+0xc0/0xc0 [ 221.245286][T15115] ip_append_data.part.0+0xf2/0x170 [ 221.250500][T15115] ? ip_reply_glue_bits+0xc0/0xc0 [ 221.250515][T15115] ip_append_data+0x6e/0x90 [ 221.250547][T15115] udp_sendmsg+0x8e7/0x2820 [ 221.264570][T15115] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 221.270040][T15115] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 221.270057][T15115] ? lockdep_hardirqs_on+0x418/0x5d0 16:39:39 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r0, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r2) [ 221.270071][T15115] ? ip_reply_glue_bits+0xc0/0xc0 [ 221.270092][T15115] ? udp4_lib_lookup_skb+0x440/0x440 [ 221.270111][T15115] ? retint_kernel+0x2d/0x2d [ 221.270137][T15115] ? ___might_sleep+0x163/0x280 [ 221.301340][T15115] ? __might_sleep+0x95/0x190 [ 221.306030][T15115] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 221.306044][T15115] ? aa_sk_perm+0x288/0x880 [ 221.306067][T15115] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 221.321727][T15115] inet_sendmsg+0x147/0x5e0 [ 221.326240][T15115] ? udp4_lib_lookup_skb+0x440/0x440 [ 221.331537][T15115] ? inet_sendmsg+0x147/0x5e0 [ 221.336217][T15115] ? ipip_gro_receive+0x100/0x100 [ 221.336237][T15115] sock_sendmsg+0xdd/0x130 [ 221.336255][T15115] sock_write_iter+0x27c/0x3e0 [ 221.336277][T15115] ? sock_sendmsg+0x130/0x130 [ 221.355143][T15115] ? aa_path_link+0x460/0x460 [ 221.359839][T15115] ? find_held_lock+0x35/0x130 [ 221.364622][T15115] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 221.370877][T15115] ? iov_iter_init+0xee/0x220 [ 221.375577][T15115] new_sync_write+0x4c7/0x760 16:39:40 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r0, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r2) [ 221.380280][T15115] ? default_llseek+0x2e0/0x2e0 [ 221.385138][T15115] ? trace_hardirqs_on_caller+0x6a/0x220 [ 221.391392][T15115] ? common_file_perm+0x238/0x720 [ 221.396451][T15115] ? apparmor_file_permission+0x25/0x30 [ 221.402033][T15115] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 221.408287][T15115] ? security_file_permission+0x94/0x380 [ 221.413939][T15115] __vfs_write+0xe4/0x110 [ 221.418286][T15115] vfs_write+0x20c/0x580 [ 221.422541][T15115] ksys_write+0xea/0x1f0 [ 221.422560][T15115] ? __ia32_sys_read+0xb0/0xb0 16:39:40 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0xffffff8d, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) [ 221.422577][T15115] ? do_syscall_64+0x26/0x610 [ 221.422598][T15115] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 221.442300][T15115] ? do_syscall_64+0x26/0x610 [ 221.446995][T15115] __x64_sys_write+0x73/0xb0 [ 221.451610][T15115] do_syscall_64+0x103/0x610 [ 221.456209][T15115] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 221.462105][T15115] RIP: 0033:0x4582f9 [ 221.466001][T15115] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 221.485611][T15115] RSP: 002b:00007f6dcf2fbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 221.494035][T15115] RAX: ffffffffffffffda RBX: 00007f6dcf2fbc90 RCX: 00000000004582f9 [ 221.502027][T15115] RDX: 000000000000fdef RSI: 0000000020000280 RDI: 0000000000000005 [ 221.510014][T15115] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 221.517994][T15115] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6dcf2fc6d4 [ 221.518003][T15115] R13: 00000000004c7ad0 R14: 00000000004ddba8 R15: 0000000000000006 16:39:40 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r3) recvmsg(r0, &(0x7f0000001840)={&(0x7f0000001480)=@can={0x1d, 0x0}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001500)=""/10, 0xa}, {&(0x7f0000001580)=""/73, 0x49}, {&(0x7f0000001600)=""/184, 0xb8}, {&(0x7f00000016c0)=""/101, 0x65}, {&(0x7f0000001740)=""/81, 0x51}], 0x5}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], r5, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x33c) close(r0) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(0xffffffffffffffff) 16:39:40 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r1) 16:39:40 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa420bd5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) 16:39:40 executing program 4 (fault-call:5 fault-nth:78): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) 16:39:40 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x7ffffffff000, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:40 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000280)="230000001a0081aee4050c00000f00fe0a8bc36f16000002000000bfd77ea14af3a311", 0x23}], 0x1}, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40043, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890c, &(0x7f0000000000)) 16:39:40 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r1) 16:39:40 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a034aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) 16:39:40 executing program 2: socketpair(0x1, 0x20001000000005, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) socket$kcm(0x2, 0xa, 0x2) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x80, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8915, &(0x7f0000000200)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x02\x00\xdc\xff\xc0\x00\x80\x00\x00\x00\x02?\xfa\xf3W\x14\xf9\x92N2\xde\xf8\xff\tj\xf3\xb8\xb4\xd2\xaf\x99\x97r\xe1v\xb2]W\xe4\xc3\xd9\xa7\xa4 \x90\x87\xa4\x1c#\x14\xa2\xee\xd0\xe3vY\xbc1\xdff4\x93O\xc6`%P\\c\xe7`;V\xfc7\xec\xd9,[\xc2\xeaL\xceg&\x1e7\xb9,\xe4\xf79i\xe2\xad\xf9\xf2\x85Z\x85\x15\xd8I&\x9e}\xeb\xb1\xa6Zf\x11\xf6\x01y\xe2\xcb\xa6\x95R\xaa\xff-\xfcU\x1c\x85\x9f\x8d\xc17l\xa5\xb9\xca\x9ej\xcf\xeeW') socketpair(0x4, 0x2, 0x9, &(0x7f0000000000)) [ 222.032383][T15165] FAULT_INJECTION: forcing a failure. [ 222.032383][T15165] name failslab, interval 1, probability 0, space 0, times 0 [ 222.111030][T15165] CPU: 0 PID: 15165 Comm: syz-executor.4 Not tainted 5.1.0-rc2+ #82 [ 222.119052][T15165] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 222.129130][T15165] Call Trace: [ 222.132441][T15165] dump_stack+0x172/0x1f0 [ 222.136796][T15165] should_fail.cold+0xa/0x15 [ 222.141400][T15165] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 222.147308][T15165] ? ___might_sleep+0x163/0x280 [ 222.152191][T15165] __should_failslab+0x121/0x190 [ 222.157129][T15165] should_failslab+0x9/0x14 [ 222.161685][T15165] kmem_cache_alloc_node_trace+0x270/0x720 [ 222.167507][T15165] __kmalloc_node_track_caller+0x3d/0x70 [ 222.173200][T15165] __kmalloc_reserve.isra.0+0x40/0xf0 [ 222.178592][T15165] __alloc_skb+0x10b/0x5e0 [ 222.183049][T15165] ? skb_trim+0x190/0x190 [ 222.187388][T15165] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 222.193112][T15165] ? skb_put+0x177/0x1d0 [ 222.197369][T15165] __ip_append_data.isra.0+0x24d6/0x2dd0 [ 222.203014][T15165] ? ip_reply_glue_bits+0xc0/0xc0 [ 222.208055][T15165] ? __ip_flush_pending_frames.isra.0+0x2d0/0x2d0 [ 222.214477][T15165] ? mark_held_locks+0xf0/0xf0 [ 222.219245][T15165] ? lock_sock_nested+0xac/0x120 [ 222.224184][T15165] ? ip_reply_glue_bits+0xc0/0xc0 [ 222.229213][T15165] ip_append_data.part.0+0xf2/0x170 [ 222.234419][T15165] ? ip_reply_glue_bits+0xc0/0xc0 [ 222.239481][T15165] ip_append_data+0x6e/0x90 [ 222.243999][T15165] udp_sendmsg+0x8e7/0x2820 [ 222.248515][T15165] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 222.254767][T15165] ? __lock_acquire+0x548/0x3fb0 [ 222.259710][T15165] ? ip_reply_glue_bits+0xc0/0xc0 [ 222.264756][T15165] ? udp4_lib_lookup_skb+0x440/0x440 [ 222.270053][T15165] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 222.275525][T15165] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 222.280989][T15165] ? lockdep_hardirqs_on+0x418/0x5d0 [ 222.281004][T15165] ? retint_kernel+0x2d/0x2d [ 222.281027][T15165] ? ___might_sleep+0x163/0x280 [ 222.281052][T15165] ? __might_sleep+0x95/0x190 [ 222.295740][T15165] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 222.295756][T15165] ? aa_sk_perm+0x288/0x880 [ 222.295786][T15165] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 222.306074][T15165] inet_sendmsg+0x147/0x5e0 [ 222.306090][T15165] ? udp4_lib_lookup_skb+0x440/0x440 [ 222.306101][T15165] ? inet_sendmsg+0x147/0x5e0 [ 222.306120][T15165] ? ipip_gro_receive+0x100/0x100 [ 222.316146][T15165] sock_sendmsg+0xdd/0x130 [ 222.316166][T15165] sock_write_iter+0x27c/0x3e0 [ 222.316191][T15165] ? sock_sendmsg+0x130/0x130 [ 222.349448][T15165] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 222.355696][T15165] ? iov_iter_init+0xee/0x220 16:39:40 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r1) 16:39:40 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r3) 16:39:40 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r3) [ 222.360386][T15165] new_sync_write+0x4c7/0x760 [ 222.365079][T15165] ? default_llseek+0x2e0/0x2e0 [ 222.369945][T15165] ? common_file_perm+0x238/0x720 [ 222.374966][T15165] ? __fget+0x381/0x550 [ 222.379111][T15165] ? apparmor_file_permission+0x25/0x30 [ 222.384639][T15165] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 222.390860][T15165] ? security_file_permission+0x94/0x380 [ 222.396583][T15165] __vfs_write+0xe4/0x110 [ 222.400894][T15165] vfs_write+0x20c/0x580 [ 222.405131][T15165] ksys_write+0xea/0x1f0 [ 222.409359][T15165] ? __ia32_sys_read+0xb0/0xb0 [ 222.414116][T15165] ? do_syscall_64+0x26/0x610 [ 222.418776][T15165] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 222.424818][T15165] ? do_syscall_64+0x26/0x610 [ 222.429478][T15165] __x64_sys_write+0x73/0xb0 [ 222.434049][T15165] do_syscall_64+0x103/0x610 [ 222.438623][T15165] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 222.444539][T15165] RIP: 0033:0x4582f9 [ 222.448413][T15165] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 222.468023][T15165] RSP: 002b:00007f6dcf2fbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 222.476440][T15165] RAX: ffffffffffffffda RBX: 00007f6dcf2fbc90 RCX: 00000000004582f9 [ 222.484393][T15165] RDX: 000000000000fdef RSI: 0000000020000280 RDI: 0000000000000005 [ 222.492344][T15165] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 222.500294][T15165] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6dcf2fc6d4 [ 222.508263][T15165] R13: 00000000004c7ad0 R14: 00000000004ddba8 R15: 0000000000000006 16:39:41 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r3) recvmsg(r0, &(0x7f0000001840)={&(0x7f0000001480)=@can={0x1d, 0x0}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001500)=""/10, 0xa}, {&(0x7f0000001580)=""/73, 0x49}, {&(0x7f0000001600)=""/184, 0xb8}, {&(0x7f00000016c0)=""/101, 0x65}, {&(0x7f0000001740)=""/81, 0x51}], 0x5}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], r5, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x33c) close(r0) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(0xffffffffffffffff) 16:39:41 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a044aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) 16:39:41 executing program 3: socketpair(0x0, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r3) 16:39:41 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0xf0ff7f00000000, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:41 executing program 2: socketpair(0x0, 0x7fc, 0x0, 0x0) 16:39:41 executing program 4 (fault-call:5 fault-nth:79): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) [ 222.842256][T15211] FAULT_INJECTION: forcing a failure. [ 222.842256][T15211] name failslab, interval 1, probability 0, space 0, times 0 [ 222.861973][T15211] CPU: 1 PID: 15211 Comm: syz-executor.4 Not tainted 5.1.0-rc2+ #82 [ 222.869960][T15211] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 222.880017][T15211] Call Trace: [ 222.883341][T15211] dump_stack+0x172/0x1f0 [ 222.887709][T15211] should_fail.cold+0xa/0x15 [ 222.892317][T15211] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 222.898139][T15211] ? ___might_sleep+0x163/0x280 [ 222.903001][T15211] __should_failslab+0x121/0x190 [ 222.907956][T15211] should_failslab+0x9/0x14 [ 222.912483][T15211] kmem_cache_alloc_node+0x264/0x710 [ 222.917783][T15211] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 222.924102][T15211] __alloc_skb+0xd5/0x5e0 [ 222.928449][T15211] ? skb_trim+0x190/0x190 [ 222.932812][T15211] ? skb_page_frag_refill+0x127/0x460 [ 222.938218][T15211] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 222.943944][T15211] ? skb_put+0x177/0x1d0 [ 222.948210][T15211] __ip_append_data.isra.0+0x24d6/0x2dd0 [ 222.953919][T15211] ? ip_reply_glue_bits+0xc0/0xc0 [ 222.958959][T15211] ? __ip_flush_pending_frames.isra.0+0x2d0/0x2d0 [ 222.965377][T15211] ? mark_held_locks+0xf0/0xf0 [ 222.970231][T15211] ? lock_sock_nested+0xac/0x120 [ 222.975173][T15211] ? ip_reply_glue_bits+0xc0/0xc0 [ 222.980201][T15211] ip_append_data.part.0+0xf2/0x170 [ 222.985806][T15211] ? ip_reply_glue_bits+0xc0/0xc0 [ 222.990833][T15211] ip_append_data+0x6e/0x90 [ 222.995348][T15211] udp_sendmsg+0x8e7/0x2820 [ 222.999863][T15211] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 223.006113][T15211] ? __lock_acquire+0x548/0x3fb0 [ 223.011073][T15211] ? ip_reply_glue_bits+0xc0/0xc0 [ 223.016107][T15211] ? udp4_lib_lookup_skb+0x440/0x440 [ 223.021401][T15211] ? is_bpf_text_address+0xac/0x170 [ 223.026616][T15211] ? find_held_lock+0x35/0x130 [ 223.031385][T15211] ? is_bpf_text_address+0xac/0x170 [ 223.036591][T15211] ? do_sigaltstack.constprop.0+0x290/0x690 [ 223.042498][T15211] ? ___might_sleep+0x163/0x280 [ 223.047356][T15211] ? __might_sleep+0x95/0x190 [ 223.052046][T15211] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 223.057682][T15211] ? aa_sk_perm+0x288/0x880 [ 223.062197][T15211] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 223.067748][T15211] inet_sendmsg+0x147/0x5e0 [ 223.072260][T15211] ? udp4_lib_lookup_skb+0x440/0x440 [ 223.077550][T15211] ? inet_sendmsg+0x147/0x5e0 [ 223.082229][T15211] ? ipip_gro_receive+0x100/0x100 [ 223.085740][T15234] netlink: 3286 bytes leftover after parsing attributes in process `syz-executor.2'. [ 223.087257][T15211] sock_sendmsg+0xdd/0x130 [ 223.087276][T15211] sock_write_iter+0x27c/0x3e0 [ 223.087295][T15211] ? sock_sendmsg+0x130/0x130 [ 223.087321][T15211] ? aa_path_link+0x460/0x460 [ 223.087334][T15211] ? find_held_lock+0x35/0x130 [ 223.087351][T15211] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 223.087366][T15211] ? iov_iter_init+0xee/0x220 [ 223.087386][T15211] new_sync_write+0x4c7/0x760 [ 223.087407][T15211] ? default_llseek+0x2e0/0x2e0 [ 223.126381][T15234] netlink: 3286 bytes leftover after parsing attributes in process `syz-executor.2'. [ 223.126959][T15211] ? common_file_perm+0x238/0x720 [ 223.126977][T15211] ? __fget+0x381/0x550 [ 223.126997][T15211] ? apparmor_file_permission+0x25/0x30 [ 223.127012][T15211] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 223.127030][T15211] ? security_file_permission+0x94/0x380 [ 223.127059][T15211] __vfs_write+0xe4/0x110 [ 223.127079][T15211] vfs_write+0x20c/0x580 16:39:41 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0xf0ffffff7f0000, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:41 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000005ec0)={&(0x7f0000005c00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000005dc0)=[{&(0x7f0000005c80)=""/11, 0xb}, {&(0x7f0000005cc0)=""/77, 0x4d}, {&(0x7f0000005d40)=""/84, 0x54}], 0x3, &(0x7f0000005e00)=""/179, 0xb3}, 0x10000) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000060c0)={&(0x7f0000005f00)=ANY=[@ANYBLOB="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"], &(0x7f0000006040)=""/78, 0x135, 0x4e, 0x1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000006180)={0xd4d8b8677c544a06, 0x5, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x63b9}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f00000001c0)='GPL\x00', 0x9, 0xc7, &(0x7f0000000200)=""/199, 0x41100, 0x1, [], r1, 0x0, r2, 0x8, &(0x7f0000006100)={0x100000001, 0x1e}, 0x8, 0x10, &(0x7f0000006140)={0x9, 0x0, 0x1, 0x400}, 0x10}, 0x70) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x3, &(0x7f0000001fd8)=@framed={{0x5, 0x0, 0x0, 0x0, 0xf, 0x72, 0xa, 0xff00}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x7, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) 16:39:41 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x100000000000000, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:41 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001600)="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", 0xcfa}], 0x1}, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x53, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x6, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xffffffffffffff62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x5004, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf}, 0x0, 0x0, r0, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000000)=@tipc, 0x80, &(0x7f0000000100)=[{&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f00000012c0)=""/178, 0xb2}, {&(0x7f0000001380)=""/212, 0xd4}, {&(0x7f0000001480)=""/190, 0xbe}, {&(0x7f0000002300)=""/152, 0x98}, {&(0x7f00000023c0)=""/225, 0xe1}, {&(0x7f00000024c0)=""/147, 0x93}, {&(0x7f0000000080)}], 0x8, &(0x7f0000001540)=""/94, 0x5e}, 0x40000003) recvmsg$kcm(r1, &(0x7f0000009ac0)={0x0, 0x0, 0x0}, 0x40) 16:39:41 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x400000000000000, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:41 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x700000000000000, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) [ 223.155531][T15238] netlink: 3286 bytes leftover after parsing attributes in process `syz-executor.2'. [ 223.155708][T15211] ksys_write+0xea/0x1f0 [ 223.155729][T15211] ? __ia32_sys_read+0xb0/0xb0 [ 223.155747][T15211] ? do_syscall_64+0x26/0x610 [ 223.155770][T15211] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 223.215067][T15211] ? do_syscall_64+0x26/0x610 [ 223.219756][T15211] __x64_sys_write+0x73/0xb0 [ 223.224358][T15211] do_syscall_64+0x103/0x610 [ 223.228958][T15211] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 223.234851][T15211] RIP: 0033:0x4582f9 [ 223.234867][T15211] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 223.234881][T15211] RSP: 002b:00007f6dcf2fbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 223.258355][T15211] RAX: ffffffffffffffda RBX: 00007f6dcf2fbc90 RCX: 00000000004582f9 [ 223.258364][T15211] RDX: 000000000000fdef RSI: 0000000020000280 RDI: 0000000000000005 [ 223.258372][T15211] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 223.258381][T15211] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6dcf2fc6d4 [ 223.258389][T15211] R13: 00000000004c7ad0 R14: 00000000004ddba8 R15: 0000000000000006 16:39:42 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r3) recvmsg(r0, &(0x7f0000001840)={&(0x7f0000001480)=@can={0x1d, 0x0}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001500)=""/10, 0xa}, {&(0x7f0000001580)=""/73, 0x49}, {&(0x7f0000001600)=""/184, 0xb8}, {&(0x7f00000016c0)=""/101, 0x65}, {&(0x7f0000001740)=""/81, 0x51}], 0x5}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], r5, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x33c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r6) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r7) 16:39:42 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x800000000000000, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:42 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x8, 0x4, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x2}, [@alu={0x8000000201a7f19, 0x0, 0x7}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={0xffffffffffffff9c}) sendmsg(r0, &(0x7f0000001600)={&(0x7f00000000c0)=@in6={0xa, 0x4e21, 0xdaa, @mcast2, 0x4}, 0x80, &(0x7f0000001580)=[{&(0x7f00000001c0)="32971993f15fb0622cbf2e4d6c773e64139ed18892eb0840a7fb8476fbc2b7133ca8d4954a163ebfe6b13dbe17070d47461c26ffb38987000111922bc8fdbcef2dfd6cbfc379bcea76b4260eb6164b960ca4af376a53e069692ab07b92b341280fc431fe15ec4e48a79102e3a9a2dd0e5bae3830c059cdd0f4001fa1dcfbe766189c4316ffb7082f9b4c9ceba0b80747777512f1b102d093433ddf316bef6091ba0849b58253f1cec5b8b37cb9138235b3b81fe7fe39e7f733721feea74a8148847be817d3f9a01513b68eed9800a023d3bcea9655a7843cb05068290a807d1b6faff5c71af9ef30dda96f870ee2e81a", 0xf0}, {&(0x7f00000002c0)="468ed18db5919836a3ee9c3fb3ffd91b7e136ff12ef4b9d93faac66f12c8629849a07d73c511c55523f44df4180251b5eed0f06c7f82d9f2a5e4fa858ec7775a4e3619f429793bf2d59d21ad", 0x4c}, {&(0x7f0000000340)="9598b91a86e5990299f0aab841be1e8177d0a2077a709dfe80a8ed49b9f3fd0aff3fdda3f501f5b65c8a96442cf6", 0x2e}, {&(0x7f0000000380)="6530870e7837d5cedf5881534d7656dc4d8a7bebebe007bd93777190af4d66b1edc411a3e4c40fddc174780aab9061bb2e68dea21256fa38616abc58dd1d2dfa854c6e3ceac39b757e5afe18976e005309706788395ce7e24f893b8841ac21849d2f14584a03f306f5a7b41bc1a22d0739e018dabb208f79663d9c3d5ed3d028ac6f8c9b36c3bf9c1d", 0x89}, {&(0x7f0000000440)="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", 0x1000}, {&(0x7f0000001440)="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", 0xff}, {&(0x7f0000001540)="b965434c27782786f824120bcac6eca1a89b640ec50b864099dae16f85443a366886ef665062e00ad8d51d485186ebeec6d28136790554c9", 0x38}], 0x7}, 0x8000) 16:39:42 executing program 3: socketpair(0x0, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r3) 16:39:42 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a054aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) 16:39:42 executing program 4 (fault-call:5 fault-nth:80): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) [ 223.703481][T15257] FAULT_INJECTION: forcing a failure. [ 223.703481][T15257] name failslab, interval 1, probability 0, space 0, times 0 [ 223.736061][T15257] CPU: 0 PID: 15257 Comm: syz-executor.4 Not tainted 5.1.0-rc2+ #82 [ 223.744053][T15257] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 223.754105][T15257] Call Trace: [ 223.757402][T15257] dump_stack+0x172/0x1f0 [ 223.761759][T15257] should_fail.cold+0xa/0x15 [ 223.766362][T15257] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 223.772181][T15257] ? ___might_sleep+0x163/0x280 [ 223.777039][T15257] __should_failslab+0x121/0x190 [ 223.781979][T15257] should_failslab+0x9/0x14 [ 223.781997][T15257] kmem_cache_alloc_node_trace+0x270/0x720 [ 223.782023][T15257] __kmalloc_node_track_caller+0x3d/0x70 [ 223.782042][T15257] __kmalloc_reserve.isra.0+0x40/0xf0 [ 223.782060][T15257] __alloc_skb+0x10b/0x5e0 [ 223.782080][T15257] ? skb_trim+0x190/0x190 [ 223.803339][T15257] ? skb_page_frag_refill+0x127/0x460 [ 223.803355][T15257] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 223.803375][T15257] ? skb_put+0x177/0x1d0 [ 223.812097][T15257] __ip_append_data.isra.0+0x24d6/0x2dd0 [ 223.812122][T15257] ? ip_reply_glue_bits+0xc0/0xc0 [ 223.812153][T15257] ? __ip_flush_pending_frames.isra.0+0x2d0/0x2d0 [ 223.844491][T15257] ? mark_held_locks+0xf0/0xf0 [ 223.849267][T15257] ? lock_sock_nested+0xac/0x120 [ 223.854217][T15257] ? ip_reply_glue_bits+0xc0/0xc0 [ 223.854232][T15257] ip_append_data.part.0+0xf2/0x170 [ 223.854252][T15257] ? ip_reply_glue_bits+0xc0/0xc0 [ 223.864479][T15257] ip_append_data+0x6e/0x90 [ 223.864503][T15257] udp_sendmsg+0x8e7/0x2820 [ 223.864541][T15257] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 223.884753][T15257] ? __lock_acquire+0x548/0x3fb0 [ 223.884769][T15257] ? ip_reply_glue_bits+0xc0/0xc0 [ 223.884789][T15257] ? udp4_lib_lookup_skb+0x440/0x440 [ 223.884811][T15257] ? is_bpf_text_address+0xac/0x170 [ 223.894762][T15257] ? find_held_lock+0x35/0x130 [ 223.894780][T15257] ? is_bpf_text_address+0xac/0x170 [ 223.894812][T15257] ? ___might_sleep+0x163/0x280 [ 223.920057][T15257] ? __might_sleep+0x95/0x190 [ 223.924746][T15257] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 223.930384][T15257] ? aa_sk_perm+0x288/0x880 [ 223.934900][T15257] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 223.940495][T15257] inet_sendmsg+0x147/0x5e0 [ 223.945007][T15257] ? udp4_lib_lookup_skb+0x440/0x440 [ 223.950289][T15257] ? inet_sendmsg+0x147/0x5e0 [ 223.954965][T15257] ? ipip_gro_receive+0x100/0x100 [ 223.960004][T15257] sock_sendmsg+0xdd/0x130 [ 223.965041][T15257] sock_write_iter+0x27c/0x3e0 [ 223.969814][T15257] ? sock_sendmsg+0x130/0x130 [ 223.974508][T15257] ? aa_path_link+0x460/0x460 [ 223.979198][T15257] ? find_held_lock+0x35/0x130 [ 223.983985][T15257] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 223.990276][T15257] ? iov_iter_init+0xee/0x220 [ 223.994988][T15257] new_sync_write+0x4c7/0x760 [ 223.999669][T15257] ? default_llseek+0x2e0/0x2e0 [ 224.004528][T15257] ? common_file_perm+0x238/0x720 [ 224.009577][T15257] ? __fget+0x381/0x550 [ 224.013737][T15257] ? apparmor_file_permission+0x25/0x30 [ 224.019279][T15257] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 224.025519][T15257] ? security_file_permission+0x94/0x380 [ 224.031160][T15257] __vfs_write+0xe4/0x110 [ 224.035496][T15257] vfs_write+0x20c/0x580 [ 224.039751][T15257] ksys_write+0xea/0x1f0 [ 224.043996][T15257] ? __ia32_sys_read+0xb0/0xb0 [ 224.048764][T15257] ? do_syscall_64+0x26/0x610 [ 224.053446][T15257] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 224.059512][T15257] ? do_syscall_64+0x26/0x610 [ 224.064199][T15257] __x64_sys_write+0x73/0xb0 [ 224.068793][T15257] do_syscall_64+0x103/0x610 [ 224.073386][T15257] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 224.079275][T15257] RIP: 0033:0x4582f9 [ 224.083168][T15257] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 16:39:42 executing program 3: socketpair(0x0, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r3) 16:39:42 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x900000000000000, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:42 executing program 2: r0 = socket$kcm(0x10, 0x4000000003, 0x10) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000080)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'veth0_to_bond\x00', 0x4020}) openat$cgroup_subtree(r2, &(0x7f0000000100)='cgroup.subtree_control\x00', 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="2e000000320081e45ae087185082cf0302b0eb02022c00000000004bb843ab05e044b90abc86d3256fe027005106", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(r2, &(0x7f0000000200)='cpuset.effective_cpus\x00', 0x0, 0x0) 16:39:42 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a064aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) [ 224.102769][T15257] RSP: 002b:00007f6dcf2fbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 224.111174][T15257] RAX: ffffffffffffffda RBX: 00007f6dcf2fbc90 RCX: 00000000004582f9 [ 224.119140][T15257] RDX: 000000000000fdef RSI: 0000000020000280 RDI: 0000000000000005 [ 224.127106][T15257] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 224.135074][T15257] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6dcf2fc6d4 [ 224.143042][T15257] R13: 00000000004c7ad0 R14: 00000000004ddba8 R15: 0000000000000006 [ 224.156194][T15277] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.2'. 16:39:42 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a074aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) 16:39:42 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x2000000000000000, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) [ 224.290026][T15277] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.2'. 16:39:43 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r2) recvmsg(r0, &(0x7f0000001840)={&(0x7f0000001480)=@can={0x1d, 0x0}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001500)=""/10, 0xa}, {&(0x7f0000001580)=""/73, 0x49}, {&(0x7f0000001600)=""/184, 0xb8}, {&(0x7f00000016c0)=""/101, 0x65}, {&(0x7f0000001740)=""/81, 0x51}], 0x5}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], r4, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r1) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r5) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r6) 16:39:43 executing program 3: socketpair(0x1e, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r3) 16:39:43 executing program 4 (fault-call:5 fault-nth:81): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) 16:39:43 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x3000000000000000, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:43 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a084aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) 16:39:43 executing program 2: r0 = socket$kcm(0x10, 0x4000000003, 0x10) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000080)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'veth0_to_bond\x00', 0x4020}) openat$cgroup_subtree(r2, &(0x7f0000000100)='cgroup.subtree_control\x00', 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="2e000000320081e45ae087185082cf0302b0eb02022c00000000004bb843ab05e044b90abc86d3256fe027005106", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(r2, &(0x7f0000000200)='cpuset.effective_cpus\x00', 0x0, 0x0) 16:39:43 executing program 3: socketpair(0x1e, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r3) [ 224.565111][T15309] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.2'. 16:39:43 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a094aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) [ 224.634286][T15300] FAULT_INJECTION: forcing a failure. [ 224.634286][T15300] name failslab, interval 1, probability 0, space 0, times 0 [ 224.678269][T15300] CPU: 0 PID: 15300 Comm: syz-executor.4 Not tainted 5.1.0-rc2+ #82 [ 224.686268][T15300] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 224.696318][T15300] Call Trace: [ 224.696345][T15300] dump_stack+0x172/0x1f0 [ 224.696371][T15300] should_fail.cold+0xa/0x15 [ 224.696394][T15300] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 224.696418][T15300] ? ___might_sleep+0x163/0x280 [ 224.696453][T15300] __should_failslab+0x121/0x190 [ 224.724188][T15300] should_failslab+0x9/0x14 16:39:43 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x3f00000000000000, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:43 executing program 3: socketpair(0x1e, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r3) [ 224.728701][T15300] kmem_cache_alloc_node+0x264/0x710 [ 224.733993][T15300] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 224.740252][T15300] __alloc_skb+0xd5/0x5e0 [ 224.744607][T15300] ? skb_trim+0x190/0x190 [ 224.748943][T15300] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 224.754668][T15300] ? skb_put+0x177/0x1d0 [ 224.758920][T15300] __ip_append_data.isra.0+0x24d6/0x2dd0 [ 224.758944][T15300] ? ip_reply_glue_bits+0xc0/0xc0 [ 224.758972][T15300] ? __ip_flush_pending_frames.isra.0+0x2d0/0x2d0 [ 224.758992][T15300] ? mark_held_locks+0xf0/0xf0 [ 224.780773][T15300] ? lock_sock_nested+0xac/0x120 [ 224.785717][T15300] ? ip_reply_glue_bits+0xc0/0xc0 [ 224.785733][T15300] ip_append_data.part.0+0xf2/0x170 [ 224.785753][T15300] ? ip_reply_glue_bits+0xc0/0xc0 [ 224.785771][T15300] ip_append_data+0x6e/0x90 [ 224.805476][T15300] udp_sendmsg+0x8e7/0x2820 [ 224.809992][T15300] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 224.816234][T15300] ? __lock_acquire+0x548/0x3fb0 [ 224.821181][T15300] ? ip_reply_glue_bits+0xc0/0xc0 16:39:43 executing program 3: socketpair(0x1e, 0x1, 0x0, 0x0) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r1) 16:39:43 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x8dffffff00000000, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) [ 224.826214][T15300] ? udp4_lib_lookup_skb+0x440/0x440 [ 224.831509][T15300] ? is_bpf_text_address+0xac/0x170 [ 224.836717][T15300] ? find_held_lock+0x35/0x130 [ 224.841490][T15300] ? is_bpf_text_address+0xac/0x170 [ 224.846701][T15300] ? ___might_sleep+0x163/0x280 [ 224.851567][T15300] ? __might_sleep+0x95/0x190 [ 224.856257][T15300] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 224.861897][T15300] ? aa_sk_perm+0x288/0x880 [ 224.866417][T15300] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 224.871984][T15300] inet_sendmsg+0x147/0x5e0 [ 224.876493][T15300] ? udp4_lib_lookup_skb+0x440/0x440 [ 224.881798][T15300] ? inet_sendmsg+0x147/0x5e0 [ 224.886479][T15300] ? ipip_gro_receive+0x100/0x100 [ 224.891511][T15300] sock_sendmsg+0xdd/0x130 [ 224.895943][T15300] sock_write_iter+0x27c/0x3e0 [ 224.900715][T15300] ? sock_sendmsg+0x130/0x130 [ 224.905414][T15300] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 224.911663][T15300] ? iov_iter_init+0xee/0x220 [ 224.916351][T15300] new_sync_write+0x4c7/0x760 [ 224.921038][T15300] ? default_llseek+0x2e0/0x2e0 [ 224.921063][T15300] ? common_file_perm+0x238/0x720 [ 224.921079][T15300] ? __fget+0x381/0x550 [ 224.921098][T15300] ? apparmor_file_permission+0x25/0x30 [ 224.921113][T15300] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 224.921134][T15300] ? security_file_permission+0x94/0x380 [ 224.921153][T15300] __vfs_write+0xe4/0x110 [ 224.931007][T15300] vfs_write+0x20c/0x580 [ 224.931029][T15300] ksys_write+0xea/0x1f0 [ 224.931047][T15300] ? __ia32_sys_read+0xb0/0xb0 [ 224.931064][T15300] ? do_syscall_64+0x26/0x610 [ 224.931079][T15300] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 224.931092][T15300] ? do_syscall_64+0x26/0x610 [ 224.931111][T15300] __x64_sys_write+0x73/0xb0 [ 224.931127][T15300] do_syscall_64+0x103/0x610 [ 224.931144][T15300] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 224.931155][T15300] RIP: 0033:0x4582f9 [ 224.931169][T15300] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 224.931176][T15300] RSP: 002b:00007f6dcf2fbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 224.931190][T15300] RAX: ffffffffffffffda RBX: 00007f6dcf2fbc90 RCX: 00000000004582f9 [ 224.931197][T15300] RDX: 000000000000fdef RSI: 0000000020000280 RDI: 0000000000000005 [ 224.931205][T15300] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 224.931212][T15300] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6dcf2fc6d4 [ 224.931221][T15300] R13: 00000000004c7ad0 R14: 00000000004ddba8 R15: 0000000000000006 16:39:43 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f0000001840)={&(0x7f0000001480)=@can={0x1d, 0x0}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001500)=""/10, 0xa}, {&(0x7f0000001580)=""/73, 0x49}, {&(0x7f0000001600)=""/184, 0xb8}, {&(0x7f00000016c0)=""/101, 0x65}, {&(0x7f0000001740)=""/81, 0x51}], 0x5}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], r3, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r4) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r5) 16:39:43 executing program 3: socketpair(0x1e, 0x1, 0x0, 0x0) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r1) 16:39:43 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a0a4aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) 16:39:43 executing program 2: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r3) recvmsg(r0, &(0x7f0000001840)={&(0x7f0000001480)=@can={0x1d, 0x0}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001500)=""/10, 0xa}, {&(0x7f0000001580)=""/73, 0x49}, {&(0x7f0000001600)=""/184, 0xb8}, {&(0x7f00000016c0)=""/101, 0x65}, {&(0x7f0000001740)=""/81, 0x51}], 0x5}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], r5, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x33c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r6) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r7) 16:39:43 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0xe803000000000000, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:43 executing program 4 (fault-call:5 fault-nth:82): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) 16:39:44 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a0b4aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) 16:39:44 executing program 3: socketpair(0x1e, 0x1, 0x0, 0x0) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r1) 16:39:44 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0xeffdffff00000000, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) [ 225.488968][T15345] FAULT_INJECTION: forcing a failure. [ 225.488968][T15345] name failslab, interval 1, probability 0, space 0, times 0 16:39:44 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed06a163e15ffb5033e9880bd7a8a295", 0x30}], 0x1}, 0x900) [ 225.552672][T15345] CPU: 0 PID: 15345 Comm: syz-executor.4 Not tainted 5.1.0-rc2+ #82 [ 225.560719][T15345] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 225.570788][T15345] Call Trace: [ 225.574094][T15345] dump_stack+0x172/0x1f0 [ 225.578455][T15345] should_fail.cold+0xa/0x15 [ 225.583080][T15345] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 225.588955][T15345] ? ___might_sleep+0x163/0x280 [ 225.593831][T15345] __should_failslab+0x121/0x190 [ 225.598778][T15345] should_failslab+0x9/0x14 [ 225.603288][T15345] kmem_cache_alloc_node_trace+0x270/0x720 [ 225.609118][T15345] __kmalloc_node_track_caller+0x3d/0x70 [ 225.614768][T15345] __kmalloc_reserve.isra.0+0x40/0xf0 [ 225.620167][T15345] __alloc_skb+0x10b/0x5e0 [ 225.624598][T15345] ? skb_trim+0x190/0x190 [ 225.628938][T15345] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 225.634671][T15345] ? skb_put+0x177/0x1d0 [ 225.638922][T15345] __ip_append_data.isra.0+0x24d6/0x2dd0 [ 225.644575][T15345] ? ip_reply_glue_bits+0xc0/0xc0 16:39:44 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x27}], 0x1}, 0x900) 16:39:44 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0xf401000000000000, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) [ 225.649620][T15345] ? __ip_flush_pending_frames.isra.0+0x2d0/0x2d0 [ 225.656043][T15345] ? mark_held_locks+0xf0/0xf0 [ 225.660822][T15345] ? lock_sock_nested+0xac/0x120 [ 225.665779][T15345] ? ip_reply_glue_bits+0xc0/0xc0 [ 225.670817][T15345] ip_append_data.part.0+0xf2/0x170 [ 225.676032][T15345] ? ip_reply_glue_bits+0xc0/0xc0 [ 225.681066][T15345] ip_append_data+0x6e/0x90 [ 225.681089][T15345] udp_sendmsg+0x8e7/0x2820 [ 225.681107][T15345] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 225.681124][T15345] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 225.681137][T15345] ? __lock_acquire+0x548/0x3fb0 [ 225.681149][T15345] ? ip_reply_glue_bits+0xc0/0xc0 [ 225.681166][T15345] ? udp4_lib_lookup_skb+0x440/0x440 [ 225.681186][T15345] ? is_bpf_text_address+0xac/0x170 [ 225.681200][T15345] ? find_held_lock+0x35/0x130 [ 225.681220][T15345] ? is_bpf_text_address+0xac/0x170 [ 225.706801][T15345] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 225.706818][T15345] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 225.706838][T15345] ? lockdep_hardirqs_on+0x418/0x5d0 [ 225.748400][T15345] ? retint_kernel+0x2d/0x2d [ 225.753034][T15345] ? trace_hardirqs_on_caller+0x6a/0x220 [ 225.758716][T15345] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 225.764194][T15345] ? retint_kernel+0x2d/0x2d [ 225.768816][T15345] inet_sendmsg+0x147/0x5e0 [ 225.773337][T15345] ? udp4_lib_lookup_skb+0x440/0x440 [ 225.778634][T15345] ? inet_sendmsg+0x147/0x5e0 [ 225.783318][T15345] ? ipip_gro_receive+0x100/0x100 [ 225.788357][T15345] sock_sendmsg+0xdd/0x130 [ 225.792785][T15345] sock_write_iter+0x27c/0x3e0 [ 225.797568][T15345] ? sock_sendmsg+0x130/0x130 [ 225.802265][T15345] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 225.808514][T15345] ? iov_iter_init+0xee/0x220 [ 225.808541][T15345] new_sync_write+0x4c7/0x760 [ 225.808561][T15345] ? default_llseek+0x2e0/0x2e0 [ 225.822737][T15345] ? common_file_perm+0x238/0x720 [ 225.822755][T15345] ? __fget+0x381/0x550 [ 225.822775][T15345] ? apparmor_file_permission+0x25/0x30 [ 225.822799][T15345] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 225.843722][T15345] ? security_file_permission+0x94/0x380 [ 225.849376][T15345] __vfs_write+0xe4/0x110 [ 225.853719][T15345] vfs_write+0x20c/0x580 [ 225.857978][T15345] ksys_write+0xea/0x1f0 [ 225.862240][T15345] ? __ia32_sys_read+0xb0/0xb0 [ 225.867012][T15345] ? do_syscall_64+0x26/0x610 [ 225.871693][T15345] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 225.871707][T15345] ? do_syscall_64+0x26/0x610 [ 225.871729][T15345] __x64_sys_write+0x73/0xb0 [ 225.871745][T15345] do_syscall_64+0x103/0x610 [ 225.871762][T15345] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 225.871773][T15345] RIP: 0033:0x4582f9 [ 225.871787][T15345] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 225.871795][T15345] RSP: 002b:00007f6dcf2fbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 225.929469][T15345] RAX: ffffffffffffffda RBX: 00007f6dcf2fbc90 RCX: 00000000004582f9 [ 225.937457][T15345] RDX: 000000000000fdef RSI: 0000000020000280 RDI: 0000000000000005 [ 225.945416][T15345] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 225.953380][T15345] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6dcf2fc6d4 [ 225.961350][T15345] R13: 00000000004c7ad0 R14: 00000000004ddba8 R15: 0000000000000006 16:39:44 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f0000001840)={&(0x7f0000001480)=@can={0x1d, 0x0}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001500)=""/10, 0xa}, {&(0x7f0000001580)=""/73, 0x49}, {&(0x7f0000001600)=""/184, 0xb8}, {&(0x7f00000016c0)=""/101, 0x65}, {&(0x7f0000001740)=""/81, 0x51}], 0x5}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], r2, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r4) 16:39:44 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x5dc}], 0x1}, 0x900) 16:39:44 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0xf7ffff7f00000000, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:44 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r0, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r2) 16:39:44 executing program 4 (fault-call:5 fault-nth:83): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) 16:39:44 executing program 2: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r3) recvmsg(r0, &(0x7f0000001840)={&(0x7f0000001480)=@can={0x1d, 0x0}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001500)=""/10, 0xa}, {&(0x7f0000001580)=""/73, 0x49}, {&(0x7f0000001600)=""/184, 0xb8}, {&(0x7f00000016c0)=""/101, 0x65}, {&(0x7f0000001740)=""/81, 0x51}], 0x5}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], r5, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x33c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r6) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r7) 16:39:44 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x200037f0}], 0x1}, 0x900) 16:39:45 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r0, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r2) 16:39:45 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0xffffff7f00000000, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) [ 226.390551][T15397] FAULT_INJECTION: forcing a failure. [ 226.390551][T15397] name failslab, interval 1, probability 0, space 0, times 0 [ 226.445394][T15397] CPU: 0 PID: 15397 Comm: syz-executor.4 Not tainted 5.1.0-rc2+ #82 [ 226.453448][T15397] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 226.463516][T15397] Call Trace: [ 226.466831][T15397] dump_stack+0x172/0x1f0 [ 226.471203][T15397] should_fail.cold+0xa/0x15 [ 226.475821][T15397] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 226.481660][T15397] __should_failslab+0x121/0x190 [ 226.486604][T15397] should_failslab+0x9/0x14 [ 226.491113][T15397] kmem_cache_alloc_node+0x264/0x710 [ 226.496414][T15397] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 226.502688][T15397] __alloc_skb+0xd5/0x5e0 [ 226.507024][T15397] ? skb_trim+0x190/0x190 [ 226.511388][T15397] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 226.517116][T15397] ? skb_put+0x177/0x1d0 [ 226.521370][T15397] __ip_append_data.isra.0+0x24d6/0x2dd0 [ 226.527031][T15397] ? ip_reply_glue_bits+0xc0/0xc0 [ 226.527059][T15397] ? __ip_flush_pending_frames.isra.0+0x2d0/0x2d0 [ 226.527076][T15397] ? mark_held_locks+0xf0/0xf0 [ 226.527097][T15397] ? lock_sock_nested+0xac/0x120 [ 226.538513][T15397] ? ip_reply_glue_bits+0xc0/0xc0 [ 226.538530][T15397] ip_append_data.part.0+0xf2/0x170 [ 226.538558][T15397] ? ip_reply_glue_bits+0xc0/0xc0 [ 226.538577][T15397] ip_append_data+0x6e/0x90 [ 226.558489][T15397] udp_sendmsg+0x8e7/0x2820 [ 226.572581][T15397] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 226.572598][T15397] ? __lock_acquire+0x548/0x3fb0 [ 226.572614][T15397] ? ip_reply_glue_bits+0xc0/0xc0 [ 226.572635][T15397] ? udp4_lib_lookup_skb+0x440/0x440 16:39:45 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0xffffffff00000000, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:45 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r0, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r2) [ 226.594088][T15397] ? mark_held_locks+0xa4/0xf0 [ 226.598870][T15397] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 226.604341][T15397] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 226.609818][T15397] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 226.615280][T15397] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 226.620735][T15397] ? lockdep_hardirqs_on+0x418/0x5d0 [ 226.626034][T15397] ? trace_hardirqs_on_caller+0x6a/0x220 [ 226.631681][T15397] ? ___might_sleep+0x163/0x280 [ 226.636546][T15397] ? __might_sleep+0x95/0x190 16:39:45 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x7ffff000}], 0x1}, 0x900) [ 226.641233][T15397] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 226.646870][T15397] ? aa_sk_perm+0x288/0x880 [ 226.651391][T15397] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 226.656959][T15397] inet_sendmsg+0x147/0x5e0 [ 226.661470][T15397] ? udp4_lib_lookup_skb+0x440/0x440 [ 226.661482][T15397] ? inet_sendmsg+0x147/0x5e0 [ 226.661495][T15397] ? ipip_gro_receive+0x100/0x100 [ 226.661511][T15397] sock_sendmsg+0xdd/0x130 [ 226.661529][T15397] sock_write_iter+0x27c/0x3e0 [ 226.661552][T15397] ? sock_sendmsg+0x130/0x130 [ 226.661581][T15397] ? aa_path_link+0x460/0x460 [ 226.695016][T15397] ? find_held_lock+0x35/0x130 [ 226.699816][T15397] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 226.706070][T15397] ? iov_iter_init+0xee/0x220 [ 226.710768][T15397] new_sync_write+0x4c7/0x760 [ 226.715469][T15397] ? default_llseek+0x2e0/0x2e0 [ 226.720341][T15397] ? retint_kernel+0x2d/0x2d [ 226.724958][T15397] __vfs_write+0xe4/0x110 [ 226.729296][T15397] vfs_write+0x20c/0x580 [ 226.733556][T15397] ksys_write+0xea/0x1f0 [ 226.737807][T15397] ? __ia32_sys_read+0xb0/0xb0 [ 226.742586][T15397] __x64_sys_write+0x73/0xb0 [ 226.747185][T15397] ? do_syscall_64+0xed/0x610 [ 226.751870][T15397] do_syscall_64+0x103/0x610 [ 226.756485][T15397] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 226.762384][T15397] RIP: 0033:0x4582f9 [ 226.766284][T15397] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 226.766293][T15397] RSP: 002b:00007f6dcf2fbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 226.766308][T15397] RAX: ffffffffffffffda RBX: 00007f6dcf2fbc90 RCX: 00000000004582f9 [ 226.766317][T15397] RDX: 000000000000fdef RSI: 0000000020000280 RDI: 0000000000000005 [ 226.766325][T15397] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 226.766334][T15397] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6dcf2fc6d4 [ 226.766349][T15397] R13: 00000000004c7ad0 R14: 00000000004ddba8 R15: 0000000000000006 16:39:45 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f0000001840)={&(0x7f0000001480)=@can={0x1d, 0x0}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001500)=""/10, 0xa}, {&(0x7f0000001580)=""/73, 0x49}, {&(0x7f0000001600)=""/184, 0xb8}, {&(0x7f00000016c0)=""/101, 0x65}, {&(0x7f0000001740)=""/81, 0x51}], 0x5}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], r2, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r4) 16:39:45 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0xfffffdef}], 0x1}, 0x900) 16:39:45 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x0, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:45 executing program 4 (fault-call:5 fault-nth:84): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) 16:39:45 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r3) 16:39:45 executing program 2: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r3) recvmsg(r0, &(0x7f0000001840)={&(0x7f0000001480)=@can={0x1d, 0x0}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001500)=""/10, 0xa}, {&(0x7f0000001580)=""/73, 0x49}, {&(0x7f0000001600)=""/184, 0xb8}, {&(0x7f00000016c0)=""/101, 0x65}, {&(0x7f0000001740)=""/81, 0x51}], 0x5}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], r5, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x33c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r6) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r7) 16:39:45 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r3) 16:39:45 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x2}, 0x900) 16:39:45 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x0, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) [ 227.233021][T15436] FAULT_INJECTION: forcing a failure. [ 227.233021][T15436] name failslab, interval 1, probability 0, space 0, times 0 [ 227.315260][T15436] CPU: 1 PID: 15436 Comm: syz-executor.4 Not tainted 5.1.0-rc2+ #82 [ 227.323290][T15436] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 227.333354][T15436] Call Trace: [ 227.336668][T15436] dump_stack+0x172/0x1f0 [ 227.341017][T15436] should_fail.cold+0xa/0x15 [ 227.345626][T15436] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 227.351455][T15436] ? ___might_sleep+0x163/0x280 [ 227.356315][T15436] __should_failslab+0x121/0x190 16:39:45 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r3) [ 227.361259][T15436] should_failslab+0x9/0x14 [ 227.361277][T15436] kmem_cache_alloc_node_trace+0x270/0x720 [ 227.361301][T15436] __kmalloc_node_track_caller+0x3d/0x70 [ 227.361320][T15436] __kmalloc_reserve.isra.0+0x40/0xf0 [ 227.361337][T15436] __alloc_skb+0x10b/0x5e0 [ 227.361354][T15436] ? skb_trim+0x190/0x190 [ 227.361375][T15436] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 227.397102][T15436] ? skb_put+0x177/0x1d0 [ 227.401371][T15436] __ip_append_data.isra.0+0x24d6/0x2dd0 [ 227.407027][T15436] ? ip_reply_glue_bits+0xc0/0xc0 16:39:46 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x3}, 0x900) [ 227.412089][T15436] ? __ip_flush_pending_frames.isra.0+0x2d0/0x2d0 [ 227.418516][T15436] ? retint_kernel+0x2d/0x2d [ 227.423120][T15436] ? ip_reply_glue_bits+0xc0/0xc0 [ 227.428157][T15436] ip_append_data.part.0+0xf2/0x170 [ 227.433372][T15436] ? ip_reply_glue_bits+0xc0/0xc0 [ 227.438402][T15436] ip_append_data+0x6e/0x90 [ 227.442931][T15436] udp_sendmsg+0x8e7/0x2820 [ 227.447467][T15436] ? visit_groups_merge+0x4c0/0x5d0 [ 227.452674][T15436] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 227.452691][T15436] ? ip_reply_glue_bits+0xc0/0xc0 16:39:46 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r3) [ 227.452711][T15436] ? udp4_lib_lookup_skb+0x440/0x440 [ 227.452725][T15436] ? __perf_event_task_sched_in+0x640/0x820 [ 227.452739][T15436] ? find_held_lock+0x35/0x130 [ 227.452757][T15436] ? __lock_acquire+0x548/0x3fb0 [ 227.452774][T15436] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 227.452790][T15436] ? lockdep_hardirqs_on+0x418/0x5d0 [ 227.452811][T15436] ? ___might_sleep+0x163/0x280 [ 227.500505][T15436] ? __might_sleep+0x95/0x190 [ 227.505198][T15436] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 227.510838][T15436] ? aa_sk_perm+0x288/0x880 [ 227.515361][T15436] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 227.520919][T15436] inet_sendmsg+0x147/0x5e0 [ 227.525447][T15436] ? udp4_lib_lookup_skb+0x440/0x440 [ 227.530739][T15436] ? inet_sendmsg+0x147/0x5e0 [ 227.535419][T15436] ? ipip_gro_receive+0x100/0x100 [ 227.540470][T15436] sock_sendmsg+0xdd/0x130 [ 227.544896][T15436] sock_write_iter+0x27c/0x3e0 [ 227.549672][T15436] ? sock_sendmsg+0x130/0x130 [ 227.554362][T15436] ? sock_sendmsg+0x130/0x130 [ 227.559055][T15436] new_sync_write+0x4c7/0x760 [ 227.563743][T15436] ? default_llseek+0x2e0/0x2e0 [ 227.568612][T15436] ? common_file_perm+0x238/0x720 [ 227.573683][T15436] ? apparmor_file_permission+0x25/0x30 [ 227.579266][T15436] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 227.585516][T15436] ? security_file_permission+0x94/0x380 [ 227.591166][T15436] __vfs_write+0xe4/0x110 [ 227.595505][T15436] vfs_write+0x20c/0x580 [ 227.599773][T15436] ksys_write+0xea/0x1f0 [ 227.604020][T15436] ? __ia32_sys_read+0xb0/0xb0 [ 227.608795][T15436] ? do_syscall_64+0x26/0x610 [ 227.613480][T15436] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 227.619552][T15436] ? do_syscall_64+0x26/0x610 [ 227.624281][T15436] __x64_sys_write+0x73/0xb0 [ 227.628880][T15436] do_syscall_64+0x103/0x610 [ 227.633481][T15436] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 227.639372][T15436] RIP: 0033:0x4582f9 [ 227.643261][T15436] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 227.663006][T15436] RSP: 002b:00007f6dcf2fbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 227.671439][T15436] RAX: ffffffffffffffda RBX: 00007f6dcf2fbc90 RCX: 00000000004582f9 [ 227.671449][T15436] RDX: 000000000000fdef RSI: 0000000020000280 RDI: 0000000000000005 [ 227.671458][T15436] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 227.671467][T15436] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6dcf2fc6d4 [ 227.671475][T15436] R13: 00000000004c7ad0 R14: 00000000004ddba8 R15: 0000000000000006 16:39:46 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f0000001840)={&(0x7f0000001480)=@can={0x1d, 0x0}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001500)=""/10, 0xa}, {&(0x7f0000001580)=""/73, 0x49}, {&(0x7f0000001600)=""/184, 0xb8}, {&(0x7f00000016c0)=""/101, 0x65}, {&(0x7f0000001740)=""/81, 0x51}], 0x5}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], r2, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r4) 16:39:46 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x4}, 0x900) 16:39:46 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r3) 16:39:46 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x0, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:46 executing program 4 (fault-call:5 fault-nth:85): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) 16:39:46 executing program 2: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r3) recvmsg(r0, &(0x7f0000001840)={&(0x7f0000001480)=@can={0x1d, 0x0}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001500)=""/10, 0xa}, {&(0x7f0000001580)=""/73, 0x49}, {&(0x7f0000001600)=""/184, 0xb8}, {&(0x7f00000016c0)=""/101, 0x65}, {&(0x7f0000001740)=""/81, 0x51}], 0x5}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], r5, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x33c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r6) close(r7) [ 228.070591][T15480] FAULT_INJECTION: forcing a failure. [ 228.070591][T15480] name failslab, interval 1, probability 0, space 0, times 0 [ 228.100960][T15480] CPU: 1 PID: 15480 Comm: syz-executor.4 Not tainted 5.1.0-rc2+ #82 [ 228.108988][T15480] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 16:39:46 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x0, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:46 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r3) 16:39:46 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x5}, 0x900) [ 228.119221][T15480] Call Trace: [ 228.122540][T15480] dump_stack+0x172/0x1f0 [ 228.126908][T15480] should_fail.cold+0xa/0x15 [ 228.131526][T15480] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 228.137355][T15480] ? ___might_sleep+0x163/0x280 [ 228.142223][T15480] __should_failslab+0x121/0x190 [ 228.147168][T15480] should_failslab+0x9/0x14 [ 228.151686][T15480] kmem_cache_alloc_node+0x264/0x710 [ 228.156982][T15480] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 228.163242][T15480] __alloc_skb+0xd5/0x5e0 16:39:46 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x0, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) [ 228.167589][T15480] ? skb_trim+0x190/0x190 [ 228.171932][T15480] ? skb_page_frag_refill+0x127/0x460 [ 228.177313][T15480] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 228.183049][T15480] ? skb_put+0x177/0x1d0 [ 228.187332][T15480] __ip_append_data.isra.0+0x24d6/0x2dd0 [ 228.193055][T15480] ? ip_reply_glue_bits+0xc0/0xc0 [ 228.198139][T15480] ? __ip_flush_pending_frames.isra.0+0x2d0/0x2d0 [ 228.204575][T15480] ? mark_held_locks+0xf0/0xf0 [ 228.209348][T15480] ? lock_sock_nested+0xac/0x120 [ 228.214293][T15480] ? ip_reply_glue_bits+0xc0/0xc0 16:39:46 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r3) [ 228.219326][T15480] ip_append_data.part.0+0xf2/0x170 [ 228.224577][T15480] ? ip_reply_glue_bits+0xc0/0xc0 [ 228.229612][T15480] ip_append_data+0x6e/0x90 [ 228.234127][T15480] udp_sendmsg+0x8e7/0x2820 [ 228.238644][T15480] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 228.244892][T15480] ? __lock_acquire+0x548/0x3fb0 [ 228.249844][T15480] ? ip_reply_glue_bits+0xc0/0xc0 [ 228.254888][T15480] ? udp4_lib_lookup_skb+0x440/0x440 [ 228.260193][T15480] ? is_bpf_text_address+0xac/0x170 [ 228.265399][T15480] ? find_held_lock+0x35/0x130 16:39:46 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x0, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) [ 228.270184][T15480] ? is_bpf_text_address+0xac/0x170 [ 228.275401][T15480] ? ___might_sleep+0x163/0x280 [ 228.280285][T15480] ? __might_sleep+0x95/0x190 [ 228.284973][T15480] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 228.290615][T15480] ? aa_sk_perm+0x288/0x880 [ 228.295138][T15480] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 228.300700][T15480] inet_sendmsg+0x147/0x5e0 [ 228.305212][T15480] ? udp4_lib_lookup_skb+0x440/0x440 [ 228.310501][T15480] ? inet_sendmsg+0x147/0x5e0 [ 228.315184][T15480] ? ipip_gro_receive+0x100/0x100 [ 228.320223][T15480] sock_sendmsg+0xdd/0x130 [ 228.324651][T15480] sock_write_iter+0x27c/0x3e0 [ 228.329425][T15480] ? sock_sendmsg+0x130/0x130 [ 228.334128][T15480] ? aa_path_link+0x460/0x460 [ 228.338815][T15480] ? find_held_lock+0x35/0x130 [ 228.343593][T15480] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 228.349835][T15480] ? iov_iter_init+0xee/0x220 [ 228.354519][T15480] new_sync_write+0x4c7/0x760 [ 228.359215][T15480] ? default_llseek+0x2e0/0x2e0 [ 228.364083][T15480] ? common_file_perm+0x238/0x720 [ 228.369114][T15480] ? __fget+0x381/0x550 [ 228.369135][T15480] ? apparmor_file_permission+0x25/0x30 [ 228.369151][T15480] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 228.369168][T15480] ? security_file_permission+0x94/0x380 [ 228.369193][T15480] __vfs_write+0xe4/0x110 [ 228.378883][T15480] vfs_write+0x20c/0x580 [ 228.390736][T15480] ksys_write+0xea/0x1f0 [ 228.390757][T15480] ? __ia32_sys_read+0xb0/0xb0 [ 228.390775][T15480] ? do_syscall_64+0x26/0x610 [ 228.390789][T15480] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 228.390803][T15480] ? do_syscall_64+0x26/0x610 [ 228.390822][T15480] __x64_sys_write+0x73/0xb0 [ 228.399374][T15480] do_syscall_64+0x103/0x610 [ 228.399395][T15480] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 228.399407][T15480] RIP: 0033:0x4582f9 [ 228.399423][T15480] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 228.399440][T15480] RSP: 002b:00007f6dcf2fbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 228.399454][T15480] RAX: ffffffffffffffda RBX: 00007f6dcf2fbc90 RCX: 00000000004582f9 [ 228.399462][T15480] RDX: 000000000000fdef RSI: 0000000020000280 RDI: 0000000000000005 [ 228.399470][T15480] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 228.399485][T15480] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6dcf2fc6d4 [ 228.408461][T15480] R13: 00000000004c7ad0 R14: 00000000004ddba8 R15: 0000000000000006 16:39:47 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f0000001840)={&(0x7f0000001480)=@can, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001500)=""/10, 0xa}, {&(0x7f0000001580)=""/73, 0x49}, {&(0x7f0000001600)=""/184, 0xb8}, {&(0x7f00000016c0)=""/101, 0x65}, {&(0x7f0000001740)=""/81, 0x51}], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r4) 16:39:47 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2}, 0x3c) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r3) 16:39:47 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x0, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:47 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x6}, 0x900) 16:39:47 executing program 4 (fault-call:5 fault-nth:86): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) 16:39:47 executing program 2: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r3) recvmsg(r0, &(0x7f0000001840)={&(0x7f0000001480)=@can={0x1d, 0x0}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001500)=""/10, 0xa}, {&(0x7f0000001580)=""/73, 0x49}, {&(0x7f0000001600)=""/184, 0xb8}, {&(0x7f00000016c0)=""/101, 0x65}, {&(0x7f0000001740)=""/81, 0x51}], 0x5}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], r5, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x33c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r6) close(r7) 16:39:47 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2}, 0x3c) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r2) 16:39:47 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x7}, 0x900) 16:39:47 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2}, 0x3c) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r2) [ 229.061443][T15524] FAULT_INJECTION: forcing a failure. [ 229.061443][T15524] name failslab, interval 1, probability 0, space 0, times 0 [ 229.088529][T15524] CPU: 0 PID: 15524 Comm: syz-executor.4 Not tainted 5.1.0-rc2+ #82 [ 229.096554][T15524] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 229.106619][T15524] Call Trace: [ 229.110780][T15524] dump_stack+0x172/0x1f0 [ 229.115121][T15524] should_fail.cold+0xa/0x15 [ 229.120057][T15524] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 229.125875][T15524] ? ___might_sleep+0x163/0x280 [ 229.130739][T15524] __should_failslab+0x121/0x190 [ 229.135678][T15524] should_failslab+0x9/0x14 [ 229.140289][T15524] kmem_cache_alloc_node_trace+0x270/0x720 [ 229.146125][T15524] __kmalloc_node_track_caller+0x3d/0x70 [ 229.151767][T15524] __kmalloc_reserve.isra.0+0x40/0xf0 [ 229.157151][T15524] __alloc_skb+0x10b/0x5e0 [ 229.161579][T15524] ? skb_trim+0x190/0x190 [ 229.165919][T15524] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 229.171644][T15524] ? skb_put+0x177/0x1d0 [ 229.175902][T15524] __ip_append_data.isra.0+0x24d6/0x2dd0 [ 229.181556][T15524] ? mark_held_locks+0xa4/0xf0 [ 229.186331][T15524] ? ip_reply_glue_bits+0xc0/0xc0 [ 229.191411][T15524] ? __ip_flush_pending_frames.isra.0+0x2d0/0x2d0 [ 229.197848][T15524] ? retint_kernel+0x2d/0x2d [ 229.202464][T15524] ? ip_reply_glue_bits+0xc0/0xc0 [ 229.207498][T15524] ip_append_data.part.0+0xf2/0x170 [ 229.212720][T15524] ? ip_reply_glue_bits+0xc0/0xc0 [ 229.217750][T15524] ip_append_data+0x6e/0x90 [ 229.222272][T15524] udp_sendmsg+0x8e7/0x2820 [ 229.226812][T15524] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 229.233057][T15524] ? __lock_acquire+0x548/0x3fb0 [ 229.238012][T15524] ? ip_reply_glue_bits+0xc0/0xc0 [ 229.243101][T15524] ? udp4_lib_lookup_skb+0x440/0x440 [ 229.248401][T15524] ? is_bpf_text_address+0xac/0x170 [ 229.253618][T15524] ? find_held_lock+0x35/0x130 16:39:47 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x8}, 0x900) 16:39:47 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x9}, 0x900) 16:39:47 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2}, 0x3c) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r2) [ 229.253635][T15524] ? is_bpf_text_address+0xac/0x170 [ 229.253656][T15524] ? ___might_sleep+0x163/0x280 [ 229.253672][T15524] ? __might_sleep+0x95/0x190 [ 229.253696][T15524] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 229.268494][T15524] ? aa_sk_perm+0x288/0x880 [ 229.268510][T15524] ? retint_kernel+0x2d/0x2d [ 229.268533][T15524] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 229.268557][T15524] inet_sendmsg+0x147/0x5e0 [ 229.278844][T15524] ? udp4_lib_lookup_skb+0x440/0x440 [ 229.278856][T15524] ? inet_sendmsg+0x147/0x5e0 [ 229.278870][T15524] ? ipip_gro_receive+0x100/0x100 [ 229.278889][T15524] sock_sendmsg+0xdd/0x130 [ 229.278907][T15524] sock_write_iter+0x27c/0x3e0 [ 229.278927][T15524] ? sock_sendmsg+0x130/0x130 [ 229.326812][T15524] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 229.333042][T15524] ? iov_iter_init+0xee/0x220 [ 229.337707][T15524] new_sync_write+0x4c7/0x760 [ 229.342390][T15524] ? default_llseek+0x2e0/0x2e0 [ 229.347235][T15524] ? retint_kernel+0x2d/0x2d [ 229.351812][T15524] ? __vfs_write+0xac/0x110 [ 229.356300][T15524] __vfs_write+0xe4/0x110 [ 229.360620][T15524] vfs_write+0x20c/0x580 [ 229.364862][T15524] ksys_write+0xea/0x1f0 [ 229.369106][T15524] ? __ia32_sys_read+0xb0/0xb0 [ 229.373863][T15524] ? do_syscall_64+0x26/0x610 [ 229.378553][T15524] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 229.384604][T15524] ? do_syscall_64+0x26/0x610 [ 229.389269][T15524] __x64_sys_write+0x73/0xb0 [ 229.393845][T15524] do_syscall_64+0x103/0x610 [ 229.398418][T15524] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 229.404323][T15524] RIP: 0033:0x4582f9 [ 229.408216][T15524] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 229.427807][T15524] RSP: 002b:00007f6dcf2fbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 229.436207][T15524] RAX: ffffffffffffffda RBX: 00007f6dcf2fbc90 RCX: 00000000004582f9 [ 229.444166][T15524] RDX: 000000000000fdef RSI: 0000000020000280 RDI: 0000000000000005 [ 229.452127][T15524] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 229.460088][T15524] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6dcf2fc6d4 [ 229.468047][T15524] R13: 00000000004c7ad0 R14: 00000000004ddba8 R15: 0000000000000006 16:39:48 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f0000001840)={&(0x7f0000001480)=@can, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001500)=""/10, 0xa}, {&(0x7f0000001580)=""/73, 0x49}, {&(0x7f0000001600)=""/184, 0xb8}, {&(0x7f00000016c0)=""/101, 0x65}, {&(0x7f0000001740)=""/81, 0x51}], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r4) 16:39:48 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2}, 0x3c) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, 0x0, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r3) 16:39:48 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0xa}, 0x900) 16:39:48 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x0, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:48 executing program 4 (fault-call:5 fault-nth:87): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) 16:39:48 executing program 2: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r3) recvmsg(r0, &(0x7f0000001840)={&(0x7f0000001480)=@can={0x1d, 0x0}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001500)=""/10, 0xa}, {&(0x7f0000001580)=""/73, 0x49}, {&(0x7f0000001600)=""/184, 0xb8}, {&(0x7f00000016c0)=""/101, 0x65}, {&(0x7f0000001740)=""/81, 0x51}], 0x5}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], r5, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x33c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r6) close(r7) 16:39:48 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2}, 0x3c) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, 0x0, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r3) 16:39:48 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0xb}, 0x900) 16:39:48 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x0, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) [ 229.856209][T15562] FAULT_INJECTION: forcing a failure. [ 229.856209][T15562] name failslab, interval 1, probability 0, space 0, times 0 [ 229.873593][T15562] CPU: 0 PID: 15562 Comm: syz-executor.4 Not tainted 5.1.0-rc2+ #82 [ 229.881579][T15562] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 229.891630][T15562] Call Trace: [ 229.891656][T15562] dump_stack+0x172/0x1f0 [ 229.891680][T15562] should_fail.cold+0xa/0x15 [ 229.891704][T15562] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 229.891728][T15562] ? ___might_sleep+0x163/0x280 [ 229.891760][T15562] __should_failslab+0x121/0x190 [ 229.919475][T15562] should_failslab+0x9/0x14 [ 229.923984][T15562] kmem_cache_alloc_node+0x264/0x710 [ 229.929277][T15562] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 229.935532][T15562] __alloc_skb+0xd5/0x5e0 [ 229.939880][T15562] ? skb_trim+0x190/0x190 [ 229.944224][T15562] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 229.949950][T15562] ? skb_put+0x177/0x1d0 [ 229.949971][T15562] __ip_append_data.isra.0+0x24d6/0x2dd0 [ 229.949993][T15562] ? ip_reply_glue_bits+0xc0/0xc0 [ 229.950022][T15562] ? __ip_flush_pending_frames.isra.0+0x2d0/0x2d0 [ 229.950037][T15562] ? mark_held_locks+0xf0/0xf0 [ 229.950056][T15562] ? ip_reply_glue_bits+0xc0/0xc0 [ 229.950070][T15562] ip_append_data.part.0+0xf2/0x170 [ 229.950089][T15562] ? ip_reply_glue_bits+0xc0/0xc0 [ 229.950105][T15562] ip_append_data+0x6e/0x90 [ 229.950128][T15562] udp_sendmsg+0x8e7/0x2820 16:39:48 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2}, 0x3c) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, 0x0, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r3) [ 229.950148][T15562] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 230.007408][T15562] ? __lock_acquire+0x548/0x3fb0 [ 230.012362][T15562] ? ip_reply_glue_bits+0xc0/0xc0 [ 230.017392][T15562] ? udp4_lib_lookup_skb+0x440/0x440 [ 230.022685][T15562] ? is_bpf_text_address+0xac/0x170 [ 230.027889][T15562] ? find_held_lock+0x35/0x130 [ 230.032675][T15562] ? is_bpf_text_address+0xac/0x170 [ 230.037884][T15562] ? ___might_sleep+0x163/0x280 [ 230.042743][T15562] ? __might_sleep+0x95/0x190 [ 230.047430][T15562] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 230.053133][T15562] ? aa_sk_perm+0x288/0x880 [ 230.057665][T15562] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 230.063215][T15562] inet_sendmsg+0x147/0x5e0 [ 230.067723][T15562] ? udp4_lib_lookup_skb+0x440/0x440 [ 230.073007][T15562] ? inet_sendmsg+0x147/0x5e0 [ 230.077684][T15562] ? ipip_gro_receive+0x100/0x100 [ 230.082718][T15562] sock_sendmsg+0xdd/0x130 [ 230.087145][T15562] sock_write_iter+0x27c/0x3e0 [ 230.091916][T15562] ? sock_sendmsg+0x130/0x130 [ 230.096605][T15562] ? __sanitizer_cov_trace_pc+0x20/0x50 [ 230.102176][T15562] ? iov_iter_init+0xee/0x220 [ 230.106877][T15562] new_sync_write+0x4c7/0x760 [ 230.111564][T15562] ? default_llseek+0x2e0/0x2e0 [ 230.116426][T15562] ? common_file_perm+0x238/0x720 [ 230.121505][T15562] ? __fget+0x381/0x550 [ 230.125674][T15562] ? apparmor_file_permission+0x25/0x30 [ 230.131226][T15562] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 230.137478][T15562] ? security_file_permission+0x94/0x380 [ 230.143143][T15562] __vfs_write+0xe4/0x110 [ 230.147508][T15562] vfs_write+0x20c/0x580 [ 230.151798][T15562] ksys_write+0xea/0x1f0 [ 230.156048][T15562] ? __ia32_sys_read+0xb0/0xb0 [ 230.160820][T15562] ? do_syscall_64+0x26/0x610 [ 230.165497][T15562] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 230.171575][T15562] ? do_syscall_64+0x26/0x610 [ 230.176262][T15562] __x64_sys_write+0x73/0xb0 [ 230.180859][T15562] do_syscall_64+0x103/0x610 [ 230.185474][T15562] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 230.191368][T15562] RIP: 0033:0x4582f9 16:39:48 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2}, 0x3c) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x0, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r3) 16:39:48 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x0, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) [ 230.195271][T15562] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 230.214872][T15562] RSP: 002b:00007f6dcf2fbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 230.214887][T15562] RAX: ffffffffffffffda RBX: 00007f6dcf2fbc90 RCX: 00000000004582f9 [ 230.214896][T15562] RDX: 000000000000fdef RSI: 0000000020000280 RDI: 0000000000000005 [ 230.214905][T15562] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 230.214914][T15562] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6dcf2fc6d4 [ 230.214923][T15562] R13: 00000000004c7ad0 R14: 00000000004ddba8 R15: 0000000000000006 16:39:49 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x301}, 0x900) 16:39:49 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x0, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:49 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f0000001840)={&(0x7f0000001480)=@can, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001500)=""/10, 0xa}, {&(0x7f0000001580)=""/73, 0x49}, {&(0x7f0000001600)=""/184, 0xb8}, {&(0x7f00000016c0)=""/101, 0x65}, {&(0x7f0000001740)=""/81, 0x51}], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r4) 16:39:49 executing program 4 (fault-call:5 fault-nth:88): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) 16:39:49 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2}, 0x3c) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x0, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r3) 16:39:49 executing program 2: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r3) recvmsg(r0, &(0x7f0000001840)={&(0x7f0000001480)=@can={0x1d, 0x0}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001500)=""/10, 0xa}, {&(0x7f0000001580)=""/73, 0x49}, {&(0x7f0000001600)=""/184, 0xb8}, {&(0x7f00000016c0)=""/101, 0x65}, {&(0x7f0000001740)=""/81, 0x51}], 0x5}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], r5, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x33c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r6) 16:39:49 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x500}, 0x900) 16:39:49 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x0, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:49 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2}, 0x3c) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x0, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r3) [ 230.823935][T15607] FAULT_INJECTION: forcing a failure. [ 230.823935][T15607] name failslab, interval 1, probability 0, space 0, times 0 [ 230.862992][T15607] CPU: 0 PID: 15607 Comm: syz-executor.4 Not tainted 5.1.0-rc2+ #82 [ 230.870992][T15607] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 230.881043][T15607] Call Trace: [ 230.884343][T15607] dump_stack+0x172/0x1f0 [ 230.888684][T15607] should_fail.cold+0xa/0x15 [ 230.893307][T15607] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 230.899120][T15607] ? ___might_sleep+0x163/0x280 [ 230.903996][T15607] __should_failslab+0x121/0x190 [ 230.908946][T15607] should_failslab+0x9/0x14 [ 230.913469][T15607] kmem_cache_alloc_node_trace+0x270/0x720 16:39:49 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2}, 0x3c) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r3) [ 230.919306][T15607] __kmalloc_node_track_caller+0x3d/0x70 [ 230.924951][T15607] __kmalloc_reserve.isra.0+0x40/0xf0 [ 230.930334][T15607] __alloc_skb+0x10b/0x5e0 [ 230.934755][T15607] ? skb_trim+0x190/0x190 [ 230.939090][T15607] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 230.944810][T15607] ? skb_put+0x177/0x1d0 [ 230.949056][T15607] __ip_append_data.isra.0+0x24d6/0x2dd0 [ 230.954713][T15607] ? ip_reply_glue_bits+0xc0/0xc0 [ 230.959756][T15607] ? __ip_flush_pending_frames.isra.0+0x2d0/0x2d0 [ 230.966176][T15607] ? retint_kernel+0x2d/0x2d [ 230.970766][T15607] ? ip_reply_glue_bits+0xc0/0xc0 [ 230.970782][T15607] ip_append_data.part.0+0xf2/0x170 [ 230.970803][T15607] ? ip_reply_glue_bits+0xc0/0xc0 [ 230.970818][T15607] ip_append_data+0x6e/0x90 [ 230.970840][T15607] udp_sendmsg+0x8e7/0x2820 [ 230.970860][T15607] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 230.970875][T15607] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 230.970890][T15607] ? lockdep_hardirqs_on+0x418/0x5d0 [ 230.970904][T15607] ? ip_reply_glue_bits+0xc0/0xc0 [ 230.970924][T15607] ? udp4_lib_lookup_skb+0x440/0x440 16:39:49 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2}, 0x3c) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r3) [ 230.970942][T15607] ? retint_kernel+0x2d/0x2d [ 230.981149][T15607] ? ___might_sleep+0x163/0x280 [ 230.981169][T15607] ? __might_sleep+0x95/0x190 [ 230.981188][T15607] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 230.981201][T15607] ? aa_sk_perm+0x288/0x880 [ 230.981223][T15607] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 230.981241][T15607] inet_sendmsg+0x147/0x5e0 [ 230.981255][T15607] ? udp4_lib_lookup_skb+0x440/0x440 [ 230.981267][T15607] ? inet_sendmsg+0x147/0x5e0 [ 230.981280][T15607] ? ipip_gro_receive+0x100/0x100 16:39:49 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2}, 0x3c) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r3) [ 230.981298][T15607] sock_sendmsg+0xdd/0x130 [ 230.981318][T15607] sock_write_iter+0x27c/0x3e0 [ 231.081336][T15607] ? sock_sendmsg+0x130/0x130 [ 231.086030][T15607] ? aa_path_link+0x460/0x460 [ 231.090707][T15607] ? find_held_lock+0x35/0x130 [ 231.095473][T15607] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 231.101717][T15607] ? iov_iter_init+0xee/0x220 [ 231.106403][T15607] new_sync_write+0x4c7/0x760 [ 231.111107][T15607] ? default_llseek+0x2e0/0x2e0 [ 231.116218][T15607] ? common_file_perm+0x238/0x720 [ 231.121261][T15607] ? __fget+0x381/0x550 16:39:49 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2}, 0x3c) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, 0x0) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(0xffffffffffffffff) [ 231.125428][T15607] ? apparmor_file_permission+0x25/0x30 [ 231.130987][T15607] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 231.137233][T15607] ? security_file_permission+0x94/0x380 [ 231.142872][T15607] __vfs_write+0xe4/0x110 [ 231.147213][T15607] vfs_write+0x20c/0x580 [ 231.151474][T15607] ksys_write+0xea/0x1f0 [ 231.155724][T15607] ? __ia32_sys_read+0xb0/0xb0 [ 231.160489][T15607] ? do_syscall_64+0x26/0x610 [ 231.165170][T15607] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 231.171239][T15607] ? do_syscall_64+0x26/0x610 [ 231.175925][T15607] __x64_sys_write+0x73/0xb0 [ 231.180525][T15607] do_syscall_64+0x103/0x610 [ 231.185133][T15607] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 231.191028][T15607] RIP: 0033:0x4582f9 [ 231.194922][T15607] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 231.214527][T15607] RSP: 002b:00007f6dcf2fbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 16:39:49 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2}, 0x3c) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, 0x0) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(0xffffffffffffffff) [ 231.222945][T15607] RAX: ffffffffffffffda RBX: 00007f6dcf2fbc90 RCX: 00000000004582f9 [ 231.230920][T15607] RDX: 000000000000fdef RSI: 0000000020000280 RDI: 0000000000000005 [ 231.238887][T15607] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 231.246855][T15607] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6dcf2fc6d4 [ 231.254820][T15607] R13: 00000000004c7ad0 R14: 00000000004ddba8 R15: 0000000000000006 16:39:50 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r3) 16:39:50 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0xffffff1f}, 0x900) 16:39:50 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x0, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:50 executing program 2: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r3) recvmsg(r0, &(0x7f0000001840)={&(0x7f0000001480)=@can={0x1d, 0x0}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001500)=""/10, 0xa}, {&(0x7f0000001580)=""/73, 0x49}, {&(0x7f0000001600)=""/184, 0xb8}, {&(0x7f00000016c0)=""/101, 0x65}, {&(0x7f0000001740)=""/81, 0x51}], 0x5}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], r5, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x33c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r6) 16:39:50 executing program 4 (fault-call:5 fault-nth:89): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) 16:39:50 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2}, 0x3c) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, 0x0) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(0xffffffffffffffff) 16:39:50 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x0, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:50 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2}, 0x3c) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r2) 16:39:50 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1, 0x0, 0x2}, 0x900) 16:39:50 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r0, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r2) [ 231.684190][T15651] FAULT_INJECTION: forcing a failure. [ 231.684190][T15651] name failslab, interval 1, probability 0, space 0, times 0 [ 231.751170][T15651] CPU: 0 PID: 15651 Comm: syz-executor.4 Not tainted 5.1.0-rc2+ #82 [ 231.759187][T15651] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 231.769247][T15651] Call Trace: [ 231.772639][T15651] dump_stack+0x172/0x1f0 [ 231.776989][T15651] should_fail.cold+0xa/0x15 [ 231.781587][T15651] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 231.787401][T15651] ? ___might_sleep+0x163/0x280 [ 231.792271][T15651] __should_failslab+0x121/0x190 [ 231.797214][T15651] should_failslab+0x9/0x14 [ 231.801721][T15651] kmem_cache_alloc_node+0x264/0x710 [ 231.807013][T15651] ? __alloc_skb+0x91/0x5e0 [ 231.811528][T15651] __alloc_skb+0xd5/0x5e0 [ 231.815872][T15651] ? skb_trim+0x190/0x190 [ 231.820210][T15651] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 231.825932][T15651] ? skb_put+0x177/0x1d0 [ 231.830182][T15651] __ip_append_data.isra.0+0x24d6/0x2dd0 [ 231.835818][T15651] ? ip_reply_glue_bits+0xc0/0xc0 [ 231.840857][T15651] ? __ip_flush_pending_frames.isra.0+0x2d0/0x2d0 [ 231.847273][T15651] ? mark_held_locks+0xf0/0xf0 [ 231.852040][T15651] ? lock_sock_nested+0xac/0x120 [ 231.856979][T15651] ? ip_reply_glue_bits+0xc0/0xc0 [ 231.862004][T15651] ip_append_data.part.0+0xf2/0x170 [ 231.867207][T15651] ? ip_reply_glue_bits+0xc0/0xc0 [ 231.872234][T15651] ip_append_data+0x6e/0x90 [ 231.876742][T15651] udp_sendmsg+0x8e7/0x2820 [ 231.881255][T15651] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 231.887500][T15651] ? ip_reply_glue_bits+0xc0/0xc0 [ 231.892548][T15651] ? udp4_lib_lookup_skb+0x440/0x440 [ 231.897839][T15651] ? flexible_sched_in+0xcb/0x9c0 [ 231.902869][T15651] ? visit_groups_merge+0x4c0/0x5d0 [ 231.908069][T15651] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 231.913540][T15651] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 231.919008][T15651] ? lockdep_hardirqs_on+0x418/0x5d0 [ 231.924300][T15651] ? trace_hardirqs_on_caller+0x6a/0x220 [ 231.929945][T15651] ? ___might_sleep+0x163/0x280 [ 231.934808][T15651] ? __might_sleep+0x95/0x190 [ 231.939493][T15651] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 231.945139][T15651] ? aa_sk_perm+0x288/0x880 [ 231.949654][T15651] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 231.955211][T15651] inet_sendmsg+0x147/0x5e0 [ 231.959713][T15651] ? udp4_lib_lookup_skb+0x440/0x440 [ 231.959724][T15651] ? inet_sendmsg+0x147/0x5e0 [ 231.959737][T15651] ? ipip_gro_receive+0x100/0x100 [ 231.959754][T15651] sock_sendmsg+0xdd/0x130 [ 231.959771][T15651] sock_write_iter+0x27c/0x3e0 [ 231.959787][T15651] ? sock_sendmsg+0x130/0x130 [ 231.959812][T15651] ? aa_path_link+0x460/0x460 [ 231.959829][T15651] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 16:39:50 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1, 0x0, 0x3}, 0x900) [ 231.959843][T15651] ? iov_iter_init+0xee/0x220 [ 231.959863][T15651] new_sync_write+0x4c7/0x760 [ 231.959879][T15651] ? default_llseek+0x2e0/0x2e0 [ 231.959899][T15651] ? common_file_perm+0x73/0x720 [ 232.020649][T15651] ? common_file_perm+0x238/0x720 [ 232.025685][T15651] ? __fget+0x381/0x550 [ 232.029854][T15651] ? apparmor_file_permission+0x25/0x30 [ 232.035411][T15651] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 232.041676][T15651] ? security_file_permission+0x94/0x380 [ 232.047360][T15651] __vfs_write+0xe4/0x110 16:39:50 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r0, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r2) [ 232.051705][T15651] vfs_write+0x20c/0x580 [ 232.055957][T15651] ksys_write+0xea/0x1f0 [ 232.060210][T15651] ? __ia32_sys_read+0xb0/0xb0 [ 232.064990][T15651] __x64_sys_write+0x73/0xb0 [ 232.069584][T15651] ? do_syscall_64+0x5b/0x610 [ 232.074271][T15651] do_syscall_64+0x103/0x610 [ 232.078871][T15651] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 232.084786][T15651] RIP: 0033:0x4582f9 [ 232.088685][T15651] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 232.108286][T15651] RSP: 002b:00007f6dcf2fbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 232.116718][T15651] RAX: ffffffffffffffda RBX: 00007f6dcf2fbc90 RCX: 00000000004582f9 [ 232.116727][T15651] RDX: 000000000000fdef RSI: 0000000020000280 RDI: 0000000000000005 [ 232.116735][T15651] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 232.116743][T15651] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6dcf2fc6d4 16:39:50 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1, 0x0, 0x4}, 0x900) 16:39:50 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x0, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:50 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2}, 0x3c) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r2) [ 232.116750][T15651] R13: 00000000004c7ad0 R14: 00000000004ddba8 R15: 0000000000000006 16:39:51 executing program 2: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r3) recvmsg(r0, &(0x7f0000001840)={&(0x7f0000001480)=@can={0x1d, 0x0}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001500)=""/10, 0xa}, {&(0x7f0000001580)=""/73, 0x49}, {&(0x7f0000001600)=""/184, 0xb8}, {&(0x7f00000016c0)=""/101, 0x65}, {&(0x7f0000001740)=""/81, 0x51}], 0x5}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], r5, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x33c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r6) 16:39:51 executing program 4 (fault-call:5 fault-nth:90): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) 16:39:51 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x0, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:51 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2}, 0x3c) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r2) 16:39:51 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1, 0x0, 0x5}, 0x900) 16:39:51 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r0, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r2) 16:39:51 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2}, 0x3c) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r3) 16:39:51 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r1) 16:39:51 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x0, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:51 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1, 0x0, 0x6}, 0x900) [ 232.622614][T15707] FAULT_INJECTION: forcing a failure. [ 232.622614][T15707] name failslab, interval 1, probability 0, space 0, times 0 [ 232.659333][T15707] CPU: 1 PID: 15707 Comm: syz-executor.4 Not tainted 5.1.0-rc2+ #82 [ 232.667337][T15707] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 232.677653][T15707] Call Trace: [ 232.680962][T15707] dump_stack+0x172/0x1f0 [ 232.685309][T15707] should_fail.cold+0xa/0x15 [ 232.689912][T15707] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 232.695729][T15707] ? ___might_sleep+0x163/0x280 [ 232.700588][T15707] __should_failslab+0x121/0x190 [ 232.700606][T15707] should_failslab+0x9/0x14 [ 232.700624][T15707] kmem_cache_alloc_node_trace+0x270/0x720 [ 232.700651][T15707] __kmalloc_node_track_caller+0x3d/0x70 [ 232.700671][T15707] __kmalloc_reserve.isra.0+0x40/0xf0 [ 232.700689][T15707] __alloc_skb+0x10b/0x5e0 [ 232.700707][T15707] ? skb_trim+0x190/0x190 [ 232.700727][T15707] ? __ip_append_data.isra.0+0x1ee3/0x2dd0 [ 232.741408][T15707] __ip_append_data.isra.0+0x24d6/0x2dd0 [ 232.747074][T15707] ? ip_reply_glue_bits+0xc0/0xc0 [ 232.752122][T15707] ? __ip_flush_pending_frames.isra.0+0x2d0/0x2d0 [ 232.758543][T15707] ? mark_held_locks+0xf0/0xf0 [ 232.763308][T15707] ? lock_sock_nested+0xac/0x120 [ 232.768246][T15707] ? ip_reply_glue_bits+0xc0/0xc0 [ 232.773273][T15707] ip_append_data.part.0+0xf2/0x170 [ 232.778484][T15707] ? ip_reply_glue_bits+0xc0/0xc0 [ 232.783518][T15707] ip_append_data+0x6e/0x90 [ 232.788040][T15707] udp_sendmsg+0x8e7/0x2820 [ 232.792553][T15707] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 232.798796][T15707] ? __lock_acquire+0x548/0x3fb0 [ 232.803729][T15707] ? ip_reply_glue_bits+0xc0/0xc0 [ 232.803749][T15707] ? udp4_lib_lookup_skb+0x440/0x440 [ 232.803763][T15707] ? mark_held_locks+0xa4/0xf0 [ 232.803780][T15707] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 232.803795][T15707] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 232.803810][T15707] ? lockdep_hardirqs_on+0x418/0x5d0 [ 232.803825][T15707] ? retint_kernel+0x2d/0x2d [ 232.803839][T15707] ? trace_hardirqs_on_caller+0x6a/0x220 [ 232.803862][T15707] ? ___might_sleep+0x163/0x280 [ 232.850090][T15707] ? __might_sleep+0x95/0x190 [ 232.854773][T15707] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 232.860406][T15707] ? aa_sk_perm+0x288/0x880 [ 232.864927][T15707] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 232.870484][T15707] inet_sendmsg+0x147/0x5e0 [ 232.874994][T15707] ? udp4_lib_lookup_skb+0x440/0x440 [ 232.880276][T15707] ? inet_sendmsg+0x147/0x5e0 [ 232.884960][T15707] ? ipip_gro_receive+0x100/0x100 [ 232.889987][T15707] sock_sendmsg+0xdd/0x130 [ 232.894407][T15707] sock_write_iter+0x27c/0x3e0 [ 232.899179][T15707] ? sock_sendmsg+0x130/0x130 [ 232.899204][T15707] ? aa_path_link+0x460/0x460 [ 232.899218][T15707] ? find_held_lock+0x35/0x130 [ 232.899233][T15707] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 232.899248][T15707] ? iov_iter_init+0xee/0x220 16:39:51 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r1) 16:39:51 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2}, 0x3c) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r3) [ 232.899268][T15707] new_sync_write+0x4c7/0x760 [ 232.899288][T15707] ? default_llseek+0x2e0/0x2e0 [ 232.933739][T15707] ? common_file_perm+0x238/0x720 [ 232.938770][T15707] ? __fget+0x381/0x550 [ 232.942935][T15707] ? apparmor_file_permission+0x25/0x30 [ 232.948484][T15707] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 232.954733][T15707] ? security_file_permission+0x94/0x380 [ 232.960378][T15707] __vfs_write+0xe4/0x110 [ 232.964720][T15707] vfs_write+0x20c/0x580 [ 232.968974][T15707] ksys_write+0xea/0x1f0 [ 232.973229][T15707] ? __ia32_sys_read+0xb0/0xb0 [ 232.978005][T15707] ? do_syscall_64+0x26/0x610 [ 232.982695][T15707] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 232.989191][T15707] ? do_syscall_64+0x26/0x610 [ 232.993878][T15707] __x64_sys_write+0x73/0xb0 [ 232.998483][T15707] do_syscall_64+0x103/0x610 [ 233.003085][T15707] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 233.008975][T15707] RIP: 0033:0x4582f9 [ 233.012871][T15707] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 233.032468][T15707] RSP: 002b:00007f6dcf2fbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 233.032484][T15707] RAX: ffffffffffffffda RBX: 00007f6dcf2fbc90 RCX: 00000000004582f9 [ 233.032493][T15707] RDX: 000000000000fdef RSI: 0000000020000280 RDI: 0000000000000005 [ 233.032502][T15707] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 233.032511][T15707] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6dcf2fc6d4 [ 233.032520][T15707] R13: 00000000004c7ad0 R14: 00000000004ddba8 R15: 0000000000000006 16:39:51 executing program 2: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r3) recvmsg(r0, &(0x7f0000001840)={&(0x7f0000001480)=@can={0x1d, 0x0}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001500)=""/10, 0xa}, {&(0x7f0000001580)=""/73, 0x49}, {&(0x7f0000001600)=""/184, 0xb8}, {&(0x7f00000016c0)=""/101, 0x65}, {&(0x7f0000001740)=""/81, 0x51}], 0x5}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], r5, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x33c) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(0xffffffffffffffff) 16:39:51 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x0, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:51 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2}, 0x3c) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r3) 16:39:51 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1, 0x0, 0x7}, 0x900) 16:39:51 executing program 4 (fault-call:5 fault-nth:91): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) 16:39:51 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r1) 16:39:52 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2}, 0x3c) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, 0x0, 0x0) close(r3) 16:39:52 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x0, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:52 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1, 0x0, 0x8}, 0x900) 16:39:52 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r3) [ 233.454057][T15747] FAULT_INJECTION: forcing a failure. [ 233.454057][T15747] name failslab, interval 1, probability 0, space 0, times 0 [ 233.533041][T15747] CPU: 0 PID: 15747 Comm: syz-executor.4 Not tainted 5.1.0-rc2+ #82 [ 233.541058][T15747] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 233.551113][T15747] Call Trace: [ 233.554415][T15747] dump_stack+0x172/0x1f0 [ 233.558776][T15747] should_fail.cold+0xa/0x15 [ 233.563379][T15747] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 233.569188][T15747] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 233.574651][T15747] ? lockdep_hardirqs_on+0x418/0x5d0 [ 233.579936][T15747] ? retint_kernel+0x2d/0x2d [ 233.584526][T15747] ? trace_hardirqs_on_caller+0x6a/0x220 [ 233.590172][T15747] __should_failslab+0x121/0x190 [ 233.595113][T15747] should_failslab+0x9/0x14 [ 233.599618][T15747] kmem_cache_alloc+0x47/0x6f0 [ 233.604385][T15747] ? retint_kernel+0x2d/0x2d [ 233.608985][T15747] __nf_conntrack_alloc+0xdb/0x680 [ 233.614102][T15747] init_conntrack.isra.0+0xe2c/0x1170 [ 233.619485][T15747] ? nf_conntrack_alloc+0x50/0x50 [ 233.624521][T15747] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 233.630771][T15747] ? ipt_do_table+0xf1e/0x1b90 [ 233.635551][T15747] nf_conntrack_in+0xd93/0x1410 [ 233.640449][T15747] ? nf_conntrack_update+0x960/0x960 [ 233.645740][T15747] ? __do_replace+0x910/0x910 [ 233.650424][T15747] ? interrupt_entry+0xc0/0xc0 [ 233.655206][T15747] ipv4_conntrack_local+0x169/0x210 [ 233.660409][T15747] nf_hook_slow+0xbf/0x1f0 [ 233.664840][T15747] __ip_local_out+0x403/0x880 [ 233.669521][T15747] ? ip_finish_output+0xd50/0xd50 [ 233.669562][T15747] ? ip_append_data.part.0+0x170/0x170 [ 233.669580][T15747] ? retint_kernel+0x2d/0x2d [ 233.669598][T15747] ip_local_out+0x2d/0x1b0 [ 233.680061][T15747] ip_send_skb+0x42/0xf0 [ 233.680079][T15747] udp_send_skb.isra.0+0x6b2/0x1180 [ 233.680105][T15747] udp_push_pending_frames+0x5c/0xf0 [ 233.680121][T15747] udp_sendmsg+0x12ff/0x2820 [ 233.680140][T15747] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 233.680156][T15747] ? ip_reply_glue_bits+0xc0/0xc0 [ 233.680175][T15747] ? udp4_lib_lookup_skb+0x440/0x440 [ 233.680190][T15747] ? finish_task_switch+0x146/0x780 16:39:52 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r3) 16:39:52 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1, 0x0, 0x9}, 0x900) [ 233.680209][T15747] ? mark_held_locks+0xa4/0xf0 [ 233.680226][T15747] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 233.680246][T15747] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 233.745830][T15747] ? lockdep_hardirqs_on+0x418/0x5d0 [ 233.751150][T15747] ? trace_hardirqs_on_caller+0x6a/0x220 [ 233.756793][T15747] ? ___might_sleep+0x163/0x280 [ 233.761660][T15747] ? __might_sleep+0x95/0x190 [ 233.766339][T15747] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 233.771978][T15747] ? aa_sk_perm+0x288/0x880 [ 233.776488][T15747] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 233.776509][T15747] inet_sendmsg+0x147/0x5e0 [ 233.776524][T15747] ? udp4_lib_lookup_skb+0x440/0x440 [ 233.776541][T15747] ? inet_sendmsg+0x147/0x5e0 [ 233.776559][T15747] ? ipip_gro_receive+0x100/0x100 [ 233.791857][T15747] sock_sendmsg+0xdd/0x130 [ 233.791877][T15747] sock_write_iter+0x27c/0x3e0 [ 233.791896][T15747] ? sock_sendmsg+0x130/0x130 [ 233.791920][T15747] ? aa_path_link+0x460/0x460 [ 233.791934][T15747] ? find_held_lock+0x35/0x130 [ 233.791949][T15747] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 233.791964][T15747] ? iov_iter_init+0xee/0x220 [ 233.791984][T15747] new_sync_write+0x4c7/0x760 [ 233.792008][T15747] ? default_llseek+0x2e0/0x2e0 [ 233.845274][T15747] ? common_file_perm+0x238/0x720 [ 233.850307][T15747] ? __fget+0x381/0x550 [ 233.854486][T15747] ? apparmor_file_permission+0x25/0x30 [ 233.860043][T15747] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 233.866292][T15747] ? security_file_permission+0x94/0x380 [ 233.871933][T15747] __vfs_write+0xe4/0x110 [ 233.876275][T15747] vfs_write+0x20c/0x580 [ 233.880530][T15747] ksys_write+0xea/0x1f0 [ 233.884788][T15747] ? __ia32_sys_read+0xb0/0xb0 [ 233.889560][T15747] ? do_syscall_64+0x26/0x610 [ 233.889577][T15747] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 233.889592][T15747] ? do_syscall_64+0x26/0x610 [ 233.889612][T15747] __x64_sys_write+0x73/0xb0 [ 233.889629][T15747] do_syscall_64+0x103/0x610 [ 233.889648][T15747] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 233.889660][T15747] RIP: 0033:0x4582f9 [ 233.889682][T15747] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 233.900389][T15747] RSP: 002b:00007f6dcf2fbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 233.900405][T15747] RAX: ffffffffffffffda RBX: 00007f6dcf2fbc90 RCX: 00000000004582f9 [ 233.900413][T15747] RDX: 000000000000fdef RSI: 0000000020000280 RDI: 0000000000000005 [ 233.900421][T15747] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 233.900430][T15747] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6dcf2fc6d4 [ 233.900448][T15747] R13: 00000000004c7ad0 R14: 00000000004ddba8 R15: 0000000000000006 16:39:52 executing program 2: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r3) recvmsg(r0, &(0x7f0000001840)={&(0x7f0000001480)=@can={0x1d, 0x0}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001500)=""/10, 0xa}, {&(0x7f0000001580)=""/73, 0x49}, {&(0x7f0000001600)=""/184, 0xb8}, {&(0x7f00000016c0)=""/101, 0x65}, {&(0x7f0000001740)=""/81, 0x51}], 0x5}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], r5, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x33c) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(0xffffffffffffffff) 16:39:52 executing program 0: socketpair(0x0, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r3) 16:39:52 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2}, 0x3c) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, 0x0, 0x0) close(r3) 16:39:52 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1, 0x0, 0xa}, 0x900) 16:39:52 executing program 4 (fault-call:5 fault-nth:92): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) 16:39:52 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x0, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:52 executing program 0: socketpair(0x0, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r3) [ 234.291381][T15781] FAULT_INJECTION: forcing a failure. [ 234.291381][T15781] name failslab, interval 1, probability 0, space 0, times 0 [ 234.304964][T15781] CPU: 0 PID: 15781 Comm: syz-executor.4 Not tainted 5.1.0-rc2+ #82 [ 234.312951][T15781] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 234.323015][T15781] Call Trace: [ 234.326324][T15781] dump_stack+0x172/0x1f0 [ 234.330672][T15781] should_fail.cold+0xa/0x15 [ 234.335298][T15781] ? mark_held_locks+0xa4/0xf0 16:39:53 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2}, 0x3c) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, 0x0, 0x0) close(r3) [ 234.340072][T15781] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 234.345890][T15781] ? lockdep_hardirqs_on+0x418/0x5d0 [ 234.351187][T15781] ? retint_kernel+0x2d/0x2d [ 234.355785][T15781] ? trace_hardirqs_on_caller+0x6a/0x220 [ 234.361429][T15781] __should_failslab+0x121/0x190 [ 234.361454][T15781] should_failslab+0x9/0x14 [ 234.361470][T15781] __kmalloc_track_caller+0x6d/0x740 [ 234.361488][T15781] ? lock_downgrade+0x880/0x880 [ 234.361510][T15781] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 234.370936][T15781] ? nf_ct_ext_add+0x2a9/0x640 16:39:53 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x0, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) [ 234.370957][T15781] __krealloc+0x71/0xc0 [ 234.370972][T15781] nf_ct_ext_add+0x2a9/0x640 [ 234.370991][T15781] init_conntrack.isra.0+0x439/0x1170 [ 234.371007][T15781] ? nf_conntrack_alloc+0x50/0x50 [ 234.371026][T15781] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 234.371040][T15781] ? ipt_do_table+0xf1e/0x1b90 [ 234.371060][T15781] nf_conntrack_in+0xd93/0x1410 [ 234.371072][T15781] ? mark_held_locks+0xa4/0xf0 [ 234.371095][T15781] ? nf_conntrack_update+0x960/0x960 [ 234.417491][T15781] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 234.417514][T15781] ? retint_kernel+0x2d/0x2d [ 234.417547][T15781] ipv4_conntrack_local+0x169/0x210 [ 234.452351][T15781] nf_hook_slow+0xbf/0x1f0 [ 234.456784][T15781] __ip_local_out+0x403/0x880 [ 234.461468][T15781] ? ip_finish_output+0xd50/0xd50 [ 234.461486][T15781] ? ip_append_data.part.0+0x170/0x170 [ 234.461502][T15781] ? retint_kernel+0x2d/0x2d [ 234.461521][T15781] ip_local_out+0x2d/0x1b0 [ 234.461545][T15781] ip_send_skb+0x42/0xf0 [ 234.461562][T15781] udp_send_skb.isra.0+0x6b2/0x1180 [ 234.461586][T15781] udp_push_pending_frames+0x5c/0xf0 [ 234.461604][T15781] udp_sendmsg+0x12ff/0x2820 [ 234.481055][T15781] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 234.481074][T15781] ? ip_reply_glue_bits+0xc0/0xc0 [ 234.481094][T15781] ? udp4_lib_lookup_skb+0x440/0x440 [ 234.481108][T15781] ? flexible_sched_in+0xcb/0x9c0 [ 234.481124][T15781] ? visit_groups_merge+0x4c0/0x5d0 [ 234.481139][T15781] ? pinned_sched_in+0xa40/0xa40 [ 234.481154][T15781] ? trace_hardirqs_on_thunk+0x1a/0x1c 16:39:53 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2}, 0x3c) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(0xffffffffffffffff) [ 234.481169][T15781] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 234.481185][T15781] ? lockdep_hardirqs_on+0x418/0x5d0 [ 234.481204][T15781] ? retint_kernel+0x2d/0x2d [ 234.500479][T15781] ? trace_hardirqs_on_caller+0x6a/0x220 [ 234.500500][T15781] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 234.500520][T15781] ? retint_kernel+0x2d/0x2d [ 234.500550][T15781] ? security_socket_sendmsg+0x89/0xc0 [ 234.500569][T15781] inet_sendmsg+0x147/0x5e0 [ 234.500583][T15781] ? udp4_lib_lookup_skb+0x440/0x440 [ 234.500594][T15781] ? inet_sendmsg+0x147/0x5e0 [ 234.500606][T15781] ? ipip_gro_receive+0x100/0x100 [ 234.500624][T15781] sock_sendmsg+0xdd/0x130 [ 234.500645][T15781] sock_write_iter+0x27c/0x3e0 [ 234.568755][T15781] ? sock_sendmsg+0x130/0x130 [ 234.607464][T15781] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 234.613715][T15781] ? iov_iter_init+0xee/0x220 [ 234.618411][T15781] new_sync_write+0x4c7/0x760 [ 234.623195][T15781] ? default_llseek+0x2e0/0x2e0 [ 234.623212][T15781] ? common_file_perm+0x113/0x720 [ 234.623229][T15781] ? common_file_perm+0x238/0x720 [ 234.623244][T15781] ? __fget+0x381/0x550 [ 234.623265][T15781] ? apparmor_file_permission+0x25/0x30 [ 234.623281][T15781] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 234.623298][T15781] ? security_file_permission+0x94/0x380 [ 234.623317][T15781] __vfs_write+0xe4/0x110 [ 234.664024][T15781] vfs_write+0x20c/0x580 [ 234.668285][T15781] ksys_write+0xea/0x1f0 [ 234.672546][T15781] ? __ia32_sys_read+0xb0/0xb0 [ 234.677318][T15781] ? do_syscall_64+0x26/0x610 [ 234.682005][T15781] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 234.688081][T15781] ? do_syscall_64+0x26/0x610 16:39:53 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x0, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) [ 234.692778][T15781] __x64_sys_write+0x73/0xb0 [ 234.697377][T15781] do_syscall_64+0x103/0x610 [ 234.701979][T15781] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 234.707871][T15781] RIP: 0033:0x4582f9 [ 234.711770][T15781] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 234.711778][T15781] RSP: 002b:00007f6dcf2fbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 16:39:53 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1, 0x0, 0x10}, 0x900) [ 234.711792][T15781] RAX: ffffffffffffffda RBX: 00007f6dcf2fbc90 RCX: 00000000004582f9 [ 234.711800][T15781] RDX: 000000000000fdef RSI: 0000000020000280 RDI: 0000000000000005 [ 234.711808][T15781] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 234.711816][T15781] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6dcf2fc6d4 [ 234.711824][T15781] R13: 00000000004c7ad0 R14: 00000000004ddba8 R15: 0000000000000006 16:39:53 executing program 2: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r3) recvmsg(r0, &(0x7f0000001840)={&(0x7f0000001480)=@can={0x1d, 0x0}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001500)=""/10, 0xa}, {&(0x7f0000001580)=""/73, 0x49}, {&(0x7f0000001600)=""/184, 0xb8}, {&(0x7f00000016c0)=""/101, 0x65}, {&(0x7f0000001740)=""/81, 0x51}], 0x5}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], r5, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x33c) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(0xffffffffffffffff) 16:39:53 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1, 0x0, 0x11}, 0x900) 16:39:53 executing program 0: socketpair(0x0, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r3) 16:39:53 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2}, 0x3c) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(0xffffffffffffffff) 16:39:53 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x0, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:53 executing program 4 (fault-call:5 fault-nth:93): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) 16:39:53 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2}, 0x3c) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(0xffffffffffffffff) [ 235.171462][T15833] FAULT_INJECTION: forcing a failure. [ 235.171462][T15833] name failslab, interval 1, probability 0, space 0, times 0 [ 235.196142][T15833] CPU: 0 PID: 15833 Comm: syz-executor.4 Not tainted 5.1.0-rc2+ #82 [ 235.204163][T15833] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 235.214225][T15833] Call Trace: [ 235.214255][T15833] dump_stack+0x172/0x1f0 [ 235.214278][T15833] should_fail.cold+0xa/0x15 [ 235.226489][T15833] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 235.232324][T15833] ? lockdep_hardirqs_on+0x418/0x5d0 [ 235.237616][T15833] ? retint_kernel+0x2d/0x2d [ 235.237634][T15833] ? trace_hardirqs_on_caller+0x6a/0x220 [ 235.237656][T15833] __should_failslab+0x121/0x190 [ 235.237675][T15833] should_failslab+0x9/0x14 [ 235.247912][T15833] kmem_cache_alloc+0x47/0x6f0 [ 235.247927][T15833] ? retint_kernel+0x2d/0x2d [ 235.247960][T15833] skb_clone+0x150/0x3b0 [ 235.257380][T15833] ip_mc_output+0x3aa/0xf70 [ 235.257402][T15833] ? __ip_queue_xmit+0x1bf0/0x1bf0 [ 235.257421][T15833] ? ip_append_data.part.0+0x170/0x170 [ 235.275478][T15833] ? retint_kernel+0x2d/0x2d [ 235.290601][T15833] ip_local_out+0xc4/0x1b0 [ 235.295031][T15833] ip_send_skb+0x42/0xf0 [ 235.299316][T15833] udp_send_skb.isra.0+0x6b2/0x1180 [ 235.304529][T15833] udp_push_pending_frames+0x5c/0xf0 [ 235.309833][T15833] udp_sendmsg+0x12ff/0x2820 [ 235.314443][T15833] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 16:39:53 executing program 0: socketpair(0x1e, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r3) 16:39:53 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x0, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) [ 235.320700][T15833] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 235.326955][T15833] ? ip_reply_glue_bits+0xc0/0xc0 [ 235.332000][T15833] ? udp4_lib_lookup_skb+0x440/0x440 [ 235.337292][T15833] ? pinned_sched_in+0xa40/0xa40 [ 235.342239][T15833] ? perf_event_pid_type+0xf0/0xf0 [ 235.347361][T15833] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 235.352832][T15833] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 235.358303][T15833] ? lockdep_hardirqs_on+0x418/0x5d0 [ 235.363597][T15833] ? trace_hardirqs_on_caller+0x6a/0x220 16:39:54 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x0, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) [ 235.369248][T15833] ? ___might_sleep+0x163/0x280 [ 235.374108][T15833] ? __might_sleep+0x95/0x190 [ 235.378798][T15833] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 235.384449][T15833] ? aa_sk_perm+0x288/0x880 [ 235.388969][T15833] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 235.394525][T15833] inet_sendmsg+0x147/0x5e0 [ 235.399068][T15833] ? udp4_lib_lookup_skb+0x440/0x440 [ 235.404379][T15833] ? inet_sendmsg+0x147/0x5e0 [ 235.409054][T15833] ? ipip_gro_receive+0x100/0x100 [ 235.409075][T15833] sock_sendmsg+0xdd/0x130 [ 235.418498][T15833] sock_write_iter+0x27c/0x3e0 [ 235.418517][T15833] ? sock_sendmsg+0x130/0x130 [ 235.418549][T15833] ? aa_path_link+0x460/0x460 [ 235.432615][T15833] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 235.438867][T15833] ? iov_iter_init+0xee/0x220 [ 235.443567][T15833] new_sync_write+0x4c7/0x760 [ 235.448270][T15833] ? default_llseek+0x2e0/0x2e0 [ 235.453130][T15833] ? common_file_perm+0x73/0x720 [ 235.458077][T15833] ? common_file_perm+0x238/0x720 [ 235.463132][T15833] ? __fget+0x381/0x550 [ 235.467333][T15833] ? apparmor_file_permission+0x25/0x30 16:39:54 executing program 0: socketpair(0x1e, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r3) [ 235.472887][T15833] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 235.479161][T15833] ? security_file_permission+0x94/0x380 [ 235.484830][T15833] __vfs_write+0xe4/0x110 [ 235.489173][T15833] vfs_write+0x20c/0x580 [ 235.493426][T15833] ksys_write+0xea/0x1f0 [ 235.497700][T15833] ? __ia32_sys_read+0xb0/0xb0 [ 235.502478][T15833] ? do_syscall_64+0x26/0x610 [ 235.507160][T15833] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 235.513246][T15833] ? do_syscall_64+0x26/0x610 [ 235.517932][T15833] __x64_sys_write+0x73/0xb0 16:39:54 executing program 0: socketpair(0x1e, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r3) [ 235.522545][T15833] do_syscall_64+0x103/0x610 [ 235.527153][T15833] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 235.533049][T15833] RIP: 0033:0x4582f9 [ 235.536949][T15833] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 235.556565][T15833] RSP: 002b:00007f6dcf2fbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 235.564993][T15833] RAX: ffffffffffffffda RBX: 00007f6dcf2fbc90 RCX: 00000000004582f9 [ 235.572972][T15833] RDX: 000000000000fdef RSI: 0000000020000280 RDI: 0000000000000005 [ 235.572982][T15833] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 235.572990][T15833] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6dcf2fc6d4 [ 235.572998][T15833] R13: 00000000004c7ad0 R14: 00000000004ddba8 R15: 0000000000000006 16:39:54 executing program 2: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r2) recvmsg(r0, &(0x7f0000001840)={&(0x7f0000001480)=@can={0x1d, 0x0}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001500)=""/10, 0xa}, {&(0x7f0000001580)=""/73, 0x49}, {&(0x7f0000001600)=""/184, 0xb8}, {&(0x7f00000016c0)=""/101, 0x65}, {&(0x7f0000001740)=""/81, 0x51}], 0x5}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], r4, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r1) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r5) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r6) 16:39:54 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x0, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:54 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2}, 0x3c) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r3) 16:39:54 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1, 0x0, 0xaa}, 0x900) 16:39:54 executing program 0: socketpair(0x1e, 0x1, 0x0, 0x0) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r1) 16:39:54 executing program 4 (fault-call:5 fault-nth:94): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) 16:39:54 executing program 0: socketpair(0x1e, 0x1, 0x0, 0x0) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r1) 16:39:54 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1, 0x0, 0x300}, 0x900) [ 236.089713][T15870] FAULT_INJECTION: forcing a failure. [ 236.089713][T15870] name failslab, interval 1, probability 0, space 0, times 0 [ 236.147158][T15870] CPU: 1 PID: 15870 Comm: syz-executor.4 Not tainted 5.1.0-rc2+ #82 [ 236.155169][T15870] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 236.165218][T15870] Call Trace: [ 236.165246][T15870] dump_stack+0x172/0x1f0 [ 236.165271][T15870] should_fail.cold+0xa/0x15 [ 236.165298][T15870] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 236.183258][T15870] ? lockdep_hardirqs_on+0x418/0x5d0 [ 236.188548][T15870] ? ipt_do_table+0xec8/0x1b90 [ 236.193497][T15870] ? trace_hardirqs_on+0x67/0x230 [ 236.198540][T15870] __should_failslab+0x121/0x190 [ 236.203485][T15870] should_failslab+0x9/0x14 [ 236.208003][T15870] kmem_cache_alloc_node+0x56/0x710 [ 236.213212][T15870] ? nf_ct_deliver_cached_events+0x216/0x6e0 [ 236.219204][T15870] __alloc_skb+0xd5/0x5e0 [ 236.223538][T15870] ? skb_trim+0x190/0x190 [ 236.223560][T15870] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 236.223579][T15870] ip_do_fragment+0x9e4/0x2520 [ 236.223596][T15870] ? ip_copy_metadata+0xcb0/0xcb0 [ 236.223620][T15870] ip_fragment.constprop.0+0x176/0x240 [ 236.234157][T15870] ip_finish_output+0x5fd/0xd50 [ 236.234176][T15870] ip_mc_output+0x292/0xf70 [ 236.234199][T15870] ? __ip_queue_xmit+0x1bf0/0x1bf0 [ 236.243952][T15870] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 236.243967][T15870] ? prandom_u32_state+0x13/0x180 [ 236.243984][T15870] ? ip_fragment.constprop.0+0x240/0x240 [ 236.244003][T15870] ? __ip_make_skb+0xf15/0x1820 [ 236.270116][T15870] ip_local_out+0xc4/0x1b0 [ 236.270136][T15870] ip_send_skb+0x42/0xf0 [ 236.270153][T15870] udp_send_skb.isra.0+0x6b2/0x1180 [ 236.270177][T15870] udp_push_pending_frames+0x5c/0xf0 [ 236.270202][T15870] udp_sendmsg+0x12ff/0x2820 [ 236.309338][T15870] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 236.315583][T15870] ? __lock_acquire+0x548/0x3fb0 [ 236.320522][T15870] ? ip_reply_glue_bits+0xc0/0xc0 [ 236.325555][T15870] ? udp4_lib_lookup_skb+0x440/0x440 [ 236.331293][T15870] ? is_bpf_text_address+0xac/0x170 [ 236.336503][T15870] ? find_held_lock+0x35/0x130 [ 236.341271][T15870] ? is_bpf_text_address+0xac/0x170 16:39:54 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2}, 0x3c) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r3) 16:39:54 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x0, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:54 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1, 0x0, 0x500}, 0x900) 16:39:54 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1, 0x0, 0x600}, 0x900) [ 236.346488][T15870] ? ___might_sleep+0x163/0x280 [ 236.351351][T15870] ? __might_sleep+0x95/0x190 [ 236.356042][T15870] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 236.361681][T15870] ? aa_sk_perm+0x288/0x880 [ 236.366198][T15870] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 236.371750][T15870] inet_sendmsg+0x147/0x5e0 [ 236.376257][T15870] ? udp4_lib_lookup_skb+0x440/0x440 [ 236.381540][T15870] ? inet_sendmsg+0x147/0x5e0 [ 236.386224][T15870] ? ipip_gro_receive+0x100/0x100 [ 236.391264][T15870] sock_sendmsg+0xdd/0x130 [ 236.395697][T15870] sock_write_iter+0x27c/0x3e0 [ 236.400481][T15870] ? sock_sendmsg+0x130/0x130 [ 236.405173][T15870] ? aa_path_link+0x460/0x460 [ 236.409856][T15870] ? find_held_lock+0x35/0x130 [ 236.409872][T15870] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 236.409887][T15870] ? iov_iter_init+0xee/0x220 [ 236.409908][T15870] new_sync_write+0x4c7/0x760 [ 236.409926][T15870] ? default_llseek+0x2e0/0x2e0 [ 236.409939][T15870] ? retint_kernel+0x2d/0x2d [ 236.409963][T15870] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 236.409981][T15870] ? retint_kernel+0x2d/0x2d [ 236.420963][T15870] __vfs_write+0xe4/0x110 [ 236.420983][T15870] vfs_write+0x20c/0x580 [ 236.421003][T15870] ksys_write+0xea/0x1f0 [ 236.421020][T15870] ? __ia32_sys_read+0xb0/0xb0 [ 236.421050][T15870] __x64_sys_write+0x73/0xb0 [ 236.471876][T15870] ? do_syscall_64+0x5b/0x610 [ 236.476557][T15870] do_syscall_64+0x103/0x610 [ 236.481159][T15870] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 236.487054][T15870] RIP: 0033:0x4582f9 [ 236.487070][T15870] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 236.487078][T15870] RSP: 002b:00007f6dcf2fbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 236.487092][T15870] RAX: ffffffffffffffda RBX: 00007f6dcf2fbc90 RCX: 00000000004582f9 [ 236.487107][T15870] RDX: 000000000000fdef RSI: 0000000020000280 RDI: 0000000000000005 [ 236.510580][T15870] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 236.510589][T15870] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6dcf2fc6d4 [ 236.510598][T15870] R13: 00000000004c7ad0 R14: 00000000004ddba8 R15: 0000000000000006 16:39:55 executing program 2: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f0000001840)={&(0x7f0000001480)=@can={0x1d, 0x0}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001500)=""/10, 0xa}, {&(0x7f0000001580)=""/73, 0x49}, {&(0x7f0000001600)=""/184, 0xb8}, {&(0x7f00000016c0)=""/101, 0x65}, {&(0x7f0000001740)=""/81, 0x51}], 0x5}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], r3, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r4) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r5) 16:39:55 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x0, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:55 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1, 0x0, 0x700}, 0x900) 16:39:55 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r3) recvmsg(r0, &(0x7f0000001840)={&(0x7f0000001480)=@can={0x1d, 0x0}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001500)=""/10, 0xa}, {&(0x7f0000001580)=""/73, 0x49}, {&(0x7f0000001600)=""/184, 0xb8}, {&(0x7f00000016c0)=""/101, 0x65}, {&(0x7f0000001740)=""/81, 0x51}], 0x5}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], r5, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x33c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r6) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r7) 16:39:55 executing program 4 (fault-call:5 fault-nth:95): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) 16:39:55 executing program 0: socketpair(0x1e, 0x1, 0x0, 0x0) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r1) [ 236.918080][T15917] FAULT_INJECTION: forcing a failure. [ 236.918080][T15917] name failslab, interval 1, probability 0, space 0, times 0 [ 236.931210][T15917] CPU: 0 PID: 15917 Comm: syz-executor.4 Not tainted 5.1.0-rc2+ #82 [ 236.939193][T15917] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 236.949249][T15917] Call Trace: [ 236.952557][T15917] dump_stack+0x172/0x1f0 [ 236.956902][T15917] should_fail.cold+0xa/0x15 [ 236.961502][T15917] ? fault_create_debugfs_attr+0x1e0/0x1e0 16:39:55 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r0, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r2) 16:39:55 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1, 0x0, 0x900}, 0x900) 16:39:55 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r0, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r2) [ 236.967321][T15917] ? retint_kernel+0x2d/0x2d [ 236.971915][T15917] ? trace_hardirqs_on_caller+0x6a/0x220 [ 236.977562][T15917] __should_failslab+0x121/0x190 [ 236.982498][T15917] should_failslab+0x9/0x14 [ 236.982545][T15917] kmem_cache_alloc+0x47/0x6f0 [ 236.982570][T15917] skb_clone+0x150/0x3b0 [ 236.992385][T15917] ip_mc_output+0x3aa/0xf70 [ 236.992406][T15917] ? __ip_queue_xmit+0x1bf0/0x1bf0 [ 236.992420][T15917] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 236.992443][T15917] ? prandom_u32_state+0x13/0x180 16:39:55 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x0, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) [ 236.992461][T15917] ? ip_append_data.part.0+0x170/0x170 [ 236.992481][T15917] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 237.017542][T15917] ? ip_idents_reserve+0x133/0x1d0 [ 237.017563][T15917] ip_local_out+0xc4/0x1b0 [ 237.017585][T15917] iptunnel_xmit+0x58e/0x980 [ 237.017609][T15917] ip_tunnel_xmit+0x1038/0x2bfa [ 237.047672][T15917] ? ip_md_tunnel_xmit+0x1640/0x1640 [ 237.047690][T15917] ? __lock_acquire+0x4bf/0x3fb0 [ 237.047704][T15917] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 237.047723][T15917] ? lock_downgrade+0x880/0x880 [ 237.047754][T15917] __gre_xmit+0x5e9/0x9a0 [ 237.047778][T15917] gre_tap_xmit+0x3e5/0x660 [ 237.072987][T15917] dev_hard_start_xmit+0x1b2/0x980 [ 237.073012][T15917] sch_direct_xmit+0x370/0xf70 [ 237.073034][T15917] ? dev_watchdog+0x800/0x800 [ 237.073049][T15917] ? lock_acquire+0x140/0x3f0 [ 237.073069][T15917] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 237.073088][T15917] __dev_queue_xmit+0x282d/0x36b0 [ 237.082691][T15917] ? __lock_acquire+0x548/0x3fb0 [ 237.082717][T15917] ? netdev_core_pick_tx+0x300/0x300 16:39:55 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x0, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) [ 237.082733][T15917] ? ip_do_fragment+0x1d2b/0x2520 [ 237.082748][T15917] ? find_held_lock+0x35/0x130 [ 237.082764][T15917] ? ip_do_fragment+0x1d2b/0x2520 [ 237.082791][T15917] ? mark_held_locks+0xa4/0xf0 [ 237.096858][T15917] ? ip_finish_output2+0x12b3/0x1740 [ 237.096872][T15917] ? ip_do_fragment+0x1d2b/0x2520 [ 237.096885][T15917] ? ip_finish_output2+0x12b3/0x1740 [ 237.096906][T15917] dev_queue_xmit+0x18/0x20 [ 237.096919][T15917] ? dev_queue_xmit+0x18/0x20 [ 237.096933][T15917] ip_finish_output2+0x102d/0x1740 [ 237.096955][T15917] ? ip_copy_metadata+0xcb0/0xcb0 [ 237.133445][T15917] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 237.133466][T15917] ip_do_fragment+0x1d2b/0x2520 [ 237.133480][T15917] ? ip_do_fragment+0x1d2b/0x2520 [ 237.133497][T15917] ? ip_copy_metadata+0xcb0/0xcb0 [ 237.133523][T15917] ip_fragment.constprop.0+0x176/0x240 [ 237.133548][T15917] ip_finish_output+0x5fd/0xd50 [ 237.204489][T15917] ip_mc_output+0x292/0xf70 [ 237.209017][T15917] ? __ip_queue_xmit+0x1bf0/0x1bf0 [ 237.214152][T15917] ? ip_fragment.constprop.0+0x240/0x240 16:39:55 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x0, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) [ 237.219809][T15917] ? __ip_make_skb+0xf15/0x1820 [ 237.224661][T15917] ip_local_out+0xc4/0x1b0 [ 237.229085][T15917] ip_send_skb+0x42/0xf0 [ 237.233338][T15917] udp_send_skb.isra.0+0x6b2/0x1180 [ 237.238562][T15917] udp_push_pending_frames+0x5c/0xf0 [ 237.243853][T15917] udp_sendmsg+0x12ff/0x2820 [ 237.248461][T15917] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 237.254703][T15917] ? __lock_acquire+0x548/0x3fb0 [ 237.254718][T15917] ? ip_reply_glue_bits+0xc0/0xc0 [ 237.254737][T15917] ? udp4_lib_lookup_skb+0x440/0x440 [ 237.254757][T15917] ? is_bpf_text_address+0xac/0x170 [ 237.254771][T15917] ? find_held_lock+0x35/0x130 [ 237.254787][T15917] ? is_bpf_text_address+0xac/0x170 [ 237.254811][T15917] ? ___might_sleep+0x163/0x280 [ 237.254830][T15917] ? __might_sleep+0x95/0x190 [ 237.294631][T15917] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 237.300271][T15917] ? aa_sk_perm+0x288/0x880 [ 237.304805][T15917] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 237.310358][T15917] inet_sendmsg+0x147/0x5e0 [ 237.314867][T15917] ? udp4_lib_lookup_skb+0x440/0x440 [ 237.320172][T15917] ? inet_sendmsg+0x147/0x5e0 [ 237.324852][T15917] ? ipip_gro_receive+0x100/0x100 [ 237.329886][T15917] sock_sendmsg+0xdd/0x130 [ 237.334326][T15917] sock_write_iter+0x27c/0x3e0 [ 237.339093][T15917] ? sock_sendmsg+0x130/0x130 [ 237.343783][T15917] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 237.350029][T15917] ? iov_iter_init+0xee/0x220 [ 237.354718][T15917] new_sync_write+0x4c7/0x760 [ 237.359400][T15917] ? default_llseek+0x2e0/0x2e0 [ 237.359424][T15917] ? common_file_perm+0x238/0x720 [ 237.359448][T15917] ? __fget+0x381/0x550 [ 237.359471][T15917] ? apparmor_file_permission+0x25/0x30 [ 237.369314][T15917] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 237.369333][T15917] ? security_file_permission+0x94/0x380 [ 237.369353][T15917] __vfs_write+0xe4/0x110 [ 237.369373][T15917] vfs_write+0x20c/0x580 [ 237.369393][T15917] ksys_write+0xea/0x1f0 [ 237.369412][T15917] ? __ia32_sys_read+0xb0/0xb0 [ 237.369429][T15917] ? do_syscall_64+0x26/0x610 [ 237.369453][T15917] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 237.369473][T15917] ? do_syscall_64+0x26/0x610 [ 237.423850][T15917] __x64_sys_write+0x73/0xb0 [ 237.428454][T15917] do_syscall_64+0x103/0x610 [ 237.433053][T15917] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 237.438947][T15917] RIP: 0033:0x4582f9 [ 237.442842][T15917] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 237.462453][T15917] RSP: 002b:00007f6dcf2fbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 237.462470][T15917] RAX: ffffffffffffffda RBX: 00007f6dcf2fbc90 RCX: 00000000004582f9 [ 237.462478][T15917] RDX: 000000000000fdef RSI: 0000000020000280 RDI: 0000000000000005 [ 237.462486][T15917] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 237.462495][T15917] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6dcf2fc6d4 [ 237.462511][T15917] R13: 00000000004c7ad0 R14: 00000000004ddba8 R15: 0000000000000006 16:39:56 executing program 2: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f0000001840)={&(0x7f0000001480)=@can={0x1d, 0x0}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001500)=""/10, 0xa}, {&(0x7f0000001580)=""/73, 0x49}, {&(0x7f0000001600)=""/184, 0xb8}, {&(0x7f00000016c0)=""/101, 0x65}, {&(0x7f0000001740)=""/81, 0x51}], 0x5}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], r2, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r4) 16:39:56 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x0, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:56 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r0, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r2) 16:39:56 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1, 0x0, 0xa00}, 0x900) 16:39:56 executing program 4 (fault-call:5 fault-nth:96): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) 16:39:56 executing program 3: socketpair(0x0, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r3) [ 237.796395][T15957] FAULT_INJECTION: forcing a failure. [ 237.796395][T15957] name failslab, interval 1, probability 0, space 0, times 0 [ 237.809312][T15957] CPU: 1 PID: 15957 Comm: syz-executor.4 Not tainted 5.1.0-rc2+ #82 [ 237.817292][T15957] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 237.827343][T15957] Call Trace: [ 237.830639][T15957] dump_stack+0x172/0x1f0 [ 237.834977][T15957] should_fail.cold+0xa/0x15 [ 237.839571][T15957] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 237.845402][T15957] ? kasan_check_read+0x11/0x20 [ 237.850266][T15957] __should_failslab+0x121/0x190 [ 237.850282][T15957] should_failslab+0x9/0x14 [ 237.850297][T15957] kmem_cache_alloc+0x47/0x6f0 [ 237.850318][T15957] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 237.870701][T15957] ? __fib_lookup+0x197/0x200 [ 237.875397][T15957] dst_alloc+0x10e/0x200 [ 237.879657][T15957] rt_dst_alloc+0x83/0x3f0 [ 237.884082][T15957] ip_route_output_key_hash_rcu+0x97d/0x30e0 [ 237.884107][T15957] ? ip_route_input_noref+0x280/0x280 [ 237.884128][T15957] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 237.901687][T15957] ? kasan_check_read+0x11/0x20 [ 237.906553][T15957] ip_route_output_key_hash+0x212/0x380 [ 237.912105][T15957] ? ip_route_output_key_hash_rcu+0x30e0/0x30e0 [ 237.918361][T15957] ? __skb_get_hash_symmetric+0x730/0x730 [ 237.924095][T15957] ip_route_output_flow+0x28/0xc0 [ 237.929128][T15957] ip_tunnel_xmit+0x788/0x2bfa [ 237.933905][T15957] ? ip_md_tunnel_xmit+0x1640/0x1640 [ 237.939198][T15957] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 237.945097][T15957] ? perf_event_pid_type+0xf0/0xf0 [ 237.945134][T15957] __gre_xmit+0x5e9/0x9a0 [ 237.945159][T15957] gre_tap_xmit+0x3e5/0x660 [ 237.954611][T15957] dev_hard_start_xmit+0x1b2/0x980 [ 237.954635][T15957] sch_direct_xmit+0x370/0xf70 [ 237.954654][T15957] ? mark_held_locks+0xa4/0xf0 [ 237.974432][T15957] ? dev_watchdog+0x800/0x800 [ 237.979122][T15957] ? lock_acquire+0x140/0x3f0 [ 237.983803][T15957] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 237.990058][T15957] __dev_queue_xmit+0x282d/0x36b0 [ 237.995087][T15957] ? __lock_acquire+0x548/0x3fb0 [ 238.000028][T15957] ? __schedule+0x81f/0x1cc0 [ 238.004634][T15957] ? netdev_core_pick_tx+0x300/0x300 [ 238.009926][T15957] ? ip_do_fragment+0x1d2b/0x2520 [ 238.014956][T15957] ? find_held_lock+0x35/0x130 [ 238.019733][T15957] ? ip_do_fragment+0x1d2b/0x2520 [ 238.024771][T15957] ? mark_held_locks+0xa4/0xf0 [ 238.029537][T15957] ? ip_finish_output2+0x12b3/0x1740 [ 238.034825][T15957] ? ip_do_fragment+0x1d2b/0x2520 [ 238.039853][T15957] ? ip_finish_output2+0x12b3/0x1740 [ 238.045153][T15957] dev_queue_xmit+0x18/0x20 [ 238.049655][T15957] ? dev_queue_xmit+0x18/0x20 [ 238.054336][T15957] ip_finish_output2+0x102d/0x1740 [ 238.059476][T15957] ? ip_copy_metadata+0xcb0/0xcb0 [ 238.064511][T15957] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 238.064532][T15957] ip_do_fragment+0x1d2b/0x2520 [ 238.064544][T15957] ? ip_do_fragment+0x1d2b/0x2520 [ 238.064562][T15957] ? ip_copy_metadata+0xcb0/0xcb0 [ 238.064588][T15957] ip_fragment.constprop.0+0x176/0x240 [ 238.064606][T15957] ip_finish_output+0x5fd/0xd50 [ 238.085690][T15957] ip_mc_output+0x292/0xf70 [ 238.085712][T15957] ? __ip_queue_xmit+0x1bf0/0x1bf0 [ 238.085728][T15957] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 238.085743][T15957] ? prandom_u32_state+0x13/0x180 [ 238.085760][T15957] ? ip_fragment.constprop.0+0x240/0x240 [ 238.085779][T15957] ? __ip_make_skb+0xf15/0x1820 [ 238.116892][T15957] ip_local_out+0xc4/0x1b0 [ 238.131747][T15957] ip_send_skb+0x42/0xf0 [ 238.135999][T15957] udp_send_skb.isra.0+0x6b2/0x1180 [ 238.141217][T15957] udp_push_pending_frames+0x5c/0xf0 [ 238.146506][T15957] udp_sendmsg+0x12ff/0x2820 [ 238.146526][T15957] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 238.146541][T15957] ? __lock_acquire+0x548/0x3fb0 [ 238.146556][T15957] ? ip_reply_glue_bits+0xc0/0xc0 [ 238.146576][T15957] ? udp4_lib_lookup_skb+0x440/0x440 [ 238.146598][T15957] ? is_bpf_text_address+0xac/0x170 [ 238.177766][T15957] ? find_held_lock+0x35/0x130 [ 238.182541][T15957] ? is_bpf_text_address+0xac/0x170 [ 238.187752][T15957] ? ___might_sleep+0x163/0x280 [ 238.192609][T15957] ? __might_sleep+0x95/0x190 [ 238.197296][T15957] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 238.197312][T15957] ? aa_sk_perm+0x288/0x880 [ 238.197342][T15957] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 238.212988][T15957] inet_sendmsg+0x147/0x5e0 [ 238.217505][T15957] ? udp4_lib_lookup_skb+0x440/0x440 [ 238.222790][T15957] ? inet_sendmsg+0x147/0x5e0 [ 238.222804][T15957] ? ipip_gro_receive+0x100/0x100 [ 238.222823][T15957] sock_sendmsg+0xdd/0x130 [ 238.222841][T15957] sock_write_iter+0x27c/0x3e0 [ 238.222860][T15957] ? sock_sendmsg+0x130/0x130 16:39:56 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x0, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:56 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r3) 16:39:56 executing program 3: socketpair(0x0, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r3) 16:39:56 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1, 0x0, 0x1100}, 0x900) 16:39:56 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r3) 16:39:56 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1, 0x0, 0x3f00}, 0x900) [ 238.222885][T15957] ? aa_path_link+0x460/0x460 [ 238.222899][T15957] ? find_held_lock+0x35/0x130 [ 238.222919][T15957] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 238.262058][T15957] ? iov_iter_init+0xee/0x220 [ 238.266743][T15957] new_sync_write+0x4c7/0x760 [ 238.271432][T15957] ? default_llseek+0x2e0/0x2e0 [ 238.276395][T15957] ? common_file_perm+0x238/0x720 [ 238.281419][T15957] ? __fget+0x381/0x550 [ 238.285594][T15957] ? apparmor_file_permission+0x25/0x30 [ 238.291145][T15957] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 238.297394][T15957] ? security_file_permission+0x94/0x380 [ 238.303044][T15957] __vfs_write+0xe4/0x110 [ 238.303065][T15957] vfs_write+0x20c/0x580 [ 238.303090][T15957] ksys_write+0xea/0x1f0 [ 238.315862][T15957] ? __ia32_sys_read+0xb0/0xb0 [ 238.320635][T15957] ? do_syscall_64+0x26/0x610 [ 238.325318][T15957] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 238.331385][T15957] ? do_syscall_64+0x26/0x610 [ 238.336081][T15957] __x64_sys_write+0x73/0xb0 [ 238.340675][T15957] do_syscall_64+0x103/0x610 [ 238.345269][T15957] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 238.351157][T15957] RIP: 0033:0x4582f9 [ 238.351173][T15957] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 238.351181][T15957] RSP: 002b:00007f6dcf2fbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 238.351196][T15957] RAX: ffffffffffffffda RBX: 00007f6dcf2fbc90 RCX: 00000000004582f9 [ 238.351204][T15957] RDX: 000000000000fdef RSI: 0000000020000280 RDI: 0000000000000005 [ 238.351219][T15957] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 238.374683][T15957] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6dcf2fc6d4 [ 238.374692][T15957] R13: 00000000004c7ad0 R14: 00000000004ddba8 R15: 0000000000000006 16:39:57 executing program 2: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f0000001840)={&(0x7f0000001480)=@can={0x1d, 0x0}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001500)=""/10, 0xa}, {&(0x7f0000001580)=""/73, 0x49}, {&(0x7f0000001600)=""/184, 0xb8}, {&(0x7f00000016c0)=""/101, 0x65}, {&(0x7f0000001740)=""/81, 0x51}], 0x5}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], r2, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r4) 16:39:57 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1, 0x0, 0x4000}, 0x900) 16:39:57 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r3) 16:39:57 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x0, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:57 executing program 3: socketpair(0x0, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r3) 16:39:57 executing program 4 (fault-call:5 fault-nth:97): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) [ 238.698635][T15998] FAULT_INJECTION: forcing a failure. [ 238.698635][T15998] name failslab, interval 1, probability 0, space 0, times 0 [ 238.711474][T15998] CPU: 0 PID: 15998 Comm: syz-executor.4 Not tainted 5.1.0-rc2+ #82 [ 238.719462][T15998] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 238.729513][T15998] Call Trace: [ 238.732814][T15998] dump_stack+0x172/0x1f0 [ 238.737161][T15998] should_fail.cold+0xa/0x15 [ 238.741751][T15998] ? retint_kernel+0x2d/0x2d [ 238.746340][T15998] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 238.752148][T15998] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 238.757620][T15998] __should_failslab+0x121/0x190 [ 238.762574][T15998] should_failslab+0x9/0x14 [ 238.767087][T15998] kmem_cache_alloc+0x47/0x6f0 [ 238.771872][T15998] skb_clone+0x150/0x3b0 [ 238.776129][T15998] ip_mc_output+0x3aa/0xf70 [ 238.776150][T15998] ? __ip_queue_xmit+0x1bf0/0x1bf0 [ 238.776167][T15998] ? ip_rt_update_pmtu+0x247/0x9e0 [ 238.776181][T15998] ? ip_append_data.part.0+0x170/0x170 [ 238.776196][T15998] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 238.776211][T15998] ? ip_idents_reserve+0x133/0x1d0 [ 238.776227][T15998] ip_local_out+0xc4/0x1b0 [ 238.776250][T15998] iptunnel_xmit+0x58e/0x980 [ 238.776262][T15998] ? write_comp_data+0x30/0x70 [ 238.776283][T15998] ip_tunnel_xmit+0x1038/0x2bfa [ 238.776308][T15998] ? __bpf_trace_preemptirq_template+0x21/0x30 [ 238.776324][T15998] ? ip_md_tunnel_xmit+0x1640/0x1640 [ 238.776340][T15998] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 238.776360][T15998] ? retint_kernel+0x2d/0x2d [ 238.776390][T15998] __gre_xmit+0x5e9/0x9a0 [ 238.785994][T15998] gre_tap_xmit+0x3e5/0x660 [ 238.786017][T15998] dev_hard_start_xmit+0x1b2/0x980 [ 238.786039][T15998] sch_direct_xmit+0x370/0xf70 [ 238.865928][T15998] ? retint_kernel+0x2d/0x2d [ 238.870517][T15998] ? dev_watchdog+0x800/0x800 [ 238.875193][T15998] ? dev_queue_xmit+0x18/0x20 [ 238.879869][T15998] ? debug_smp_processor_id+0x10/0x280 [ 238.885320][T15998] ? __sanitizer_cov_trace_pc+0x11/0x50 [ 238.890862][T15998] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 238.897097][T15998] __dev_queue_xmit+0x282d/0x36b0 [ 238.902111][T15998] ? __lock_acquire+0x548/0x3fb0 [ 238.907049][T15998] ? netdev_core_pick_tx+0x300/0x300 [ 238.912331][T15998] ? ip_do_fragment+0x1d2b/0x2520 [ 238.917350][T15998] ? find_held_lock+0x35/0x130 [ 238.922111][T15998] ? ip_do_fragment+0x1d2b/0x2520 [ 238.927135][T15998] ? mark_held_locks+0xa4/0xf0 [ 238.931891][T15998] ? ip_finish_output2+0x12b3/0x1740 [ 238.937170][T15998] ? ip_do_fragment+0x1d2b/0x2520 [ 238.942187][T15998] ? ip_finish_output2+0x12b3/0x1740 [ 238.947473][T15998] dev_queue_xmit+0x18/0x20 [ 238.951971][T15998] ? dev_queue_xmit+0x18/0x20 [ 238.956642][T15998] ip_finish_output2+0x102d/0x1740 [ 238.962969][T15998] ? ip_copy_metadata+0xcb0/0xcb0 [ 238.967988][T15998] ? ip_copy_metadata+0xcb0/0xcb0 [ 238.973010][T15998] ip_do_fragment+0x1d2b/0x2520 [ 238.977852][T15998] ? ip_do_fragment+0x1d2b/0x2520 [ 238.982870][T15998] ? ip_copy_metadata+0xcb0/0xcb0 [ 238.988244][T15998] ip_fragment.constprop.0+0x176/0x240 [ 238.993703][T15998] ip_finish_output+0x5fd/0xd50 [ 238.998553][T15998] ip_mc_output+0x292/0xf70 [ 239.003054][T15998] ? __ip_queue_xmit+0x1bf0/0x1bf0 [ 239.008158][T15998] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 239.013612][T15998] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 239.019069][T15998] ? ip_fragment.constprop.0+0x240/0x240 [ 239.024713][T15998] ? trace_hardirqs_on_caller+0x6a/0x220 [ 239.030344][T15998] ip_local_out+0xc4/0x1b0 [ 239.034756][T15998] ip_send_skb+0x42/0xf0 [ 239.038995][T15998] udp_send_skb.isra.0+0x6b2/0x1180 [ 239.044194][T15998] udp_push_pending_frames+0x5c/0xf0 [ 239.049476][T15998] udp_sendmsg+0x12ff/0x2820 [ 239.054062][T15998] ? event_sched_in.isra.0+0x5e8/0xbf0 [ 239.059520][T15998] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 239.065759][T15998] ? ip_reply_glue_bits+0xc0/0xc0 [ 239.070785][T15998] ? udp4_lib_lookup_skb+0x440/0x440 [ 239.076062][T15998] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 239.082294][T15998] ? flexible_sched_in+0xcb/0x9c0 [ 239.087311][T15998] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 239.092762][T15998] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 239.098231][T15998] ? lockdep_hardirqs_on+0x418/0x5d0 [ 239.103513][T15998] ? retint_kernel+0x2d/0x2d [ 239.108103][T15998] ? trace_hardirqs_on_caller+0x6a/0x220 [ 239.113731][T15998] ? pinned_sched_in+0xa40/0xa40 [ 239.119248][T15998] ? ___might_sleep+0x163/0x280 [ 239.124099][T15998] ? __might_sleep+0x95/0x190 [ 239.128783][T15998] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 239.134420][T15998] ? aa_sk_perm+0x288/0x880 [ 239.138957][T15998] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 239.144500][T15998] inet_sendmsg+0x147/0x5e0 [ 239.148998][T15998] ? udp4_lib_lookup_skb+0x440/0x440 [ 239.154270][T15998] ? inet_sendmsg+0x147/0x5e0 [ 239.158936][T15998] ? ipip_gro_receive+0x100/0x100 [ 239.163957][T15998] sock_sendmsg+0xdd/0x130 [ 239.168371][T15998] sock_write_iter+0x27c/0x3e0 [ 239.173129][T15998] ? sock_sendmsg+0x130/0x130 [ 239.177808][T15998] ? aa_path_link+0x460/0x460 [ 239.182481][T15998] ? find_held_lock+0x35/0x130 [ 239.187237][T15998] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 239.193470][T15998] ? iov_iter_init+0xee/0x220 [ 239.198144][T15998] new_sync_write+0x4c7/0x760 [ 239.202816][T15998] ? default_llseek+0x2e0/0x2e0 [ 239.207695][T15998] ? common_file_perm+0x238/0x720 [ 239.212713][T15998] ? __fget+0x381/0x550 [ 239.216867][T15998] ? apparmor_file_permission+0x25/0x30 [ 239.222404][T15998] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 239.228647][T15998] ? security_file_permission+0x94/0x380 [ 239.234277][T15998] __vfs_write+0xe4/0x110 [ 239.238605][T15998] vfs_write+0x20c/0x580 [ 239.242847][T15998] ksys_write+0xea/0x1f0 [ 239.247086][T15998] ? __ia32_sys_read+0xb0/0xb0 [ 239.251896][T15998] ? do_syscall_64+0x26/0x610 [ 239.256572][T15998] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 239.262633][T15998] ? do_syscall_64+0x26/0x610 [ 239.267311][T15998] __x64_sys_write+0x73/0xb0 [ 239.271900][T15998] do_syscall_64+0x103/0x610 [ 239.276489][T15998] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 239.282371][T15998] RIP: 0033:0x4582f9 [ 239.286261][T15998] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 239.305853][T15998] RSP: 002b:00007f6dcf2fbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 239.314265][T15998] RAX: ffffffffffffffda RBX: 00007f6dcf2fbc90 RCX: 00000000004582f9 [ 239.322313][T15998] RDX: 000000000000fdef RSI: 0000000020000280 RDI: 0000000000000005 [ 239.330274][T15998] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 239.338234][T15998] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6dcf2fc6d4 16:39:57 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1, 0x0, 0x80fe}, 0x900) 16:39:57 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r3) 16:39:57 executing program 3: socketpair(0x0, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r3) 16:39:57 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x0, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) [ 239.346198][T15998] R13: 00000000004c7ad0 R14: 00000000004ddba8 R15: 0000000000000006 16:39:58 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r3) 16:39:58 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x0, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:58 executing program 2: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f0000001840)={&(0x7f0000001480)=@can={0x1d, 0x0}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001500)=""/10, 0xa}, {&(0x7f0000001580)=""/73, 0x49}, {&(0x7f0000001600)=""/184, 0xb8}, {&(0x7f00000016c0)=""/101, 0x65}, {&(0x7f0000001740)=""/81, 0x51}], 0x5}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, [], r2, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r4) 16:39:58 executing program 3 (fault-call:7 fault-nth:0): socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2}, 0x3c) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r3) 16:39:58 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1, 0x0, 0xfe80}, 0x900) 16:39:58 executing program 4 (fault-call:5 fault-nth:98): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) 16:39:58 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r3) [ 239.642746][T16046] FAULT_INJECTION: forcing a failure. [ 239.642746][T16046] name failslab, interval 1, probability 0, space 0, times 0 [ 239.658410][T16042] FAULT_INJECTION: forcing a failure. [ 239.658410][T16042] name failslab, interval 1, probability 0, space 0, times 0 [ 239.671135][T16042] CPU: 1 PID: 16042 Comm: syz-executor.4 Not tainted 5.1.0-rc2+ #82 [ 239.679116][T16042] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 239.689181][T16042] Call Trace: [ 239.692485][T16042] dump_stack+0x172/0x1f0 [ 239.696827][T16042] should_fail.cold+0xa/0x15 [ 239.701423][T16042] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 239.707246][T16042] ? kasan_check_read+0x11/0x20 [ 239.712140][T16042] __should_failslab+0x121/0x190 [ 239.717083][T16042] should_failslab+0x9/0x14 [ 239.721585][T16042] kmem_cache_alloc+0x47/0x6f0 [ 239.726350][T16042] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 239.732591][T16042] ? __fib_lookup+0x197/0x200 [ 239.737280][T16042] dst_alloc+0x10e/0x200 [ 239.741533][T16042] rt_dst_alloc+0x83/0x3f0 [ 239.745955][T16042] ip_route_output_key_hash_rcu+0x97d/0x30e0 [ 239.751953][T16042] ? ip_route_input_noref+0x280/0x280 [ 239.757328][T16042] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 239.763569][T16042] ? kasan_check_read+0x11/0x20 [ 239.768428][T16042] ip_route_output_key_hash+0x212/0x380 [ 239.774026][T16042] ? ip_route_output_key_hash_rcu+0x30e0/0x30e0 [ 239.780278][T16042] ? __skb_get_hash_symmetric+0x730/0x730 [ 239.786043][T16042] ip_route_output_flow+0x28/0xc0 [ 239.791072][T16042] ip_tunnel_xmit+0x788/0x2bfa [ 239.795849][T16042] ? ip_md_tunnel_xmit+0x1640/0x1640 [ 239.801140][T16042] ? __lock_acquire+0x548/0x3fb0 [ 239.806075][T16042] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 239.811985][T16042] __gre_xmit+0x5e9/0x9a0 [ 239.816324][T16042] gre_tap_xmit+0x3e5/0x660 [ 239.820838][T16042] dev_hard_start_xmit+0x1b2/0x980 [ 239.825967][T16042] sch_direct_xmit+0x370/0xf70 [ 239.830748][T16042] ? dev_watchdog+0x800/0x800 [ 239.835424][T16042] ? lock_acquire+0x140/0x3f0 [ 239.840292][T16042] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 239.846535][T16042] __dev_queue_xmit+0x282d/0x36b0 [ 239.851582][T16042] ? __lock_acquire+0x548/0x3fb0 [ 239.856534][T16042] ? netdev_core_pick_tx+0x300/0x300 [ 239.861819][T16042] ? ip_do_fragment+0x1d2b/0x2520 [ 239.866845][T16042] ? find_held_lock+0x35/0x130 [ 239.871609][T16042] ? ip_do_fragment+0x1d2b/0x2520 [ 239.876636][T16042] ? mark_held_locks+0xa4/0xf0 [ 239.881397][T16042] ? ip_finish_output2+0x12b3/0x1740 [ 239.886679][T16042] ? ip_do_fragment+0x1d2b/0x2520 16:39:58 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x0, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:58 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1, 0x0, 0x34000}, 0x900) [ 239.891702][T16042] ? ip_finish_output2+0x12b3/0x1740 [ 239.896993][T16042] dev_queue_xmit+0x18/0x20 [ 239.901495][T16042] ? dev_queue_xmit+0x18/0x20 [ 239.906173][T16042] ip_finish_output2+0x102d/0x1740 [ 239.911307][T16042] ? ip_copy_metadata+0xcb0/0xcb0 [ 239.916346][T16042] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 239.922590][T16042] ip_do_fragment+0x1d2b/0x2520 [ 239.927453][T16042] ? ip_do_fragment+0x1d2b/0x2520 [ 239.932480][T16042] ? ip_copy_metadata+0xcb0/0xcb0 [ 239.937517][T16042] ip_fragment.constprop.0+0x176/0x240 [ 239.942980][T16042] ip_finish_output+0x5fd/0xd50 [ 239.947832][T16042] ip_mc_output+0x292/0xf70 [ 239.952344][T16042] ? __ip_queue_xmit+0x1bf0/0x1bf0 [ 239.957464][T16042] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 239.963704][T16042] ? prandom_u32_state+0x13/0x180 [ 239.968731][T16042] ? ip_fragment.constprop.0+0x240/0x240 [ 239.974362][T16042] ? __ip_make_skb+0xf15/0x1820 [ 239.979218][T16042] ip_local_out+0xc4/0x1b0 [ 239.983641][T16042] ip_send_skb+0x42/0xf0 [ 239.987888][T16042] udp_send_skb.isra.0+0x6b2/0x1180 [ 239.993095][T16042] udp_push_pending_frames+0x5c/0xf0 [ 239.998384][T16042] udp_sendmsg+0x12ff/0x2820 [ 240.002978][T16042] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 240.010000][T16042] ? __lock_acquire+0x548/0x3fb0 [ 240.014949][T16042] ? ip_reply_glue_bits+0xc0/0xc0 [ 240.019982][T16042] ? udp4_lib_lookup_skb+0x440/0x440 [ 240.025269][T16042] ? is_bpf_text_address+0xac/0x170 [ 240.030477][T16042] ? find_held_lock+0x35/0x130 [ 240.035251][T16042] ? is_bpf_text_address+0xac/0x170 [ 240.040464][T16042] ? ___might_sleep+0x163/0x280 [ 240.045320][T16042] ? __might_sleep+0x95/0x190 [ 240.050000][T16042] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 240.055639][T16042] ? aa_sk_perm+0x288/0x880 [ 240.060148][T16042] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 240.065694][T16042] inet_sendmsg+0x147/0x5e0 [ 240.070194][T16042] ? udp4_lib_lookup_skb+0x440/0x440 [ 240.075473][T16042] ? inet_sendmsg+0x147/0x5e0 [ 240.080152][T16042] ? ipip_gro_receive+0x100/0x100 [ 240.085177][T16042] sock_sendmsg+0xdd/0x130 [ 240.089597][T16042] sock_write_iter+0x27c/0x3e0 [ 240.094362][T16042] ? sock_sendmsg+0x130/0x130 [ 240.099063][T16042] ? aa_path_link+0x460/0x460 [ 240.103743][T16042] ? find_held_lock+0x35/0x130 [ 240.108509][T16042] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 240.114751][T16042] ? iov_iter_init+0xee/0x220 [ 240.119928][T16042] new_sync_write+0x4c7/0x760 [ 240.124608][T16042] ? default_llseek+0x2e0/0x2e0 [ 240.129476][T16042] ? common_file_perm+0x238/0x720 [ 240.134503][T16042] ? __fget+0x381/0x550 [ 240.138663][T16042] ? apparmor_file_permission+0x25/0x30 [ 240.144208][T16042] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 240.150458][T16042] ? security_file_permission+0x94/0x380 [ 240.156091][T16042] __vfs_write+0xe4/0x110 [ 240.160427][T16042] vfs_write+0x20c/0x580 [ 240.164689][T16042] ksys_write+0xea/0x1f0 [ 240.168933][T16042] ? __ia32_sys_read+0xb0/0xb0 [ 240.173701][T16042] ? do_syscall_64+0x26/0x610 [ 240.178375][T16042] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 240.184447][T16042] ? do_syscall_64+0x26/0x610 [ 240.189132][T16042] __x64_sys_write+0x73/0xb0 [ 240.193722][T16042] do_syscall_64+0x103/0x610 [ 240.198316][T16042] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 240.204203][T16042] RIP: 0033:0x4582f9 [ 240.208096][T16042] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 240.227694][T16042] RSP: 002b:00007f6dcf2fbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 240.236103][T16042] RAX: ffffffffffffffda RBX: 00007f6dcf2fbc90 RCX: 00000000004582f9 [ 240.244069][T16042] RDX: 000000000000fdef RSI: 0000000020000280 RDI: 0000000000000005 [ 240.252070][T16042] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 240.260046][T16042] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6dcf2fc6d4 [ 240.268013][T16042] R13: 00000000004c7ad0 R14: 00000000004ddba8 R15: 0000000000000006 [ 240.301167][T16046] CPU: 1 PID: 16046 Comm: syz-executor.3 Not tainted 5.1.0-rc2+ #82 [ 240.309167][T16046] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 240.319227][T16046] Call Trace: [ 240.322529][T16046] dump_stack+0x172/0x1f0 [ 240.326876][T16046] should_fail.cold+0xa/0x15 [ 240.331476][T16046] ? sock_close+0x1b/0x30 [ 240.335814][T16046] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 240.341629][T16046] ? find_held_lock+0x35/0x130 [ 240.346400][T16046] ? debug_check_no_obj_freed+0x200/0x464 [ 240.352144][T16046] __should_failslab+0x121/0x190 [ 240.357094][T16046] should_failslab+0x9/0x14 [ 240.361605][T16046] kmem_cache_alloc_node+0x56/0x710 [ 240.366820][T16046] __alloc_skb+0xd5/0x5e0 [ 240.371160][T16046] ? skb_trim+0x190/0x190 [ 240.375519][T16046] ? tipc_group_proto_xmit+0x21c/0xa60 [ 240.380991][T16046] tipc_buf_acquire+0x2f/0x100 [ 240.385813][T16046] tipc_msg_create+0x38/0x270 [ 240.390501][T16046] tipc_group_proto_xmit+0x2bb/0xa60 [ 240.395796][T16046] tipc_group_delete+0xfc/0x370 [ 240.400657][T16046] ? tipc_group_create+0x880/0x880 [ 240.405776][T16046] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 240.412017][T16046] ? __tipc_shutdown+0x809/0xcb0 [ 240.416975][T16046] tipc_sk_leave+0x105/0x1e0 [ 240.421572][T16046] ? tipc_sk_withdraw+0x540/0x540 [ 240.426613][T16046] ? do_wait_intr_irq+0x2b0/0x2b0 [ 240.431652][T16046] tipc_release+0x108/0x14d0 [ 240.436245][T16046] ? __sock_release+0x89/0x2b0 [ 240.441022][T16046] __sock_release+0xd3/0x2b0 [ 240.445623][T16046] ? __sock_release+0x2b0/0x2b0 [ 240.450477][T16046] sock_close+0x1b/0x30 [ 240.454635][T16046] __fput+0x2e5/0x8d0 [ 240.458626][T16046] ____fput+0x16/0x20 [ 240.462613][T16046] task_work_run+0x14a/0x1c0 [ 240.467218][T16046] exit_to_usermode_loop+0x273/0x2c0 [ 240.472522][T16046] do_syscall_64+0x52d/0x610 [ 240.477122][T16046] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 240.483024][T16046] RIP: 0033:0x4582f9 [ 240.486928][T16046] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 240.506524][T16046] RSP: 002b:00007f25a5fcac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 240.514922][T16046] RAX: 0000000000000000 RBX: 00007f25a5fcac90 RCX: 00000000004582f9 [ 240.514948][T16046] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 [ 240.514957][T16046] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 240.514966][T16046] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f25a5fcb6d4 16:39:59 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x0, @mcast1}, 0x80, 0x0}, 0x10c000) sendmsg(r0, &(0x7f00000027c0)={0x0, 0x0, &(0x7f0000002580)=[{0x0}], 0x1, 0x0, 0x0, 0x3e43dbf6}, 0x0) 16:39:59 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1, 0x0, 0x40000}, 0x900) 16:39:59 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x3c) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r3) 16:39:59 executing program 4 (fault-call:5 fault-nth:99): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) [ 240.514975][T16046] R13: 00000000004f5a92 R14: 00000000004cf118 R15: 0000000000000003 [ 240.553866][T16046] kasan: CONFIG_KASAN_INLINE enabled [ 240.560948][T16046] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 240.569020][T16046] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 240.575963][T16046] CPU: 1 PID: 16046 Comm: syz-executor.3 Not tainted 5.1.0-rc2+ #82 [ 240.583934][T16046] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 240.594003][T16046] RIP: 0010:tipc_mcast_filter_msg+0x70/0x17a0 [ 240.600078][T16046] Code: 4c 39 e0 b8 00 00 00 00 4c 0f 44 e0 e8 d9 fa a1 fa 48 b8 00 00 00 00 00 fc ff df 49 8d bc 24 c8 00 00 00 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 43 13 00 00 49 8b 9c 24 c8 00 00 00 48 b8 00 00 [ 240.600256][ T3877] kobject: 'loop1' (000000001fcb396a): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 240.619687][T16046] RSP: 0018:ffff888065f6f958 EFLAGS: 00010202 [ 240.619699][T16046] RAX: dffffc0000000000 RBX: ffff888065f6fab8 RCX: ffffc9000c43e000 [ 240.619708][T16046] RDX: 0000000000000019 RSI: ffffffff86ce76a7 RDI: 00000000000000c8 [ 240.619717][T16046] RBP: ffff888065f6f9c0 R08: ffff8880639f8200 R09: ffffed1015d25bc8 [ 240.619725][T16046] R10: ffffed1015d25bc7 R11: ffff8880ae92de3b R12: 0000000000000000 [ 240.619748][T16046] R13: 0000000000000009 R14: ffff888096454100 R15: ffff88806a072080 [ 240.619759][T16046] FS: 00007f25a5fcb700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 240.619767][T16046] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 240.619774][T16046] CR2: 000000000073c000 CR3: 000000008605e000 CR4: 00000000001406e0 [ 240.619785][T16046] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 240.619793][T16046] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 240.619797][T16046] Call Trace: [ 240.619816][T16046] ? kfree_skbmem+0xaa/0x150 [ 240.619836][T16046] tipc_sk_filter_rcv+0x1ed3/0x34b0 [ 240.636724][ T3877] kobject: 'loop0' (00000000cfaa4458): kobject_uevent_env [ 240.644065][T16046] ? debug_object_deactivate+0x1e4/0x360 [ 240.644082][T16046] ? find_held_lock+0x35/0x130 [ 240.644100][T16046] ? tipc_sk_overlimit2+0xa0/0xa0 16:39:59 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0xa, 0x122000000003, 0x11) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d000076862c681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9880bd7a8a295", 0x30}], 0x1, 0x0, 0x100000}, 0x900) [ 240.644114][T16046] ? lock_downgrade+0x880/0x880 [ 240.644131][T16046] ? __lock_acquire+0x548/0x3fb0 [ 240.644144][T16046] ? __release_sock+0xca/0x3a0 [ 240.644157][T16046] tipc_sk_backlog_rcv+0xeb/0x1e0 [ 240.644177][T16046] ? tipc_sk_mcast_rcv+0x1020/0x1020 [ 240.657132][ T3877] kobject: 'loop0' (00000000cfaa4458): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 240.660095][T16046] ? __local_bh_enable_ip+0x15a/0x270 [ 240.660111][T16046] ? lockdep_hardirqs_on+0x418/0x5d0 [ 240.660125][T16046] ? __release_sock+0xca/0x3a0 [ 240.660139][T16046] ? trace_hardirqs_on+0x67/0x230 [ 240.660151][T16046] ? __release_sock+0xca/0x3a0 [ 240.660170][T16046] ? __local_bh_enable_ip+0x15a/0x270 [ 240.668841][ T3877] kobject: 'loop5' (000000009629a835): kobject_uevent_env [ 240.676088][T16046] __release_sock+0x12e/0x3a0 [ 240.676106][T16046] release_sock+0x59/0x1c0 [ 240.676128][T16046] tipc_release+0x9ea/0x14d0 [ 240.676149][T16046] __sock_release+0xd3/0x2b0 [ 240.676163][T16046] ? __sock_release+0x2b0/0x2b0 [ 240.676175][T16046] sock_close+0x1b/0x30 [ 240.676187][T16046] __fput+0x2e5/0x8d0 [ 240.676202][T16046] ____fput+0x16/0x20 [ 240.676221][T16046] task_work_run+0x14a/0x1c0 [ 240.690570][ T3877] kobject: 'loop5' (000000009629a835): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 240.691706][T16046] exit_to_usermode_loop+0x273/0x2c0 [ 240.691724][T16046] do_syscall_64+0x52d/0x610 [ 240.691741][T16046] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 240.691758][T16046] RIP: 0033:0x4582f9 [ 240.703210][ T3877] kobject: 'loop4' (0000000033843031): kobject_uevent_env [ 240.707671][T16046] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 240.707679][T16046] RSP: 002b:00007f25a5fcac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 240.707693][T16046] RAX: 0000000000000000 RBX: 00007f25a5fcac90 RCX: 00000000004582f9 [ 240.707700][T16046] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 [ 240.707708][T16046] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 240.707716][T16046] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f25a5fcb6d4 [ 240.707731][T16046] R13: 00000000004f5a92 R14: 00000000004cf118 R15: 0000000000000003 [ 240.717498][ T3877] kobject: 'loop4' (0000000033843031): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 240.718957][T16046] Modules linked in: [ 240.772152][T16073] FAULT_INJECTION: forcing a failure. [ 240.772152][T16073] name failslab, interval 1, probability 0, space 0, times 0 [ 240.813498][ T3877] kobject: 'loop5' (000000009629a835): kobject_uevent_env [ 240.817044][T16073] CPU: 1 PID: 16073 Comm: syz-executor.4 Tainted: G D 5.1.0-rc2+ #82 [ 240.817053][T16073] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 240.817065][T16073] Call Trace: [ 240.826953][ T3877] kobject: 'loop5' (000000009629a835): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 240.828835][T16073] dump_stack+0x172/0x1f0 [ 240.828853][T16073] should_fail.cold+0xa/0x15 [ 240.828869][T16073] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 240.828890][T16073] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 241.055807][T16073] __should_failslab+0x121/0x190 [ 241.060748][T16073] should_failslab+0x9/0x14 [ 241.065257][T16073] kmem_cache_alloc+0x47/0x6f0 [ 241.070014][T16073] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 241.076245][T16073] ? __fib_lookup+0x197/0x200 [ 241.080928][T16073] dst_alloc+0x10e/0x200 [ 241.085169][T16073] rt_dst_alloc+0x83/0x3f0 [ 241.089582][T16073] ip_route_output_key_hash_rcu+0x97d/0x30e0 [ 241.095554][T16073] ? ip_route_input_noref+0x280/0x280 [ 241.100916][T16073] ? ip_route_output_key_hash+0x183/0x380 [ 241.106632][T16073] ip_route_output_key_hash+0x212/0x380 [ 241.112169][T16073] ? ip_route_output_key_hash_rcu+0x30e0/0x30e0 [ 241.118907][T16073] ? __skb_get_hash_symmetric+0x730/0x730 [ 241.124619][T16073] ip_route_output_flow+0x28/0xc0 [ 241.129636][T16073] ip_tunnel_xmit+0x788/0x2bfa [ 241.134391][T16073] ? ip_md_tunnel_xmit+0x1640/0x1640 [ 241.139667][T16073] ? __kernel_text_address+0xd/0x40 [ 241.144865][T16073] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 241.150749][T16073] __gre_xmit+0x5e9/0x9a0 [ 241.155074][T16073] ipgre_xmit+0x4e2/0xa70 [ 241.159399][T16073] dev_hard_start_xmit+0x1b2/0x980 [ 241.164505][T16073] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 241.170739][T16073] __dev_queue_xmit+0x2a9a/0x36b0 [ 241.175754][T16073] ? trace_hardirqs_on+0x67/0x230 [ 241.180771][T16073] ? kasan_check_read+0x11/0x20 [ 241.185617][T16073] ? netdev_core_pick_tx+0x300/0x300 [ 241.190891][T16073] ? _raw_spin_unlock_bh+0x31/0x40 [ 241.195997][T16073] ? __sched_text_start+0x8/0x8 [ 241.200841][T16073] ? memcpy+0x46/0x50 [ 241.204811][T16073] dev_queue_xmit+0x18/0x20 [ 241.209306][T16073] ? dev_queue_xmit+0x18/0x20 [ 241.213972][T16073] neigh_connected_output+0x403/0x5f0 [ 241.219341][T16073] ip_finish_output2+0x949/0x1740 [ 241.224357][T16073] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 241.230586][T16073] ? ip_copy_metadata+0xcb0/0xcb0 [ 241.235606][T16073] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 241.241838][T16073] ip_do_fragment+0x1d2b/0x2520 [ 241.246677][T16073] ? ip_do_fragment+0x1d2b/0x2520 [ 241.251717][T16073] ? ip_copy_metadata+0xcb0/0xcb0 [ 241.256736][T16073] ip_fragment.constprop.0+0x176/0x240 [ 241.262200][T16073] ip_finish_output+0x5fd/0xd50 [ 241.267046][T16073] ip_mc_output+0x292/0xf70 [ 241.271544][T16073] ? __ip_queue_xmit+0x1bf0/0x1bf0 [ 241.276646][T16073] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 241.282875][T16073] ? prandom_u32_state+0x13/0x180 [ 241.287892][T16073] ? ip_fragment.constprop.0+0x240/0x240 [ 241.293516][T16073] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 241.299230][T16073] ? ip_idents_reserve+0x133/0x1d0 [ 241.304335][T16073] ip_local_out+0xc4/0x1b0 [ 241.308742][T16073] ip_send_skb+0x42/0xf0 [ 241.312978][T16073] udp_send_skb.isra.0+0x6b2/0x1180 [ 241.318189][T16073] udp_push_pending_frames+0x5c/0xf0 [ 241.323470][T16073] udp_sendmsg+0x12ff/0x2820 [ 241.328059][T16073] ? ima_add_template_entry.cold+0x48/0x48 [ 241.333861][T16073] ? refcount_dec_not_one+0x1f0/0x1f0 [ 241.339225][T16073] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 241.345460][T16073] ? ip_reply_glue_bits+0xc0/0xc0 [ 241.350480][T16073] ? udp4_lib_lookup_skb+0x440/0x440 [ 241.355755][T16073] ? mark_held_locks+0xf0/0xf0 [ 241.360514][T16073] ? __read_once_size_nocheck.constprop.0+0x10/0x10 [ 241.367097][T16073] ? ___might_sleep+0x163/0x280 [ 241.371937][T16073] ? __might_sleep+0x95/0x190 [ 241.376605][T16073] ? aa_sk_perm+0x288/0x880 [ 241.381102][T16073] ? kernel_text_address+0x73/0xf0 [ 241.386208][T16073] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 241.391750][T16073] inet_sendmsg+0x147/0x5e0 [ 241.396242][T16073] ? udp4_lib_lookup_skb+0x440/0x440 [ 241.401515][T16073] ? inet_sendmsg+0x147/0x5e0 [ 241.406180][T16073] ? ipip_gro_receive+0x100/0x100 [ 241.411197][T16073] sock_sendmsg+0xdd/0x130 [ 241.415604][T16073] sock_write_iter+0x27c/0x3e0 [ 241.420364][T16073] ? sock_sendmsg+0x130/0x130 [ 241.425045][T16073] ? aa_path_link+0x460/0x460 [ 241.429713][T16073] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 241.435945][T16073] ? iov_iter_init+0xee/0x220 [ 241.440614][T16073] new_sync_write+0x4c7/0x760 [ 241.445282][T16073] ? default_llseek+0x2e0/0x2e0 [ 241.450123][T16073] ? __fget+0xa3/0x550 [ 241.454187][T16073] ? common_file_perm+0x238/0x720 [ 241.459201][T16073] ? __fget+0x381/0x550 [ 241.463349][T16073] ? apparmor_file_permission+0x25/0x30 [ 241.468886][T16073] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 241.475117][T16073] ? security_file_permission+0x94/0x380 [ 241.480742][T16073] __vfs_write+0xe4/0x110 [ 241.485071][T16073] vfs_write+0x20c/0x580 [ 241.489308][T16073] ksys_write+0xea/0x1f0 [ 241.493540][T16073] ? __ia32_sys_read+0xb0/0xb0 [ 241.498299][T16073] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 241.504356][T16073] __x64_sys_write+0x73/0xb0 [ 241.508937][T16073] do_syscall_64+0x103/0x610 [ 241.513519][T16073] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 241.519417][T16073] RIP: 0033:0x4582f9 [ 241.523310][T16073] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 241.542900][T16073] RSP: 002b:00007f6dcf2dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 241.551297][T16073] RAX: ffffffffffffffda RBX: 00007f6dcf2dac90 RCX: 00000000004582f9 [ 241.559255][T16073] RDX: 000000000000fdef RSI: 0000000020000280 RDI: 0000000000000004 [ 241.567212][T16073] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 241.575170][T16073] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6dcf2db6d4 [ 241.583130][T16073] R13: 00000000004c7ad0 R14: 00000000004ddba8 R15: 0000000000000005 16:40:00 executing program 2: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) recvmsg(r0, &(0x7f0000001840)={&(0x7f0000001480)=@can, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001500)=""/10, 0xa}, {&(0x7f0000001580)=""/73, 0x49}, {&(0x7f0000001600)=""/184, 0xb8}, {&(0x7f00000016c0)=""/101, 0x65}, {&(0x7f0000001740)=""/81, 0x51}], 0x5}, 0x20) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r4) [ 241.618943][T16046] ---[ end trace 8f7c3692423ee473 ]--- [ 241.624629][T16046] RIP: 0010:tipc_mcast_filter_msg+0x70/0x17a0 [ 241.632256][ T3877] kobject: 'loop2' (00000000ab426265): kobject_uevent_env [ 241.652621][ T3877] kobject: 'loop2' (00000000ab426265): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 241.674722][ T3877] kobject: 'loop4' (0000000033843031): kobject_uevent_env [ 241.681351][T16046] Code: 4c 39 e0 b8 00 00 00 00 4c 0f 44 e0 e8 d9 fa a1 fa 48 b8 00 00 00 00 00 fc ff df 49 8d bc 24 c8 00 00 00 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 43 13 00 00 49 8b 9c 24 c8 00 00 00 48 b8 00 00 [ 241.693162][ T3877] kobject: 'loop4' (0000000033843031): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 241.702269][T16046] RSP: 0018:ffff888065f6f958 EFLAGS: 00010202 [ 241.718830][T16046] RAX: dffffc0000000000 RBX: ffff888065f6fab8 RCX: ffffc9000c43e000 [ 241.721493][ T3877] kobject: 'loop1' (000000001fcb396a): kobject_uevent_env [ 241.732321][T16046] RDX: 0000000000000019 RSI: ffffffff86ce76a7 RDI: 00000000000000c8 [ 241.742678][ T3877] kobject: 'loop1' (000000001fcb396a): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 241.744359][T16046] RBP: ffff888065f6f9c0 R08: ffff8880639f8200 R09: ffffed1015d25bc8 [ 241.761409][T16046] R10: ffffed1015d25bc7 R11: ffff8880ae92de3b R12: 0000000000000000 [ 241.769730][T16046] R13: 0000000000000009 R14: ffff888096454100 R15: ffff88806a072080 [ 241.777696][T16046] FS: 00007f25a5fcb700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 241.786919][T16046] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 241.793676][T16046] CR2: 000000000152cfd0 CR3: 000000008605e000 CR4: 00000000001406f0 [ 241.801700][T16046] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 241.809726][T16046] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 241.817682][T16046] Kernel panic - not syncing: Fatal exception [ 241.824412][T16046] Kernel Offset: disabled [ 241.828735][T16046] Rebooting in 86400 seconds..