ting program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000020008108040f80ecdb4cb92e0a480e00260000", 0x17}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:55:58 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108060f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:55:58 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000020008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e0001", 0x23}], 0x1, 0x0, 0x0, 0x6558}, 0x0) [ 2141.269220][T20507] FAULT_INJECTION: forcing a failure. [ 2141.269220][T20507] name failslab, interval 1, probability 0, space 0, times 0 [ 2141.282482][T20507] CPU: 0 PID: 20507 Comm: syz-executor.4 Not tainted 5.5.0-rc2-syzkaller #0 [ 2141.291182][T20507] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2141.302292][T20507] Call Trace: [ 2141.305635][T20507] dump_stack+0x197/0x210 [ 2141.309993][T20507] should_fail.cold+0xa/0x15 15:55:58 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108100f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) [ 2141.314607][T20507] ? fault_create_debugfs_attr+0x180/0x180 [ 2141.320443][T20507] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2141.325923][T20507] __should_failslab+0x121/0x190 [ 2141.330884][T20507] should_failslab+0x9/0x14 [ 2141.335418][T20507] kmem_cache_alloc+0x47/0x710 [ 2141.340215][T20507] skb_clone+0x154/0x3d0 [ 2141.344481][T20507] bpf_clone_redirect+0xb2/0x470 [ 2141.349890][T20507] ? __kasan_check_read+0x11/0x20 [ 2141.354945][T20507] bpf_prog_3d1649e183dc2cc1+0xf40/0x1000 [ 2141.360686][T20507] ? __lock_acquire+0x16f2/0x4a00 15:55:58 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000020008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e0001", 0x23}], 0x1, 0x0, 0x0, 0x6558}, 0x0) [ 2141.365735][T20507] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2141.371211][T20507] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2141.376689][T20507] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2141.382029][T20507] ? bpf_test_run+0x7d6/0xab0 [ 2141.386725][T20507] ? find_held_lock+0x35/0x130 [ 2141.391516][T20507] ? bpf_test_run+0x7d6/0xab0 [ 2141.396207][T20507] ? lock_downgrade+0x920/0x920 [ 2141.401068][T20507] ? ktime_get+0x100/0x2f0 [ 2141.405492][T20507] ? bpf_test_run+0x7d6/0xab0 [ 2141.410205][T20507] ? ktime_get+0x100/0x2f0 [ 2141.414635][T20507] ? lockdep_hardirqs_on+0x421/0x5e0 15:55:58 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000020008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e0001", 0x23}], 0x1, 0x0, 0x0, 0x6558}, 0x0) [ 2141.419944][T20507] ? trace_hardirqs_on+0x67/0x240 [ 2141.424994][T20507] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2141.430723][T20507] ? ktime_get+0x1fd/0x2f0 [ 2141.435163][T20507] bpf_test_run+0x31f/0xab0 [ 2141.439697][T20507] ? bpf_test_finish.isra.0+0x510/0x510 [ 2141.445274][T20507] ? bpf_prog_test_run_skb+0x59b/0x10b0 [ 2141.451019][T20507] bpf_prog_test_run_skb+0x8d4/0x10b0 [ 2141.456428][T20507] ? bpf_test_init.isra.0+0x230/0x230 [ 2141.461826][T20507] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2141.468098][T20507] ? fput+0x1b/0x20 [ 2141.471934][T20507] ? __bpf_prog_get+0x97/0x2d0 [ 2141.476721][T20507] ? bpf_test_init.isra.0+0x230/0x230 [ 2141.482116][T20507] __do_sys_bpf+0x1230/0x3810 [ 2141.486820][T20507] ? bpf_prog_load+0x18f0/0x18f0 [ 2141.491778][T20507] ? __kasan_check_write+0x14/0x20 [ 2141.496902][T20507] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2141.502458][T20507] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2141.502483][T20507] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2141.513431][T20507] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2141.518902][T20507] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2141.518921][T20507] ? retint_kernel+0x2b/0x2b [ 2141.518939][T20507] ? trace_hardirqs_on_caller+0x6a/0x240 [ 2141.518977][T20507] __x64_sys_bpf+0x73/0xb0 [ 2141.528845][T20507] ? do_syscall_64+0x5b/0x790 [ 2141.528866][T20507] do_syscall_64+0xfa/0x790 [ 2141.528894][T20507] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2141.538924][T20507] RIP: 0033:0x45a919 [ 2141.538941][T20507] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2141.538950][T20507] RSP: 002b:00007f69f668ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2141.538965][T20507] RAX: ffffffffffffffda RBX: 00007f69f668ac90 RCX: 000000000045a919 [ 2141.538973][T20507] RDX: 0000000000000028 RSI: 0000000020000780 RDI: 000000000000000a [ 2141.538986][T20507] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2141.548158][T20507] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f69f668b6d4 [ 2141.548167][T20507] R13: 00000000004c0eb3 R14: 00000000004d4b08 R15: 0000000000000005 15:55:59 executing program 4 (fault-call:2 fault-nth:20): perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) [ 2141.893116][T20533] FAULT_INJECTION: forcing a failure. [ 2141.893116][T20533] name failslab, interval 1, probability 0, space 0, times 0 [ 2141.906369][T20533] CPU: 0 PID: 20533 Comm: syz-executor.4 Not tainted 5.5.0-rc2-syzkaller #0 [ 2141.915146][T20533] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2141.925312][T20533] Call Trace: [ 2141.928600][T20533] dump_stack+0x197/0x210 [ 2141.933095][T20533] should_fail.cold+0xa/0x15 [ 2141.937700][T20533] ? fault_create_debugfs_attr+0x180/0x180 [ 2141.943511][T20533] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2141.948962][T20533] __should_failslab+0x121/0x190 [ 2141.953885][T20533] should_failslab+0x9/0x14 [ 2141.958374][T20533] kmem_cache_alloc_node_trace+0x5a/0x750 [ 2141.964100][T20533] ? __copy_skb_header+0x246/0x5e0 [ 2141.969212][T20533] __kmalloc_node_track_caller+0x3d/0x70 [ 2141.974832][T20533] __kmalloc_reserve.isra.0+0x40/0xf0 [ 2141.980204][T20533] pskb_expand_head+0x151/0xff0 [ 2141.985067][T20533] skb_ensure_writable+0x2d2/0x480 [ 2141.990170][T20533] bpf_clone_redirect+0x135/0x470 [ 2141.995182][T20533] bpf_prog_3d1649e183dc2cc1+0xd5c/0x1000 [ 2142.000953][T20533] ? __lock_acquire+0x16f2/0x4a00 [ 2142.005981][T20533] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2142.011263][T20533] ? __kasan_check_read+0x11/0x20 [ 2142.016273][T20533] ? bpf_test_run+0x7d6/0xab0 [ 2142.020948][T20533] ? find_held_lock+0x35/0x130 [ 2142.025706][T20533] ? bpf_test_run+0x7d6/0xab0 [ 2142.030370][T20533] ? lock_downgrade+0x920/0x920 [ 2142.035205][T20533] ? ktime_get+0x100/0x2f0 [ 2142.039600][T20533] ? bpf_test_run+0x7d6/0xab0 [ 2142.044255][T20533] ? ktime_get+0x100/0x2f0 [ 2142.048653][T20533] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2142.053919][T20533] ? trace_hardirqs_on+0x67/0x240 [ 2142.059102][T20533] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2142.064814][T20533] ? ktime_get+0x1fd/0x2f0 [ 2142.069253][T20533] bpf_test_run+0x31f/0xab0 [ 2142.073757][T20533] ? __sanitizer_cov_trace_pc+0x3b/0x50 [ 2142.079301][T20533] ? bpf_test_finish.isra.0+0x510/0x510 [ 2142.084844][T20533] ? __build_skb+0x58/0x70 [ 2142.089246][T20533] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2142.095497][T20533] bpf_prog_test_run_skb+0x8d4/0x10b0 [ 2142.100861][T20533] ? bpf_test_init.isra.0+0x230/0x230 [ 2142.106229][T20533] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2142.112482][T20533] ? fput+0x1b/0x20 [ 2142.116274][T20533] ? __bpf_prog_get+0x97/0x2d0 [ 2142.121021][T20533] ? bpf_test_init.isra.0+0x230/0x230 [ 2142.126394][T20533] __do_sys_bpf+0x1230/0x3810 [ 2142.131083][T20533] ? bpf_prog_load+0x18f0/0x18f0 [ 2142.136015][T20533] ? __kasan_check_write+0x14/0x20 [ 2142.141127][T20533] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2142.146656][T20533] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2142.151943][T20533] ? wait_for_completion+0x440/0x440 [ 2142.157228][T20533] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2142.163482][T20533] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2142.168936][T20533] ? do_syscall_64+0x26/0x790 [ 2142.173610][T20533] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2142.179657][T20533] ? do_syscall_64+0x26/0x790 [ 2142.184334][T20533] __x64_sys_bpf+0x73/0xb0 [ 2142.188736][T20533] do_syscall_64+0xfa/0x790 [ 2142.193224][T20533] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2142.199095][T20533] RIP: 0033:0x45a919 [ 2142.202985][T20533] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2142.222577][T20533] RSP: 002b:00007f69f668ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2142.231022][T20533] RAX: ffffffffffffffda RBX: 00007f69f668ac90 RCX: 000000000045a919 [ 2142.238978][T20533] RDX: 0000000000000028 RSI: 0000000020000780 RDI: 000000000000000a [ 2142.246934][T20533] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2142.255017][T20533] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f69f668b6d4 [ 2142.263085][T20533] R13: 00000000004c0eb3 R14: 00000000004d4b08 R15: 0000000000000005 15:56:05 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e000c0010008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:56:05 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108250f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:56:05 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000020008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff05", 0x29}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:56:05 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000310008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:56:05 executing program 5: socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x8983, 0x0) perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x56, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r1, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 15:56:05 executing program 4 (fault-call:2 fault-nth:21): perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 15:56:05 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108350f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:56:05 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000020008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff05", 0x29}], 0x1, 0x0, 0x0, 0x6558}, 0x0) [ 2148.447638][T20555] FAULT_INJECTION: forcing a failure. [ 2148.447638][T20555] name failslab, interval 1, probability 0, space 0, times 0 [ 2148.460493][T20555] CPU: 0 PID: 20555 Comm: syz-executor.4 Not tainted 5.5.0-rc2-syzkaller #0 [ 2148.469183][T20555] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2148.479251][T20555] Call Trace: [ 2148.482561][T20555] dump_stack+0x197/0x210 [ 2148.486910][T20555] should_fail.cold+0xa/0x15 [ 2148.491500][T20555] ? fault_create_debugfs_attr+0x180/0x180 [ 2148.491517][T20555] ? __kasan_check_read+0x11/0x20 [ 2148.491531][T20555] ? mark_lock+0xc2/0x1220 [ 2148.491635][T20555] ? __perf_event_task_sched_in+0x63b/0x810 [ 2148.491658][T20555] __should_failslab+0x121/0x190 [ 2148.517756][T20555] should_failslab+0x9/0x14 [ 2148.522274][T20555] kmem_cache_alloc+0x47/0x710 [ 2148.527055][T20555] ? finish_task_switch+0x147/0x750 [ 2148.532268][T20555] ? __kasan_check_read+0x11/0x20 [ 2148.537298][T20555] skb_clone+0x154/0x3d0 [ 2148.541558][T20555] bpf_clone_redirect+0xb2/0x470 [ 2148.546505][T20555] ? __kasan_check_read+0x11/0x20 [ 2148.551544][T20555] bpf_prog_3d1649e183dc2cc1+0x118/0x1000 [ 2148.551562][T20555] ? __lock_acquire+0x16f2/0x4a00 [ 2148.551578][T20555] ? rcu_preempt_deferred_qs_irqrestore+0x4ff/0xd60 [ 2148.551594][T20555] ? __kasan_check_read+0x11/0x20 [ 2148.551612][T20555] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2148.551626][T20555] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2148.551643][T20555] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2148.590405][T20555] ? retint_kernel+0x2b/0x2b [ 2148.595014][T20555] ? trace_hardirqs_on_caller+0x6a/0x240 [ 2148.600696][T20555] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2148.606171][T20555] ? __this_cpu_preempt_check+0x35/0x190 [ 2148.611813][T20555] ? retint_kernel+0x2b/0x2b [ 2148.616430][T20555] bpf_test_run+0x31f/0xab0 [ 2148.620973][T20555] ? bpf_test_finish.isra.0+0x510/0x510 [ 2148.626536][T20555] bpf_prog_test_run_skb+0x8d4/0x10b0 [ 2148.631931][T20555] ? bpf_test_init.isra.0+0x230/0x230 [ 2148.637319][T20555] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2148.643583][T20555] ? fput+0x1b/0x20 [ 2148.647409][T20555] ? __bpf_prog_get+0x97/0x2d0 [ 2148.652216][T20555] ? bpf_test_init.isra.0+0x230/0x230 [ 2148.657708][T20555] __do_sys_bpf+0x1230/0x3810 [ 2148.662440][T20555] ? bpf_prog_load+0x18f0/0x18f0 [ 2148.667404][T20555] ? retint_kernel+0x2b/0x2b [ 2148.672034][T20555] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2148.672050][T20555] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2148.672066][T20555] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2148.672081][T20555] ? retint_kernel+0x2b/0x2b [ 2148.672098][T20555] ? trace_hardirqs_on_caller+0x6a/0x240 [ 2148.672139][T20555] __x64_sys_bpf+0x73/0xb0 [ 2148.698528][T20555] do_syscall_64+0xfa/0x790 [ 2148.698553][T20555] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2148.713343][T20555] RIP: 0033:0x45a919 [ 2148.717238][T20555] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2148.736846][T20555] RSP: 002b:00007f69f668ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 15:56:05 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108041080ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:56:05 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e008b0410008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:56:05 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000020008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff05", 0x29}], 0x1, 0x0, 0x0, 0x6558}, 0x0) [ 2148.745254][T20555] RAX: ffffffffffffffda RBX: 00007f69f668ac90 RCX: 000000000045a919 [ 2148.753228][T20555] RDX: 0000000000000028 RSI: 0000000020000780 RDI: 000000000000000a [ 2148.761219][T20555] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2148.769202][T20555] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f69f668b6d4 [ 2148.777183][T20555] R13: 00000000004c0eb3 R14: 00000000004d4b08 R15: 0000000000000005 15:56:06 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000020008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff05000500", 0x2c}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:56:23 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e000e0010008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:56:23 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108042580ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:56:23 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000020008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff05000500", 0x2c}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:56:23 executing program 4 (fault-call:2 fault-nth:22): perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 15:56:23 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000610008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:56:23 executing program 5: socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x8983, 0x0) perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x56, &(0x7f0000000b40)=ANY=[@ANYBLOB="b70200000b000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000002f3753a9c3b630bf92dd696125265586f2043649b89ec9b91dc174d5701424fa24052b2fe97409000000058e4bf0391702519694cd73608fadb119a5ffc8f1460c55bcce412bc1cc14a1f64ad78f7efc6f2233bacac999cbb0468424c2e8ab6cafc7bed227046c4ef20a09f4a46c382c1e7016a71a704c7b3cddf5306b500fda7b4a72bedb7c33a4c7e1f0c42819df5c26d28b450e2a9980b62fe2a57ac040892270e005a2e4ead36494a405cb500badb2b544edf5499098896b66851b823d3dc390934ea9062dd57a13ddb0ce78dbf6619bb0148e4dbb7ac738e4eb6e8061fa9d376fd0a4abf451611aa4aca07c12035ab1b2b55c098a78182c4651c0c3b019f94858fb0dc2ebd1ec689d889bf0839369cf62791d3bbd6c31262839a19f99e860dbed7b9493f9c8c764310e79aa8bd1e9e23f1ed38f91e6a53d265a75ec4fcd4d8b2d06c73ca7efec28b59fbeccfa1dbcd25032f328223bc33acc2449b6e9da679198772ecf1cc7f3886628dcc16c8ff17ff6ca528ef87741fc3e0f242a1037df395cbf0a9912d1b6d0bbc1482efe0712fac17f70f20bb9c6aef2d925d788d93d6c22aee7d387a7eaaada553f98a010533f2aa5a5cea2bdb19fc8c42e5d714ea143ab8a567bf262b03872602bfd2f35062c812cdc2eaf4a1ab92a419708546a70395497f822b5f06f0df2ba672d883b9fcfd34b7f4dc24bb3abdcb6f3e383dad4bc980c08e8e01099afd19cf916b0b9ab158153475d393aac65059df3c2f3d1ba5c9dc1c7e70ec14dd5af0b5b1a748ef9ebde08f72b53a54d2d66f41c5aa1fb1d91dfd6146e"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r1, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 15:56:23 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000020008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff05000500", 0x2c}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:56:23 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108043580ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) [ 2165.932477][T20590] FAULT_INJECTION: forcing a failure. [ 2165.932477][T20590] name failslab, interval 1, probability 0, space 0, times 0 [ 2165.946777][T20590] CPU: 0 PID: 20590 Comm: syz-executor.4 Not tainted 5.5.0-rc2-syzkaller #0 [ 2165.955487][T20590] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2165.955496][T20590] Call Trace: [ 2165.955521][T20590] dump_stack+0x197/0x210 [ 2165.955543][T20590] should_fail.cold+0xa/0x15 [ 2165.955562][T20590] ? do_syscall_64+0xfa/0x790 [ 2165.955580][T20590] ? fault_create_debugfs_attr+0x180/0x180 [ 2165.955603][T20590] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2165.994059][T20590] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2165.999368][T20590] ? retint_kernel+0x2b/0x2b [ 2166.003984][T20590] __should_failslab+0x121/0x190 [ 2166.009044][T20590] should_failslab+0x9/0x14 [ 2166.013563][T20590] kmem_cache_alloc_node_trace+0x5a/0x750 [ 2166.019312][T20590] ? __this_cpu_preempt_check+0x35/0x190 [ 2166.024981][T20590] __kmalloc_node_track_caller+0x3d/0x70 [ 2166.030634][T20590] __kmalloc_reserve.isra.0+0x40/0xf0 [ 2166.036047][T20590] pskb_expand_head+0x151/0xff0 [ 2166.040930][T20590] skb_ensure_writable+0x2d2/0x480 [ 2166.046090][T20590] bpf_clone_redirect+0x135/0x470 [ 2166.051142][T20590] bpf_prog_3d1649e183dc2cc1+0x424/0x1000 [ 2166.056891][T20590] ? __lock_acquire+0x16f2/0x4a00 [ 2166.061951][T20590] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2166.067411][T20590] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2166.072881][T20590] ? bpf_test_run+0x7d6/0xab0 [ 2166.077575][T20590] ? find_held_lock+0x35/0x130 [ 2166.082794][T20590] ? bpf_test_run+0x7d6/0xab0 [ 2166.087501][T20590] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2166.092982][T20590] ? lock_downgrade+0x920/0x920 [ 2166.097849][T20590] ? ktime_get+0x100/0x2f0 [ 2166.102278][T20590] ? bpf_test_run+0x7d6/0xab0 [ 2166.107073][T20590] ? ktime_get+0x100/0x2f0 [ 2166.111515][T20590] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2166.116826][T20590] ? trace_hardirqs_on+0x67/0x240 [ 2166.121876][T20590] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2166.127627][T20590] ? ktime_get+0x1fd/0x2f0 [ 2166.132081][T20590] bpf_test_run+0x31f/0xab0 [ 2166.136675][T20590] ? eth_type_trans+0x396/0x760 [ 2166.141685][T20590] ? __sanitizer_cov_trace_pc+0x1/0x50 [ 2166.147188][T20590] ? bpf_test_finish.isra.0+0x510/0x510 [ 2166.152762][T20590] ? __build_skb+0x58/0x70 [ 2166.157209][T20590] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2166.163569][T20590] bpf_prog_test_run_skb+0x8d4/0x10b0 [ 2166.168964][T20590] ? assoc_array_gc+0x1421/0x1440 [ 2166.174011][T20590] ? bpf_test_init.isra.0+0x230/0x230 [ 2166.179417][T20590] ? bpf_test_init.isra.0+0x230/0x230 [ 2166.184808][T20590] __do_sys_bpf+0x1230/0x3810 [ 2166.189611][T20590] ? bpf_prog_load+0x18f0/0x18f0 [ 2166.194573][T20590] ? __kasan_check_write+0x14/0x20 [ 2166.199709][T20590] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2166.205286][T20590] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2166.210597][T20590] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2166.216078][T20590] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2166.221560][T20590] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2166.227038][T20590] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2166.232342][T20590] ? retint_kernel+0x2b/0x2b [ 2166.236936][T20590] ? trace_hardirqs_on_caller+0x6a/0x240 [ 2166.242591][T20590] __x64_sys_bpf+0x73/0xb0 [ 2166.242608][T20590] ? do_syscall_64+0x5b/0x790 [ 2166.242623][T20590] do_syscall_64+0xfa/0x790 [ 2166.242646][T20590] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2166.262986][T20590] RIP: 0033:0x45a919 [ 2166.266903][T20590] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2166.286613][T20590] RSP: 002b:00007f69f668ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2166.295388][T20590] RAX: ffffffffffffffda RBX: 00007f69f668ac90 RCX: 000000000045a919 [ 2166.303375][T20590] RDX: 0000000000000028 RSI: 0000000020000780 RDI: 000000000000000a [ 2166.311364][T20590] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2166.319353][T20590] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f69f668b6d4 15:56:23 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000020008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff0500050012", 0x2d}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:56:23 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb90f0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:56:23 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000020008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff0500050012", 0x2d}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:56:23 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb9100a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) [ 2166.327333][T20590] R13: 00000000004c0eb3 R14: 00000000004d4b08 R15: 0000000000000005 15:56:30 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e003f0010008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:56:30 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000020008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff0500050012", 0x2d}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:56:30 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000a10008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:56:30 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb9350a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:56:30 executing program 4 (fault-call:2 fault-nth:23): perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) [ 2173.041169][T20630] FAULT_INJECTION: forcing a failure. [ 2173.041169][T20630] name failslab, interval 1, probability 0, space 0, times 0 [ 2173.054224][T20630] CPU: 1 PID: 20630 Comm: syz-executor.4 Not tainted 5.5.0-rc2-syzkaller #0 [ 2173.062909][T20630] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2173.062916][T20630] Call Trace: [ 2173.062939][T20630] dump_stack+0x197/0x210 [ 2173.062961][T20630] should_fail.cold+0xa/0x15 [ 2173.062977][T20630] ? kasan_unpoison_shadow+0x20/0x50 [ 2173.062995][T20630] ? fault_create_debugfs_attr+0x180/0x180 [ 2173.063016][T20630] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2173.090548][T20630] ? skb_release_data+0x556/0x8d0 [ 2173.090570][T20630] ? __kmalloc_node_track_caller+0x4e/0x70 [ 2173.102091][T20630] ? __phys_addr+0xa4/0x120 [ 2173.102119][T20630] __should_failslab+0x121/0x190 [ 2173.102135][T20630] should_failslab+0x9/0x14 [ 2173.102153][T20630] kmem_cache_alloc+0x47/0x710 [ 2173.131709][T20630] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2173.138493][T20630] ? __this_cpu_preempt_check+0x35/0x190 [ 2173.144152][T20630] skb_clone+0x154/0x3d0 [ 2173.148414][T20630] bpf_clone_redirect+0xb2/0x470 [ 2173.153373][T20630] bpf_prog_3d1649e183dc2cc1+0x8c8/0x1000 [ 2173.159116][T20630] ? __lock_acquire+0x16f2/0x4a00 [ 2173.164161][T20630] ? rcu_preempt_deferred_qs_irqrestore+0x4ff/0xd60 [ 2173.170767][T20630] ? __kasan_check_read+0x11/0x20 [ 2173.175807][T20630] ? bpf_test_run+0x7d6/0xab0 [ 2173.180504][T20630] ? find_held_lock+0x35/0x130 [ 2173.185304][T20630] ? bpf_test_run+0x7d6/0xab0 15:56:30 executing program 5: socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x8983, 0x0) perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x59, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r1, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 15:56:30 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e06480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:56:30 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e10480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) [ 2173.189997][T20630] ? lock_downgrade+0x920/0x920 [ 2173.194862][T20630] ? ktime_get+0x100/0x2f0 [ 2173.199296][T20630] ? bpf_test_run+0x7d6/0xab0 [ 2173.203988][T20630] ? ktime_get+0x100/0x2f0 [ 2173.208423][T20630] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2173.213738][T20630] ? trace_hardirqs_on+0x67/0x240 [ 2173.218797][T20630] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2173.224539][T20630] ? ktime_get+0x1fd/0x2f0 [ 2173.228976][T20630] bpf_test_run+0x31f/0xab0 [ 2173.233503][T20630] ? bpf_test_finish.isra.0+0x510/0x510 [ 2173.239063][T20630] ? __build_skb+0x58/0x70 [ 2173.243506][T20630] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2173.249765][T20630] bpf_prog_test_run_skb+0x8d4/0x10b0 [ 2173.255160][T20630] ? bpf_test_init.isra.0+0x230/0x230 [ 2173.255177][T20630] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2173.255195][T20630] ? fput+0x1b/0x20 [ 2173.255210][T20630] ? __bpf_prog_get+0x97/0x2d0 [ 2173.255230][T20630] ? bpf_test_init.isra.0+0x230/0x230 [ 2173.280756][T20630] __do_sys_bpf+0x1230/0x3810 [ 2173.285472][T20630] ? bpf_prog_load+0x18f0/0x18f0 15:56:30 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e25480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) [ 2173.290430][T20630] ? __kasan_check_write+0x14/0x20 [ 2173.295554][T20630] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2173.301130][T20630] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2173.306439][T20630] ? wait_for_completion+0x440/0x440 [ 2173.311754][T20630] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2173.318028][T20630] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2173.323530][T20630] ? do_syscall_64+0x26/0x790 [ 2173.328225][T20630] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2173.334327][T20630] ? do_syscall_64+0x26/0x790 [ 2173.339029][T20630] __x64_sys_bpf+0x73/0xb0 [ 2173.343461][T20630] do_syscall_64+0xfa/0x790 [ 2173.347970][T20630] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2173.353865][T20630] RIP: 0033:0x45a919 [ 2173.357758][T20630] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2173.377507][T20630] RSP: 002b:00007f69f668ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 15:56:30 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e35480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:56:30 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x7, 0x0, 0x0, 0x0, 0x300}, 0x3c) [ 2173.386161][T20630] RAX: ffffffffffffffda RBX: 00007f69f668ac90 RCX: 000000000045a919 [ 2173.394152][T20630] RDX: 0000000000000028 RSI: 0000000020000780 RDI: 000000000000000a [ 2173.402143][T20630] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2173.410131][T20630] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f69f668b6d4 [ 2173.418123][T20630] R13: 00000000004c0eb3 R14: 00000000004d4b08 R15: 0000000000000005 15:56:30 executing program 4 (fault-call:2 fault-nth:24): perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) [ 2173.685911][T20658] FAULT_INJECTION: forcing a failure. [ 2173.685911][T20658] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2173.699357][T20658] CPU: 0 PID: 20658 Comm: syz-executor.4 Not tainted 5.5.0-rc2-syzkaller #0 [ 2173.708016][T20658] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2173.718073][T20658] Call Trace: [ 2173.721385][T20658] dump_stack+0x197/0x210 [ 2173.725732][T20658] should_fail.cold+0xa/0x15 [ 2173.730382][T20658] ? fault_create_debugfs_attr+0x180/0x180 [ 2173.736224][T20658] ? stack_trace_save+0xac/0xe0 [ 2173.741110][T20658] ? stack_trace_consume_entry+0x190/0x190 [ 2173.746988][T20658] should_fail_alloc_page+0x50/0x60 [ 2173.752210][T20658] __alloc_pages_nodemask+0x1a1/0x910 [ 2173.757591][T20658] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2173.763402][T20658] ? skb_clone+0x154/0x3d0 [ 2173.767950][T20658] ? bpf_clone_redirect+0xb2/0x470 [ 2173.773058][T20658] ? bpf_prog_3d1649e183dc2cc1+0xa8c/0x1000 [ 2173.778949][T20658] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2173.785098][T20658] ? fault_create_debugfs_attr+0x180/0x180 [ 2173.790920][T20658] cache_grow_begin+0x90/0xc60 [ 2173.795692][T20658] ? __kmalloc_node_track_caller+0x3d/0x70 [ 2173.801529][T20658] ? trace_hardirqs_off+0x62/0x240 [ 2173.806741][T20658] kmem_cache_alloc_node_trace+0x689/0x750 [ 2173.812545][T20658] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2173.817846][T20658] __kmalloc_node_track_caller+0x3d/0x70 [ 2173.823480][T20658] __kmalloc_reserve.isra.0+0x40/0xf0 [ 2173.828853][T20658] pskb_expand_head+0x151/0xff0 [ 2173.833699][T20658] skb_ensure_writable+0x2d2/0x480 [ 2173.838798][T20658] bpf_clone_redirect+0x135/0x470 [ 2173.843811][T20658] bpf_prog_3d1649e183dc2cc1+0xa8c/0x1000 [ 2173.849522][T20658] ? __lock_acquire+0x16f2/0x4a00 [ 2173.854546][T20658] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2173.860004][T20658] ? __kasan_check_read+0x11/0x20 [ 2173.865034][T20658] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2173.870480][T20658] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2173.875958][T20658] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2173.881259][T20658] ? retint_kernel+0x2b/0x2b [ 2173.885848][T20658] ? trace_hardirqs_on_caller+0x6a/0x240 [ 2173.891495][T20658] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2173.896975][T20658] ? __this_cpu_preempt_check+0x35/0x190 [ 2173.902614][T20658] ? retint_kernel+0x2b/0x2b [ 2173.907232][T20658] bpf_test_run+0x31f/0xab0 [ 2173.911771][T20658] ? bpf_test_finish.isra.0+0x510/0x510 [ 2173.917457][T20658] bpf_prog_test_run_skb+0x8d4/0x10b0 [ 2173.922965][T20658] ? bpf_test_init.isra.0+0x230/0x230 [ 2173.928487][T20658] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2173.934794][T20658] ? fput+0x1b/0x20 [ 2173.938611][T20658] ? __bpf_prog_get+0x97/0x2d0 [ 2173.943386][T20658] ? bpf_test_init.isra.0+0x230/0x230 [ 2173.948780][T20658] __do_sys_bpf+0x1230/0x3810 [ 2173.953486][T20658] ? bpf_prog_load+0x18f0/0x18f0 [ 2173.958420][T20658] ? __kasan_check_write+0x14/0x20 [ 2173.963541][T20658] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2173.969088][T20658] ? wait_for_completion+0x440/0x440 [ 2173.974421][T20658] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2173.980686][T20658] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2173.986389][T20658] ? do_syscall_64+0x26/0x790 [ 2173.991251][T20658] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2173.997323][T20658] ? do_syscall_64+0x26/0x790 [ 2174.002017][T20658] __x64_sys_bpf+0x73/0xb0 [ 2174.006505][T20658] do_syscall_64+0xfa/0x790 [ 2174.011025][T20658] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2174.016989][T20658] RIP: 0033:0x45a919 [ 2174.020884][T20658] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2174.040488][T20658] RSP: 002b:00007f69f668ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2174.048903][T20658] RAX: ffffffffffffffda RBX: 00007f69f668ac90 RCX: 000000000045a919 [ 2174.056865][T20658] RDX: 0000000000000028 RSI: 0000000020000780 RDI: 000000000000000a [ 2174.064836][T20658] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2174.072807][T20658] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f69f668b6d4 [ 2174.080786][T20658] R13: 00000000004c0eb3 R14: 00000000004d4b08 R15: 0000000000000005 15:56:39 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00400010008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:56:39 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x7, 0x0, 0x0, 0x0, 0x300}, 0x3c) 15:56:39 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000c10008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:56:39 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a08000026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:56:39 executing program 4 (fault-call:2 fault-nth:25): perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 15:56:39 executing program 5: socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x8983, 0x0) perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x59, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r1, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) [ 2182.405705][T20680] FAULT_INJECTION: forcing a failure. [ 2182.405705][T20680] name failslab, interval 1, probability 0, space 0, times 0 [ 2182.418556][T20680] CPU: 1 PID: 20680 Comm: syz-executor.4 Not tainted 5.5.0-rc2-syzkaller #0 [ 2182.427251][T20680] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2182.437314][T20680] Call Trace: [ 2182.440609][T20680] dump_stack+0x197/0x210 [ 2182.444954][T20680] should_fail.cold+0xa/0x15 [ 2182.449546][T20680] ? kasan_unpoison_shadow+0x20/0x50 [ 2182.454829][T20680] ? fault_create_debugfs_attr+0x180/0x180 [ 2182.460656][T20680] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2182.466402][T20680] ? skb_release_data+0x556/0x8d0 [ 2182.471449][T20680] ? __kmalloc_node_track_caller+0x4e/0x70 [ 2182.477274][T20680] ? __phys_addr+0xa4/0x120 [ 2182.481805][T20680] __should_failslab+0x121/0x190 [ 2182.487463][T20680] should_failslab+0x9/0x14 [ 2182.491991][T20680] kmem_cache_alloc+0x47/0x710 [ 2182.492010][T20680] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2182.492026][T20680] ? __this_cpu_preempt_check+0x35/0x190 [ 2182.492052][T20680] skb_clone+0x154/0x3d0 [ 2182.508674][T20680] bpf_clone_redirect+0xb2/0x470 [ 2182.508700][T20680] bpf_prog_3d1649e183dc2cc1+0x9c8/0x1000 [ 2182.508722][T20680] ? __lock_acquire+0x16f2/0x4a00 [ 2182.523600][T20680] ? bpf_prog_test_run_skb+0x2bf/0x10b0 [ 2182.534273][T20680] ? __do_sys_bpf+0x1230/0x3810 [ 2182.534296][T20680] ? __kasan_check_read+0x11/0x20 [ 2182.534316][T20680] ? bpf_test_run+0x188/0xab0 [ 2182.548856][T20680] ? find_held_lock+0x35/0x130 15:56:39 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x7, 0x0, 0x0, 0x0, 0x300}, 0x3c) 15:56:39 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a48030026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) [ 2182.553721][T20680] ? bpf_test_run+0x188/0xab0 [ 2182.558433][T20680] ? lock_downgrade+0x920/0x920 [ 2182.563311][T20680] ? ktime_get+0x100/0x2f0 [ 2182.567835][T20680] ? bpf_test_run+0x188/0xab0 [ 2182.572537][T20680] ? ktime_get+0x100/0x2f0 [ 2182.578891][T20680] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2182.584204][T20680] ? trace_hardirqs_on+0x67/0x240 [ 2182.589259][T20680] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2182.595015][T20680] ? ktime_get+0x1fd/0x2f0 [ 2182.599461][T20680] bpf_test_run+0x31f/0xab0 15:56:39 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x7, 0x0, 0x0, 0x0, 0x300}, 0x3c) 15:56:39 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a48100026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) [ 2182.604006][T20680] ? bpf_test_finish.isra.0+0x510/0x510 [ 2182.609575][T20680] ? __build_skb+0x58/0x70 [ 2182.614015][T20680] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2182.620281][T20680] bpf_prog_test_run_skb+0x8d4/0x10b0 [ 2182.625684][T20680] ? bpf_test_init.isra.0+0x230/0x230 [ 2182.631082][T20680] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2182.637349][T20680] ? fput+0x1b/0x20 [ 2182.641177][T20680] ? __bpf_prog_get+0x97/0x2d0 [ 2182.641197][T20680] ? bpf_test_init.isra.0+0x230/0x230 [ 2182.641210][T20680] __do_sys_bpf+0x1230/0x3810 [ 2182.641229][T20680] ? bpf_prog_load+0x18f0/0x18f0 [ 2182.641245][T20680] ? __kasan_check_write+0x14/0x20 [ 2182.641257][T20680] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2182.641278][T20680] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2182.676954][T20680] ? wait_for_completion+0x440/0x440 [ 2182.682265][T20680] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2182.688519][T20680] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2182.693996][T20680] ? do_syscall_64+0x26/0x790 [ 2182.698698][T20680] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 15:56:40 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) [ 2182.704784][T20680] ? do_syscall_64+0x26/0x790 [ 2182.709499][T20680] __x64_sys_bpf+0x73/0xb0 [ 2182.713940][T20680] do_syscall_64+0xfa/0x790 [ 2182.718467][T20680] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2182.724406][T20680] RIP: 0033:0x45a919 [ 2182.728315][T20680] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2182.747927][T20680] RSP: 002b:00007f69f668ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 15:56:40 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a48250026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) [ 2182.756875][T20680] RAX: ffffffffffffffda RBX: 00007f69f668ac90 RCX: 000000000045a919 [ 2182.764984][T20680] RDX: 0000000000000028 RSI: 0000000020000780 RDI: 000000000000000a [ 2182.772970][T20680] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2182.772979][T20680] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f69f668b6d4 [ 2182.772988][T20680] R13: 00000000004c0eb3 R14: 00000000004d4b08 R15: 0000000000000005 15:56:47 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e65580010008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:56:47 executing program 4 (fault-call:2 fault-nth:26): perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 15:56:47 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) 15:56:47 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000e10008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:56:47 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a48350026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:56:47 executing program 5: socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x8983, 0x0) perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x59, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r1, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 15:56:48 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) [ 2190.776893][T20718] FAULT_INJECTION: forcing a failure. [ 2190.776893][T20718] name failslab, interval 1, probability 0, space 0, times 0 [ 2190.789739][T20718] CPU: 1 PID: 20718 Comm: syz-executor.4 Not tainted 5.5.0-rc2-syzkaller #0 [ 2190.798427][T20718] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2190.808499][T20718] Call Trace: [ 2190.811816][T20718] dump_stack+0x197/0x210 [ 2190.816368][T20718] should_fail.cold+0xa/0x15 [ 2190.820985][T20718] ? do_syscall_64+0xfa/0x790 [ 2190.825680][T20718] ? fault_create_debugfs_attr+0x180/0x180 [ 2190.831532][T20718] ? __local_bh_enable_ip+0x15a/0x270 [ 2190.836969][T20718] __should_failslab+0x121/0x190 [ 2190.842109][T20718] should_failslab+0x9/0x14 [ 2190.846649][T20718] kmem_cache_alloc_node_trace+0x5a/0x750 [ 2190.852391][T20718] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2190.857708][T20718] __kmalloc_node_track_caller+0x3d/0x70 [ 2190.863363][T20718] __kmalloc_reserve.isra.0+0x40/0xf0 [ 2190.868767][T20718] pskb_expand_head+0x151/0xff0 [ 2190.873669][T20718] skb_ensure_writable+0x2d2/0x480 [ 2190.878803][T20718] bpf_clone_redirect+0x135/0x470 [ 2190.883847][T20718] bpf_prog_3d1649e183dc2cc1+0xa8c/0x1000 [ 2190.889582][T20718] ? __lock_acquire+0x16f2/0x4a00 [ 2190.894617][T20718] ? bpf_prog_test_run_skb+0x2bf/0x10b0 [ 2190.900183][T20718] ? __do_sys_bpf+0x1230/0x3810 [ 2190.905061][T20718] ? __kasan_check_read+0x11/0x20 [ 2190.910116][T20718] ? bpf_test_run+0x188/0xab0 [ 2190.914806][T20718] ? find_held_lock+0x35/0x130 [ 2190.919586][T20718] ? bpf_test_run+0x188/0xab0 [ 2190.924293][T20718] ? lock_downgrade+0x920/0x920 [ 2190.929160][T20718] ? ktime_get+0x100/0x2f0 [ 2190.933595][T20718] ? bpf_test_run+0x188/0xab0 [ 2190.938289][T20718] ? ktime_get+0x100/0x2f0 [ 2190.942729][T20718] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2190.948041][T20718] ? trace_hardirqs_on+0x67/0x240 [ 2190.953213][T20718] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2190.958955][T20718] ? ktime_get+0x1fd/0x2f0 [ 2190.963403][T20718] bpf_test_run+0x31f/0xab0 [ 2190.967938][T20718] ? bpf_test_finish.isra.0+0x510/0x510 [ 2190.973507][T20718] ? __build_skb+0x58/0x70 [ 2190.977941][T20718] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2190.984208][T20718] bpf_prog_test_run_skb+0x8d4/0x10b0 [ 2190.989610][T20718] ? bpf_test_init.isra.0+0x230/0x230 [ 2190.995011][T20718] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2191.001274][T20718] ? fput+0x1b/0x20 [ 2191.005107][T20718] ? __bpf_prog_get+0x97/0x2d0 [ 2191.009891][T20718] ? bpf_test_init.isra.0+0x230/0x230 [ 2191.015282][T20718] __do_sys_bpf+0x1230/0x3810 [ 2191.019985][T20718] ? bpf_prog_load+0x18f0/0x18f0 [ 2191.024927][T20718] ? __kasan_check_write+0x14/0x20 [ 2191.024943][T20718] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2191.024958][T20718] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2191.024977][T20718] ? wait_for_completion+0x440/0x440 [ 2191.025001][T20718] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2191.025031][T20718] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2191.025048][T20718] ? do_syscall_64+0x26/0x790 [ 2191.025061][T20718] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2191.025080][T20718] ? do_syscall_64+0x26/0x790 [ 2191.035741][T20718] __x64_sys_bpf+0x73/0xb0 [ 2191.035762][T20718] do_syscall_64+0xfa/0x790 [ 2191.035783][T20718] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2191.088375][T20718] RIP: 0033:0x45a919 [ 2191.092291][T20718] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2191.111936][T20718] RSP: 002b:00007f69f668ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2191.120370][T20718] RAX: ffffffffffffffda RBX: 00007f69f668ac90 RCX: 000000000045a919 15:56:48 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x300}, 0x3c) 15:56:48 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a48002426000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:56:48 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x300}, 0x3c) 15:56:48 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0400000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:56:48 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x300}, 0x3c) [ 2191.128362][T20718] RDX: 0000000000000028 RSI: 0000000020000780 RDI: 000000000000000a [ 2191.136355][T20718] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2191.144367][T20718] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f69f668b6d4 [ 2191.152348][T20718] R13: 00000000004c0eb3 R14: 00000000004d4b08 R15: 0000000000000005 15:57:03 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00600010008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:57:03 executing program 4 (fault-call:2 fault-nth:27): perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="b70200000b000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000002f3753a9c3b630bf92dd696125265586f2043649b89ec9b91dc174d5701424fa24052b2fe97409000000058e4bf0391702519694cd73608fadb119a5ffc8f1460c55bcce412bc1cc14a1f64ad78f7efc6f2233bacac999cbb0468424c2e8ab6cafc7bed227046c4ef20a09f4a46c382c1e7016a71a704c7b3cddf5306b500fda7b4a72bedb7c33a4c7e1f0c42819df5c26d28b450e2a9980b62fe2a57ac040892270e005a2e4ead36494a405cb500badb2b544edf5499098896b66851b823d3dc390934ea9062dd57a13ddb0ce78dbf6619bb0148e4dbb7ac738e4eb6e8061fa9d376fd0a4abf451611aa4aca07c12035ab1b2b55c098a78182c4651c0c3b019f94858fb0dc2ebd1ec689d889bf0839369cf62791d3bbd6c31262839a19f99e860dbed7b9493f9c8c764310e79aa8bd1e9e23f1ed38f91e6a53d265a75ec4fcd4d8b2d06c73ca7efec28b59fbeccfa1dbcd25032f328223bc33acc2449b6e9da679198772ecf1cc7f3886628dcc16c8ff17ff6ca528ef87741fc3e0f242a1037df395cbf0a9912d1b6d0bbc1482efe0712fac17f70f20bb9c6aef2d925d788d93d6c22aee7d387a7eaaada553f98a010533f2aa5a5cea2bdb19fc8c42e5d714ea143ab8a567bf262b03872602bfd2f35062c812cdc2eaf4a1ab92a419708546a70395497f822b5f06f0df2ba672d883b9fcfd34b7f4dc24bb3abdcb6f3e383dad4bc980c08e8e01099afd19cf916b0b9ab158153475d393aac65059df3c2f3d1ba5c9dc1c7e70ec14dd5af0b5b1a748ef9ebde08f72b53a54d2d66f41c5aa1fb1d91dfd6146e77bce93c45de0a0b19580a0ff90bdace7f549b8dcc95be4d596423ca8db0831932067edf32e58beaaa8625b91c05"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 15:57:03 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000f10008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:57:03 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x7}, 0x3c) 15:57:03 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0025000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:57:03 executing program 5: socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x8983, 0x0) perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x5b, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r1, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 15:57:03 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0226000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:57:03 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x7}, 0x3c) [ 2206.279137][T20766] FAULT_INJECTION: forcing a failure. [ 2206.279137][T20766] name failslab, interval 1, probability 0, space 0, times 0 [ 2206.291955][T20766] CPU: 0 PID: 20766 Comm: syz-executor.4 Not tainted 5.5.0-rc2-syzkaller #0 [ 2206.300637][T20766] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2206.310702][T20766] Call Trace: [ 2206.314019][T20766] dump_stack+0x197/0x210 [ 2206.318399][T20766] should_fail.cold+0xa/0x15 [ 2206.323099][T20766] ? kasan_unpoison_shadow+0x20/0x50 15:57:03 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0326000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) [ 2206.328437][T20766] ? fault_create_debugfs_attr+0x180/0x180 [ 2206.334299][T20766] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2206.340048][T20766] ? skb_release_data+0x556/0x8d0 [ 2206.345092][T20766] ? __kmalloc_node_track_caller+0x4e/0x70 [ 2206.350933][T20766] ? __phys_addr+0xa4/0x120 [ 2206.355456][T20766] __should_failslab+0x121/0x190 [ 2206.360412][T20766] should_failslab+0x9/0x14 [ 2206.364949][T20766] kmem_cache_alloc+0x47/0x710 [ 2206.369791][T20766] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2206.376056][T20766] ? __this_cpu_preempt_check+0x35/0x190 [ 2206.381726][T20766] skb_clone+0x154/0x3d0 [ 2206.385991][T20766] bpf_clone_redirect+0xb2/0x470 [ 2206.390947][T20766] bpf_prog_3d1649e183dc2cc1+0x7d4/0x1000 [ 2206.396686][T20766] ? __lock_acquire+0x16f2/0x4a00 [ 2206.401792][T20766] ? rcu_preempt_deferred_qs_irqrestore+0x4ff/0xd60 [ 2206.408400][T20766] ? __kasan_check_read+0x11/0x20 [ 2206.413440][T20766] ? bpf_test_run+0x7d6/0xab0 [ 2206.418137][T20766] ? find_held_lock+0x35/0x130 [ 2206.423005][T20766] ? bpf_test_run+0x7d6/0xab0 15:57:03 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0426000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) [ 2206.427705][T20766] ? lock_downgrade+0x920/0x920 [ 2206.432564][T20766] ? ktime_get+0x100/0x2f0 [ 2206.436982][T20766] ? bpf_test_run+0x7d6/0xab0 [ 2206.441669][T20766] ? ktime_get+0x100/0x2f0 [ 2206.446101][T20766] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2206.451402][T20766] ? trace_hardirqs_on+0x67/0x240 [ 2206.456443][T20766] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2206.462178][T20766] ? ktime_get+0x1fd/0x2f0 [ 2206.466614][T20766] bpf_test_run+0x31f/0xab0 [ 2206.471147][T20766] ? bpf_test_finish.isra.0+0x510/0x510 15:57:03 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x7}, 0x3c) [ 2206.476713][T20766] ? __build_skb+0x58/0x70 [ 2206.481158][T20766] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2206.487441][T20766] bpf_prog_test_run_skb+0x8d4/0x10b0 [ 2206.492839][T20766] ? bpf_test_init.isra.0+0x230/0x230 [ 2206.498229][T20766] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2206.504491][T20766] ? fput+0x1b/0x20 [ 2206.508315][T20766] ? __bpf_prog_get+0x97/0x2d0 [ 2206.513099][T20766] ? bpf_test_init.isra.0+0x230/0x230 [ 2206.518524][T20766] __do_sys_bpf+0x1230/0x3810 [ 2206.523228][T20766] ? bpf_prog_load+0x18f0/0x18f0 [ 2206.528190][T20766] ? __kasan_check_write+0x14/0x20 [ 2206.533320][T20766] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2206.538875][T20766] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2206.544612][T20766] ? wait_for_completion+0x440/0x440 [ 2206.544636][T20766] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2206.544663][T20766] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2206.544677][T20766] ? do_syscall_64+0x26/0x790 [ 2206.544693][T20766] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2206.544709][T20766] ? do_syscall_64+0x26/0x790 [ 2206.544730][T20766] __x64_sys_bpf+0x73/0xb0 [ 2206.544752][T20766] do_syscall_64+0xfa/0x790 [ 2206.544772][T20766] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2206.591950][T20766] RIP: 0033:0x45a919 [ 2206.595849][T20766] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2206.617541][T20766] RSP: 002b:00007f69f6669c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 15:57:03 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0626000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) [ 2206.626060][T20766] RAX: ffffffffffffffda RBX: 00007f69f6669c90 RCX: 000000000045a919 [ 2206.634047][T20766] RDX: 0000000000000028 RSI: 0000000020000780 RDI: 000000000000000a [ 2206.642033][T20766] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2206.650020][T20766] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f69f666a6d4 [ 2206.658042][T20766] R13: 00000000004c0eb3 R14: 00000000004d4b08 R15: 0000000000000005 15:57:14 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e58650010008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:57:14 executing program 1: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x26b, &(0x7f0000000f80), 0x1fa}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x6) 15:57:14 executing program 4 (fault-call:2 fault-nth:28): perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="b70200000b000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000002f3753a9c3b630bf92dd696125265586f2043649b89ec9b91dc174d5701424fa24052b2fe97409000000058e4bf0391702519694cd73608fadb119a5ffc8f1460c55bcce412bc1cc14a1f64ad78f7efc6f2233bacac999cbb0468424c2e8ab6cafc7bed227046c4ef20a09f4a46c382c1e7016a71a704c7b3cddf5306b500fda7b4a72bedb7c33a4c7e1f0c42819df5c26d28b450e2a9980b62fe2a57ac040892270e005a2e4ead36494a405cb500badb2b544edf5499098896b66851b823d3dc390934ea9062dd57a13ddb0ce78dbf6619bb0148e4dbb7ac738e4eb6e8061fa9d376fd0a4abf451611aa4aca07c12035ab1b2b55c098a78182c4651c0c3b019f94858fb0dc2ebd1ec689d889bf0839369cf62791d3bbd6c31262839a19f99e860dbed7b9493f9c8c764310e79aa8bd1e9e23f1ed38f91e6a53d265a75ec4fcd4d8b2d06c73ca7efec28b59fbeccfa1dbcd25032f328223bc33acc2449b6e9da679198772ecf1cc7f3886628dcc16c8ff17ff6ca528ef87741fc3e0f242a1037df395cbf0a9912d1b6d0bbc1482efe0712fac17f70f20bb9c6aef2d925d788d93d6c22aee7d387a7eaaada553f98a010533f2aa5a5cea2bdb19fc8c42e5d714ea143ab8a567bf262b03872602bfd2f35062c812cdc2eaf4a1ab92a419708546a70395497f822b5f06f0df2ba672d883b9fcfd34b7f4dc24bb3abdcb6f3e383dad4bc980c08e8e01099afd19cf916b0b9ab158153475d393aac65059df3c2f3d1ba5c9dc1c7e70ec14dd5af0b5b1a748ef9ebde08f72b53a54d2d66f41c5aa1fb1d91dfd6146e77bce93c45de0a0b19580a0ff90bdace7f549b8dcc95be4d596423ca8db0831932067edf32e58beaaa8625b91c05"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 15:57:14 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a26000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:57:14 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00003f10008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:57:14 executing program 5: socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x8983, 0x0) perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x5b, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r1, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 15:57:14 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0c26000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:57:15 executing program 1: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00'}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00'}, 0x10) [ 2217.748201][T20803] FAULT_INJECTION: forcing a failure. [ 2217.748201][T20803] name failslab, interval 1, probability 0, space 0, times 0 [ 2217.761448][T20803] CPU: 0 PID: 20803 Comm: syz-executor.4 Not tainted 5.5.0-rc2-syzkaller #0 [ 2217.770263][T20803] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2217.780351][T20803] Call Trace: [ 2217.783678][T20803] dump_stack+0x197/0x210 [ 2217.788058][T20803] should_fail.cold+0xa/0x15 [ 2217.792693][T20803] ? do_syscall_64+0xfa/0x790 [ 2217.797410][T20803] ? fault_create_debugfs_attr+0x180/0x180 [ 2217.803250][T20803] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2217.809518][T20803] ? flexible_sched_in+0xcb/0xa50 [ 2217.814569][T20803] __should_failslab+0x121/0x190 [ 2217.819537][T20803] should_failslab+0x9/0x14 [ 2217.824085][T20803] kmem_cache_alloc_node_trace+0x5a/0x750 [ 2217.829839][T20803] __kmalloc_node_track_caller+0x3d/0x70 [ 2217.835500][T20803] __kmalloc_reserve.isra.0+0x40/0xf0 [ 2217.840892][T20803] pskb_expand_head+0x151/0xff0 15:57:15 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0e26000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:57:15 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0xd}, 0x3c) [ 2217.845773][T20803] skb_ensure_writable+0x2d2/0x480 [ 2217.850949][T20803] bpf_clone_redirect+0x135/0x470 [ 2217.856003][T20803] bpf_prog_3d1649e183dc2cc1+0xc0/0x1000 [ 2217.861664][T20803] ? __lock_acquire+0x16f2/0x4a00 [ 2217.866721][T20803] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2217.872203][T20803] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2217.877690][T20803] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2217.883180][T20803] ? retint_kernel+0x2b/0x2b [ 2217.887823][T20803] ? trace_hardirqs_on_caller+0x6a/0x240 [ 2217.893492][T20803] ? trace_hardirqs_on_thunk+0x1a/0x1c 15:57:15 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000700)=ANY=[@ANYBLOB="9feb010018000000000000001cff00001c0000000300000001"], &(0x7f0000000100)=""/249, 0x19, 0xf9, 0x1}, 0x20) 15:57:15 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0f26000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) [ 2217.899001][T20803] ? __this_cpu_preempt_check+0x35/0x190 [ 2217.904654][T20803] ? retint_kernel+0x2b/0x2b [ 2217.909285][T20803] ? ktime_get+0x129/0x2f0 [ 2217.913725][T20803] ? ktime_get+0x12e/0x2f0 [ 2217.918157][T20803] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2217.923887][T20803] ? ktime_get+0x1fd/0x2f0 [ 2217.928714][T20803] bpf_test_run+0x31f/0xab0 [ 2217.933254][T20803] ? bpf_test_finish.isra.0+0x510/0x510 [ 2217.938913][T20803] ? __build_skb+0x58/0x70 [ 2217.943354][T20803] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2217.949622][T20803] bpf_prog_test_run_skb+0x8d4/0x10b0 [ 2217.955038][T20803] ? assoc_array_gc+0x1421/0x1440 [ 2217.960088][T20803] ? bpf_test_init.isra.0+0x230/0x230 [ 2217.965493][T20803] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2217.971762][T20803] ? fput+0x1b/0x20 [ 2217.975591][T20803] ? __bpf_prog_get+0x97/0x2d0 [ 2217.980380][T20803] ? bpf_test_init.isra.0+0x230/0x230 [ 2217.985775][T20803] __do_sys_bpf+0x1230/0x3810 [ 2217.990489][T20803] ? bpf_prog_load+0x18f0/0x18f0 [ 2217.995446][T20803] ? __kasan_check_write+0x14/0x20 [ 2218.000580][T20803] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2218.006156][T20803] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2218.011461][T20803] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2218.017725][T20803] ? debug_smp_processor_id+0x33/0x18a [ 2218.023208][T20803] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 2218.029403][T20803] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2218.034882][T20803] ? do_syscall_64+0x26/0x790 [ 2218.039714][T20803] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2218.045992][T20803] ? do_syscall_64+0x26/0x790 [ 2218.046017][T20803] __x64_sys_bpf+0x73/0xb0 [ 2218.046034][T20803] do_syscall_64+0xfa/0x790 [ 2218.046053][T20803] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2218.046065][T20803] RIP: 0033:0x45a919 [ 2218.046080][T20803] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2218.046087][T20803] RSP: 002b:00007f69f668ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2218.065600][T20803] RAX: ffffffffffffffda RBX: 00007f69f668ac90 RCX: 000000000045a919 [ 2218.065609][T20803] RDX: 0000000000000028 RSI: 0000000020000780 RDI: 000000000000000a [ 2218.065618][T20803] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2218.065628][T20803] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f69f668b6d4 [ 2218.065637][T20803] R13: 00000000004c0eb3 R14: 00000000004d4b08 R15: 0000000000000005 15:57:26 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e1026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:57:26 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00810010008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:57:26 executing program 4 (fault-call:2 fault-nth:29): perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 15:57:26 executing program 1: perf_event_open(&(0x7f0000000400)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x96, 0x0, @perf_config_ext, 0x0, 0x7, 0x80000000, 0x0, 0x0, 0x400004, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000300)='syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) 15:57:26 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00004010008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:57:26 executing program 5: socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x8983, 0x0) perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x5b, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r1, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 15:57:26 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e6026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:57:26 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0035000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) [ 2229.088262][T20850] FAULT_INJECTION: forcing a failure. [ 2229.088262][T20850] name failslab, interval 1, probability 0, space 0, times 0 [ 2229.101533][T20850] CPU: 1 PID: 20850 Comm: syz-executor.4 Not tainted 5.5.0-rc2-syzkaller #0 [ 2229.110226][T20850] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2229.120300][T20850] Call Trace: [ 2229.123703][T20850] dump_stack+0x197/0x210 [ 2229.130762][T20850] should_fail.cold+0xa/0x15 [ 2229.135377][T20850] ? kasan_unpoison_shadow+0x20/0x50 [ 2229.140692][T20850] ? fault_create_debugfs_attr+0x180/0x180 [ 2229.146549][T20850] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2229.152303][T20850] ? skb_release_data+0x556/0x8d0 [ 2229.157350][T20850] ? __kmalloc_node_track_caller+0x4e/0x70 [ 2229.163179][T20850] ? __phys_addr+0xa4/0x120 [ 2229.167745][T20850] __should_failslab+0x121/0x190 [ 2229.172709][T20850] should_failslab+0x9/0x14 [ 2229.177245][T20850] kmem_cache_alloc+0x47/0x710 [ 2229.182057][T20850] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 15:57:26 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0040000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) [ 2229.188333][T20850] ? __this_cpu_preempt_check+0x35/0x190 [ 2229.193990][T20850] skb_clone+0x154/0x3d0 [ 2229.198254][T20850] bpf_clone_redirect+0xb2/0x470 [ 2229.203214][T20850] bpf_prog_3d1649e183dc2cc1+0xe90/0x1000 [ 2229.208953][T20850] ? __lock_acquire+0x16f2/0x4a00 [ 2229.213994][T20850] ? bpf_prog_test_run_skb+0x2bf/0x10b0 [ 2229.219732][T20850] ? __do_sys_bpf+0x1230/0x3810 [ 2229.219760][T20850] ? __kasan_check_read+0x11/0x20 [ 2229.229652][T20850] ? bpf_test_run+0x188/0xab0 [ 2229.234346][T20850] ? find_held_lock+0x35/0x130 [ 2229.239143][T20850] ? bpf_test_run+0x188/0xab0 [ 2229.243953][T20850] ? lock_downgrade+0x920/0x920 [ 2229.248837][T20850] ? ktime_get+0x100/0x2f0 [ 2229.254228][T20850] ? bpf_test_run+0x188/0xab0 [ 2229.258929][T20850] ? ktime_get+0x100/0x2f0 [ 2229.263401][T20850] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2229.268970][T20850] ? trace_hardirqs_on+0x67/0x240 [ 2229.274020][T20850] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2229.279756][T20850] ? ktime_get+0x1fd/0x2f0 [ 2229.284203][T20850] bpf_test_run+0x31f/0xab0 [ 2229.288823][T20850] ? bpf_test_finish.isra.0+0x510/0x510 [ 2229.294402][T20850] ? __build_skb+0x58/0x70 [ 2229.298848][T20850] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2229.305560][T20850] bpf_prog_test_run_skb+0x8d4/0x10b0 [ 2229.311045][T20850] ? bpf_test_init.isra.0+0x230/0x230 [ 2229.316536][T20850] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2229.322809][T20850] ? fput+0x1b/0x20 [ 2229.326630][T20850] ? __bpf_prog_get+0x97/0x2d0 [ 2229.331409][T20850] ? bpf_test_init.isra.0+0x230/0x230 15:57:26 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0025000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) [ 2229.336796][T20850] __do_sys_bpf+0x1230/0x3810 [ 2229.341493][T20850] ? bpf_prog_load+0x18f0/0x18f0 [ 2229.346453][T20850] ? __kasan_check_write+0x14/0x20 [ 2229.351579][T20850] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2229.357148][T20850] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2229.362457][T20850] ? wait_for_completion+0x440/0x440 [ 2229.367770][T20850] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2229.374031][T20850] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2229.379517][T20850] ? do_syscall_64+0x26/0x790 [ 2229.384213][T20850] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2229.390295][T20850] ? do_syscall_64+0x26/0x790 [ 2229.395003][T20850] __x64_sys_bpf+0x73/0xb0 [ 2229.399439][T20850] do_syscall_64+0xfa/0x790 [ 2229.403968][T20850] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2229.409882][T20850] RIP: 0033:0x45a919 [ 2229.413800][T20850] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2229.433563][T20850] RSP: 002b:00007f69f668ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2229.441993][T20850] RAX: ffffffffffffffda RBX: 00007f69f668ac90 RCX: 000000000045a919 [ 2229.449995][T20850] RDX: 0000000000000028 RSI: 0000000020000780 RDI: 000000000000000a [ 2229.458095][T20850] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2229.466089][T20850] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f69f668b6d4 [ 2229.474077][T20850] R13: 00000000004c0eb3 R14: 00000000004d4b08 R15: 0000000000000005 15:57:26 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0035000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:57:26 executing program 4 (fault-call:2 fault-nth:30): perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="b70200000b000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000002f3753a9c3b630bf92dd696125265586f2043649b89ec9b91dc174d5701424fa24052b2fe97409000000058e4bf0391702519694cd73608fadb119a5ffc8f1460c55bcce412bc1cc14a1f64ad78f7efc6f2233bacac999cbb0468424c2e8ab6cafc7bed227046c4ef20a09f4a46c382c1e7016a71a704c7b3cddf5306b500fda7b4a72bedb7c33a4c7e1f0c42819df5c26d28b450e2a9980b62fe2a57ac040892270e005a2e4ead36494a405cb500badb2b544edf5499098896b66851b823d3dc390934ea9062dd57a13ddb0ce78dbf6619bb0148e4dbb7ac738e4eb6e8061fa9d376fd0a4abf451611aa4aca07c12035ab1b2b55c098a78182c4651c0c3b019f94858fb0dc2ebd1ec689d889bf0839369cf62791d3bbd6c31262839a19f99e860dbed7b9493f9c8c764310e79aa8bd1e9e23f1ed38f91e6a53d265a75ec4fcd4d8b2d06c73ca7efec28b59fbeccfa1dbcd25032f328223bc33acc2449b6e9da679198772ecf1cc7f3886628dcc16c8ff17ff6ca528ef87741fc3e0f242a1037df395cbf0a9912d1b6d0bbc1482efe0712fac17f70f20bb9c6aef2d925d788d93d6c22aee7d387a7eaaada553f98a010533f2aa5a5cea2bdb19fc8c42e5d714ea143ab8a567bf262b03872602bfd2f35062c812cdc2eaf4a1ab92a419708546a70395497f822b5f06f0df2ba672d883b9fcfd34b7f4dc24bb3abdcb6f3e383dad4bc980c08e8e01099afd19cf916b0b9ab158153475d393aac65059df3c2f3d1ba5c9dc1c7e70ec14dd5af0b5b1a748ef9ebde08f72b53a54d2d66f41c5aa1fb1d91dfd6146e77bce93c45de0a0b19580a0ff90bdace7f549b8dcc95be4d596423ca8db0831932067edf32e58beaaa8625b91c05"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 15:57:26 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a26000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) [ 2231.023518][ T7] tipc: TX() has been purged, node left! [ 2231.513137][T20907] IPVS: ftp: loaded support on port[0] = 21 [ 2231.645907][T20908] IPVS: ftp: loaded support on port[0] = 21 [ 2231.989710][T20907] chnl_net:caif_netlink_parms(): no params data found [ 2232.216070][T20908] chnl_net:caif_netlink_parms(): no params data found [ 2232.266970][T20907] bridge0: port 1(bridge_slave_0) entered blocking state [ 2232.300817][T20907] bridge0: port 1(bridge_slave_0) entered disabled state [ 2232.324692][T20907] device bridge_slave_0 entered promiscuous mode [ 2232.374694][T20907] bridge0: port 2(bridge_slave_1) entered blocking state [ 2232.384498][T20907] bridge0: port 2(bridge_slave_1) entered disabled state [ 2232.441996][T20907] device bridge_slave_1 entered promiscuous mode [ 2232.509006][T20907] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2232.569626][T20907] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2232.607418][T20908] bridge0: port 1(bridge_slave_0) entered blocking state [ 2232.634747][T20908] bridge0: port 1(bridge_slave_0) entered disabled state [ 2232.647612][T20908] device bridge_slave_0 entered promiscuous mode [ 2232.687496][T20907] team0: Port device team_slave_0 added [ 2232.694001][T20908] bridge0: port 2(bridge_slave_1) entered blocking state [ 2232.701354][T20908] bridge0: port 2(bridge_slave_1) entered disabled state [ 2232.709193][T20908] device bridge_slave_1 entered promiscuous mode [ 2232.719634][T20907] team0: Port device team_slave_1 added [ 2232.804654][T20907] device hsr_slave_0 entered promiscuous mode [ 2232.851483][T20907] device hsr_slave_1 entered promiscuous mode [ 2232.910759][T20907] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2232.918628][T20907] Cannot create hsr debugfs directory [ 2232.927610][T20908] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2232.953614][T20908] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2232.987693][T20908] team0: Port device team_slave_0 added [ 2233.000960][T20908] team0: Port device team_slave_1 added [ 2233.078166][T20908] device hsr_slave_0 entered promiscuous mode [ 2233.131181][T20908] device hsr_slave_1 entered promiscuous mode [ 2233.173640][T20908] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2233.182291][T20908] Cannot create hsr debugfs directory [ 2233.259583][T20907] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2233.292565][T13931] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2233.300400][T13931] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2233.310566][T20907] 8021q: adding VLAN 0 to HW filter on device team0 [ 2233.331683][T20876] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2233.340485][T20876] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2233.349603][T20876] bridge0: port 1(bridge_slave_0) entered blocking state [ 2233.356717][T20876] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2233.371247][T20876] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2233.379270][T20876] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2233.388793][T20876] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2233.398419][T20876] bridge0: port 2(bridge_slave_1) entered blocking state [ 2233.405664][T20876] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2233.430077][T20908] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2233.443090][T20876] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2233.464349][T13955] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2233.473385][T13955] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2233.482807][T13955] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2233.490541][T13955] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 2233.500579][T13955] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2233.509557][T13955] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 2233.522184][T13955] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2233.530791][T13955] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2233.553844][T20908] 8021q: adding VLAN 0 to HW filter on device team0 [ 2233.563071][T20876] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2233.575693][T20876] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2233.584916][T20876] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2233.593589][T20876] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2233.604357][T20907] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2233.621640][T13931] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2233.631275][T13931] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2233.640718][T13931] bridge0: port 1(bridge_slave_0) entered blocking state [ 2233.647885][T13931] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2233.656333][T13931] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2233.665186][T13931] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2233.673797][T13931] bridge0: port 2(bridge_slave_1) entered blocking state [ 2233.680917][T13931] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2233.689657][T13931] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2233.711001][T20896] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 2233.720069][T20896] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 2233.749574][T20921] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 2233.758193][T20921] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2233.765845][T20921] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2233.776322][T20921] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 2233.789945][T20907] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2233.803432][T20921] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 2233.828462][T20908] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 2233.840450][T20908] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2233.854226][T20922] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2233.863591][T20922] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2233.872738][T20922] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 2233.912002][T20922] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 2233.919604][T20922] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 2233.935502][T20908] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2234.088106][T20934] FAULT_INJECTION: forcing a failure. [ 2234.088106][T20934] name failslab, interval 1, probability 0, space 0, times 0 [ 2234.101322][T20934] CPU: 1 PID: 20934 Comm: syz-executor.4 Not tainted 5.5.0-rc2-syzkaller #0 [ 2234.110112][T20934] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2234.120178][T20934] Call Trace: [ 2234.123547][T20934] dump_stack+0x197/0x210 [ 2234.128062][T20934] should_fail.cold+0xa/0x15 [ 2234.132797][T20934] ? kasan_unpoison_shadow+0x20/0x50 [ 2234.138165][T20934] ? fault_create_debugfs_attr+0x180/0x180 [ 2234.144063][T20934] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2234.149804][T20934] ? skb_release_data+0x556/0x8d0 [ 2234.154859][T20934] ? __kmalloc_node_track_caller+0x4e/0x70 [ 2234.160668][T20934] ? __phys_addr+0xa4/0x120 [ 2234.165172][T20934] __should_failslab+0x121/0x190 [ 2234.170117][T20934] should_failslab+0x9/0x14 [ 2234.174645][T20934] kmem_cache_alloc+0x47/0x710 [ 2234.179512][T20934] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2234.185845][T20934] ? __this_cpu_preempt_check+0x35/0x190 [ 2234.191717][T20934] skb_clone+0x154/0x3d0 [ 2234.195988][T20934] bpf_clone_redirect+0xb2/0x470 [ 2234.200928][T20934] bpf_prog_3d1649e183dc2cc1+0x408/0x1000 [ 2234.206681][T20934] ? __lock_acquire+0x16f2/0x4a00 [ 2234.211714][T20934] ? bpf_prog_test_run_skb+0x2bf/0x10b0 [ 2234.217260][T20934] ? __do_sys_bpf+0x1230/0x3810 [ 2234.222127][T20934] ? __kasan_check_read+0x11/0x20 [ 2234.227139][T20934] ? bpf_test_run+0x188/0xab0 [ 2234.231819][T20934] ? find_held_lock+0x35/0x130 [ 2234.236571][T20934] ? bpf_test_run+0x188/0xab0 [ 2234.241248][T20934] ? lock_downgrade+0x920/0x920 [ 2234.246120][T20934] ? ktime_get+0x100/0x2f0 [ 2234.250533][T20934] ? bpf_test_run+0x188/0xab0 [ 2234.256097][T20934] ? ktime_get+0x100/0x2f0 [ 2234.260559][T20934] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2234.266868][T20934] ? trace_hardirqs_on+0x67/0x240 [ 2234.272269][T20934] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2234.277988][T20934] ? ktime_get+0x1fd/0x2f0 [ 2234.282412][T20934] bpf_test_run+0x31f/0xab0 [ 2234.286914][T20934] ? bpf_test_finish.isra.0+0x510/0x510 [ 2234.292467][T20934] ? __build_skb+0x58/0x70 [ 2234.296891][T20934] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2234.303138][T20934] bpf_prog_test_run_skb+0x8d4/0x10b0 [ 2234.308517][T20934] ? bpf_test_init.isra.0+0x230/0x230 [ 2234.313898][T20934] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2234.320326][T20934] ? fput+0x1b/0x20 [ 2234.324158][T20934] ? __bpf_prog_get+0x97/0x2d0 [ 2234.329055][T20934] ? bpf_test_init.isra.0+0x230/0x230 [ 2234.334481][T20934] __do_sys_bpf+0x1230/0x3810 [ 2234.339192][T20934] ? bpf_prog_load+0x18f0/0x18f0 [ 2234.344135][T20934] ? __kasan_check_write+0x14/0x20 [ 2234.349597][T20934] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2234.355146][T20934] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2234.360592][T20934] ? wait_for_completion+0x440/0x440 [ 2234.365893][T20934] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2234.372134][T20934] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2234.377596][T20934] ? do_syscall_64+0x26/0x790 [ 2234.382271][T20934] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2234.388449][T20934] ? do_syscall_64+0x26/0x790 [ 2234.393124][T20934] __x64_sys_bpf+0x73/0xb0 [ 2234.397627][T20934] do_syscall_64+0xfa/0x790 [ 2234.402549][T20934] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2234.408461][T20934] RIP: 0033:0x45a919 [ 2234.412351][T20934] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2234.432318][T20934] RSP: 002b:00007f208576fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2234.440731][T20934] RAX: ffffffffffffffda RBX: 00007f208576fc90 RCX: 000000000045a919 [ 2234.448794][T20934] RDX: 0000000000000028 RSI: 0000000020000780 RDI: 000000000000000a [ 2234.456880][T20934] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2234.464860][T20934] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f20857706d4 [ 2234.472826][T20934] R13: 00000000004c0eb3 R14: 00000000004d4b08 R15: 0000000000000005 [ 2235.339401][ T7] device bridge_slave_1 left promiscuous mode [ 2235.346714][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 2235.395224][ T7] device bridge_slave_0 left promiscuous mode [ 2235.401565][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 2235.532356][ T7] device hsr_slave_0 left promiscuous mode [ 2235.561727][ T7] device hsr_slave_1 left promiscuous mode [ 2235.626572][ T7] team0 (unregistering): Port device team_slave_1 removed [ 2235.643029][ T7] team0 (unregistering): Port device team_slave_0 removed [ 2235.658535][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2235.698947][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2235.797032][ T7] bond0 (unregistering): Released all slaves 15:57:39 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e02be0010008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:57:39 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00655810008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:57:39 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0025000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:57:39 executing program 4 (fault-call:2 fault-nth:31): perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="b70200000b000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000002f3753a9c3b630bf92dd696125265586f2043649b89ec9b91dc174d5701424fa24052b2fe97409000000058e4bf0391702519694cd73608fadb119a5ffc8f1460c55bcce412bc1cc14a1f64ad78f7efc6f2233bacac999cbb0468424c2e8ab6cafc7bed227046c4ef20a09f4a46c382c1e7016a71a704c7b3cddf5306b500fda7b4a72bedb7c33a4c7e1f0c42819df5c26d28b450e2a9980b62fe2a57ac040892270e005a2e4ead36494a405cb500badb2b544edf5499098896b66851b823d3dc390934ea9062dd57a13ddb0ce78dbf6619bb0148e4dbb7ac738e4eb6e8061fa9d376fd0a4abf451611aa4aca07c12035ab1b2b55c098a78182c4651c0c3b019f94858fb0dc2ebd1ec689d889bf0839369cf62791d3bbd6c31262839a19f99e860dbed7b9493f9c8c764310e79aa8bd1e9e23f1ed38f91e6a53d265a75ec4fcd4d8b2d06c73ca7efec28b59fbeccfa1dbcd25032f328223bc33acc2449b6e9da679198772ecf1cc7f3886628dcc16c8ff17ff6ca528ef87741fc3e0f242a1037df395cbf0a9912d1b6d0bbc1482efe0712fac17f70f20bb9c6aef2d925d788d93d6c22aee7d387a7eaaada553f98a010533f2aa5a5cea2bdb19fc8c42e5d714ea143ab8a567bf262b03872602bfd2f35062c812cdc2eaf4a1ab92a419708546a70395497f822b5f06f0df2ba672d883b9fcfd34b7f4dc24bb3abdcb6f3e383dad4bc980c08e8e01099afd19cf916b0b9ab158153475d393aac65059df3c2f3d1ba5c9dc1c7e70ec14dd5af0b5b1a748ef9ebde08f72b53a54d2d66f41c5aa1fb1d91dfd6146e77bce93c45de0a0b19580a0ff90bdace7f549b8dcc95be4d596423ca8db0831932067edf32e58beaaa8625b91c05"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 15:57:39 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e002600000400bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:57:39 executing program 5: socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x8983, 0x0) perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x5b, &(0x7f0000000b40)=ANY=[@ANYBLOB="b70200000b000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000002f3753a9c3b630bf92dd696125265586f2043649b89ec9b91dc174d5701424fa24052b2fe97409000000058e4bf0391702519694cd73608fadb119a5ffc8f1460c55bcce412bc1cc14a1f64ad78f7efc6f2233bacac999cbb0468424c2e8ab6cafc7bed227046c4ef20a09f4a46c382c1e7016a71a704c7b3cddf5306b500fda7b4a72bedb7c33a4c7e1f0c42819df5c26d28b450e2a9980b62fe2a57ac040892270e005a2e4ead36494a405cb500badb2b544edf5499098896b66851b823d3dc390934ea9062dd57a13ddb0ce78dbf6619bb0148e4dbb7ac738e4eb6e8061fa9d376fd0a4abf451611aa4aca07c12035ab1b2b55c098a78182c4651c0c3b019f94858fb0dc2ebd1ec689d889bf0839369cf62791d3bbd6c31262839a19f99e860dbed7b9493f9c8c764310e79aa8bd1e9e23f1ed38f91e6a53d265a75ec4fcd4d8b2d06c73ca7efec28b59fbeccfa1dbcd25032f328223bc33acc2449b6e9da679198772ecf1cc7f3886628dcc16c8ff17ff6ca528ef87741fc3e0f242a1037df395cbf0a9912d1b6d0bbc1482efe0712fac17f70f20bb9c6aef2d925d788d93d6c22aee7d387a7eaaada553f98a010533f2aa5a5cea2bdb19fc8c42e5d714ea143ab8a567bf262b03872602bfd2f35062c812cdc2eaf4a1ab92a419708546a70395497f822b5f06f0df2ba672d883b9fcfd34b7f4dc24bb3abdcb6f3e383dad4bc980c08e8e01099afd19cf916b0b9ab158153475d393aac65059df3c2f3d1ba5c9dc1c7e70ec14dd5af0b5b1a748ef9ebde08f72b53a54d2d66f41c5aa1fb1d91dfd6146e77bce93c45de0a0b19580a0ff90bdace7f549b8dcc95be4d596423ca8db0831932067edf32e58beaaa"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r1, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 15:57:39 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e002600000ec0bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) [ 2242.613727][T20956] FAULT_INJECTION: forcing a failure. [ 2242.613727][T20956] name failslab, interval 1, probability 0, space 0, times 0 [ 2242.627431][T20956] CPU: 0 PID: 20956 Comm: syz-executor.4 Not tainted 5.5.0-rc2-syzkaller #0 [ 2242.636330][T20956] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2242.646390][T20956] Call Trace: [ 2242.646413][T20956] dump_stack+0x197/0x210 [ 2242.646435][T20956] should_fail.cold+0xa/0x15 [ 2242.658644][T20956] ? fault_create_debugfs_attr+0x180/0x180 [ 2242.664470][T20956] ? __kasan_check_read+0x11/0x20 [ 2242.669520][T20956] ? mark_lock+0xc2/0x1220 [ 2242.673955][T20956] ? __perf_event_task_sched_in+0x63b/0x810 [ 2242.679876][T20956] __should_failslab+0x121/0x190 [ 2242.684841][T20956] should_failslab+0x9/0x14 [ 2242.689354][T20956] kmem_cache_alloc+0x47/0x710 [ 2242.694147][T20956] ? finish_task_switch+0x147/0x750 [ 2242.699363][T20956] ? __kasan_check_read+0x11/0x20 [ 2242.704410][T20956] skb_clone+0x154/0x3d0 [ 2242.708946][T20956] bpf_clone_redirect+0xb2/0x470 [ 2242.713912][T20956] ? __kasan_check_read+0x11/0x20 [ 2242.719091][T20956] bpf_prog_3d1649e183dc2cc1+0xaa4/0x1000 [ 2242.724836][T20956] ? __lock_acquire+0x16f2/0x4a00 [ 2242.729893][T20956] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2242.735629][T20956] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2242.741106][T20956] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2242.746411][T20956] ? retint_kernel+0x2b/0x2b [ 2242.751017][T20956] ? trace_hardirqs_on_caller+0x6a/0x240 [ 2242.756692][T20956] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2242.762179][T20956] ? __this_cpu_preempt_check+0x35/0x190 [ 2242.767819][T20956] ? retint_kernel+0x2b/0x2b [ 2242.772445][T20956] ? ktime_get+0x129/0x2f0 [ 2242.776881][T20956] ? ktime_get+0x12e/0x2f0 [ 2242.781321][T20956] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2242.787062][T20956] ? ktime_get+0x1fd/0x2f0 [ 2242.791501][T20956] bpf_test_run+0x31f/0xab0 [ 2242.796036][T20956] ? bpf_test_finish.isra.0+0x510/0x510 [ 2242.801602][T20956] ? __build_skb+0x58/0x70 [ 2242.806022][T20956] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2242.812256][T20956] bpf_prog_test_run_skb+0x8d4/0x10b0 [ 2242.817647][T20956] ? bpf_test_init.isra.0+0x230/0x230 [ 2242.823036][T20956] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2242.829268][T20956] ? fput+0x1b/0x20 [ 2242.833067][T20956] ? __bpf_prog_get+0x97/0x2d0 [ 2242.837907][T20956] ? bpf_test_init.isra.0+0x230/0x230 [ 2242.843265][T20956] __do_sys_bpf+0x1230/0x3810 [ 2242.847953][T20956] ? bpf_prog_load+0x18f0/0x18f0 [ 2242.852879][T20956] ? __kasan_check_write+0x14/0x20 [ 2242.857992][T20956] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2242.863524][T20956] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2242.868797][T20956] ? wait_for_completion+0x440/0x440 [ 2242.874074][T20956] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2242.880311][T20956] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2242.885789][T20956] ? do_syscall_64+0x26/0x790 [ 2242.890451][T20956] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2242.896507][T20956] ? do_syscall_64+0x26/0x790 [ 2242.901174][T20956] __x64_sys_bpf+0x73/0xb0 [ 2242.905594][T20956] do_syscall_64+0xfa/0x790 [ 2242.910090][T20956] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2242.916510][T20956] RIP: 0033:0x45a919 [ 2242.920628][T20956] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2242.940235][T20956] RSP: 002b:00007f208576fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2242.948725][T20956] RAX: ffffffffffffffda RBX: 00007f208576fc90 RCX: 000000000045a919 [ 2242.956710][T20956] RDX: 0000000000000028 RSI: 0000000020000780 RDI: 000000000000000a 15:57:40 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026020000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) [ 2242.964670][T20956] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2242.972633][T20956] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f20857706d4 [ 2242.980613][T20956] R13: 00000000004c0eb3 R14: 00000000004d4b08 R15: 0000000000000005 15:57:40 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0025000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:57:40 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00006010008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:57:40 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026030000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:57:40 executing program 4 (fault-call:2 fault-nth:32): perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) [ 2243.368628][T20980] FAULT_INJECTION: forcing a failure. [ 2243.368628][T20980] name failslab, interval 1, probability 0, space 0, times 0 [ 2243.382188][T20980] CPU: 0 PID: 20980 Comm: syz-executor.4 Not tainted 5.5.0-rc2-syzkaller #0 [ 2243.390893][T20980] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2243.400977][T20980] Call Trace: [ 2243.404460][T20980] dump_stack+0x197/0x210 [ 2243.408907][T20980] should_fail.cold+0xa/0x15 [ 2243.413569][T20980] ? fault_create_debugfs_attr+0x180/0x180 [ 2243.419377][T20980] ? __kasan_check_read+0x11/0x20 [ 2243.424409][T20980] ? mark_lock+0xc2/0x1220 [ 2243.428982][T20980] ? __perf_event_task_sched_in+0x63b/0x810 [ 2243.434912][T20980] __should_failslab+0x121/0x190 [ 2243.439874][T20980] should_failslab+0x9/0x14 [ 2243.444391][T20980] kmem_cache_alloc+0x47/0x710 [ 2243.449175][T20980] ? finish_task_switch+0x147/0x750 [ 2243.454397][T20980] ? __kasan_check_read+0x11/0x20 [ 2243.454417][T20980] skb_clone+0x154/0x3d0 [ 2243.454436][T20980] bpf_clone_redirect+0xb2/0x470 [ 2243.454450][T20980] ? __kasan_check_read+0x11/0x20 [ 2243.454471][T20980] bpf_prog_3d1649e183dc2cc1+0xfb0/0x1000 [ 2243.479390][T20980] ? __lock_acquire+0x16f2/0x4a00 [ 2243.484527][T20980] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2243.490024][T20980] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2243.495503][T20980] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2243.500801][T20980] ? retint_kernel+0x2b/0x2b [ 2243.505503][T20980] ? trace_hardirqs_on_caller+0x6a/0x240 [ 2243.511315][T20980] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2243.516775][T20980] ? __this_cpu_preempt_check+0x35/0x190 [ 2243.522417][T20980] ? retint_kernel+0x2b/0x2b [ 2243.527003][T20980] ? ktime_get+0x15b/0x2f0 [ 2243.531629][T20980] ? read_tsc+0x3/0x10 [ 2243.535688][T20980] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2243.541414][T20980] ? ktime_get+0x1fd/0x2f0 [ 2243.545822][T20980] bpf_test_run+0x31f/0xab0 [ 2243.550333][T20980] ? bpf_test_finish.isra.0+0x510/0x510 [ 2243.555883][T20980] ? __build_skb+0x58/0x70 [ 2243.560306][T20980] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2243.566555][T20980] bpf_prog_test_run_skb+0x8d4/0x10b0 [ 2243.571937][T20980] ? bpf_test_init.isra.0+0x230/0x230 [ 2243.577508][T20980] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2243.583746][T20980] ? fput+0x1b/0x20 [ 2243.587641][T20980] ? __bpf_prog_get+0x97/0x2d0 [ 2243.592409][T20980] ? bpf_test_init.isra.0+0x230/0x230 [ 2243.597793][T20980] __do_sys_bpf+0x1230/0x3810 [ 2243.602501][T20980] ? bpf_prog_load+0x18f0/0x18f0 [ 2243.607447][T20980] ? __this_cpu_preempt_check+0x35/0x190 [ 2243.613080][T20980] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2243.619314][T20980] ? debug_smp_processor_id+0x33/0x18a [ 2243.624766][T20980] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 2243.631109][T20980] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2243.636578][T20980] ? do_syscall_64+0x26/0x790 [ 2243.641247][T20980] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2243.647302][T20980] ? do_syscall_64+0x26/0x790 [ 2243.651975][T20980] __x64_sys_bpf+0x73/0xb0 [ 2243.656616][T20980] do_syscall_64+0xfa/0x790 [ 2243.661123][T20980] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2243.667021][T20980] RIP: 0033:0x45a919 [ 2243.670903][T20980] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2243.690495][T20980] RSP: 002b:00007f208576fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2243.699011][T20980] RAX: ffffffffffffffda RBX: 00007f208576fc90 RCX: 000000000045a919 [ 2243.706979][T20980] RDX: 0000000000000028 RSI: 0000000020000780 RDI: 000000000000000a [ 2243.714942][T20980] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2243.722911][T20980] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f20857706d4 [ 2243.730872][T20980] R13: 00000000004c0eb3 R14: 00000000004d4b08 R15: 0000000000000005 [ 2245.220786][ T7] tipc: TX() has been purged, node left! [ 2247.612646][ T7] device bridge_slave_1 left promiscuous mode [ 2247.619228][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 2247.661533][ T7] device bridge_slave_0 left promiscuous mode [ 2247.667992][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 2247.804548][ T7] device hsr_slave_0 left promiscuous mode [ 2247.860819][ T7] device hsr_slave_1 left promiscuous mode [ 2247.935553][ T7] device team_slave_1 left promiscuous mode [ 2247.944505][ T7] team0 (unregistering): Port device team_slave_1 removed [ 2247.955943][ T7] device team_slave_0 left promiscuous mode [ 2247.963074][ T7] team0 (unregistering): Port device team_slave_0 removed [ 2247.975287][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2248.015886][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2248.157750][ T7] bond0 (unregistering): Released all slaves 15:57:53 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00f00010008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:57:53 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0400000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:57:53 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026040000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:57:53 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00586510008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:57:53 executing program 4 (fault-call:2 fault-nth:33): perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 15:57:53 executing program 5: socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x8983, 0x0) perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x5b, &(0x7f0000000b40)=ANY=[@ANYBLOB="b70200000b000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000002f3753a9c3b630bf92dd696125265586f2043649b89ec9b91dc174d5701424fa24052b2fe97409000000058e4bf0391702519694cd73608fadb119a5ffc8f1460c55bcce412bc1cc14a1f64ad78f7efc6f2233bacac999cbb0468424c2e8ab6cafc7bed227046c4ef20a09f4a46c382c1e7016a71a704c7b3cddf5306b500fda7b4a72bedb7c33a4c7e1f0c42819df5c26d28b450e2a9980b62fe2a57ac040892270e005a2e4ead36494a405cb500badb2b544edf5499098896b66851b823d3dc390934ea9062dd57a13ddb0ce78dbf6619bb0148e4dbb7ac738e4eb6e8061fa9d376fd0a4abf451611aa4aca07c12035ab1b2b55c098a78182c4651c0c3b019f94858fb0dc2ebd1ec689d889bf0839369cf62791d3bbd6c31262839a19f99e860dbed7b9493f9c8c764310e79aa8bd1e9e23f1ed38f91e6a53d265a75ec4fcd4d8b2d06c73ca7efec28b59fbeccfa1dbcd25032f328223bc33acc2449b6e9da679198772ecf1cc7f3886628dcc16c8ff17ff6ca528ef87741fc3e0f242a1037df395cbf0a9912d1b6d0bbc1482efe0712fac17f70f20bb9c6aef2d925d788d93d6c22aee7d387a7eaaada553f98a010533f2aa5a5cea2bdb19fc8c42e5d714ea143ab8a567bf262b03872602bfd2f35062c812cdc2eaf4a1ab92a419708546a70395497f822b5f06f0df2ba672d883b9fcfd34b7f4dc24bb3abdcb6f3e383dad4bc980c08e8e01099afd19cf916b0b9ab158153475d393aac65059df3c2f3d1ba5c9dc1c7e70ec14dd5af0b5b1a748ef9ebde08f72b53a54d2d66f41c5aa1fb1d91dfd6146e77bce93c45de0a0b19580a0ff90bdace7f549b8dcc95be4d596423ca8db0831932067edf32e58beaaa"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r1, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 15:57:53 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026060000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) [ 2256.005563][T21028] FAULT_INJECTION: forcing a failure. [ 2256.005563][T21028] name failslab, interval 1, probability 0, space 0, times 0 [ 2256.018367][T21028] CPU: 1 PID: 21028 Comm: syz-executor.4 Not tainted 5.5.0-rc2-syzkaller #0 [ 2256.027142][T21028] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2256.037386][T21028] Call Trace: [ 2256.040702][T21028] dump_stack+0x197/0x210 [ 2256.045067][T21028] should_fail.cold+0xa/0x15 [ 2256.049691][T21028] ? kasan_unpoison_shadow+0x20/0x50 [ 2256.055013][T21028] ? fault_create_debugfs_attr+0x180/0x180 [ 2256.060842][T21028] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2256.066581][T21028] ? skb_release_data+0x556/0x8d0 [ 2256.071795][T21028] ? __kmalloc_node_track_caller+0x4e/0x70 [ 2256.077630][T21028] ? __phys_addr+0xa4/0x120 [ 2256.082165][T21028] __should_failslab+0x121/0x190 [ 2256.087126][T21028] should_failslab+0x9/0x14 [ 2256.091647][T21028] kmem_cache_alloc+0x47/0x710 [ 2256.096435][T21028] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2256.102675][T21028] ? __this_cpu_preempt_check+0x35/0x190 [ 2256.102695][T21028] skb_clone+0x154/0x3d0 [ 2256.102714][T21028] bpf_clone_redirect+0xb2/0x470 [ 2256.102735][T21028] bpf_prog_3d1649e183dc2cc1+0x420/0x1000 [ 2256.102753][T21028] ? __lock_acquire+0x16f2/0x4a00 [ 2256.102766][T21028] ? bpf_prog_test_run_skb+0x2bf/0x10b0 [ 2256.102781][T21028] ? __do_sys_bpf+0x1230/0x3810 [ 2256.102801][T21028] ? __kasan_check_read+0x11/0x20 [ 2256.102815][T21028] ? bpf_test_run+0x188/0xab0 [ 2256.102828][T21028] ? find_held_lock+0x35/0x130 15:57:53 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e00260a0000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:57:53 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0400000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) [ 2256.102841][T21028] ? bpf_test_run+0x188/0xab0 [ 2256.102860][T21028] ? lock_downgrade+0x920/0x920 [ 2256.102878][T21028] ? ktime_get+0x100/0x2f0 [ 2256.128742][T21028] ? bpf_test_run+0x188/0xab0 [ 2256.128758][T21028] ? ktime_get+0x100/0x2f0 [ 2256.128776][T21028] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2256.128796][T21028] ? trace_hardirqs_on+0x67/0x240 [ 2256.144216][T21028] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2256.144236][T21028] ? ktime_get+0x1fd/0x2f0 [ 2256.144258][T21028] bpf_test_run+0x31f/0xab0 [ 2256.153681][T21028] ? bpf_test_finish.isra.0+0x510/0x510 [ 2256.153700][T21028] ? __build_skb+0x58/0x70 [ 2256.153716][T21028] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2256.153735][T21028] bpf_prog_test_run_skb+0x8d4/0x10b0 [ 2256.153756][T21028] ? bpf_test_init.isra.0+0x230/0x230 [ 2256.153772][T21028] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2256.153792][T21028] ? fput+0x1b/0x20 [ 2256.153809][T21028] ? __bpf_prog_get+0x97/0x2d0 [ 2256.153826][T21028] ? bpf_test_init.isra.0+0x230/0x230 [ 2256.153839][T21028] __do_sys_bpf+0x1230/0x3810 [ 2256.153857][T21028] ? bpf_prog_load+0x18f0/0x18f0 [ 2256.153873][T21028] ? __kasan_check_write+0x14/0x20 [ 2256.153887][T21028] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2256.153906][T21028] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2256.276269][T21028] ? wait_for_completion+0x440/0x440 [ 2256.281604][T21028] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2256.287885][T21028] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2256.293368][T21028] ? do_syscall_64+0x26/0x790 [ 2256.298075][T21028] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 15:57:53 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0400000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:57:53 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e00260c0000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) [ 2256.304224][T21028] ? do_syscall_64+0x26/0x790 [ 2256.309051][T21028] __x64_sys_bpf+0x73/0xb0 [ 2256.313504][T21028] do_syscall_64+0xfa/0x790 [ 2256.318037][T21028] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2256.323943][T21028] RIP: 0033:0x45a919 [ 2256.327860][T21028] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2256.348431][T21028] RSP: 002b:00007f208576fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 15:57:53 executing program 4 (fault-call:2 fault-nth:34): perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) [ 2256.356849][T21028] RAX: ffffffffffffffda RBX: 00007f208576fc90 RCX: 000000000045a919 [ 2256.365004][T21028] RDX: 0000000000000028 RSI: 0000000020000780 RDI: 000000000000000a [ 2256.365012][T21028] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2256.365020][T21028] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f20857706d4 [ 2256.365027][T21028] R13: 00000000004c0eb3 R14: 00000000004d4b08 R15: 0000000000000005 [ 2256.520208][T21047] FAULT_INJECTION: forcing a failure. [ 2256.520208][T21047] name failslab, interval 1, probability 0, space 0, times 0 [ 2256.533182][T21047] CPU: 1 PID: 21047 Comm: syz-executor.4 Not tainted 5.5.0-rc2-syzkaller #0 [ 2256.533192][T21047] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2256.533203][T21047] Call Trace: [ 2256.555247][T21047] dump_stack+0x197/0x210 [ 2256.559603][T21047] should_fail.cold+0xa/0x15 [ 2256.564214][T21047] ? do_syscall_64+0xfa/0x790 [ 2256.568918][T21047] ? fault_create_debugfs_attr+0x180/0x180 [ 2256.574742][T21047] ? __local_bh_enable_ip+0x15a/0x270 [ 2256.574766][T21047] __should_failslab+0x121/0x190 [ 2256.574787][T21047] should_failslab+0x9/0x14 [ 2256.589605][T21047] kmem_cache_alloc_node_trace+0x5a/0x750 [ 2256.595439][T21047] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2256.600741][T21047] __kmalloc_node_track_caller+0x3d/0x70 [ 2256.600761][T21047] __kmalloc_reserve.isra.0+0x40/0xf0 [ 2256.600779][T21047] pskb_expand_head+0x151/0xff0 [ 2256.600805][T21047] skb_ensure_writable+0x2d2/0x480 [ 2256.600826][T21047] bpf_clone_redirect+0x135/0x470 [ 2256.600850][T21047] bpf_prog_3d1649e183dc2cc1+0xcc0/0x1000 [ 2256.600869][T21047] ? __lock_acquire+0x16f2/0x4a00 [ 2256.600884][T21047] ? bpf_prog_test_run_skb+0x2bf/0x10b0 [ 2256.600898][T21047] ? __do_sys_bpf+0x1230/0x3810 [ 2256.600914][T21047] ? __kasan_check_read+0x11/0x20 [ 2256.600932][T21047] ? bpf_test_run+0x188/0xab0 [ 2256.611945][T21047] ? find_held_lock+0x35/0x130 [ 2256.611962][T21047] ? bpf_test_run+0x188/0xab0 [ 2256.611981][T21047] ? lock_downgrade+0x920/0x920 [ 2256.611995][T21047] ? ktime_get+0x100/0x2f0 [ 2256.612012][T21047] ? bpf_test_run+0x188/0xab0 [ 2256.638960][T21047] ? ktime_get+0x100/0x2f0 [ 2256.638977][T21047] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2256.638998][T21047] ? trace_hardirqs_on+0x67/0x240 [ 2256.659084][T21047] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2256.659103][T21047] ? ktime_get+0x1fd/0x2f0 [ 2256.707314][T21047] bpf_test_run+0x31f/0xab0 [ 2256.711986][T21047] ? bpf_test_finish.isra.0+0x510/0x510 [ 2256.717733][T21047] ? __build_skb+0x58/0x70 [ 2256.722178][T21047] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2256.728449][T21047] bpf_prog_test_run_skb+0x8d4/0x10b0 [ 2256.733846][T21047] ? bpf_test_init.isra.0+0x230/0x230 [ 2256.739244][T21047] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2256.745509][T21047] ? fput+0x1b/0x20 [ 2256.749349][T21047] ? __bpf_prog_get+0x97/0x2d0 [ 2256.754157][T21047] ? bpf_test_init.isra.0+0x230/0x230 [ 2256.759662][T21047] __do_sys_bpf+0x1230/0x3810 [ 2256.764388][T21047] ? bpf_prog_load+0x18f0/0x18f0 [ 2256.769346][T21047] ? __kasan_check_write+0x14/0x20 [ 2256.774480][T21047] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2256.780050][T21047] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2256.785362][T21047] ? wait_for_completion+0x440/0x440 [ 2256.790674][T21047] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2256.797449][T21047] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2256.802914][T21047] ? do_syscall_64+0x26/0x790 [ 2256.807593][T21047] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2256.813649][T21047] ? do_syscall_64+0x26/0x790 [ 2256.818315][T21047] __x64_sys_bpf+0x73/0xb0 [ 2256.822730][T21047] do_syscall_64+0xfa/0x790 [ 2256.827234][T21047] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2256.833119][T21047] RIP: 0033:0x45a919 [ 2256.837068][T21047] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2256.856892][T21047] RSP: 002b:00007f208576fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2256.865300][T21047] RAX: ffffffffffffffda RBX: 00007f208576fc90 RCX: 000000000045a919 [ 2256.873270][T21047] RDX: 0000000000000028 RSI: 0000000020000780 RDI: 000000000000000a [ 2256.881248][T21047] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2256.889324][T21047] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f20857706d4 [ 2256.897300][T21047] R13: 00000000004c0eb3 R14: 00000000004d4b08 R15: 0000000000000005 15:58:06 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000020008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:58:06 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0400000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:58:06 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00008110008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:58:06 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e00260e0000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:58:06 executing program 4 (fault-call:2 fault-nth:35): perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 15:58:06 executing program 5: socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x8983, 0x0) perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x5b, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r1, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 15:58:06 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0400000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:58:06 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e00260f0000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) [ 2269.555031][T21070] FAULT_INJECTION: forcing a failure. [ 2269.555031][T21070] name failslab, interval 1, probability 0, space 0, times 0 [ 2269.567911][T21070] CPU: 1 PID: 21070 Comm: syz-executor.4 Not tainted 5.5.0-rc2-syzkaller #0 [ 2269.576605][T21070] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2269.586673][T21070] Call Trace: [ 2269.586699][T21070] dump_stack+0x197/0x210 [ 2269.586718][T21070] should_fail.cold+0xa/0x15 [ 2269.586734][T21070] ? kasan_unpoison_shadow+0x20/0x50 [ 2269.586751][T21070] ? fault_create_debugfs_attr+0x180/0x180 [ 2269.586766][T21070] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2269.586786][T21070] ? skb_release_data+0x556/0x8d0 [ 2269.621003][T21070] ? __kmalloc_node_track_caller+0x4e/0x70 [ 2269.626846][T21070] ? __phys_addr+0xa4/0x120 [ 2269.631382][T21070] __should_failslab+0x121/0x190 [ 2269.636368][T21070] should_failslab+0x9/0x14 [ 2269.640892][T21070] kmem_cache_alloc+0x47/0x710 [ 2269.645763][T21070] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2269.652027][T21070] ? __this_cpu_preempt_check+0x35/0x190 [ 2269.657688][T21070] skb_clone+0x154/0x3d0 [ 2269.661956][T21070] bpf_clone_redirect+0xb2/0x470 [ 2269.666918][T21070] bpf_prog_3d1649e183dc2cc1+0xbec/0x1000 [ 2269.672662][T21070] ? __lock_acquire+0x16f2/0x4a00 [ 2269.677704][T21070] ? bpf_prog_test_run_skb+0x2bf/0x10b0 [ 2269.683288][T21070] ? __do_sys_bpf+0x1230/0x3810 [ 2269.683308][T21070] ? __kasan_check_read+0x11/0x20 [ 2269.683322][T21070] ? bpf_test_run+0x188/0xab0 [ 2269.683341][T21070] ? find_held_lock+0x35/0x130 [ 2269.702663][T21070] ? bpf_test_run+0x188/0xab0 [ 2269.707366][T21070] ? lock_downgrade+0x920/0x920 [ 2269.712236][T21070] ? ktime_get+0x100/0x2f0 [ 2269.716666][T21070] ? bpf_test_run+0x188/0xab0 [ 2269.721354][T21070] ? ktime_get+0x100/0x2f0 [ 2269.725811][T21070] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2269.731116][T21070] ? trace_hardirqs_on+0x67/0x240 [ 2269.736185][T21070] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2269.741924][T21070] ? ktime_get+0x1fd/0x2f0 [ 2269.746357][T21070] bpf_test_run+0x31f/0xab0 [ 2269.750952][T21070] ? bpf_test_finish.isra.0+0x510/0x510 [ 2269.750970][T21070] ? __build_skb+0x58/0x70 [ 2269.750987][T21070] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2269.751006][T21070] bpf_prog_test_run_skb+0x8d4/0x10b0 [ 2269.772591][T21070] ? bpf_test_init.isra.0+0x230/0x230 [ 2269.777988][T21070] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2269.784257][T21070] ? fput+0x1b/0x20 [ 2269.788105][T21070] ? __bpf_prog_get+0x97/0x2d0 [ 2269.792893][T21070] ? bpf_test_init.isra.0+0x230/0x230 [ 2269.798285][T21070] __do_sys_bpf+0x1230/0x3810 [ 2269.802986][T21070] ? bpf_prog_load+0x18f0/0x18f0 [ 2269.807923][T21070] ? __kasan_check_write+0x14/0x20 [ 2269.813044][T21070] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2269.818627][T21070] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2269.823927][T21070] ? wait_for_completion+0x440/0x440 [ 2269.829239][T21070] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2269.835517][T21070] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2269.841018][T21070] ? do_syscall_64+0x26/0x790 [ 2269.845719][T21070] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2269.851811][T21070] ? do_syscall_64+0x26/0x790 15:58:07 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026100000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:58:07 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0400000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:58:07 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0400000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:58:07 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026600000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) [ 2269.856520][T21070] __x64_sys_bpf+0x73/0xb0 [ 2269.860969][T21070] do_syscall_64+0xfa/0x790 [ 2269.865525][T21070] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2269.871443][T21070] RIP: 0033:0x45a919 [ 2269.875353][T21070] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2269.894989][T21070] RSP: 002b:00007f208576fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2269.895009][T21070] RAX: ffffffffffffffda RBX: 00007f208576fc90 RCX: 000000000045a919 [ 2269.895018][T21070] RDX: 0000000000000028 RSI: 0000000020000780 RDI: 000000000000000a [ 2269.895026][T21070] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2269.895034][T21070] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f20857706d4 [ 2269.895041][T21070] R13: 00000000004c0eb3 R14: 00000000004d4b08 R15: 0000000000000005 15:58:15 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000025008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:58:15 executing program 4 (fault-call:2 fault-nth:36): perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 15:58:15 executing program 1: r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0400000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:58:15 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026f00000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:58:15 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00048b10008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:58:15 executing program 5: socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x8983, 0x0) perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x5c, &(0x7f0000000b40)=ANY=[@ANYBLOB="b70200000b000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000002f3753a9c3b630bf92dd696125265586f2043649b89ec9b91dc174d5701424fa24052b2fe97409000000058e4bf0391702519694cd73608fadb119a5ffc8f1460c55bcce412bc1cc14a1f64ad78f7efc6f2233bacac999cbb0468424c2e8ab6cafc7bed227046c4ef20a09f4a46c382c1e7016a71a704c7b3cddf5306b500fda7b4a72bedb7c33a4c7e1f0c42819df5c26d28b450e2a9980b62fe2a57ac040892270e005a2e4ead36494a405cb500badb2b544edf5499098896b66851b823d3dc390934ea9062dd57a13ddb0ce78dbf6619bb0148e4dbb7ac738e4eb6e8061fa9d376fd0a4abf451611aa4aca07c12035ab1b2b55c098a78182c4651c0c3b019f94858fb0dc2ebd1ec689d889bf0839369cf62791d3bbd6c31262839a19f99e860dbed7b9493f9c8c764310e79aa8bd1e9e23f1ed38f91e6a53d265a75ec4fcd4d8b2d06c73ca7efec28b59fbeccfa1dbcd25032f328223bc33acc2449b6e9da679198772ecf1cc7f3886628dcc16c8ff17ff6ca528ef87741fc3e0f242a1037df395cbf0a9912d1b6d0bbc1482efe0712fac17f70f20bb9c6aef2d925d788d93d6c22aee7d387a7eaaada553f98a010533f2aa5a5cea2bdb19fc8c42e5d714ea143ab8a567bf262b03872602bfd2f35062c812cdc2eaf4a1ab92a419708546a70395497f822b5f06f0df2ba672d883b9fcfd34b7f4dc24bb3abdcb6f3e383dad4bc980c08e8e01099afd19cf916b0b9ab158153475d393aac65059df3c2f3d1ba5c9dc1c7e70ec14dd5af0b5b1a748ef9ebde08f72b53a54d2d66f41c5aa1fb1d91dfd6146e77bce93c45de0a0b19580a0ff90bdace7f549b8dcc95be4d596423ca8db0831932067edf32e58beaaa8625b9"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r1, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 15:58:16 executing program 1: r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0400000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:58:16 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026000300e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) [ 2278.818812][T21109] FAULT_INJECTION: forcing a failure. [ 2278.818812][T21109] name failslab, interval 1, probability 0, space 0, times 0 [ 2278.831579][T21109] CPU: 1 PID: 21109 Comm: syz-executor.4 Not tainted 5.5.0-rc2-syzkaller #0 [ 2278.840274][T21109] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2278.850444][T21109] Call Trace: [ 2278.853761][T21109] dump_stack+0x197/0x210 [ 2278.858269][T21109] should_fail.cold+0xa/0x15 [ 2278.862900][T21109] ? do_syscall_64+0xfa/0x790 [ 2278.867623][T21109] ? fault_create_debugfs_attr+0x180/0x180 [ 2278.873537][T21109] ? __local_bh_enable_ip+0x15a/0x270 [ 2278.878946][T21109] __should_failslab+0x121/0x190 [ 2278.883931][T21109] should_failslab+0x9/0x14 [ 2278.888463][T21109] kmem_cache_alloc_node_trace+0x5a/0x750 [ 2278.894220][T21109] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2278.899697][T21109] __kmalloc_node_track_caller+0x3d/0x70 [ 2278.905465][T21109] __kmalloc_reserve.isra.0+0x40/0xf0 [ 2278.910858][T21109] pskb_expand_head+0x151/0xff0 [ 2278.910884][T21109] skb_ensure_writable+0x2d2/0x480 [ 2278.910908][T21109] bpf_clone_redirect+0x135/0x470 [ 2278.925932][T21109] bpf_prog_3d1649e183dc2cc1+0x86c/0x1000 [ 2278.925958][T21109] ? __lock_acquire+0x16f2/0x4a00 [ 2278.936691][T21109] ? bpf_prog_test_run_skb+0x2bf/0x10b0 [ 2278.942260][T21109] ? __do_sys_bpf+0x1230/0x3810 [ 2278.947150][T21109] ? __kasan_check_read+0x11/0x20 [ 2278.952192][T21109] ? bpf_test_run+0x188/0xab0 [ 2278.956892][T21109] ? find_held_lock+0x35/0x130 [ 2278.961678][T21109] ? bpf_test_run+0x188/0xab0 [ 2278.966376][T21109] ? lock_downgrade+0x920/0x920 [ 2278.971253][T21109] ? ktime_get+0x100/0x2f0 [ 2278.975687][T21109] ? bpf_test_run+0x188/0xab0 [ 2278.980396][T21109] ? ktime_get+0x100/0x2f0 [ 2278.984831][T21109] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2278.990143][T21109] ? trace_hardirqs_on+0x67/0x240 [ 2278.995196][T21109] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2279.000938][T21109] ? ktime_get+0x1fd/0x2f0 [ 2279.005381][T21109] bpf_test_run+0x31f/0xab0 [ 2279.009911][T21109] ? bpf_test_finish.isra.0+0x510/0x510 [ 2279.015473][T21109] ? __build_skb+0x58/0x70 [ 2279.019903][T21109] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2279.026143][T21109] bpf_prog_test_run_skb+0x8d4/0x10b0 [ 2279.026164][T21109] ? bpf_test_init.isra.0+0x230/0x230 [ 2279.026179][T21109] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2279.026196][T21109] ? fput+0x1b/0x20 [ 2279.026211][T21109] ? __bpf_prog_get+0x97/0x2d0 [ 2279.026235][T21109] ? bpf_test_init.isra.0+0x230/0x230 [ 2279.058865][T21109] __do_sys_bpf+0x1230/0x3810 [ 2279.063566][T21109] ? bpf_prog_load+0x18f0/0x18f0 [ 2279.068530][T21109] ? __kasan_check_write+0x14/0x20 [ 2279.073661][T21109] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2279.079226][T21109] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2279.084535][T21109] ? wait_for_completion+0x440/0x440 [ 2279.089854][T21109] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2279.096132][T21109] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2279.101613][T21109] ? do_syscall_64+0x26/0x790 [ 2279.106311][T21109] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2279.112564][T21109] ? do_syscall_64+0x26/0x790 15:58:16 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026ac0400e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:58:16 executing program 1: r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0400000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:58:16 executing program 1: socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0400000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:58:16 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026000600e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) [ 2279.117260][T21109] __x64_sys_bpf+0x73/0xb0 [ 2279.121870][T21109] do_syscall_64+0xfa/0x790 [ 2279.126392][T21109] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2279.132316][T21109] RIP: 0033:0x45a919 [ 2279.136229][T21109] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2279.155848][T21109] RSP: 002b:00007f208576fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2279.155863][T21109] RAX: ffffffffffffffda RBX: 00007f208576fc90 RCX: 000000000045a919 [ 2279.155871][T21109] RDX: 0000000000000028 RSI: 0000000020000780 RDI: 000000000000000a [ 2279.155879][T21109] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2279.155888][T21109] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f20857706d4 [ 2279.155896][T21109] R13: 00000000004c0eb3 R14: 00000000004d4b08 R15: 0000000000000005 15:58:24 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000035008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:58:24 executing program 4 (fault-call:2 fault-nth:37): perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 15:58:24 executing program 1: socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0400000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:58:24 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026000a00e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:58:24 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e0000f010008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) [ 2287.007080][T21140] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2287.160385][T21148] FAULT_INJECTION: forcing a failure. [ 2287.160385][T21148] name failslab, interval 1, probability 0, space 0, times 0 [ 2287.173561][T21148] CPU: 1 PID: 21148 Comm: syz-executor.4 Not tainted 5.5.0-rc2-syzkaller #0 [ 2287.182264][T21148] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2287.192428][T21148] Call Trace: [ 2287.195750][T21148] dump_stack+0x197/0x210 [ 2287.200251][T21148] should_fail.cold+0xa/0x15 [ 2287.205167][T21148] ? kasan_unpoison_shadow+0x20/0x50 [ 2287.210681][T21148] ? fault_create_debugfs_attr+0x180/0x180 [ 2287.216692][T21148] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2287.222436][T21148] ? skb_release_data+0x556/0x8d0 [ 2287.227829][T21148] ? __kmalloc_node_track_caller+0x4e/0x70 [ 2287.233661][T21148] ? __phys_addr+0xa4/0x120 [ 2287.238313][T21148] __should_failslab+0x121/0x190 [ 2287.243267][T21148] should_failslab+0x9/0x14 [ 2287.247780][T21148] kmem_cache_alloc+0x47/0x710 [ 2287.255482][T21148] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2287.261766][T21148] ? __this_cpu_preempt_check+0x35/0x190 [ 2287.267416][T21148] skb_clone+0x154/0x3d0 [ 2287.271676][T21148] bpf_clone_redirect+0xb2/0x470 [ 2287.276665][T21148] bpf_prog_3d1649e183dc2cc1+0x27c/0x1000 [ 2287.282435][T21148] ? __lock_acquire+0x16f2/0x4a00 [ 2287.287490][T21148] ? bpf_prog_test_run_skb+0x2bf/0x10b0 [ 2287.293177][T21148] ? __do_sys_bpf+0x1230/0x3810 [ 2287.298042][T21148] ? __kasan_check_read+0x11/0x20 [ 2287.303198][T21148] ? bpf_test_run+0x188/0xab0 [ 2287.308024][T21148] ? find_held_lock+0x35/0x130 [ 2287.312842][T21148] ? bpf_test_run+0x188/0xab0 [ 2287.318516][T21148] ? lock_downgrade+0x920/0x920 [ 2287.323625][T21148] ? ktime_get+0x100/0x2f0 [ 2287.328052][T21148] ? bpf_test_run+0x188/0xab0 [ 2287.332737][T21148] ? ktime_get+0x100/0x2f0 [ 2287.337195][T21148] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2287.342537][T21148] ? trace_hardirqs_on+0x67/0x240 [ 2287.347612][T21148] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2287.353379][T21148] ? ktime_get+0x1fd/0x2f0 [ 2287.357808][T21148] bpf_test_run+0x31f/0xab0 [ 2287.362356][T21148] ? bpf_test_finish.isra.0+0x510/0x510 [ 2287.368423][T21148] ? __build_skb+0x58/0x70 [ 2287.373232][T21148] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2287.379720][T21148] bpf_prog_test_run_skb+0x8d4/0x10b0 [ 2287.385227][T21148] ? bpf_test_init.isra.0+0x230/0x230 [ 2287.390696][T21148] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2287.397000][T21148] ? fput+0x1b/0x20 [ 2287.400954][T21148] ? __bpf_prog_get+0x97/0x2d0 [ 2287.405726][T21148] ? bpf_test_init.isra.0+0x230/0x230 [ 2287.411145][T21148] __do_sys_bpf+0x1230/0x3810 [ 2287.415856][T21148] ? bpf_prog_load+0x18f0/0x18f0 [ 2287.420802][T21148] ? __kasan_check_write+0x14/0x20 [ 2287.426182][T21148] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2287.432359][T21148] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2287.437748][T21148] ? wait_for_completion+0x440/0x440 [ 2287.443271][T21148] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2287.449748][T21148] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2287.455569][T21148] ? do_syscall_64+0x26/0x790 [ 2287.460555][T21148] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2287.466628][T21148] ? do_syscall_64+0x26/0x790 [ 2287.471464][T21148] __x64_sys_bpf+0x73/0xb0 [ 2287.476012][T21148] do_syscall_64+0xfa/0x790 [ 2287.480550][T21148] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2287.486548][T21148] RIP: 0033:0x45a919 [ 2287.490450][T21148] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2287.510448][T21148] RSP: 002b:00007f208576fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2287.518927][T21148] RAX: ffffffffffffffda RBX: 00007f208576fc90 RCX: 000000000045a919 [ 2287.527724][T21148] RDX: 0000000000000028 RSI: 0000000020000780 RDI: 000000000000000a [ 2287.536086][T21148] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2287.544222][T21148] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f20857706d4 [ 2287.552290][T21148] R13: 00000000004c0eb3 R14: 00000000004d4b08 R15: 0000000000000005 15:58:25 executing program 5: socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x8983, 0x0) perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x5c, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r1, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 15:58:25 executing program 1: socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0400000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:58:25 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026000c00e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:58:25 executing program 4 (fault-call:2 fault-nth:38): perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 15:58:25 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000360008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:58:25 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026000e00e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:58:25 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, 0x0, 0x0) [ 2288.142945][T21168] FAULT_INJECTION: forcing a failure. [ 2288.142945][T21168] name failslab, interval 1, probability 0, space 0, times 0 [ 2288.156768][T21168] CPU: 0 PID: 21168 Comm: syz-executor.4 Not tainted 5.5.0-rc2-syzkaller #0 [ 2288.165469][T21168] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2288.176526][T21168] Call Trace: [ 2288.179865][T21168] dump_stack+0x197/0x210 [ 2288.184363][T21168] should_fail.cold+0xa/0x15 [ 2288.189247][T21168] ? do_syscall_64+0xfa/0x790 [ 2288.194723][T21168] ? fault_create_debugfs_attr+0x180/0x180 [ 2288.201105][T21168] ? __this_cpu_preempt_check+0x35/0x190 [ 2288.206850][T21168] ? retint_kernel+0x2b/0x2b [ 2288.211501][T21168] __should_failslab+0x121/0x190 [ 2288.211518][T21168] should_failslab+0x9/0x14 [ 2288.211531][T21168] kmem_cache_alloc_node_trace+0x5a/0x750 [ 2288.211546][T21168] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2288.211560][T21168] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2288.211580][T21168] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2288.248013][T21168] __kmalloc_node_track_caller+0x3d/0x70 [ 2288.254009][T21168] __kmalloc_reserve.isra.0+0x40/0xf0 [ 2288.260011][T21168] pskb_expand_head+0x151/0xff0 [ 2288.265127][T21168] skb_ensure_writable+0x2d2/0x480 [ 2288.265149][T21168] bpf_clone_redirect+0x135/0x470 [ 2288.265170][T21168] bpf_prog_3d1649e183dc2cc1+0x5ec/0x1000 [ 2288.265188][T21168] ? __lock_acquire+0x16f2/0x4a00 [ 2288.265210][T21168] ? rcu_preempt_deferred_qs_irqrestore+0x4ff/0xd60 [ 2288.293472][T21168] ? __kasan_check_read+0x11/0x20 [ 2288.298530][T21168] ? bpf_test_run+0x7d6/0xab0 [ 2288.303241][T21168] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2288.308734][T21168] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2288.314312][T21168] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2288.320334][T21168] ? retint_kernel+0x2b/0x2b [ 2288.325167][T21168] ? trace_hardirqs_on_caller+0x6a/0x240 [ 2288.330836][T21168] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2288.336581][T21168] ? __this_cpu_preempt_check+0x35/0x190 [ 2288.336595][T21168] ? retint_kernel+0x2b/0x2b [ 2288.336619][T21168] bpf_test_run+0x31f/0xab0 [ 2288.336643][T21168] ? bpf_test_finish.isra.0+0x510/0x510 [ 2288.336665][T21168] bpf_prog_test_run_skb+0x8d4/0x10b0 [ 2288.336685][T21168] ? assoc_array_gc+0x1421/0x1440 [ 2288.347053][T21168] ? bpf_test_init.isra.0+0x230/0x230 [ 2288.372990][T21168] ? bpf_test_init.isra.0+0x230/0x230 [ 2288.378491][T21168] __do_sys_bpf+0x1230/0x3810 [ 2288.383212][T21168] ? bpf_prog_load+0x18f0/0x18f0 [ 2288.388285][T21168] ? __kasan_check_write+0x14/0x20 [ 2288.393656][T21168] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2288.399212][T21168] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2288.404817][T21168] ? wait_for_completion+0x440/0x440 [ 2288.410206][T21168] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2288.416461][T21168] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2288.421928][T21168] ? do_syscall_64+0x26/0x790 [ 2288.426734][T21168] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2288.432805][T21168] ? do_syscall_64+0x26/0x790 [ 2288.437938][T21168] __x64_sys_bpf+0x73/0xb0 [ 2288.442606][T21168] do_syscall_64+0xfa/0x790 [ 2288.447390][T21168] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2288.453495][T21168] RIP: 0033:0x45a919 [ 2288.457603][T21168] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2288.477407][T21168] RSP: 002b:00007f208576fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2288.485942][T21168] RAX: ffffffffffffffda RBX: 00007f208576fc90 RCX: 000000000045a919 [ 2288.494038][T21168] RDX: 0000000000000028 RSI: 0000000020000780 RDI: 000000000000000a [ 2288.502036][T21168] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2288.510033][T21168] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f20857706d4 [ 2288.518010][T21168] R13: 00000000004c0eb3 R14: 00000000004d4b08 R15: 0000000000000005 15:58:32 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, 0x0, 0x0) 15:58:32 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000040008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:58:32 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026000f00e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:58:32 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000400008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:58:32 executing program 4 (fault-call:2 fault-nth:39): perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) [ 2295.462131][T21196] FAULT_INJECTION: forcing a failure. [ 2295.462131][T21196] name failslab, interval 1, probability 0, space 0, times 0 [ 2295.476039][T21196] CPU: 0 PID: 21196 Comm: syz-executor.4 Not tainted 5.5.0-rc2-syzkaller #0 [ 2295.484771][T21196] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2295.495042][T21196] Call Trace: [ 2295.498713][T21196] dump_stack+0x197/0x210 [ 2295.503084][T21196] should_fail.cold+0xa/0x15 [ 2295.507805][T21196] ? fault_create_debugfs_attr+0x180/0x180 [ 2295.513746][T21196] ? __kasan_check_read+0x11/0x20 [ 2295.518868][T21196] ? mark_lock+0xc2/0x1220 [ 2295.523470][T21196] ? __perf_event_task_sched_in+0x63b/0x810 [ 2295.529518][T21196] __should_failslab+0x121/0x190 [ 2295.534468][T21196] should_failslab+0x9/0x14 [ 2295.539293][T21196] kmem_cache_alloc+0x47/0x710 [ 2295.544139][T21196] ? finish_task_switch+0x147/0x750 [ 2295.549343][T21196] ? __kasan_check_read+0x11/0x20 [ 2295.554394][T21196] skb_clone+0x154/0x3d0 [ 2295.558661][T21196] bpf_clone_redirect+0xb2/0x470 [ 2295.563700][T21196] ? __kasan_check_read+0x11/0x20 [ 2295.568893][T21196] bpf_prog_3d1649e183dc2cc1+0xabc/0x1000 [ 2295.574618][T21196] ? __lock_acquire+0x16f2/0x4a00 [ 2295.580102][T21196] ? __kasan_check_read+0x11/0x20 [ 2295.585146][T21196] ? bpf_test_run+0x7d6/0xab0 [ 2295.589832][T21196] ? find_held_lock+0x35/0x130 [ 2295.594733][T21196] ? bpf_test_run+0x7d6/0xab0 [ 2295.599455][T21196] ? lock_downgrade+0x920/0x920 [ 2295.604432][T21196] ? ktime_get+0x100/0x2f0 [ 2295.608970][T21196] ? bpf_test_run+0x7d6/0xab0 [ 2295.613685][T21196] ? ktime_get+0x100/0x2f0 [ 2295.618112][T21196] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2295.623485][T21196] ? trace_hardirqs_on+0x67/0x240 [ 2295.628548][T21196] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2295.634268][T21196] ? ktime_get+0x1fd/0x2f0 [ 2295.638760][T21196] bpf_test_run+0x31f/0xab0 [ 2295.643273][T21196] ? bpf_test_finish.isra.0+0x510/0x510 [ 2295.648832][T21196] ? __build_skb+0x58/0x70 [ 2295.653331][T21196] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2295.659715][T21196] bpf_prog_test_run_skb+0x8d4/0x10b0 [ 2295.665128][T21196] ? bpf_test_init.isra.0+0x230/0x230 [ 2295.670740][T21196] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2295.677010][T21196] ? fput+0x1b/0x20 [ 2295.680825][T21196] ? __bpf_prog_get+0x97/0x2d0 [ 2295.685593][T21196] ? bpf_test_init.isra.0+0x230/0x230 [ 2295.691244][T21196] __do_sys_bpf+0x1230/0x3810 [ 2295.696106][T21196] ? bpf_prog_load+0x18f0/0x18f0 [ 2295.701528][T21196] ? __kasan_check_write+0x14/0x20 [ 2295.706890][T21196] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2295.712586][T21196] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2295.717876][T21196] ? wait_for_completion+0x440/0x440 [ 2295.723328][T21196] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2295.730021][T21196] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2295.735982][T21196] ? do_syscall_64+0x26/0x790 [ 2295.740681][T21196] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2295.746864][T21196] ? do_syscall_64+0x26/0x790 [ 2295.751553][T21196] __x64_sys_bpf+0x73/0xb0 [ 2295.756004][T21196] do_syscall_64+0xfa/0x790 [ 2295.760518][T21196] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2295.767054][T21196] RIP: 0033:0x45a919 [ 2295.771090][T21196] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2295.791490][T21196] RSP: 002b:00007f208576fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2295.800104][T21196] RAX: ffffffffffffffda RBX: 00007f208576fc90 RCX: 000000000045a919 [ 2295.808479][T21196] RDX: 0000000000000028 RSI: 0000000020000780 RDI: 000000000000000a [ 2295.816456][T21196] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2295.824680][T21196] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f20857706d4 [ 2295.832861][T21196] R13: 00000000004c0eb3 R14: 00000000004d4b08 R15: 0000000000000005 15:58:34 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026003f00e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:58:34 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, 0x0, 0x0) 15:58:34 executing program 5: socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x8983, 0x0) perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x5c, &(0x7f0000000b40)=ANY=[@ANYBLOB="b70200000b000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000002f3753a9c3b630bf92dd696125265586f2043649b89ec9b91dc174d5701424fa24052b2fe97409000000058e4bf0391702519694cd73608fadb119a5ffc8f1460c55bcce412bc1cc14a1f64ad78f7efc6f2233bacac999cbb0468424c2e8ab6cafc7bed227046c4ef20a09f4a46c382c1e7016a71a704c7b3cddf5306b500fda7b4a72bedb7c33a4c7e1f0c42819df5c26d28b450e2a9980b62fe2a57ac040892270e005a2e4ead36494a405cb500badb2b544edf5499098896b66851b823d3dc390934ea9062dd57a13ddb0ce78dbf6619bb0148e4dbb7ac738e4eb6e8061fa9d376fd0a4abf451611aa4aca07c12035ab1b2b55c098a78182c4651c0c3b019f94858fb0dc2ebd1ec689d889bf0839369cf62791d3bbd6c31262839a19f99e860dbed7b9493f9c8c764310e79aa8bd1e9e23f1ed38f91e6a53d265a75ec4fcd4d8b2d06c73ca7efec28b59fbeccfa1dbcd25032f328223bc33acc2449b6e9da679198772ecf1cc7f3886628dcc16c8ff17ff6ca528ef87741fc3e0f242a1037df395cbf0a9912d1b6d0bbc1482efe0712fac17f70f20bb9c6aef2d925d788d93d6c22aee7d387a7eaaada553f98a010533f2aa5a5cea2bdb19fc8c42e5d714ea143ab8a567bf262b03872602bfd2f35062c812cdc2eaf4a1ab92a419708546a70395497f822b5f06f0df2ba672d883b9fcfd34b7f4dc24bb3abdcb6f3e383dad4bc980c08e8e01099afd19cf916b0b9ab158153475d393aac65059df3c2f3d1ba5c9dc1c7e70ec14dd5af0b5b1a748ef9ebde08f72b53a54d2d66f41c5aa1fb1d91dfd6146e77bce93c45de0a0b19580a0ff90bdace7f549b8dcc95be4d596423ca8db0831932067edf32e58beaaa8625b9"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r1, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 15:58:34 executing program 4 (fault-call:2 fault-nth:40): perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 15:58:34 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000007008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:58:34 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6558}, 0x0) 15:58:34 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026004000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) [ 2297.274709][T21213] FAULT_INJECTION: forcing a failure. [ 2297.274709][T21213] name failslab, interval 1, probability 0, space 0, times 0 [ 2297.287745][T21213] CPU: 1 PID: 21213 Comm: syz-executor.4 Not tainted 5.5.0-rc2-syzkaller #0 [ 2297.296441][T21213] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2297.306783][T21213] Call Trace: [ 2297.310190][T21213] dump_stack+0x197/0x210 [ 2297.314740][T21213] should_fail.cold+0xa/0x15 [ 2297.319665][T21213] ? do_syscall_64+0xfa/0x790 [ 2297.324391][T21213] ? fault_create_debugfs_attr+0x180/0x180 [ 2297.330552][T21213] ? __local_bh_enable_ip+0x15a/0x270 [ 2297.336135][T21213] __should_failslab+0x121/0x190 [ 2297.341219][T21213] should_failslab+0x9/0x14 [ 2297.345735][T21213] kmem_cache_alloc_node_trace+0x5a/0x750 [ 2297.351466][T21213] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2297.356880][T21213] __kmalloc_node_track_caller+0x3d/0x70 [ 2297.362671][T21213] __kmalloc_reserve.isra.0+0x40/0xf0 [ 2297.368186][T21213] pskb_expand_head+0x151/0xff0 15:58:34 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026655800e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) [ 2297.373097][T21213] skb_ensure_writable+0x2d2/0x480 [ 2297.378604][T21213] bpf_clone_redirect+0x135/0x470 [ 2297.383752][T21213] bpf_prog_3d1649e183dc2cc1+0x458/0x1000 [ 2297.389622][T21213] ? __lock_acquire+0x16f2/0x4a00 [ 2297.395070][T21213] ? bpf_prog_test_run_skb+0x2bf/0x10b0 [ 2297.400876][T21213] ? __do_sys_bpf+0x1230/0x3810 [ 2297.405759][T21213] ? __kasan_check_read+0x11/0x20 [ 2297.410800][T21213] ? bpf_test_run+0x188/0xab0 [ 2297.415546][T21213] ? find_held_lock+0x35/0x130 [ 2297.420339][T21213] ? bpf_test_run+0x188/0xab0 [ 2297.425060][T21213] ? lock_downgrade+0x920/0x920 [ 2297.430081][T21213] ? ktime_get+0x100/0x2f0 [ 2297.434766][T21213] ? bpf_test_run+0x188/0xab0 [ 2297.434778][T21213] ? ktime_get+0x100/0x2f0 [ 2297.434792][T21213] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2297.434808][T21213] ? trace_hardirqs_on+0x67/0x240 [ 2297.434825][T21213] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2297.434837][T21213] ? ktime_get+0x1fd/0x2f0 [ 2297.434857][T21213] bpf_test_run+0x31f/0xab0 [ 2297.472113][T21213] ? bpf_test_finish.isra.0+0x510/0x510 [ 2297.477783][T21213] ? __build_skb+0x58/0x70 [ 2297.482382][T21213] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2297.488902][T21213] bpf_prog_test_run_skb+0x8d4/0x10b0 [ 2297.494326][T21213] ? bpf_test_init.isra.0+0x230/0x230 [ 2297.499800][T21213] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2297.506422][T21213] ? fput+0x1b/0x20 [ 2297.510255][T21213] ? __bpf_prog_get+0x97/0x2d0 [ 2297.515158][T21213] ? bpf_test_init.isra.0+0x230/0x230 [ 2297.520653][T21213] __do_sys_bpf+0x1230/0x3810 [ 2297.525460][T21213] ? bpf_prog_load+0x18f0/0x18f0 [ 2297.530429][T21213] ? __kasan_check_write+0x14/0x20 [ 2297.535825][T21213] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2297.541597][T21213] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2297.541613][T21213] ? wait_for_completion+0x440/0x440 [ 2297.541637][T21213] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2297.541663][T21213] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2297.541682][T21213] ? do_syscall_64+0x26/0x790 [ 2297.569781][T21213] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2297.576019][T21213] ? do_syscall_64+0x26/0x790 [ 2297.580734][T21213] __x64_sys_bpf+0x73/0xb0 [ 2297.585274][T21213] do_syscall_64+0xfa/0x790 [ 2297.589815][T21213] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2297.595732][T21213] RIP: 0033:0x45a919 [ 2297.599721][T21213] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2297.619770][T21213] RSP: 002b:00007f208576fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2297.628539][T21213] RAX: ffffffffffffffda RBX: 00007f208576fc90 RCX: 000000000045a919 [ 2297.628547][T21213] RDX: 0000000000000028 RSI: 0000000020000780 RDI: 000000000000000a [ 2297.628555][T21213] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2297.628562][T21213] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f20857706d4 [ 2297.628569][T21213] R13: 00000000004c0eb3 R14: 00000000004d4b08 R15: 0000000000000005 15:58:42 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e0000006f008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:58:42 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026006000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:58:42 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6558}, 0x0) 15:58:42 executing program 4 (fault-call:2 fault-nth:41): perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 15:58:42 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e0000000a008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) [ 2304.946172][T21246] FAULT_INJECTION: forcing a failure. [ 2304.946172][T21246] name failslab, interval 1, probability 0, space 0, times 0 [ 2304.959145][T21246] CPU: 0 PID: 21246 Comm: syz-executor.4 Not tainted 5.5.0-rc2-syzkaller #0 [ 2304.967830][T21246] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2304.977902][T21246] Call Trace: [ 2304.981220][T21246] dump_stack+0x197/0x210 [ 2304.985584][T21246] should_fail.cold+0xa/0x15 [ 2304.990230][T21246] ? fault_create_debugfs_attr+0x180/0x180 [ 2304.996068][T21246] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2305.001816][T21246] ? skb_release_data+0x556/0x8d0 [ 2305.006867][T21246] ? __phys_addr+0xa4/0x120 [ 2305.011363][T21246] __should_failslab+0x121/0x190 [ 2305.016334][T21246] should_failslab+0x9/0x14 [ 2305.020968][T21246] kmem_cache_alloc+0x47/0x710 [ 2305.025744][T21246] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2305.032079][T21246] ? __this_cpu_preempt_check+0x35/0x190 [ 2305.037707][T21246] skb_clone+0x154/0x3d0 [ 2305.041960][T21246] bpf_clone_redirect+0xb2/0x470 [ 2305.046902][T21246] ? bpf_clone_redirect+0x2d2/0x470 [ 2305.052203][T21246] bpf_prog_3d1649e183dc2cc1+0x2f4/0x1000 [ 2305.057945][T21246] ? __lock_acquire+0x16f2/0x4a00 [ 2305.062976][T21246] ? bpf_prog_test_run_skb+0x2bf/0x10b0 [ 2305.068542][T21246] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2305.074015][T21246] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2305.079575][T21246] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2305.084865][T21246] ? retint_kernel+0x2b/0x2b [ 2305.089446][T21246] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2305.095365][T21246] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2305.100835][T21246] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2305.106121][T21246] ? retint_kernel+0x2b/0x2b [ 2305.110722][T21246] ? trace_hardirqs_on_caller+0x6a/0x240 [ 2305.116369][T21246] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2305.121840][T21246] ? __this_cpu_preempt_check+0x35/0x190 [ 2305.127468][T21246] ? retint_kernel+0x2b/0x2b [ 2305.132060][T21246] bpf_test_run+0x31f/0xab0 [ 2305.136571][T21246] ? bpf_test_finish.isra.0+0x510/0x510 [ 2305.142140][T21246] ? __build_skb+0x58/0x70 [ 2305.146568][T21246] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2305.152847][T21246] bpf_prog_test_run_skb+0x8d4/0x10b0 [ 2305.159691][T21246] ? bpf_test_init.isra.0+0x230/0x230 [ 2305.165056][T21246] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2305.171289][T21246] ? fput+0x1b/0x20 [ 2305.175091][T21246] ? __bpf_prog_get+0x97/0x2d0 [ 2305.179858][T21246] ? bpf_test_init.isra.0+0x230/0x230 [ 2305.185224][T21246] __do_sys_bpf+0x1230/0x3810 [ 2305.189975][T21246] ? bpf_prog_load+0x18f0/0x18f0 [ 2305.194902][T21246] ? __kasan_check_write+0x14/0x20 [ 2305.200014][T21246] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2305.205553][T21246] ? wait_for_completion+0x440/0x440 [ 2305.210828][T21246] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2305.217062][T21246] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2305.222531][T21246] ? do_syscall_64+0x26/0x790 [ 2305.227227][T21246] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2305.233393][T21246] ? do_syscall_64+0x26/0x790 [ 2305.238072][T21246] __x64_sys_bpf+0x73/0xb0 [ 2305.242492][T21246] do_syscall_64+0xfa/0x790 [ 2305.246995][T21246] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2305.252894][T21246] RIP: 0033:0x45a919 [ 2305.256804][T21246] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2305.276759][T21246] RSP: 002b:00007f208576fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2305.285175][T21246] RAX: ffffffffffffffda RBX: 00007f208576fc90 RCX: 000000000045a919 [ 2305.293147][T21246] RDX: 0000000000000028 RSI: 0000000020000780 RDI: 000000000000000a [ 2305.301222][T21246] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2305.309194][T21246] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f20857706d4 [ 2305.317265][T21246] R13: 00000000004c0eb3 R14: 00000000004d4b08 R15: 0000000000000005 15:58:45 executing program 5: socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x8983, 0x0) perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x5c, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r1, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 15:58:45 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6558}, 0x0) 15:58:45 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026586500e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:58:45 executing program 4 (fault-call:2 fault-nth:42): perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="b70200000b000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000002f3753a9c3b630bf92dd696125265586f2043649b89ec9b91dc174d5701424fa24052b2fe97409000000058e4bf0391702519694cd73608fadb119a5ffc8f1460c55bcce412bc1cc14a1f64ad78f7efc6f2233bacac999cbb0468424c2e8ab6cafc7bed227046c4ef20a09f4a46c382c1e7016a71a704c7b3cddf5306b500fda7b4a72bedb7c33a4c7e1f0c42819df5c26d28b450e2a9980b62fe2a57ac040892270e005a2e4ead36494a405cb500badb2b544edf5499098896b66851b823d3dc390934ea9062dd57a13ddb0ce78dbf6619bb0148e4dbb7ac738e4eb6e8061fa9d376fd0a4abf451611aa4aca07c12035ab1b2b55c098a78182c4651c0c3b019f94858fb0dc2ebd1ec689d889bf0839369cf62791d3bbd6c31262839a19f99e860dbed7b9493f9c8c764310e79aa8bd1e9e23f1ed38f91e6a53d265a75ec4fcd4d8b2d06c73ca7efec28b59fbeccfa1dbcd25032f328223bc33acc2449b6e9da679198772ecf1cc7f3886628dcc16c8ff17ff6ca528ef87741fc3e0f242a1037df395cbf0a9912d1b6d0bbc1482efe0712fac17f70f20bb9c6aef2d925d788d93d6c22aee7d387a7eaaada553f98a010533f2aa5a5cea2bdb19fc8c42e5d714ea143ab8a567bf262b03872602bfd2f35062c812cdc2eaf4a1ab92a419708546a70395497f822b5f06f0df2ba672d883b9fcfd34b7f4dc24bb3abdcb6f3e383dad4bc980c08e8e01099afd19cf916b0b9ab158153475d393aac65059df3c2f3d1ba5c9dc1c7e70ec14dd5af0b5b1a748ef9ebde08f72b53a54d2d66f41c5aa1fb1d91dfd6146e77bce93c45de0a0b19580a0ff90bdace7f549b8dcc95be4d596423ca8db0831932067edf32e58beaaa8625b91c05"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 15:58:45 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e0000000f008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:58:45 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026008100e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:58:45 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x6558}, 0x0) [ 2308.622652][T21261] FAULT_INJECTION: forcing a failure. [ 2308.622652][T21261] name failslab, interval 1, probability 0, space 0, times 0 [ 2308.635681][T21261] CPU: 0 PID: 21261 Comm: syz-executor.4 Not tainted 5.5.0-rc2-syzkaller #0 [ 2308.644397][T21261] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2308.654478][T21261] Call Trace: [ 2308.657793][T21261] dump_stack+0x197/0x210 [ 2308.662169][T21261] should_fail.cold+0xa/0x15 [ 2308.666796][T21261] ? do_syscall_64+0xfa/0x790 [ 2308.671583][T21261] ? fault_create_debugfs_attr+0x180/0x180 [ 2308.677408][T21261] ? __local_bh_enable_ip+0x15a/0x270 [ 2308.682810][T21261] __should_failslab+0x121/0x190 [ 2308.687769][T21261] should_failslab+0x9/0x14 [ 2308.692295][T21261] kmem_cache_alloc_node_trace+0x5a/0x750 [ 2308.698065][T21261] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2308.703357][T21261] ? retint_kernel+0x2b/0x2b [ 2308.703374][T21261] ? trace_hardirqs_on_caller+0x6a/0x240 [ 2308.703394][T21261] __kmalloc_node_track_caller+0x3d/0x70 [ 2308.703412][T21261] __kmalloc_reserve.isra.0+0x40/0xf0 [ 2308.703434][T21261] pskb_expand_head+0x151/0xff0 [ 2308.714082][T21261] ? skb_ensure_writable+0xe1/0x480 [ 2308.714108][T21261] skb_ensure_writable+0x2d2/0x480 [ 2308.714129][T21261] bpf_clone_redirect+0x135/0x470 [ 2308.714151][T21261] bpf_prog_3d1649e183dc2cc1+0x1fc/0x1000 [ 2308.714173][T21261] ? __lock_acquire+0x16f2/0x4a00 [ 2308.756505][T21261] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2308.762231][T21261] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2308.767819][T21261] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2308.773131][T21261] ? retint_kernel+0x2b/0x2b [ 2308.777739][T21261] ? trace_hardirqs_on_caller+0x6a/0x240 [ 2308.783470][T21261] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2308.788924][T21261] ? __this_cpu_preempt_check+0x35/0x190 [ 2308.794566][T21261] ? retint_kernel+0x2b/0x2b [ 2308.799148][T21261] ? ktime_get+0x129/0x2f0 [ 2308.803560][T21261] ? ktime_get+0x12e/0x2f0 [ 2308.807965][T21261] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2308.813693][T21261] ? ktime_get+0x1fd/0x2f0 [ 2308.818119][T21261] bpf_test_run+0x31f/0xab0 [ 2308.822814][T21261] ? bpf_test_finish.isra.0+0x510/0x510 [ 2308.828366][T21261] ? __build_skb+0x58/0x70 [ 2308.832788][T21261] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2308.839034][T21261] bpf_prog_test_run_skb+0x8d4/0x10b0 [ 2308.844461][T21261] ? bpf_test_init.isra.0+0x230/0x230 [ 2308.849853][T21261] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2308.856101][T21261] ? fput+0x1b/0x20 [ 2308.859942][T21261] ? __bpf_prog_get+0x97/0x2d0 [ 2308.864716][T21261] ? bpf_test_init.isra.0+0x230/0x230 [ 2308.870077][T21261] __do_sys_bpf+0x1230/0x3810 [ 2308.875123][T21261] ? bpf_prog_load+0x18f0/0x18f0 [ 2308.880066][T21261] ? retint_kernel+0x2b/0x2b [ 2308.884684][T21261] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2308.890146][T21261] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2308.895592][T21261] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2308.901000][T21261] ? retint_kernel+0x2b/0x2b [ 2308.905588][T21261] ? trace_hardirqs_on_caller+0x6a/0x240 [ 2308.911311][T21261] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2308.916820][T21261] ? do_syscall_64+0x93/0x790 [ 2308.921610][T21261] __x64_sys_bpf+0x73/0xb0 [ 2308.926060][T21261] do_syscall_64+0xfa/0x790 [ 2308.930558][T21261] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2308.936504][T21261] RIP: 0033:0x45a919 [ 2308.940460][T21261] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2308.960080][T21261] RSP: 002b:00007f208576fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2308.968494][T21261] RAX: ffffffffffffffda RBX: 00007f208576fc90 RCX: 000000000045a919 [ 2308.976459][T21261] RDX: 0000000000000028 RSI: 0000000020000780 RDI: 000000000000000a [ 2308.984432][T21261] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2308.992418][T21261] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f20857706d4 [ 2309.000376][T21261] R13: 00000000004c0eb3 R14: 00000000004d4b08 R15: 0000000000000005 15:58:52 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e20000090008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:58:52 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e002604ac00e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:58:52 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x6558}, 0x0) 15:58:52 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000210008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:58:52 executing program 4 (fault-call:2 fault-nth:43): perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) [ 2315.340249][T21285] FAULT_INJECTION: forcing a failure. [ 2315.340249][T21285] name failslab, interval 1, probability 0, space 0, times 0 [ 2315.352977][T21285] CPU: 1 PID: 21285 Comm: syz-executor.4 Not tainted 5.5.0-rc2-syzkaller #0 [ 2315.352990][T21285] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2315.352996][T21285] Call Trace: [ 2315.353023][T21285] dump_stack+0x197/0x210 [ 2315.371781][T21285] should_fail.cold+0xa/0x15 [ 2315.383972][T21285] ? do_syscall_64+0xfa/0x790 [ 2315.388672][T21285] ? fault_create_debugfs_attr+0x180/0x180 [ 2315.388691][T21285] ? __local_bh_enable_ip+0x15a/0x270 [ 2315.388714][T21285] __should_failslab+0x121/0x190 [ 2315.399875][T21285] should_failslab+0x9/0x14 [ 2315.399890][T21285] kmem_cache_alloc_node_trace+0x5a/0x750 [ 2315.399911][T21285] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2315.420354][T21285] __kmalloc_node_track_caller+0x3d/0x70 [ 2315.426012][T21285] __kmalloc_reserve.isra.0+0x40/0xf0 [ 2315.431406][T21285] pskb_expand_head+0x151/0xff0 [ 2315.436282][T21285] skb_ensure_writable+0x2d2/0x480 [ 2315.441415][T21285] bpf_clone_redirect+0x135/0x470 [ 2315.446441][T21285] bpf_prog_3d1649e183dc2cc1+0x8bc/0x1000 [ 2315.452167][T21285] ? __lock_acquire+0x16f2/0x4a00 [ 2315.457208][T21285] ? bpf_prog_test_run_skb+0x2bf/0x10b0 [ 2315.462775][T21285] ? __do_sys_bpf+0x1230/0x3810 [ 2315.467661][T21285] ? __kasan_check_read+0x11/0x20 [ 2315.472702][T21285] ? bpf_test_run+0x188/0xab0 [ 2315.477399][T21285] ? find_held_lock+0x35/0x130 [ 2315.482187][T21285] ? bpf_test_run+0x188/0xab0 [ 2315.486873][T21285] ? lock_downgrade+0x920/0x920 [ 2315.491709][T21285] ? ktime_get+0x100/0x2f0 [ 2315.496236][T21285] ? bpf_test_run+0x188/0xab0 [ 2315.500912][T21285] ? ktime_get+0x100/0x2f0 [ 2315.505329][T21285] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2315.510622][T21285] ? trace_hardirqs_on+0x67/0x240 [ 2315.515725][T21285] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2315.521430][T21285] ? ktime_get+0x1fd/0x2f0 [ 2315.525844][T21285] bpf_test_run+0x31f/0xab0 [ 2315.530337][T21285] ? bpf_test_finish.isra.0+0x510/0x510 [ 2315.535880][T21285] ? __build_skb+0x58/0x70 [ 2315.540295][T21285] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2315.546533][T21285] bpf_prog_test_run_skb+0x8d4/0x10b0 [ 2315.551919][T21285] ? bpf_test_init.isra.0+0x230/0x230 [ 2315.557302][T21285] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2315.563549][T21285] ? fput+0x1b/0x20 [ 2315.567362][T21285] ? __bpf_prog_get+0x97/0x2d0 [ 2315.572121][T21285] ? bpf_test_init.isra.0+0x230/0x230 [ 2315.577484][T21285] __do_sys_bpf+0x1230/0x3810 [ 2315.582156][T21285] ? bpf_prog_load+0x18f0/0x18f0 [ 2315.587079][T21285] ? __kasan_check_write+0x14/0x20 [ 2315.592197][T21285] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2315.597729][T21285] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2315.603011][T21285] ? wait_for_completion+0x440/0x440 [ 2315.608286][T21285] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2315.614521][T21285] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2315.619964][T21285] ? do_syscall_64+0x26/0x790 [ 2315.624641][T21285] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2315.630698][T21285] ? do_syscall_64+0x26/0x790 [ 2315.635370][T21285] __x64_sys_bpf+0x73/0xb0 [ 2315.639771][T21285] do_syscall_64+0xfa/0x790 [ 2315.644263][T21285] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2315.650238][T21285] RIP: 0033:0x45a919 [ 2315.654120][T21285] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2315.674231][T21285] RSP: 002b:00007f208576fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2315.682639][T21285] RAX: ffffffffffffffda RBX: 00007f208576fc90 RCX: 000000000045a919 [ 2315.690625][T21285] RDX: 0000000000000028 RSI: 0000000020000780 RDI: 000000000000000a [ 2315.698582][T21285] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2315.706637][T21285] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f20857706d4 [ 2315.714608][T21285] R13: 00000000004c0eb3 R14: 00000000004d4b08 R15: 0000000000000005 15:58:59 executing program 5: socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x8983, 0x0) perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x5c, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r1, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 15:58:59 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x6558}, 0x0) 15:58:59 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e002600f000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:58:59 executing program 4 (fault-call:2 fault-nth:44): perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 15:58:59 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000310008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:58:59 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) [ 2322.000951][T21296] FAULT_INJECTION: forcing a failure. [ 2322.000951][T21296] name failslab, interval 1, probability 0, space 0, times 0 [ 2322.013724][T21296] CPU: 1 PID: 21296 Comm: syz-executor.4 Not tainted 5.5.0-rc2-syzkaller #0 [ 2322.022428][T21296] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2322.032495][T21296] Call Trace: [ 2322.035787][T21296] dump_stack+0x197/0x210 [ 2322.040127][T21296] should_fail.cold+0xa/0x15 [ 2322.044729][T21296] ? do_syscall_64+0xfa/0x790 [ 2322.049410][T21296] ? fault_create_debugfs_attr+0x180/0x180 [ 2322.055306][T21296] ? __local_bh_enable_ip+0x15a/0x270 [ 2322.060697][T21296] __should_failslab+0x121/0x190 [ 2322.065630][T21296] should_failslab+0x9/0x14 [ 2322.070129][T21296] kmem_cache_alloc_node_trace+0x5a/0x750 [ 2322.075840][T21296] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2322.081129][T21296] __kmalloc_node_track_caller+0x3d/0x70 [ 2322.086753][T21296] __kmalloc_reserve.isra.0+0x40/0xf0 [ 2322.092129][T21296] pskb_expand_head+0x151/0xff0 [ 2322.096983][T21296] skb_ensure_writable+0x2d2/0x480 [ 2322.102090][T21296] bpf_clone_redirect+0x135/0x470 [ 2322.107120][T21296] bpf_prog_3d1649e183dc2cc1+0xa58/0x1000 [ 2322.112833][T21296] ? __lock_acquire+0x16f2/0x4a00 [ 2322.117857][T21296] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2322.124092][T21296] ? debug_smp_processor_id+0x33/0x18a [ 2322.129552][T21296] ? perf_trace_lock_acquire+0xf5/0x530 [ 2322.135087][T21296] ? __kasan_check_read+0x11/0x20 [ 2322.140110][T21296] ? bpf_test_run+0x7d6/0xab0 [ 2322.144791][T21296] ? find_held_lock+0x35/0x130 [ 2322.149555][T21296] ? bpf_test_run+0x7d6/0xab0 [ 2322.154249][T21296] ? lock_downgrade+0x920/0x920 [ 2322.159130][T21296] ? ktime_get+0x100/0x2f0 [ 2322.163543][T21296] ? bpf_test_run+0x7d6/0xab0 [ 2322.168206][T21296] ? ktime_get+0x100/0x2f0 [ 2322.172631][T21296] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2322.177938][T21296] ? trace_hardirqs_on+0x67/0x240 [ 2322.182986][T21296] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2322.188706][T21296] ? ktime_get+0x1fd/0x2f0 [ 2322.193221][T21296] bpf_test_run+0x31f/0xab0 [ 2322.197742][T21296] ? bpf_test_finish.isra.0+0x510/0x510 [ 2322.203285][T21296] ? __build_skb+0x58/0x70 [ 2322.207719][T21296] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2322.213969][T21296] bpf_prog_test_run_skb+0x8d4/0x10b0 [ 2322.219359][T21296] ? bpf_test_init.isra.0+0x230/0x230 [ 2322.224727][T21296] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2322.230974][T21296] ? fput+0x1b/0x20 [ 2322.234782][T21296] ? __bpf_prog_get+0x97/0x2d0 [ 2322.239542][T21296] ? bpf_test_init.isra.0+0x230/0x230 [ 2322.244909][T21296] __do_sys_bpf+0x1230/0x3810 [ 2322.249588][T21296] ? bpf_prog_load+0x18f0/0x18f0 [ 2322.254520][T21296] ? __kasan_check_write+0x14/0x20 [ 2322.259810][T21296] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2322.265363][T21296] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2322.271275][T21296] ? wait_for_completion+0x440/0x440 [ 2322.276567][T21296] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2322.283615][T21296] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2322.289297][T21296] ? do_syscall_64+0x26/0x790 [ 2322.293967][T21296] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2322.300046][T21296] ? do_syscall_64+0x26/0x790 [ 2322.304723][T21296] __x64_sys_bpf+0x73/0xb0 [ 2322.309199][T21296] do_syscall_64+0xfa/0x790 [ 2322.313751][T21296] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2322.319660][T21296] RIP: 0033:0x45a919 [ 2322.323574][T21296] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2322.343189][T21296] RSP: 002b:00007f208576fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 15:58:59 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026000200e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) [ 2322.351864][T21296] RAX: ffffffffffffffda RBX: 00007f208576fc90 RCX: 000000000045a919 [ 2322.360174][T21296] RDX: 0000000000000028 RSI: 0000000020000780 RDI: 000000000000000a [ 2322.368976][T21296] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2322.377738][T21296] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f20857706d4 [ 2322.385801][T21296] R13: 00000000004c0eb3 R14: 00000000004d4b08 R15: 0000000000000005 15:59:03 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000ea0008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:59:03 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026000300e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:59:03 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:59:03 executing program 4 (fault-call:2 fault-nth:45): perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 15:59:03 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000410008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) [ 2326.708947][T21325] FAULT_INJECTION: forcing a failure. [ 2326.708947][T21325] name failslab, interval 1, probability 0, space 0, times 0 [ 2326.727092][T21325] CPU: 0 PID: 21325 Comm: syz-executor.4 Not tainted 5.5.0-rc2-syzkaller #0 [ 2326.735789][T21325] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2326.745977][T21325] Call Trace: [ 2326.749417][T21325] dump_stack+0x197/0x210 [ 2326.753778][T21325] should_fail.cold+0xa/0x15 [ 2326.758398][T21325] ? fault_create_debugfs_attr+0x180/0x180 [ 2326.764223][T21325] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2326.769533][T21325] ? retint_kernel+0x2b/0x2b [ 2326.774129][T21325] ? trace_hardirqs_on_caller+0x6a/0x240 [ 2326.779766][T21325] __should_failslab+0x121/0x190 [ 2326.784704][T21325] should_failslab+0x9/0x14 [ 2326.789355][T21325] kmem_cache_alloc+0x47/0x710 [ 2326.794141][T21325] ? retint_kernel+0x2b/0x2b [ 2326.798747][T21325] skb_clone+0x154/0x3d0 [ 2326.802992][T21325] bpf_clone_redirect+0xb2/0x470 [ 2326.807979][T21325] bpf_prog_3d1649e183dc2cc1+0xea8/0x1000 [ 2326.813693][T21325] ? __lock_acquire+0x16f2/0x4a00 [ 2326.818766][T21325] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2326.824213][T21325] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2326.829665][T21325] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2326.834941][T21325] ? retint_kernel+0x2b/0x2b [ 2326.839616][T21325] ? trace_hardirqs_on_caller+0x6a/0x240 [ 2326.845250][T21325] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2326.855135][T21325] ? __this_cpu_preempt_check+0x35/0x190 [ 2326.860910][T21325] ? retint_kernel+0x2b/0x2b [ 2326.865509][T21325] ? ktime_get+0x129/0x2f0 [ 2326.870069][T21325] ? ktime_get+0x12e/0x2f0 [ 2326.874479][T21325] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2326.880308][T21325] ? ktime_get+0x1fd/0x2f0 [ 2326.884845][T21325] bpf_test_run+0x31f/0xab0 [ 2326.889370][T21325] ? bpf_test_finish.isra.0+0x510/0x510 [ 2326.894925][T21325] bpf_prog_test_run_skb+0x8d4/0x10b0 [ 2326.900310][T21325] ? assoc_array_gc+0x1421/0x1440 [ 2326.905415][T21325] ? bpf_test_init.isra.0+0x230/0x230 [ 2326.910783][T21325] ? bpf_test_init.isra.0+0x230/0x230 [ 2326.916143][T21325] __do_sys_bpf+0x1230/0x3810 [ 2326.920824][T21325] ? bpf_prog_load+0x18f0/0x18f0 [ 2326.925776][T21325] ? __kasan_check_write+0x14/0x20 [ 2326.931275][T21325] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2326.936861][T21325] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2326.942156][T21325] ? wait_for_completion+0x440/0x440 [ 2326.947498][T21325] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2326.953754][T21325] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2326.959203][T21325] ? do_syscall_64+0x26/0x790 [ 2326.963865][T21325] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2326.969942][T21325] ? do_syscall_64+0x26/0x790 [ 2326.974624][T21325] __x64_sys_bpf+0x73/0xb0 [ 2326.979053][T21325] do_syscall_64+0xfa/0x790 [ 2326.983556][T21325] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2326.989466][T21325] RIP: 0033:0x45a919 [ 2326.993365][T21325] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2327.012986][T21325] RSP: 002b:00007f208576fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2327.021419][T21325] RAX: ffffffffffffffda RBX: 00007f208576fc90 RCX: 000000000045a919 [ 2327.029378][T21325] RDX: 0000000000000028 RSI: 0000000020000780 RDI: 000000000000000a [ 2327.037351][T21325] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2327.045848][T21325] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f20857706d4 [ 2327.053808][T21325] R13: 00000000004c0eb3 R14: 00000000004d4b08 R15: 0000000000000005 15:59:11 executing program 5: socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x8983, 0x0) perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x5c, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r1, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 15:59:11 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:59:11 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026000400e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:59:11 executing program 4 (fault-call:2 fault-nth:46): perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 15:59:11 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000610008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:59:11 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:59:11 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026000600e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) [ 2334.494661][T21344] FAULT_INJECTION: forcing a failure. [ 2334.494661][T21344] name failslab, interval 1, probability 0, space 0, times 0 [ 2334.507844][T21344] CPU: 0 PID: 21344 Comm: syz-executor.4 Not tainted 5.5.0-rc2-syzkaller #0 [ 2334.516535][T21344] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2334.526603][T21344] Call Trace: [ 2334.526632][T21344] dump_stack+0x197/0x210 [ 2334.526655][T21344] should_fail.cold+0xa/0x15 [ 2334.526672][T21344] ? do_syscall_64+0xfa/0x790 [ 2334.526689][T21344] ? fault_create_debugfs_attr+0x180/0x180 [ 2334.526705][T21344] ? __local_bh_enable_ip+0x15a/0x270 [ 2334.526727][T21344] __should_failslab+0x121/0x190 [ 2334.526745][T21344] should_failslab+0x9/0x14 [ 2334.526758][T21344] kmem_cache_alloc_node_trace+0x5a/0x750 [ 2334.526771][T21344] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2334.526790][T21344] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2334.580980][T21344] ? retint_kernel+0x2b/0x2b [ 2334.585619][T21344] __kmalloc_node_track_caller+0x3d/0x70 [ 2334.585639][T21344] __kmalloc_reserve.isra.0+0x40/0xf0 [ 2334.585661][T21344] pskb_expand_head+0x151/0xff0 [ 2334.601526][T21344] skb_ensure_writable+0x2d2/0x480 [ 2334.606667][T21344] bpf_clone_redirect+0x135/0x470 [ 2334.611717][T21344] bpf_prog_3d1649e183dc2cc1+0x5d4/0x1000 [ 2334.617563][T21344] ? __lock_acquire+0x16f2/0x4a00 [ 2334.622613][T21344] ? rcu_preempt_deferred_qs_irqrestore+0x4ff/0xd60 [ 2334.629303][T21344] ? __kasan_check_read+0x11/0x20 [ 2334.629323][T21344] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2334.629343][T21344] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2334.645424][T21344] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2334.650761][T21344] ? retint_kernel+0x2b/0x2b [ 2334.655369][T21344] ? trace_hardirqs_on_caller+0x6a/0x240 [ 2334.661030][T21344] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2334.666953][T21344] ? __this_cpu_preempt_check+0x35/0x190 [ 2334.672605][T21344] ? retint_kernel+0x2b/0x2b [ 2334.677228][T21344] ? bpf_test_run+0x29b/0xab0 [ 2334.682701][T21344] ? bpf_test_run+0x2a0/0xab0 [ 2334.687400][T21344] bpf_test_run+0x31f/0xab0 [ 2334.691933][T21344] ? bpf_test_finish.isra.0+0x510/0x510 [ 2334.697505][T21344] bpf_prog_test_run_skb+0x8d4/0x10b0 [ 2334.702893][T21344] ? bpf_test_init.isra.0+0x230/0x230 [ 2334.708283][T21344] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2334.714553][T21344] ? fput+0x1b/0x20 [ 2334.718380][T21344] ? __bpf_prog_get+0x97/0x2d0 [ 2334.723166][T21344] ? bpf_test_init.isra.0+0x230/0x230 [ 2334.728563][T21344] __do_sys_bpf+0x1230/0x3810 [ 2334.733257][T21344] ? _raw_spin_unlock_irq+0x59/0x80 [ 2334.738471][T21344] ? bpf_prog_load+0x18f0/0x18f0 [ 2334.743448][T21344] ? __schedule+0x93c/0x1f90 [ 2334.743469][T21344] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2334.743483][T21344] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2334.743499][T21344] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2334.743512][T21344] ? retint_kernel+0x2b/0x2b [ 2334.743527][T21344] ? trace_hardirqs_on_caller+0x6a/0x240 [ 2334.743563][T21344] __x64_sys_bpf+0x73/0xb0 [ 2334.778929][T21344] ? do_syscall_64+0x5b/0x790 [ 2334.783624][T21344] do_syscall_64+0xfa/0x790 [ 2334.788152][T21344] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2334.794059][T21344] RIP: 0033:0x45a919 [ 2334.797966][T21344] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2334.817575][T21344] RSP: 002b:00007f208576fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2334.826007][T21344] RAX: ffffffffffffffda RBX: 00007f208576fc90 RCX: 000000000045a919 [ 2334.833983][T21344] RDX: 0000000000000028 RSI: 0000000020000780 RDI: 000000000000000a [ 2334.833992][T21344] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2334.834000][T21344] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f20857706d4 [ 2334.834007][T21344] R13: 00000000004c0eb3 R14: 00000000004d4b08 R15: 0000000000000005 15:59:17 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00020010008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:59:17 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:59:17 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026000a00e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:59:17 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000a10008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:59:17 executing program 4 (fault-call:2 fault-nth:47): perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) [ 2340.084814][T21367] FAULT_INJECTION: forcing a failure. [ 2340.084814][T21367] name failslab, interval 1, probability 0, space 0, times 0 [ 2340.097671][T21367] CPU: 1 PID: 21367 Comm: syz-executor.4 Not tainted 5.5.0-rc2-syzkaller #0 [ 2340.106635][T21367] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2340.106649][T21367] Call Trace: [ 2340.120119][T21367] dump_stack+0x197/0x210 [ 2340.124471][T21367] should_fail.cold+0xa/0x15 [ 2340.129436][T21367] ? kasan_unpoison_shadow+0x20/0x50 [ 2340.134743][T21367] ? fault_create_debugfs_attr+0x180/0x180 [ 2340.140571][T21367] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2340.146307][T21367] ? skb_release_data+0x556/0x8d0 [ 2340.151349][T21367] ? __kmalloc_node_track_caller+0x4e/0x70 [ 2340.157177][T21367] ? __phys_addr+0xa4/0x120 [ 2340.161789][T21367] __should_failslab+0x121/0x190 [ 2340.166923][T21367] should_failslab+0x9/0x14 [ 2340.171452][T21367] kmem_cache_alloc+0x47/0x710 [ 2340.176233][T21367] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2340.182489][T21367] ? __this_cpu_preempt_check+0x35/0x190 [ 2340.188145][T21367] skb_clone+0x154/0x3d0 [ 2340.192405][T21367] bpf_clone_redirect+0xb2/0x470 [ 2340.197383][T21367] bpf_prog_3d1649e183dc2cc1+0x98/0x1000 [ 2340.203034][T21367] ? __lock_acquire+0x16f2/0x4a00 [ 2340.208083][T21367] ? rcu_preempt_deferred_qs_irqrestore+0x4ff/0xd60 [ 2340.214689][T21367] ? __kasan_check_read+0x11/0x20 [ 2340.219720][T21367] ? bpf_test_run+0x7d6/0xab0 [ 2340.224394][T21367] ? find_held_lock+0x35/0x130 [ 2340.224408][T21367] ? bpf_test_run+0x7d6/0xab0 [ 2340.224429][T21367] ? lock_downgrade+0x920/0x920 [ 2340.224443][T21367] ? ktime_get+0x100/0x2f0 [ 2340.224454][T21367] ? bpf_test_run+0x7d6/0xab0 [ 2340.224465][T21367] ? ktime_get+0x100/0x2f0 [ 2340.224480][T21367] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2340.224504][T21367] ? trace_hardirqs_on+0x67/0x240 [ 2340.224522][T21367] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2340.224539][T21367] ? ktime_get+0x1fd/0x2f0 [ 2340.273150][T21367] bpf_test_run+0x31f/0xab0 [ 2340.277682][T21367] ? bpf_test_finish.isra.0+0x510/0x510 [ 2340.283338][T21367] ? __build_skb+0x58/0x70 [ 2340.287872][T21367] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2340.294949][T21367] bpf_prog_test_run_skb+0x8d4/0x10b0 [ 2340.300323][T21367] ? bpf_test_init.isra.0+0x230/0x230 [ 2340.305774][T21367] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2340.312039][T21367] ? fput+0x1b/0x20 [ 2340.315852][T21367] ? __bpf_prog_get+0x97/0x2d0 [ 2340.320631][T21367] ? bpf_test_init.isra.0+0x230/0x230 [ 2340.326003][T21367] __do_sys_bpf+0x1230/0x3810 [ 2340.330704][T21367] ? bpf_prog_load+0x18f0/0x18f0 [ 2340.335638][T21367] ? __kasan_check_write+0x14/0x20 [ 2340.340748][T21367] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2340.346323][T21367] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2340.351612][T21367] ? wait_for_completion+0x440/0x440 [ 2340.356917][T21367] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2340.363177][T21367] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2340.368633][T21367] ? do_syscall_64+0x26/0x790 [ 2340.373310][T21367] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2340.379372][T21367] ? do_syscall_64+0x26/0x790 [ 2340.384066][T21367] __x64_sys_bpf+0x73/0xb0 [ 2340.388707][T21367] do_syscall_64+0xfa/0x790 [ 2340.393214][T21367] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2340.399116][T21367] RIP: 0033:0x45a919 [ 2340.403102][T21367] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2340.422853][T21367] RSP: 002b:00007f208576fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2340.431439][T21367] RAX: ffffffffffffffda RBX: 00007f208576fc90 RCX: 000000000045a919 [ 2340.439425][T21367] RDX: 0000000000000028 RSI: 0000000020000780 RDI: 000000000000000a [ 2340.447385][T21367] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2340.455354][T21367] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f20857706d4 [ 2340.463356][T21367] R13: 00000000004c0eb3 R14: 00000000004d4b08 R15: 0000000000000005 [ 2346.274390][T21374] netlink: 131070 bytes leftover after parsing attributes in process `syz-executor.3'. 15:59:27 executing program 5: socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x8983, 0x0) perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x5c, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r1, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 15:59:27 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:59:27 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00030010008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:59:27 executing program 4 (fault-call:2 fault-nth:48): perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 15:59:27 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026000c00e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:59:27 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000c10008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:59:27 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026000e00e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:59:27 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e04000000", 0x17}], 0x1, 0x0, 0x0, 0x6558}, 0x0) [ 2349.943021][T21387] FAULT_INJECTION: forcing a failure. [ 2349.943021][T21387] name failslab, interval 1, probability 0, space 0, times 0 [ 2349.955922][T21387] CPU: 1 PID: 21387 Comm: syz-executor.4 Not tainted 5.5.0-rc2-syzkaller #0 [ 2349.955934][T21387] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2349.955940][T21387] Call Trace: [ 2349.955961][T21387] dump_stack+0x197/0x210 [ 2349.955986][T21387] should_fail.cold+0xa/0x15 [ 2349.987109][T21387] ? kasan_unpoison_shadow+0x20/0x50 [ 2349.992513][T21387] ? fault_create_debugfs_attr+0x180/0x180 [ 2349.998332][T21387] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2350.004062][T21387] ? skb_release_data+0x556/0x8d0 [ 2350.009094][T21387] ? __kmalloc_node_track_caller+0x4e/0x70 [ 2350.014908][T21387] ? __phys_addr+0xa4/0x120 [ 2350.019432][T21387] __should_failslab+0x121/0x190 [ 2350.024481][T21387] should_failslab+0x9/0x14 [ 2350.029002][T21387] kmem_cache_alloc+0x47/0x710 [ 2350.033805][T21387] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2350.040065][T21387] ? __this_cpu_preempt_check+0x35/0x190 [ 2350.045736][T21387] skb_clone+0x154/0x3d0 [ 2350.050003][T21387] bpf_clone_redirect+0xb2/0x470 [ 2350.054965][T21387] bpf_prog_3d1649e183dc2cc1+0x754/0x1000 [ 2350.060711][T21387] ? __lock_acquire+0x16f2/0x4a00 [ 2350.065750][T21387] ? bpf_prog_test_run_skb+0x2bf/0x10b0 [ 2350.071309][T21387] ? __do_sys_bpf+0x1230/0x3810 [ 2350.076197][T21387] ? __kasan_check_read+0x11/0x20 [ 2350.081237][T21387] ? bpf_test_run+0x188/0xab0 [ 2350.085927][T21387] ? find_held_lock+0x35/0x130 [ 2350.090703][T21387] ? bpf_test_run+0x188/0xab0 [ 2350.095572][T21387] ? lock_downgrade+0x920/0x920 [ 2350.100445][T21387] ? ktime_get+0x100/0x2f0 [ 2350.104874][T21387] ? bpf_test_run+0x188/0xab0 [ 2350.109570][T21387] ? ktime_get+0x100/0x2f0 [ 2350.114007][T21387] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2350.119321][T21387] ? trace_hardirqs_on+0x67/0x240 [ 2350.124365][T21387] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2350.130095][T21387] ? ktime_get+0x1fd/0x2f0 [ 2350.134531][T21387] bpf_test_run+0x31f/0xab0 [ 2350.139067][T21387] ? bpf_test_finish.isra.0+0x510/0x510 [ 2350.144629][T21387] ? __build_skb+0x58/0x70 [ 2350.149099][T21387] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2350.155370][T21387] bpf_prog_test_run_skb+0x8d4/0x10b0 [ 2350.160787][T21387] ? bpf_test_init.isra.0+0x230/0x230 [ 2350.166177][T21387] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2350.172440][T21387] ? fput+0x1b/0x20 [ 2350.176265][T21387] ? __bpf_prog_get+0x97/0x2d0 [ 2350.181055][T21387] ? bpf_test_init.isra.0+0x230/0x230 [ 2350.186444][T21387] __do_sys_bpf+0x1230/0x3810 [ 2350.191144][T21387] ? bpf_prog_load+0x18f0/0x18f0 [ 2350.196102][T21387] ? __kasan_check_write+0x14/0x20 [ 2350.201220][T21387] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2350.206772][T21387] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2350.212069][T21387] ? wait_for_completion+0x440/0x440 [ 2350.217388][T21387] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2350.223663][T21387] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2350.229171][T21387] ? do_syscall_64+0x26/0x790 [ 2350.233866][T21387] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 15:59:27 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e04000000", 0x17}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:59:27 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026000f00e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:59:27 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e04000000", 0x17}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:59:27 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026001000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) [ 2350.239958][T21387] ? do_syscall_64+0x26/0x790 [ 2350.239980][T21387] __x64_sys_bpf+0x73/0xb0 [ 2350.240001][T21387] do_syscall_64+0xfa/0x790 [ 2350.253787][T21387] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2350.259695][T21387] RIP: 0033:0x45a919 [ 2350.263867][T21387] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2350.283475][T21387] RSP: 002b:00007f208576fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2350.283489][T21387] RAX: ffffffffffffffda RBX: 00007f208576fc90 RCX: 000000000045a919 [ 2350.283498][T21387] RDX: 0000000000000028 RSI: 0000000020000780 RDI: 000000000000000a [ 2350.283507][T21387] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2350.283516][T21387] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f20857706d4 [ 2350.283524][T21387] R13: 00000000004c0eb3 R14: 00000000004d4b08 R15: 0000000000000005 15:59:42 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0400000000e8bd6efb350009000e0001", 0x23}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:59:42 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00040010008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:59:42 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000e10008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:59:42 executing program 4 (fault-call:2 fault-nth:49): perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 15:59:42 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026006000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:59:42 executing program 5: socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x8983, 0x0) perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x5c, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r1, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 15:59:42 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e002600f000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:59:42 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0400000000e8bd6efb350009000e0001", 0x23}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:59:42 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0400000000e8bd6efb350009000e0001", 0x23}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:59:42 executing program 4: perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 15:59:42 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026000003e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:59:42 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000f10008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:59:42 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0400000000e8bd6efb350009000e000100400000ff05", 0x29}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:59:56 executing program 5: socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x8983, 0x0) perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x5c, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r1, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 15:59:56 executing program 4: perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x2, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 15:59:56 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e002600ac04e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:59:56 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0400000000e8bd6efb350009000e000100400000ff05", 0x29}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:59:56 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00001010008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:59:56 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00060010008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:59:56 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0400000000e8bd6efb350009000e000100400000ff05", 0x29}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:59:56 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026000006e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:59:56 executing program 4: perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x3, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 15:59:56 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e002600000ae8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:59:56 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0400000000e8bd6efb350009000e000100400000ff05000500", 0x2c}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 15:59:56 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00006010008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:00:05 executing program 5: socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x8983, 0x0) perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x5c, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r1, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 16:00:05 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0400000000e8bd6efb350009000e000100400000ff05000500", 0x2c}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:00:05 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e002600000ce8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:00:05 executing program 4: perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="b70200000b000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000002f3753a9c3b630bf92dd696125265586f2043649b89ec9b91dc174d5701424fa24052b2fe97409000000058e4bf0391702519694cd73608fadb119a5ffc8f1460c55bcce412bc1cc14a1f64ad78f7efc6f2233bacac999cbb0468424c2e8ab6cafc7bed227046c4ef20a09f4a46c382c1e7016a71a704c7b3cddf5306b500fda7b4a72bedb7c33a4c7e1f0c42819df5c26d28b450e2a9980b62fe2a57ac040892270e005a2e4ead36494a405cb500badb2b544edf5499098896b66851b823d3dc390934ea9062dd57a13ddb0ce78dbf6619bb0148e4dbb7ac738e4eb6e8061fa9d376fd0a4abf451611aa4aca07c12035ab1b2b55c098a78182c4651c0c3b019f94858fb0dc2ebd1ec689d889bf0839369cf62791d3bbd6c31262839a19f99e860dbed7b9493f9c8c764310e79aa8bd1e9e23f1ed38f91e6a53d265a75ec4fcd4d8b2d06c73ca7efec28b59fbeccfa1dbcd25032f328223bc33acc2449b6e9da679198772ecf1cc7f3886628dcc16c8ff17ff6ca528ef87741fc3e0f242a1037df395cbf0a9912d1b6d0bbc1482efe0712fac17f70f20bb9c6aef2d925d788d93d6c22aee7d387a7eaaada553f98a010533f2aa5a5cea2bdb19fc8c42e5d714ea143ab8a567bf262b03872602bfd2f35062c812cdc2eaf4a1ab92a419708546a70395497f822b5f06f0df2ba672d883b9fcfd34b7f4dc24bb3abdcb6f3e383dad4bc980c08e8e01099afd19cf916b0b9ab158153475d393aac65059df3c2f3d1ba5c9dc1c7e70ec14dd5af0b5b1a748ef9ebde08f72b53a54d2d66f41c5aa1fb1d91dfd6146e77bce93c45de0a0b19580a0ff90bdace7f549b8dcc95be4d596423ca8db0831932067edf32e58beaaa8625b91c05"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x4, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 16:00:05 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000020008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:00:05 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e000a0010008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:00:05 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e002600000ee8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) [ 2388.092295][T21520] netlink: 18 bytes leftover after parsing attributes in process `syz-executor.2'. 16:00:05 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0400000000e8bd6efb350009000e000100400000ff05000500", 0x2c}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:00:05 executing program 4: perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x5, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 16:00:05 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0400000000e8bd6efb350009000e000100400000ff0500050012", 0x2d}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:00:05 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e002600000fe8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) [ 2388.278299][T21534] netlink: 18 bytes leftover after parsing attributes in process `syz-executor.2'. 16:00:05 executing program 4: perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x6, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 16:00:14 executing program 5: socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x8983, 0x0) perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x5c, &(0x7f0000000b40)=ANY=[@ANYBLOB="b70200000b000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000002f3753a9c3b630bf92dd696125265586f2043649b89ec9b91dc174d5701424fa24052b2fe97409000000058e4bf0391702519694cd73608fadb119a5ffc8f1460c55bcce412bc1cc14a1f64ad78f7efc6f2233bacac999cbb0468424c2e8ab6cafc7bed227046c4ef20a09f4a46c382c1e7016a71a704c7b3cddf5306b500fda7b4a72bedb7c33a4c7e1f0c42819df5c26d28b450e2a9980b62fe2a57ac040892270e005a2e4ead36494a405cb500badb2b544edf5499098896b66851b823d3dc390934ea9062dd57a13ddb0ce78dbf6619bb0148e4dbb7ac738e4eb6e8061fa9d376fd0a4abf451611aa4aca07c12035ab1b2b55c098a78182c4651c0c3b019f94858fb0dc2ebd1ec689d889bf0839369cf62791d3bbd6c31262839a19f99e860dbed7b9493f9c8c764310e79aa8bd1e9e23f1ed38f91e6a53d265a75ec4fcd4d8b2d06c73ca7efec28b59fbeccfa1dbcd25032f328223bc33acc2449b6e9da679198772ecf1cc7f3886628dcc16c8ff17ff6ca528ef87741fc3e0f242a1037df395cbf0a9912d1b6d0bbc1482efe0712fac17f70f20bb9c6aef2d925d788d93d6c22aee7d387a7eaaada553f98a010533f2aa5a5cea2bdb19fc8c42e5d714ea143ab8a567bf262b03872602bfd2f35062c812cdc2eaf4a1ab92a419708546a70395497f822b5f06f0df2ba672d883b9fcfd34b7f4dc24bb3abdcb6f3e383dad4bc980c08e8e01099afd19cf916b0b9ab158153475d393aac65059df3c2f3d1ba5c9dc1c7e70ec14dd5af0b5b1a748ef9ebde08f72b53a54d2d66f41c5aa1fb1d91dfd6146e77bce93c45de0a0b19580a0ff90bdace7f549b8dcc95be4d596423ca8db0831932067edf32e58beaaa8625b91c05"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r1, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 16:00:14 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e002600003fe8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:00:14 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000025008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:00:14 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0400000000e8bd6efb350009000e000100400000ff0500050012", 0x2d}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:00:14 executing program 4: perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x7, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 16:00:14 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e000c0010008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:00:14 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026000040e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:00:14 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0400000000e8bd6efb350009000e000100400000ff0500050012", 0x2d}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:00:14 executing program 4: perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x8, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) [ 2397.537723][T21563] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. 16:00:14 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026006558e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) [ 2397.622955][T21571] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. 16:00:14 executing program 1: 16:00:15 executing program 4: perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x9, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 16:00:30 executing program 5: socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x8983, 0x0) perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x5c, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r1, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 16:00:30 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000035008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:00:30 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026000060e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:00:30 executing program 1: 16:00:30 executing program 4: perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="b70200000b000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000002f3753a9c3b630bf92dd696125265586f2043649b89ec9b91dc174d5701424fa24052b2fe97409000000058e4bf0391702519694cd73608fadb119a5ffc8f1460c55bcce412bc1cc14a1f64ad78f7efc6f2233bacac999cbb0468424c2e8ab6cafc7bed227046c4ef20a09f4a46c382c1e7016a71a704c7b3cddf5306b500fda7b4a72bedb7c33a4c7e1f0c42819df5c26d28b450e2a9980b62fe2a57ac040892270e005a2e4ead36494a405cb500badb2b544edf5499098896b66851b823d3dc390934ea9062dd57a13ddb0ce78dbf6619bb0148e4dbb7ac738e4eb6e8061fa9d376fd0a4abf451611aa4aca07c12035ab1b2b55c098a78182c4651c0c3b019f94858fb0dc2ebd1ec689d889bf0839369cf62791d3bbd6c31262839a19f99e860dbed7b9493f9c8c764310e79aa8bd1e9e23f1ed38f91e6a53d265a75ec4fcd4d8b2d06c73ca7efec28b59fbeccfa1dbcd25032f328223bc33acc2449b6e9da679198772ecf1cc7f3886628dcc16c8ff17ff6ca528ef87741fc3e0f242a1037df395cbf0a9912d1b6d0bbc1482efe0712fac17f70f20bb9c6aef2d925d788d93d6c22aee7d387a7eaaada553f98a010533f2aa5a5cea2bdb19fc8c42e5d714ea143ab8a567bf262b03872602bfd2f35062c812cdc2eaf4a1ab92a419708546a70395497f822b5f06f0df2ba672d883b9fcfd34b7f4dc24bb3abdcb6f3e383dad4bc980c08e8e01099afd19cf916b0b9ab158153475d393aac65059df3c2f3d1ba5c9dc1c7e70ec14dd5af0b5b1a748ef9ebde08f72b53a54d2d66f41c5aa1fb1d91dfd6146e77bce93c45de0a0b19580a0ff90bdace7f549b8dcc95be4d596423ca8db0831932067edf32e58beaaa8625b91c05"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xb, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 16:00:30 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e000e0010008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:00:30 executing program 1: bpf$MAP_CREATE(0x1000000000000, &(0x7f0000000000)={0xd, 0x4, 0x4, 0x8004}, 0x3c) 16:00:30 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026005865e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:00:30 executing program 1: socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a1, &(0x7f0000000580)='ip6_vti0\x00') 16:00:30 executing program 4: perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xc, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 16:00:30 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026000081e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:00:30 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000040008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:00:39 executing program 5: socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x8983, 0x0) perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x5c, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r1, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 16:00:39 executing program 1: perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xb, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 16:00:39 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e00260004ace8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:00:39 executing program 4: perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xd, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 16:00:39 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e0000006f008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:00:39 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00100010008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:00:39 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e00260000f0e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:00:39 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e002600000400bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:00:39 executing program 1: perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="b70200000b000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000002f3753a9c3b630bf92dd696125265586f2043649b89ec9b91dc174d5701424fa24052b2fe97409000000058e4bf0391702519694cd73608fadb119a5ffc8f1460c55bcce412bc1cc14a1f64ad78f7efc6f2233bacac999cbb0468424c2e8ab6cafc7bed227046c4ef20a09f4a46c382c1e7016a71a704c7b3cddf5306b500fda7b4a72bedb7c33a4c7e1f0c42819df5c26d28b450e2a9980b62fe2a57ac040892270e005a2e4ead36494a405cb500badb2b544edf5499098896b66851b823d3dc390934ea9062dd57a13ddb0ce78dbf6619bb0148e4dbb7ac738e4eb6e8061fa9d376fd0a4abf451611aa4aca07c12035ab1b2b55c098a78182c4651c0c3b019f94858fb0dc2ebd1ec689d889bf0839369cf62791d3bbd6c31262839a19f99e860dbed7b9493f9c8c764310e79aa8bd1e9e23f1ed38f91e6a53d265a75ec4fcd4d8b2d06c73ca7efec28b59fbeccfa1dbcd25032f328223bc33acc2449b6e9da679198772ecf1cc7f3886628dcc16c8ff17ff6ca528ef87741fc3e0f242a1037df395cbf0a9912d1b6d0bbc1482efe0712fac17f70f20bb9c6aef2d925d788d93d6c22aee7d387a7eaaada553f98a010533f2aa5a5cea2bdb19fc8c42e5d714ea143ab8a567bf262b03872602bfd2f35062c812cdc2eaf4a1ab92a419708546a70395497f822b5f06f0df2ba672d883b9fcfd34b7f4dc24bb3abdcb6f3e383dad4bc980c08e8e01099afd19cf916b0b9ab158153475d393aac65059df3c2f3d1ba5c9dc1c7e70ec14dd5af0b5b1a748ef9ebde08f72b53a54d2d66f41c5aa1fb1d91dfd6146e77bce93c45de0a0b19580a0ff90bdace7f549b8dcc95be4d596423ca8db0831932067edf32e58beaaa8625b91c05"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x9, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 16:00:39 executing program 4: perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xe, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 16:00:39 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000ea0008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:00:39 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e002600000ec0bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:00:47 executing program 5: socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x8983, 0x0) perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x5c, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r1, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 16:00:47 executing program 4: perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xf, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 16:00:47 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026000200e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:00:47 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026000002e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:00:47 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000002008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:00:47 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00600010008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:00:47 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026000003e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:00:47 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026000200e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:00:47 executing program 4: perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x10, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 16:00:48 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000007008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:00:48 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026000004e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:00:48 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026000200e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:00:59 executing program 5: socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x8983, 0x0) perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x5c, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r1, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 16:00:59 executing program 4: perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="b70200000b000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000002f3753a9c3b630bf92dd696125265586f2043649b89ec9b91dc174d5701424fa24052b2fe97409000000058e4bf0391702519694cd73608fadb119a5ffc8f1460c55bcce412bc1cc14a1f64ad78f7efc6f2233bacac999cbb0468424c2e8ab6cafc7bed227046c4ef20a09f4a46c382c1e7016a71a704c7b3cddf5306b500fda7b4a72bedb7c33a4c7e1f0c42819df5c26d28b450e2a9980b62fe2a57ac040892270e005a2e4ead36494a405cb500badb2b544edf5499098896b66851b823d3dc390934ea9062dd57a13ddb0ce78dbf6619bb0148e4dbb7ac738e4eb6e8061fa9d376fd0a4abf451611aa4aca07c12035ab1b2b55c098a78182c4651c0c3b019f94858fb0dc2ebd1ec689d889bf0839369cf62791d3bbd6c31262839a19f99e860dbed7b9493f9c8c764310e79aa8bd1e9e23f1ed38f91e6a53d265a75ec4fcd4d8b2d06c73ca7efec28b59fbeccfa1dbcd25032f328223bc33acc2449b6e9da679198772ecf1cc7f3886628dcc16c8ff17ff6ca528ef87741fc3e0f242a1037df395cbf0a9912d1b6d0bbc1482efe0712fac17f70f20bb9c6aef2d925d788d93d6c22aee7d387a7eaaada553f98a010533f2aa5a5cea2bdb19fc8c42e5d714ea143ab8a567bf262b03872602bfd2f35062c812cdc2eaf4a1ab92a419708546a70395497f822b5f06f0df2ba672d883b9fcfd34b7f4dc24bb3abdcb6f3e383dad4bc980c08e8e01099afd19cf916b0b9ab158153475d393aac65059df3c2f3d1ba5c9dc1c7e70ec14dd5af0b5b1a748ef9ebde08f72b53a54d2d66f41c5aa1fb1d91dfd6146e77bce93c45de0a0b19580a0ff90bdace7f549b8dcc95be4d596423ca8db0831932067edf32e58beaaa8625b91c05"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x11, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 16:00:59 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026000006e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:00:59 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108041080ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:00:59 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e0000000a008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:01:02 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00f00010008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:01:02 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e002600000ae8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:01:02 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000020008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:01:02 executing program 4: perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="b70200000b000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000002f3753a9c3b630bf92dd696125265586f2043649b89ec9b91dc174d5701424fa24052b2fe97409000000058e4bf0391702519694cd73608fadb119a5ffc8f1460c55bcce412bc1cc14a1f64ad78f7efc6f2233bacac999cbb0468424c2e8ab6cafc7bed227046c4ef20a09f4a46c382c1e7016a71a704c7b3cddf5306b500fda7b4a72bedb7c33a4c7e1f0c42819df5c26d28b450e2a9980b62fe2a57ac040892270e005a2e4ead36494a405cb500badb2b544edf5499098896b66851b823d3dc390934ea9062dd57a13ddb0ce78dbf6619bb0148e4dbb7ac738e4eb6e8061fa9d376fd0a4abf451611aa4aca07c12035ab1b2b55c098a78182c4651c0c3b019f94858fb0dc2ebd1ec689d889bf0839369cf62791d3bbd6c31262839a19f99e860dbed7b9493f9c8c764310e79aa8bd1e9e23f1ed38f91e6a53d265a75ec4fcd4d8b2d06c73ca7efec28b59fbeccfa1dbcd25032f328223bc33acc2449b6e9da679198772ecf1cc7f3886628dcc16c8ff17ff6ca528ef87741fc3e0f242a1037df395cbf0a9912d1b6d0bbc1482efe0712fac17f70f20bb9c6aef2d925d788d93d6c22aee7d387a7eaaada553f98a010533f2aa5a5cea2bdb19fc8c42e5d714ea143ab8a567bf262b03872602bfd2f35062c812cdc2eaf4a1ab92a419708546a70395497f822b5f06f0df2ba672d883b9fcfd34b7f4dc24bb3abdcb6f3e383dad4bc980c08e8e01099afd19cf916b0b9ab158153475d393aac65059df3c2f3d1ba5c9dc1c7e70ec14dd5af0b5b1a748ef9ebde08f72b53a54d2d66f41c5aa1fb1d91dfd6146e77bce93c45de0a0b19580a0ff90bdace7f549b8dcc95be4d596423ca8db0831932067edf32e58beaaa8625b91c05"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x12, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 16:01:02 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e0000000f008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:01:02 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e002600000ce8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) [ 2444.912633][T21756] netlink: 18 bytes leftover after parsing attributes in process `syz-executor.1'. 16:01:02 executing program 1 (fault-call:1 fault-nth:0): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0400000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) [ 2445.048416][T21767] FAULT_INJECTION: forcing a failure. [ 2445.048416][T21767] name failslab, interval 1, probability 0, space 0, times 0 [ 2445.065031][T21767] CPU: 1 PID: 21767 Comm: syz-executor.1 Not tainted 5.5.0-rc2-syzkaller #0 [ 2445.073753][T21767] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2445.083819][T21767] Call Trace: [ 2445.087130][T21767] dump_stack+0x197/0x210 [ 2445.091470][T21767] should_fail.cold+0xa/0x15 [ 2445.091490][T21767] ? fault_create_debugfs_attr+0x180/0x180 [ 2445.091513][T21767] ? ___might_sleep+0x163/0x2c0 [ 2445.101901][T21767] __should_failslab+0x121/0x190 [ 2445.101921][T21767] should_failslab+0x9/0x14 [ 2445.101937][T21767] kmem_cache_alloc_node_trace+0x274/0x750 [ 2445.101952][T21767] ? _raw_spin_unlock_bh+0x2c/0x30 [ 2445.101972][T21767] ? release_sock+0x156/0x1c0 [ 2445.131838][T21767] __get_vm_area_node+0x12f/0x3b0 [ 2445.136900][T21767] __vmalloc_node_range+0xce/0x790 [ 2445.142026][T21767] ? netlink_sendmsg+0x685/0xea0 [ 2445.146981][T21767] ? netlink_sendmsg+0x685/0xea0 [ 2445.151948][T21767] vmalloc+0x6b/0x90 [ 2445.155828][T21767] ? netlink_sendmsg+0x685/0xea0 [ 2445.160765][T21767] netlink_sendmsg+0x685/0xea0 [ 2445.165530][T21767] ? netlink_unicast+0x7d0/0x7d0 [ 2445.170458][T21767] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2445.176117][T21767] ? apparmor_socket_sendmsg+0x2a/0x30 [ 2445.181563][T21767] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2445.187787][T21767] ? security_socket_sendmsg+0x8d/0xc0 [ 2445.193243][T21767] ? netlink_unicast+0x7d0/0x7d0 [ 2445.198176][T21767] sock_sendmsg+0xd7/0x130 [ 2445.202578][T21767] ____sys_sendmsg+0x753/0x880 [ 2445.207325][T21767] ? kernel_sendmsg+0x50/0x50 [ 2445.212006][T21767] ? __fget+0x35d/0x550 [ 2445.216153][T21767] ? find_held_lock+0x35/0x130 [ 2445.220905][T21767] ___sys_sendmsg+0x100/0x170 [ 2445.225565][T21767] ? sendmsg_copy_msghdr+0x70/0x70 [ 2445.230673][T21767] ? __kasan_check_read+0x11/0x20 [ 2445.235693][T21767] ? __fget+0x37f/0x550 [ 2445.239835][T21767] ? ksys_dup3+0x3e0/0x3e0 [ 2445.244240][T21767] ? __fget_light+0x1a9/0x230 [ 2445.248910][T21767] ? __fdget+0x1b/0x20 [ 2445.252961][T21767] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2445.259194][T21767] __sys_sendmsg+0x105/0x1d0 [ 2445.263780][T21767] ? __sys_sendmsg_sock+0xc0/0xc0 [ 2445.268795][T21767] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2445.274258][T21767] ? do_syscall_64+0x26/0x790 [ 2445.279016][T21767] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2445.285072][T21767] ? do_syscall_64+0x26/0x790 [ 2445.289738][T21767] __x64_sys_sendmsg+0x78/0xb0 [ 2445.294511][T21767] do_syscall_64+0xfa/0x790 [ 2445.299009][T21767] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2445.304893][T21767] RIP: 0033:0x45a919 [ 2445.308771][T21767] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2445.328374][T21767] RSP: 002b:00007f668f870c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2445.336769][T21767] RAX: ffffffffffffffda RBX: 00007f668f870c90 RCX: 000000000045a919 [ 2445.344778][T21767] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 2445.352748][T21767] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2445.360762][T21767] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f668f8716d4 [ 2445.368725][T21767] R13: 00000000004c99b6 R14: 00000000004e1888 R15: 0000000000000004 [ 2445.379833][T21767] syz-executor.1: vmalloc: allocation failure: 213312 bytes, mode:0xcc0(GFP_KERNEL), nodemask=(null),cpuset=syz1,mems_allowed=0-1 [ 2445.393492][T21767] CPU: 1 PID: 21767 Comm: syz-executor.1 Not tainted 5.5.0-rc2-syzkaller #0 [ 2445.402171][T21767] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2445.402177][T21767] Call Trace: [ 2445.402198][T21767] dump_stack+0x197/0x210 [ 2445.402218][T21767] warn_alloc.cold+0x87/0x164 [ 2445.402234][T21767] ? zone_watermark_ok_safe+0x260/0x260 [ 2445.402252][T21767] ? kmem_cache_alloc_node_trace+0x398/0x750 [ 2445.402279][T21767] ? __get_vm_area_node+0x2e7/0x3b0 [ 2445.402300][T21767] __vmalloc_node_range+0x44c/0x790 [ 2445.402325][T21767] ? netlink_sendmsg+0x685/0xea0 [ 2445.402343][T21767] vmalloc+0x6b/0x90 [ 2445.402360][T21767] ? netlink_sendmsg+0x685/0xea0 [ 2445.402377][T21767] netlink_sendmsg+0x685/0xea0 [ 2445.402401][T21767] ? netlink_unicast+0x7d0/0x7d0 [ 2445.402418][T21767] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2445.402439][T21767] ? apparmor_socket_sendmsg+0x2a/0x30 [ 2445.415778][T21767] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2445.487441][T21767] ? security_socket_sendmsg+0x8d/0xc0 [ 2445.492907][T21767] ? netlink_unicast+0x7d0/0x7d0 [ 2445.497831][T21767] sock_sendmsg+0xd7/0x130 [ 2445.502247][T21767] ____sys_sendmsg+0x753/0x880 [ 2445.506999][T21767] ? kernel_sendmsg+0x50/0x50 [ 2445.511683][T21767] ? __fget+0x35d/0x550 [ 2445.515830][T21767] ? find_held_lock+0x35/0x130 [ 2445.520611][T21767] ___sys_sendmsg+0x100/0x170 [ 2445.525332][T21767] ? sendmsg_copy_msghdr+0x70/0x70 [ 2445.530462][T21767] ? __kasan_check_read+0x11/0x20 [ 2445.535471][T21767] ? __fget+0x37f/0x550 [ 2445.539631][T21767] ? ksys_dup3+0x3e0/0x3e0 [ 2445.544055][T21767] ? __fget_light+0x1a9/0x230 [ 2445.548722][T21767] ? __fdget+0x1b/0x20 [ 2445.552831][T21767] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2445.559067][T21767] __sys_sendmsg+0x105/0x1d0 [ 2445.563707][T21767] ? __sys_sendmsg_sock+0xc0/0xc0 [ 2445.568771][T21767] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2445.574255][T21767] ? do_syscall_64+0x26/0x790 [ 2445.578917][T21767] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2445.584967][T21767] ? do_syscall_64+0x26/0x790 [ 2445.589631][T21767] __x64_sys_sendmsg+0x78/0xb0 [ 2445.594405][T21767] do_syscall_64+0xfa/0x790 [ 2445.598899][T21767] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2445.604770][T21767] RIP: 0033:0x45a919 [ 2445.608648][T21767] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2445.629362][T21767] RSP: 002b:00007f668f870c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2445.637775][T21767] RAX: ffffffffffffffda RBX: 00007f668f870c90 RCX: 000000000045a919 [ 2445.645826][T21767] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 2445.653789][T21767] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2445.661755][T21767] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f668f8716d4 [ 2445.669808][T21767] R13: 00000000004c99b6 R14: 00000000004e1888 R15: 0000000000000004 [ 2445.679936][T21767] Mem-Info: [ 2445.683166][T21767] active_anon:41979 inactive_anon:337 isolated_anon:0 [ 2445.683166][T21767] active_file:9384 inactive_file:38023 isolated_file:0 [ 2445.683166][T21767] unevictable:0 dirty:59 writeback:0 unstable:0 [ 2445.683166][T21767] slab_reclaimable:13713 slab_unreclaimable:88285 [ 2445.683166][T21767] mapped:59281 shmem:403 pagetables:702 bounce:0 [ 2445.683166][T21767] free:1326786 free_pcp:509 free_cma:0 [ 2445.730695][T21767] Node 0 active_anon:165784kB inactive_anon:1344kB active_file:37396kB inactive_file:152092kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:237144kB dirty:240kB writeback:0kB shmem:1612kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 28672kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 2445.760681][T21767] Node 1 active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 2445.789395][T21767] Node 0 DMA free:15908kB min:220kB low:272kB high:324kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2445.819146][T21767] lowmem_reserve[]: 0 2537 2537 2537 2537 [ 2445.825366][T21767] Node 0 DMA32 free:1526644kB min:36104kB low:45128kB high:54152kB reserved_highatomic:0KB active_anon:165772kB inactive_anon:1348kB active_file:37396kB inactive_file:152120kB unevictable:0kB writepending:296kB present:3129332kB managed:2601532kB mlocked:0kB kernel_stack:7160kB pagetables:2760kB bounce:0kB free_pcp:2232kB local_pcp:892kB free_cma:0kB [ 2445.858420][T21767] lowmem_reserve[]: 0 0 0 0 0 [ 2445.863174][T21767] Node 0 Normal free:0kB min:0kB low:0kB high:0kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2445.892710][T21767] lowmem_reserve[]: 0 0 0 0 0 [ 2445.897473][T21767] Node 1 Normal free:3768556kB min:53780kB low:67224kB high:80668kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB writepending:0kB present:3932160kB managed:3870200kB mlocked:0kB kernel_stack:16kB pagetables:4kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 2445.932339][T21767] lowmem_reserve[]: 0 0 0 0 0 [ 2445.937305][T21767] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 2445.952642][T21767] Node 0 DMA32: 1959*4kB (UME) 699*8kB (UME) 1298*16kB (UME) 643*32kB (UME) 374*64kB (UME) 220*128kB (UME) 65*256kB (UME) 8*512kB (UME) 6*1024kB (UME) 6*2048kB (UM) 337*4096kB (UM) = 1526388kB [ 2445.972392][T21767] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 2445.984478][T21767] Node 1 Normal: 3*4kB (UE) 106*8kB (UE) 167*16kB (UM) 101*32kB (UME) 40*64kB (UME) 21*128kB (UE) 6*256kB (UME) 4*512kB (UE) 3*1024kB (UME) 3*2048kB (UME) 914*4096kB (M) = 3768556kB [ 2446.004293][T21767] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2446.014294][T21767] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2446.024603][T21767] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2446.034261][T21767] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2446.043648][T21767] 47819 total pagecache pages [ 2446.048331][T21767] 0 pages in swap cache [ 2446.052558][T21767] Swap cache stats: add 0, delete 0, find 0/0 [ 2446.058624][T21767] Free swap = 0kB [ 2446.062480][T21767] Total swap = 0kB [ 2446.066229][T21767] 1965979 pages RAM [ 2446.070063][T21767] 0 pages HighMem/MovableOnly [ 2446.074825][T21767] 344069 pages reserved [ 2446.079002][T21767] 0 pages cma reserved 16:01:18 executing program 5: socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x8983, 0x0) perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 16:01:18 executing program 4: perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x13, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 16:01:18 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e002600000ee8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:01:18 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000025008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:01:18 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0400000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:01:18 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00be0210008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:01:18 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e002600000fe8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:01:18 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000002, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0400000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) [ 2461.517304][T21789] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. 16:01:18 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026000010e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:01:18 executing program 4: perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x14, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 16:01:18 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000003, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0400000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) [ 2461.656455][T21799] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. 16:01:19 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000004, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0400000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:01:29 executing program 5: socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x8983, 0x0) perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 16:01:29 executing program 4: perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x15, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 16:01:29 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026000060e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:01:29 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000035008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:01:29 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000006, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0400000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:01:29 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000310008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:01:29 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f00000a, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0400000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:01:29 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026000000e8bd6efb020009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:01:29 executing program 4: perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x16, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 16:01:29 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f00000c, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0400000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:01:29 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e0000006f008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:01:29 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026000000e8bd6efb030009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:01:40 executing program 5: socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x8983, 0x0) perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 16:01:40 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f00000e, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0400000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:01:40 executing program 4: perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x17, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 16:01:40 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e000000a00e8108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:01:40 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026000000e8bd6efb040009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:01:40 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000610008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:01:40 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f00000f, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0400000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:01:40 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026000000e8bd6efb050009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:01:40 executing program 4: perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d502890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 16:01:40 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000010, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0400000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:01:40 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010040008040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:01:40 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026000000e8bd6efb060009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:01:47 executing program 5: socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x8983, 0x0) perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={0xffffffffffffffff, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 16:01:47 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000060, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0400000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:01:47 executing program 4: perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x78) 16:01:47 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026000000e8bd6efb070009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:01:47 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010028108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:01:47 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000a10008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:01:47 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f0000f0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0400000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:01:47 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026000000e8bd6efb080009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:01:47 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000300, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0400000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:01:48 executing program 4: perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x200007a8) 16:01:48 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010038108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:01:48 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000600, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0400000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:01:57 executing program 5: socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x8983, 0x0) perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={0xffffffffffffffff, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 16:01:57 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026000000e8bd6efb090009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:01:57 executing program 4: perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x3, 0x0, 0x6, 0x7f, 0x0, 0x80000001, 0x80020, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0x6, 0x7}, 0x12830, 0x2000000003, 0x6, 0x7, 0x4e1c8000000000, 0x639d, 0xf42}, r0, 0x0, 0xffffffffffffffff, 0x8) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r1, 0x18000000000002a0, 0x30, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be931d0dcbbc1fdb34bc4261d3b6e638f9f95", 0x0, 0x100, 0x0, 0x0, 0xed, &(0x7f0000000000), &(0x7f0000000100)="e916c4d8cd02910101118e078a89632acc6ca02f77f082be2e30ec88b4a9ae02f64828fdaf770da255d08202bf5125b858cca1d63efcf8f04ab453a49f3dbb31fbffc82fabdf6ad9bbd575c105d9cd0864c94c807ce4ba54aa1f36d66c6d5f153e681b606dcfa387ad126885d3dab750d4fc6a6363a30d45d3e08be042963863947017ed5d0667f3fc2d57a5f413929b78868b22ea2b7d209d7af46da21a69bd3e6f9b8bcbb12424c3b2dc1bc63c24b02e471f96f930c77a7e01693a6665aecf0a5ad20e52ee7cc18e16b64bc29fe15a01b76bd4c19f50ddfba4833cdb767eaec3f6d8d8c7e43393b72337de46"}, 0x40) 16:01:57 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f0006e6, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0400000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:01:57 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010048108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:01:57 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000c10008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:01:57 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026000000e8bd6efb0a0009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:01:57 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000a00, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0400000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:01:57 executing program 4: r0 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000940)={r0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000900)='ppp0.-\x00'}, 0x30) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000008c0)={0x0, r1}, 0x10) perf_event_open(&(0x7f00000002c0)={0x2, 0xff51, 0x4b, 0xfe, 0x0, 0x5c, 0x0, 0x0, 0x20410, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0xfff, 0x7, 0x891f139ce71df799, 0x7ff, 0xffffffff, 0x6}, r0, 0x1, r1, 0x3) perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 16:01:57 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010068108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:01:57 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000c00, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0400000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:01:57 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026000000e8bd6efb0b0009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:02:06 executing program 5: socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x8983, 0x0) perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={0xffffffffffffffff, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 16:02:06 executing program 4: perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) r1 = socket$kcm(0x2b, 0x1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.evefts\x00\xc6t\xb8\xa6\xa9\xe8b\x94k\xeaXW5*_\xc3\xa6\x8e\xa2\xfd\x03A\xf40C|t\xfc\xd0$\xac<\xb9m\x18\xbf\x9bp\x9a\xea\x16\x7f\x9f\x1e\x18$\xc6\xa9L6\xb0\xda\x1f\x00q\x9d\xa6T\fX\xa0\xc9\x03\xd5GU\xbd\b[\xc3PE\xac\xb2\xbe\x0e\xe3\xc8\xcf9\x1aRR$\x1e55\xce\xc5|\x0e\xe6z,\xd8*\x8b\xf1\xaf\xe6|g\v\x96d i~\x10fW\xd3[\xffYfC\xf9\xa5\x8arN\xdb30x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r4, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r5 = socket$kcm(0x2b, 0x1, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.evefts\x00\xc6t\xb8\xa6\xa9\xe8b\x94k\xeaXW5*_\xc3\xa6\x8e\xa2\xfd\x03A\xf40C|t\xfc\xd0$\xac<\xb9m\x18\xbf\x9bp\x9a\xea\x16\x7f\x9f\x1e\x18$\xc6\xa9L6\xb0\xda\x1f\x00q\x9d\xa6T\fX\xa0\xc9\x03\xd5GU\xbd\b[\xc3PE\xac\xb2\xbe\x0e\xe3\xc8\xcf9\x1aRR$\x1e55\xce\xc5|\x0e\xe6z,\xd8*\x8b\xf1\xaf\xe6|g\v\x96d i~\x10fW\xd3[\xffYfC\xf9\xa5\x8arN\xdb30x0, 0x0, &(0x7f00000004c0), 0x0, 0x0, 0x0, &(0x7f0000000540)=0x1, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000004480)={0xffffffffffffffff, 0x10, &(0x7f0000004440)={&(0x7f0000004340)=""/210, 0xd2, r7}}, 0x10) r8 = socket$kcm(0x2b, 0x1, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.evefts\x00\xc6t\xb8\xa6\xa9\xe8b\x94k\xeaXW5*_\xc3\xa6\x8e\xa2\xfd\x03A\xf40C|t\xfc\xd0$\xac<\xb9m\x18\xbf\x9bp\x9a\xea\x16\x7f\x9f\x1e\x18$\xc6\xa9L6\xb0\xda\x1f\x00q\x9d\xa6T\fX\xa0\xc9\x03\xd5GU\xbd\b[\xc3PE\xac\xb2\xbe\x0e\xe3\xc8\xcf9\x1aRR$\x1e55\xce\xc5|\x0e\xe6z,\xd8*\x8b\xf1\xaf\xe6|g\v\x96d i~\x10fW\xd3[\xffYfC\xf9\xa5\x8arN\xdb30x0, 0x0, &(0x7f0000000140)={0x6, 0x4}, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x7, 0x5, 0xd519}, &(0x7f00000001c0)=0x4bb0806a, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=0x8}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x2f, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="b70200000b000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000002f3753a9d3c03b56b1d9f6ca25265586f2043649b89ec9b91dc174d5701424fa24052b2fe97409000000058e4bf0391702519694cd73608fadb119a5ffc8f1460c55bcce412bc1cc14a1f64ad78f7efc6f2233bacac999cbb0468424c2e8ab6cafc7bed227046c4ef20a09f4a46c382c1e7016a71a704c7b3cddf5306b500fda7b4a72bedb7c33a4c7e1f0c42819df5c26d28b450e2a9980b62fe2a57ac040892270e005a2e4ead36494a405cb500badb2b544ed823d3dc390934ea9062dd57a13ddb0ce78dbf6619bb0148e4dbb7ac738e4eb6e8061fa9d376fd0a4abf451611aa4aca07c12035ab1b2b55c098a78182c4651c0c3b019f94858fb0dc2ebd1ec689d889bf0839369cf62791d3bbd6c31262839a19f99e860dbed7b9493f9c8c764310e79aa8bd1e9e23f1ed38f91e6a53d265a75ec4fcd4d8b2d06c73ca7efec28b59fbeccfa1dbcd25032f328223bc33acc2449b6e9da679198772ecf1cc7f3886628dcc16c8ff17ff6ca528ef87741fc3e0f242a1037df395cbf0a9912d1b6d0bbc1482efe0712fac17f70f20bb9c6aef2d925d788d93d6c22aee7d387a7eaaada553f98a010533f2aa5a5cea2bdb19fc8c42e5d714ea143ab8a567bf262b03872602bfd2f35062c812cdc2eaf4a1ab92a419708546a70395497f822b5f06f0df2ba672d883b9fcfd34b7f4dc24bb3abdcb6f3e383dad4bc980c08e8e01099afd19cf916b0b9ab158153475d393aac65059df3c2f3d1ba5c9dc1c7e70ec14dd5af0b5b1a748ef9ebde08f72b53a54d2d66f41c5aa1fb1d91dfd6146e77bce93c45de0a0b19580a0ff90bdace7f549b8dcc95be4d596423ca8db0831932067edf32e58beaaa8625b91c05000000000000000000"], &(0x7f0000000340)='syzka3\xe6$\x01\x00', 0x0, 0x384, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000300)={0x0, 0xffffffff}, 0x0, r2}, 0x2fb) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100, 0x0, 0x2e, 0x0, &(0x7f00000000c0)="51b6377d32dd689e493286b3de6802004d197aec4f8558c0e918a3c8f7cdc035061c3abcb95a3f17c0a32cb51b5e"}, 0x40) 16:02:21 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00003f10008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:02:21 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f006558, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0400000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:02:21 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026000000e8bd6efb100009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:02:22 executing program 4: perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$kcm(0x2b, 0x1, 0x0) socket$kcm(0x29, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.evefts\x00\xc6t\xb8\xa6\xa9\xe8b\x94k\xeaXW5*_\xc3\xa6\x8e\xa2\xfd\x03A\xf40C|t\xfc\xd0$\xac<\xb9m\x18\xbf\x9bp\x9a\xea\x16\x7f\x9f\x1e\x18$\xc6\xa9L6\xb0\xda\x1f\x00q\x9d\xa6T\fX\xa0\xc9\x03\xd5GU\xbd\b[\xc3PE\xac\xb2\xbe\x0e\xe3\xc8\xcf9\x1aRR$\x1e55\xce\xc5|\x0e\xe6z,\xd8*\x8b\xf1\xaf\xe6|g\v\x96d i~\x10fW\xd3[\xffYfC\xf9\xa5\x8arN\xdb30x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)='syzkaller\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r0) r5 = socket$kcm(0x2b, 0x1, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.evefts\x00\xc6t\xb8\xa6\xa9\xe8b\x94k\xeaXW5*_\xc3\xa6\x8e\xa2\xfd\x03A\xf40C|t\xfc\xd0$\xac<\xb9m\x18\xbf\x9bp\x9a\xea\x16\x7f\x9f\x1e\x18$\xc6\xa9L6\xb0\xda\x1f\x00q\x9d\xa6T\fX\xa0\xc9\x03\xd5GU\xbd\b[\xc3PE\xac\xb2\xbe\x0e\xe3\xc8\xcf9\x1aRR$\x1e55\xce\xc5|\x0e\xe6z,\xd8*\x8b\xf1\xaf\xe6|g\v\x96d i~\x10fW\xd3[\xffYfC\xf9\xa5\x8arN\xdb30x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0xc0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=0x5, 0x0, 0x0, 0x0, &(0x7f00000004c0), 0x0, 0x0, 0x0, &(0x7f0000000540)=0x1, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000004480)={0xffffffffffffffff, 0x10, &(0x7f0000004440)={&(0x7f0000004340)=""/210, 0xd2, r4}}, 0x10) r5 = socket$kcm(0x2b, 0x1, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.evefts\x00\xc6t\xb8\xa6\xa9\xe8b\x94k\xeaXW5*_\xc3\xa6\x8e\xa2\xfd\x03A\xf40C|t\xfc\xd0$\xac<\xb9m\x18\xbf\x9bp\x9a\xea\x16\x7f\x9f\x1e\x18$\xc6\xa9L6\xb0\xda\x1f\x00q\x9d\xa6T\fX\xa0\xc9\x03\xd5GU\xbd\b[\xc3PE\xac\xb2\xbe\x0e\xe3\xc8\xcf9\x1aRR$\x1e55\xce\xc5|\x0e\xe6z,\xd8*\x8b\xf1\xaf\xe6|g\v\x96d i~\x10fW\xd3[\xffYfC\xf9\xa5\x8arN\xdb30xffffffffffffffff}) sendmsg(r12, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000001100)=[{&(0x7f0000000e40)="f82b5e4213250eee0f682aba4479351ca042995804263db2227e3ee580e6f162aff8a7634fdee81d5fe74318bc16c898f8e446654c590279b76946a00407f0259b8308f9ef6255fd874672accd27d606fb68f94fccd754cf3aa5e92753b1dffd01ebe7957f0a8a3af7f589a9e4fe4229de802a1d86232eadc9071ad0dc6168ec02068f7090ce4f96a5206f", 0x8b}, {&(0x7f0000000ac0)="62ab4b0d5dd42b90f3c15591a6c60771a84154dfa81c3b51db", 0x19}, {&(0x7f0000000f00)="d32db09dfc55a8df9623789b066a7b064e5751935dbc79072f6e7b32b10d9f2a317e0b794a509c37a1cbe66c4639bdd186ab0f7fc3a389ef092715c71db96ab4cd0a7cf47e3bafe9a23204f4f55c048221a8c0bc", 0x54}, {&(0x7f0000000f80)="a6021de29835bab817c8531a5e56fabe7b72fcff8994dc8d4fc26b54f94f9f60067554916d757740911320400701aab6e0206b97794b919e81303f40403bd58b449f78dd44020a17403ca6d1783c9545f6ed7317a6487cc43628b4e22b0a0d252601ae6352f19692505daa664f5389bd8044acd317c64eeaf5e9f59ee1d1954c74c48f9c3d59f0a2", 0x88}, {&(0x7f0000000b00)="827565d299dcbe3437ff6fd4b0e6d301", 0x10}, {&(0x7f0000001040)="a08bb29aafe5880166feb722e8b3e4b50271de4208a9ecc44e1f03e7c85fb17063c80cea7805ff1431a806ef48af7d2372bebaf2dfc0c31a4d0fa8e947c1ef3e2f4007d67272a130721804dd08639aa8861fa4c13c3086919e651bbb97085c8fc840def7d3ad3fc8eb435c9fcce58dba4ef14dc0cb81be4233a8c53feb154f7b53f2fd3d919000260c83ffd9f99849beb9445db2bfae5e", 0x97}], 0x6, &(0x7f0000001180)=[{0x90, 0x1, 0x1d, "cccdab49c707611e35960dd137ac1dd62f5645d38da6bb430e0434c1a4380098259558e5eff16c2e1847aa4fbf7e06d5a1051314d036de9057b2038165e4948bbc3525362e0ea50b6679c97a93da11e89eb61159e8600917729b0055a2d5ad968cfdf71b2392a02906e79208850167873a573c0be8df759a92e1b7ee58"}, {0xb0, 0x30, 0x7fff, "34addd38c2d7cba9176a25794e2b82ad1059c06d7e80ec60249a893c9ddb010365638504becae57a0bdcfd66c7c0fc8e0b4187f338496b3404b137a7d702706eb3aa43f292b3f05f424a345521bc3bfd33cce25eda434a6560a0178b93c824fed63ae4de0aaae9785bec48a84d85c786cb17b2164df5a3f12751ab2f599b89dc7228d12d6a6fc81e091e1fb4d3548eb50ce90f5c9ce1c1199a09c2af"}, {0x78, 0x0, 0x101, "7eb8a8b1c41310734b1845a528f177e5920268e3a2d07b0dd64ed3a7666e4fe6473b050e190cb855eba9ce51968f32815408e1f64215ed54df08c12e43d875cc33130db8093465b978d0ea8d699246c4ed1c9f38320547d9d98211b12d9e4aac983828c3a982"}, {0x10, 0x11, 0x7}, {0x60, 0x38e, 0x1642bbdf, "c18904cb623d26a67dc9300e4ddca8d06ae8525a608ada01a91da4687a44924f087082e5524ae2da626e83b508ee47007dff1880dc8b4721043aa38fe01e61063ac62f4953e8bb120e8321e20c"}, {0xe8, 0x10f, 0x1, "e4fd0081ef928a272d49c9a45e6b2ecc365455d9580f6d749ed64df84092d49c88f71194edfcc0edc53138b139852281a0f38e2437fd056384c26ebbac9830cd259a8de2d7b9d2688a4d47db81979aafc88c847c550c3cbb36e3e7ac307d5cf851d3418588c9852f43ad13ea38edb11fb0068e13de62cc370f0906be8ce4bac347239e77f19d041cc690040efeb940c0d2aab02662b2bb9eba6b6564077e38fe46eaccdd0f40a5d8e419ef7e14002e38e1a9b7b68bcdab3e3ed4fbe141d74a1d9b4010abe8fca6506ae29e0f0e9e0a36a5"}], 0x310}, 0x50) [ 2542.458232][T22167] netlink: 387 bytes leftover after parsing attributes in process `syz-executor.1'. 16:02:39 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008102040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:02:39 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="e03f030010008108040f80ecdb4cb92e0a480e0400000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:02:39 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026000000e8bd6efb170009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) [ 2542.710335][T22189] netlink: 212912 bytes leftover after parsing attributes in process `syz-executor.1'. 16:02:46 executing program 5: socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x8983, 0x0) perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="b70200000b000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000002f3753a9c3b630bf92dd696125265586f2043649b89ec9b91dc174d5701424fa24052b2fe97409000000058e4bf0391702519694cd73608fadb119a5ffc8f1460c55bcce412bc1cc14a1f64ad78f7efc6f2233bacac999cbb0468424c2e8ab6cafc7bed227046c4ef20a09f4a46c382c1e7016a71a704c7b3cddf5306b500fda7b4a72bedb7c33a4c7e1f0c42819df5c26d28b450e2a9980b62fe2a57ac040892270e005a2e4ead36494a405cb500badb2b544edf5499098896b66851b823d3dc390934ea9062dd57a13ddb0ce78dbf6619bb0148e4dbb7ac738e4eb6e8061fa9d376fd0a4abf451611aa4aca07c12035ab1b2b55c098a78182c4651c0c3b019f94858fb0dc2ebd1ec689d889bf0839369cf62791d3bbd6c31262839a19f99e860dbed7b9493f9c8c764310e79aa8bd1e9e23f1ed38f91e6a53d265a75ec4fcd4d8b2d06c73ca7efec28b59fbeccfa1dbcd25032f328223bc33acc2449b6e9da679198772ecf1cc7f3886628dcc16c8ff17ff6ca528ef87741fc3e0f242a1037df395cbf0a9912d1b6d0bbc1482efe0712fac17f70f20bb9c6aef2d925d788d93d6c22aee7d387a7eaaada553f98a010533f2aa5a5cea2bdb19fc8c42e5d714ea143ab8a567bf262b03872602bfd2f35062c812cdc2eaf4a1ab92a419708546a70395497f822b5f06f0df2ba672d883b9fcfd34b7f4dc24bb3abdcb6f3e383dad4bc980c08e8e01099afd19cf916b0b9ab158153475d393aac65059df3c2f3d1ba5c9dc1c7e70ec14dd5af0b5b1a748ef9ebde08f72b53a54d2d66f41c5aa1fb1d91dfd6146e77bce93c45de0a0b19580a0ff90bdace7f549b8dcc95be4d596423ca8db0831932067edf32e58beaaa8625b91c05"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r1, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000006c0), 0x0, 0x100}, 0x40) 16:02:46 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026000000e8bd6efb180009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:02:46 executing program 4: r0 = perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = socket$kcm(0x2b, 0x1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.evefts\x00\xc6t\xb8\xa6\xa9\xe8b\x94k\xeaXW5*_\xc3\xa6\x8e\xa2\xfd\x03A\xf40C|t\xfc\xd0$\xac<\xb9m\x18\xbf\x9bp\x9a\xea\x16\x7f\x9f\x1e\x18$\xc6\xa9L6\xb0\xda\x1f\x00q\x9d\xa6T\fX\xa0\xc9\x03\xd5GU\xbd\b[\xc3PE\xac\xb2\xbe\x0e\xe3\xc8\xcf9\x1aRR$\x1e55\xce\xc5|\x0e\xe6z,\xd8*\x8b\xf1\xaf\xe6|g\v\x96d i~\x10fW\xd3[\xffYfC\xf9\xa5\x8arN\xdb30x0, 0x0, &(0x7f00000003c0)={0x7, 0x2}, 0x0, 0x0, &(0x7f0000000400)={0x5, 0xd, 0x8, 0x8001}, &(0x7f0000000440)=0x3, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)}}, 0x10) r5 = socket$kcm(0x2b, 0x1, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.evefts\x00\xc6t\xb8\xa6\xa9\xe8b\x94k\xeaXW5*_\xc3\xa6\x8e\xa2\xfd\x03A\xf40C|t\xfc\xd0$\xac<\xb9m\x18\xbf\x9bp\x9a\xea\x16\x7f\x9f\x1e\x18$\xc6\xa9L6\xb0\xda\x1f\x00q\x9d\xa6T\fX\xa0\xc9\x03\xd5GU\xbd\b[\xc3PE\xac\xb2\xbe\x0e\xe3\xc8\xcf9\x1aRR$\x1e55\xce\xc5|\x0e\xe6z,\xd8*\x8b\xf1\xaf\xe6|g\v\x96d i~\x10fW\xd3[\xffYfC\xf9\xa5\x8arN\xdb30x0}, 0x80, &(0x7f0000005680)=[{&(0x7f0000005640)=""/34, 0x22}], 0x1}, 0x1ecc58557d7e6a15) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x400, @multicast1}, 0x10, 0x0, 0x23e, &(0x7f0000005700)=[@ip_tos_u8={{0xb, 0x0, 0x1, 0x7}}, @ip_tos_int={{0x0, 0x0, 0x1, 0x3}}, @ip_pktinfo={{0x0, 0x0, 0x8, {r1, @multicast2, @loopback}}}, @ip_tos_u8={{0x0, 0x0, 0x1, 0x4}}, @ip_tos_u8={{0x0, 0x0, 0x1, 0x1f}}, @ip_tos_int={{0x0, 0x0, 0x1, 0x801ff}}, @ip_ttl={{0x0, 0x0, 0x2, 0x101}}, @ip_tos_int={{0x0, 0x0, 0x1, 0x80000001}}, @ip_pktinfo={{0x0, 0x0, 0x8, {0x0, @loopback, @dev={0xac, 0x14, 0x14, 0xb}}}}], 0x20}, 0x800) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x5c, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='sy\x90kaller\x00^\xd0\xb1\xdd\xeb\xc5\xe2\xf2.b\xfc\x9e\xec4\xeb\xc2\x05\x12\x86\n\xf1h\xaah\x1b\x1c\x11\x8f\xe4\xb9\xe9\x8d1\x01\xe04\x92\x05D8R\xc2\x1e\xebQ\xc2\xce\xcf3\xf9\xdc\x1fDE\x1fqvd\xebqS\x92$M\xb0g\xea\xcfc\xcb\xfb\x00\xd1\xa1H\x90x;s\x14V\xeb\xc8O\x9c\x81\x10\x9d\xdeXt\x9f~\xe0)M\xb7\x13\x80w\rX\x01\xe9\x82\xc4\xd7j\x97\xdb\xae\x8fm\fh\xc7\xdecl\xa4\xaf\xbbB\xb6\x86\x18\xa3\xa64^\xb7-<\x1d\x15\x10\t\x89:\xe2\x88\xb4|a\x11v\xcc\"n\xcf\xba\xb7\x02\x01\x18\x11%\xb7\x12\xc9M\xba\x8f\xa8\xdc\x01\x18\x94\r?hG\xb5\xb4\x85\x17\xa7\xd0\x11\xd9\xb1>\x85\"\x8358\xac(\xabtu4\xbd\xdc\\jP\xb2\x9d\x05\xa4\xe2\x9c\xfb\xb6\xbd\xffF\xe6\x90\x1c\xc7\xb1\xa3\x16\x9b+\x9af\x1e\xa2\x19\xa13|/\xa6\x15\xe2\xcc\x00'/251, 0x0, 0x0, 0x0, 0x0, 0x0, [], r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x18000000000002a0, 0xffffffffffffff93, 0xfffffd99, &(0x7f0000000380)="b9ff03000005698cb89e40f088a8d501b8227a090000005ad0b942890600de0500000077fbc02e7f11c7", 0x0, 0x100, 0x0, 0x0, 0xbe, &(0x7f00000003c0)="f67928cc8938a6baef0ee3bc5572441afac9a35954e0e0037be5e055b8b01ed6b4f8ea73d59f10072480400fdd15bd1fd7c26692371d06ae3811b051", &(0x7f00000002c0)="906b546158ea466db32eebb7afd815e0efde8a1ab2c710856b213930f0f2dceb04d2637a8f2931094dad3db522eb87e7ac7e427281db907d1e5968b8cc6929969e410d3c8bc7d08ac5543212b706d008f89cb30d90f150afc258580d5faeeb3027746ed97294d786b30413d876d3d4937110313bf3ef0f87d326a920e53d075c70c441cac70d63f9036a714ce14bd4d9d219ff5860baf75544df9b3cc73d576ce8836e84f1a7c07e4f0484e106f230e36756d844c87faf09159e3ed465bb"}, 0x1e) 16:02:47 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026000000e8bd6efb1a0009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:02:47 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000007008108040f80ecdb4cb92e0a480e0400000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:02:48 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e0000000a008108040f80ecdb4cb92e0a480e0400000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:02:53 executing program 5: socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x8983, 0x0) perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="b70200000b000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000002f3753a9c3b630bf92dd696125265586f2043649b89ec9b91dc174d5701424fa24052b2fe97409000000058e4bf0391702519694cd73608fadb119a5ffc8f1460c55bcce412bc1cc14a1f64ad78f7efc6f2233bacac999cbb0468424c2e8ab6cafc7bed227046c4ef20a09f4a46c382c1e7016a71a704c7b3cddf5306b500fda7b4a72bedb7c33a4c7e1f0c42819df5c26d28b450e2a9980b62fe2a57ac040892270e005a2e4ead36494a405cb500badb2b544edf5499098896b66851b823d3dc390934ea9062dd57a13ddb0ce78dbf6619bb0148e4dbb7ac738e4eb6e8061fa9d376fd0a4abf451611aa4aca07c12035ab1b2b55c098a78182c4651c0c3b019f94858fb0dc2ebd1ec689d889bf0839369cf62791d3bbd6c31262839a19f99e860dbed7b9493f9c8c764310e79aa8bd1e9e23f1ed38f91e6a53d265a75ec4fcd4d8b2d06c73ca7efec28b59fbeccfa1dbcd25032f328223bc33acc2449b6e9da679198772ecf1cc7f3886628dcc16c8ff17ff6ca528ef87741fc3e0f242a1037df395cbf0a9912d1b6d0bbc1482efe0712fac17f70f20bb9c6aef2d925d788d93d6c22aee7d387a7eaaada553f98a010533f2aa5a5cea2bdb19fc8c42e5d714ea143ab8a567bf262b03872602bfd2f35062c812cdc2eaf4a1ab92a419708546a70395497f822b5f06f0df2ba672d883b9fcfd34b7f4dc24bb3abdcb6f3e383dad4bc980c08e8e01099afd19cf916b0b9ab158153475d393aac65059df3c2f3d1ba5c9dc1c7e70ec14dd5af0b5b1a748ef9ebde08f72b53a54d2d66f41c5aa1fb1d91dfd6146e77bce93c45de0a0b19580a0ff90bdace7f549b8dcc95be4d596423ca8db0831932067edf32e58beaaa8625b91c05"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r1, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000006c0), 0x0, 0x100}, 0x40) 16:02:53 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026000000e8bd6efb1b0009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:02:53 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008104040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:02:53 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e0000000f008108040f80ecdb4cb92e0a480e0400000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:03:01 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e02000010008108040f80ecdb4cb92e0a480e0400000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:03:01 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00586510008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:03:01 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026000000e8bd6efb1c0009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:03:01 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008105040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:03:01 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x3b, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e00f80ecdb4cb904044865160b00170010000000000004140e000a0002000000dc2976d153b4", 0x235}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000040)={r1}) perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20000000000000a5, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) sendmsg$kcm(r1, &(0x7f00000001c0)={&(0x7f0000000100)=@sco={0x1f, {0xd8, 0x3f, 0x8, 0x6, 0x0, 0x7f}}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000380)="ee276d71375b7572f09dd94f6fc7382fd1799a7016887c2e435a5627079e0009c463dc6097fae0ea183c88918afb58076f4acd165f3a4e7131057f3c2a411429696b1c7a0b9f5b69e0357b1135cffb4e5e93ec399c2fadaf4ad6bd2737da17122481812c2b52eec77693b6910d70d92411371e6fd5c2ef11695afe72ebf9c83a08aab931e4a533b4b58af32830e776affe9b378da7d507a18950200e8ed4663afac8ece93a250f86bb69c830f98657ffa86314d61331ec94906363b57a9ac15addc0c51044159ce4d0fe7c3969cd8e3028c7d8b99cdbc2616c86b416420c9c3214ddc772d46fd22bb21547a9c5515d47ed", 0xf1}, {&(0x7f0000000180)="99aa084de7b03bee08654f25bc60ff67f52a01a5840a4d9d8334a27a396c8b78e31b8f898bc201fcfd33", 0x2a}, {&(0x7f0000000480)="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", 0xfe}, {&(0x7f0000000280)="2ac91ab8645024bcc75ccf5264bb260b5870ffb2edfca936d626f6251fec4be946c96deddb7e55fe980d8cd34baeecfac67757e9f4073f3daa8455e3de2190f5802ae9ed4b4937ac328be9def66e9aa09128dc7afa86a548f26dab00702c05946ed2542d0132fc6b0ffe4d17941ef27c2a5b5c02cadc05e99582db1868de", 0x7e}, {&(0x7f0000000e40)="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", 0x1000}], 0x5}, 0x8028) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 16:03:01 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026000000e8bd6efb1d0009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) [ 2564.123532][T22268] netlink: 'syz-executor.4': attribute type 23 has an invalid length. [ 2564.126388][T22269] netlink: 510 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2564.142275][T22268] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 16:03:01 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e03000010008108040f80ecdb4cb92e0a480e0400000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) [ 2564.194623][T22272] netlink: 'syz-executor.4': attribute type 23 has an invalid length. [ 2564.210075][T22272] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 16:03:01 executing program 4: r0 = perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.evefts\x00\xc6t\xb8\xa6\xa9\xe8b\x94k\xeaXW5*_\xc3\xa6\x8e\xa2\xfd\x03A\xf40C|t\xfc\xd0$\xac<\xb9m\x18\xbf\x9bp\x9a\xea\x16\x7f\x9f\x1e\x18$\xc6\xa9L6\xb0\xda\x1f\x00q\x9d\xa6T\fX\xa0\xc9\x03\xd5GU\xbd\b[\xc3PE\xac\xb2\xbe\x0e\xe3\xc8\xcf9\x1aRR$\x1e55\xce\xc5|\x0e\xe6z,\xd8*\x8b\xf1\xaf\xe6|g\v\x96d i~\x10fW\xd3[\xffYfC\xf9\xa5\x8arN\xdb3r2}) sendmsg$kcm(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000080)="ee69f60b43c474fb2ab939d771ee10de1dc4351512d3de38c4511daa3068177daa0c4c49459be907b2529d4057567a0b2f093285483722c4a7a332991290b6274c1145d250b518b838fed273dbfbb0bea1f59b443411d59b19b4df837608d2af075fcf1b737b5088d180998233", 0x6d}, {&(0x7f0000000100)="a3859986af6d0146825be4bf39e84da2780bea33656d9ae24f074efc7c3be385b7dde2", 0x23}, {&(0x7f0000000140)="6cc54b68e92e5b00298d72bd1508264cb0277dc3277a91679079d55b64b6295b3e8e209b9e973b12cd959fe07c0acc308d0f5e2809c40ecf256740", 0x3b}, {&(0x7f0000000180)="0cf6630fff413cf94de6084bcc79449b161070fad6622afdd6d2d12465b02b7eb9af40aac3274b8ebaa638679b556edb4e881e52ac19a7408b4f456e726c", 0x3e}, {&(0x7f0000000380)="4b9cf79821c1beff1ad98871eb432403ce087082fa1f3fae2e1fcc3f09739586108a935e9d67e77820b34fc828c86f53571eab7783d4480106f10194b3d211e6a3ecc6030fdb98fdb3350f4c9001058891b1837831e4c701fb401b917f673e1b03a2b69c0de07edb40f3dd4800145e8346396790d4f6f231a00bef7d29dcc48d6256c9e15fdbcf0da834ebd0d5e0fe2e95583ed6fc0b6f36693d3c23f1ac92f36edca35d85ccf9e85cfe58c3e3e0025b61164b4aa0039eaad32b469f1dca3000acf0060f46fda5ce9e8449cebda2bebc528ae08e37605146e9c1eca0ec", 0xdd}, {&(0x7f00000001c0)="08583de17423892e9bb3f851f5560258b0cb4008bd228b9c70e46d4a87f7f059f833f7cdfbe97eed38aaaf8588c8c9e7", 0x30}], 0x6, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0xb0}, 0x40080) 16:03:33 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e0000001000810d040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:03:33 executing program 5: socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x8983, 0x0) perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r1, 0x18000000000002a0, 0x10, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501", 0x0, 0x100}, 0x40) [ 2596.137061][T22407] netlink: 24574 bytes leftover after parsing attributes in process `syz-executor.1'. 16:03:33 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026000000e8bd6efb280009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:03:33 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2ef0000010008108040f80ecdb4cb92e0a480e0400000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) [ 2596.264227][T22415] netlink: 'syz-executor.4': attribute type 23 has an invalid length. [ 2596.283886][T22417] netlink: 61438 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2596.301643][T22415] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 16:03:33 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e0000001000810f040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:03:33 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00030010008108040f80ecdb4cb92e0a480e0400000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) [ 2596.338276][T22415] netlink: 'syz-executor.4': attribute type 23 has an invalid length. 16:03:33 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026000000e8bd6efb290009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) [ 2596.421204][T22415] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 16:03:33 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008110040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) [ 2596.503815][T22415] netlink: 'syz-executor.4': attribute type 23 has an invalid length. [ 2596.524156][T22432] netlink: 196606 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2596.537266][T22415] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 16:03:46 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000360008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:03:46 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026000000e8bd6efb2a0009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:03:46 executing program 4: perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) r1 = socket$kcm(0x2b, 0x1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.evefts\x00\xc6t\xb8\xa6\xa9\xe8b\x94k\xeaXW5*_\xc3\xa6\x8e\xa2\xfd\x03A\xf40C|t\xfc\xd0$\xac<\xb9m\x18\xbf\x9bp\x9a\xea\x16\x7f\x9f\x1e\x18$\xc6\xa9L6\xb0\xda\x1f\x00q\x9d\xa6T\fX\xa0\xc9\x03\xd5GU\xbd\b[\xc3PE\xac\xb2\xbe\x0e\xe3\xc8\xcf9\x1aRR$\x1e55\xce\xc5|\x0e\xe6z,\xd8*\x8b\xf1\xaf\xe6|g\v\x96d i~\x10fW\xd3[\xffYfC\xf9\xa5\x8arN\xdb30x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r4, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$TUNSETIFINDEX(r2, 0x400454da, &(0x7f0000000040)=r4) 16:03:46 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00060010008108040f80ecdb4cb92e0a480e0400000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:03:46 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008113040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:03:46 executing program 5: socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x8983, 0x0) perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="b70200000b000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000002f3753a9c3b630bf92dd696125265586f2043649b89ec9b91dc174d5701424fa24052b2fe97409000000058e4bf0391702519694cd73608fadb119a5ffc8f1460c55bcce412bc1cc14a1f64ad78f7efc6f2233bacac999cbb0468424c2e8ab6cafc7bed227046c4ef20a09f4a46c382c1e7016a71a704c7b3cddf5306b500fda7b4a72bedb7c33a4c7e1f0c42819df5c26d28b450e2a9980b62fe2a57ac040892270e005a2e4ead36494a405cb500badb2b544edf5499098896b66851b823d3dc390934ea9062dd57a13ddb0ce78dbf6619bb0148e4dbb7ac738e4eb6e8061fa9d376fd0a4abf451611aa4aca07c12035ab1b2b55c098a78182c4651c0c3b019f94858fb0dc2ebd1ec689d889bf0839369cf62791d3bbd6c31262839a19f99e860dbed7b9493f9c8c764310e79aa8bd1e9e23f1ed38f91e6a53d265a75ec4fcd4d8b2d06c73ca7efec28b59fbeccfa1dbcd25032f328223bc33acc2449b6e9da679198772ecf1cc7f3886628dcc16c8ff17ff6ca528ef87741fc3e0f242a1037df395cbf0a9912d1b6d0bbc1482efe0712fac17f70f20bb9c6aef2d925d788d93d6c22aee7d387a7eaaada553f98a010533f2aa5a5cea2bdb19fc8c42e5d714ea143ab8a567bf262b03872602bfd2f35062c812cdc2eaf4a1ab92a419708546a70395497f822b5f06f0df2ba672d883b9fcfd34b7f4dc24bb3abdcb6f3e383dad4bc980c08e8e01099afd19cf916b0b9ab158153475d393aac65059df3c2f3d1ba5c9dc1c7e70ec14dd5af0b5b1a748ef9ebde08f72b53a54d2d66f41c5aa1fb1d91dfd6146e77bce93c45de0a0b19580a0ff90bdace7f549b8dcc95be4d596423ca8db0831932067edf32e58beaaa8625b91c05"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r1, 0x18000000000002a0, 0x18, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de05000000", 0x0, 0x100}, 0x40) 16:03:46 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2ee6060010008108040f80ecdb4cb92e0a480e0400000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:03:46 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026000000e8bd6efb2b0009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:03:46 executing program 4: perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) r1 = socket$kcm(0x2b, 0x1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.evefts\x00\xc6t\xb8\xa6\xa9\xe8b\x94k\xeaXW5*_\xc3\xa6\x8e\xa2\xfd\x03A\xf40C|t\xfc\xd0$\xac<\xb9m\x18\xbf\x9bp\x9a\xea\x16\x7f\x9f\x1e\x18$\xc6\xa9L6\xb0\xda\x1f\x00q\x9d\xa6T\fX\xa0\xc9\x03\xd5GU\xbd\b[\xc3PE\xac\xb2\xbe\x0e\xe3\xc8\xcf9\x1aRR$\x1e55\xce\xc5|\x0e\xe6z,\xd8*\x8b\xf1\xaf\xe6|g\v\x96d i~\x10fW\xd3[\xffYfC\xf9\xa5\x8arN\xdb30x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, r6, 0x0, 0x0, 0x0, r7}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00', r7}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r1, r5, 0x0, 0x9, &(0x7f00000000c0)='\\wlan1^\xd8\x00', r8}, 0x30) [ 2678.602569][T22723] netlink: 196606 bytes leftover after parsing attributes in process `syz-executor.1'. 16:04:57 executing program 5: socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x8983, 0x0) perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r1, 0x18000000000002a0, 0x1e, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72b", 0x0, 0x100}, 0x40) 16:04:57 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350609000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:04:57 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00040010008108040f80ecdb4cb92e0a480e0400000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:04:57 executing program 4: perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000015e00)={&(0x7f0000015c00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000015d80)=[{&(0x7f0000015c80)=""/157, 0x9d}, {&(0x7f0000015d40)}], 0x2, &(0x7f0000015dc0)=""/39, 0x27}, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x17, 0x1, &(0x7f0000000b40)=ANY=[@ANYPTR64=&(0x7f0000015e40)=ANY=[]], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r1, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 16:04:57 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108350f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:04:57 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00060010008108040f80ecdb4cb92e0a480e0400000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:04:57 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350a09000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:05:07 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000410008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:05:07 executing program 4: perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f00000000c0)=@in={0x2, 0x0, @remote}, 0x80, &(0x7f00000003c0)=[{&(0x7f00000004c0)}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) sendmsg(r2, &(0x7f00000002c0)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x2, @random="be1706fb20d9", 'veth1_to_bond\x00'}}, 0x80, &(0x7f0000000240)=[{&(0x7f00000004c0)="c6053e27adda289123481c349f2622e1c39feeb34e8af7eca83b3b27ce97f2e34dc80a9b21cd73e19c51154975aa662000b8ee6ce1c73caec7f258db8778e6a83bdf1dfe41d7c42cf447815074d7c1d9f5d42ef471a533d3d768ced6681d65609c9e6e18c261e9e17ad2932a", 0x6c}, {&(0x7f0000000640)="a0156a3fa5ff3848d2f579ae430a6342d16018267c1b12655641ca244f6d9db366c39411957bdd677682d98a93c9368769b880614bac5c7003b288b4b528d870351be61504e45bd7455db685aa591b1bda3d5bfee43b3372464484f8d65cbf3c060b855b9fdcbd5e304407483f1539c3c3a23867", 0x74}], 0x2, &(0x7f0000001d80)=ANY=[@ANYBLOB="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"], 0x1025}, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f0000000440)={0x4, 0x70, 0x9, 0xff, 0x6, 0x40, 0x0, 0x70, 0x240, 0x8, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000280)}, 0x100, 0x1, 0x0, 0x1, 0x9, 0x200, 0x8}) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2b, 'cpu'}, {0x2d, 'io'}]}, 0x17) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f0000000040)=r4, 0xab) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) sendmsg(r3, &(0x7f0000000080)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000021000000000000000000000095000000000000003d1daf0ceff3eb784574faf9"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r6 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f0000000100)={r3, r5}) sendmsg$kcm(r6, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000017c0)=[{0x0}], 0x1}, 0x0) r7 = socket$kcm(0x2b, 0x1, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.evefts\x00\xc6t\xb8\xa6\xa9\xe8b\x94k\xeaXW5*_\xc3\xa6\x8e\xa2\xfd\x03A\xf40C|t\xfc\xd0$\xac<\xb9m\x18\xbf\x9bp\x9a\xea\x16\x7f\x9f\x1e\x18$\xc6\xa9L6\xb0\xda\x1f\x00q\x9d\xa6T\fX\xa0\xc9\x03\xd5GU\xbd\b[\xc3PE\xac\xb2\xbe\x0e\xe3\xc8\xcf9\x1aRR$\x1e55\xce\xc5|\x0e\xe6z,\xd8*\x8b\xf1\xaf\xe6|g\v\x96d i~\x10fW\xd3[\xffYfC\xf9\xa5\x8arN\xdb30x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r4, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r5 = socket$kcm(0x2b, 0x1, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.evefts\x00\xc6t\xb8\xa6\xa9\xe8b\x94k\xeaXW5*_\xc3\xa6\x8e\xa2\xfd\x03A\xf40C|t\xfc\xd0$\xac<\xb9m\x18\xbf\x9bp\x9a\xea\x16\x7f\x9f\x1e\x18$\xc6\xa9L6\xb0\xda\x1f\x00q\x9d\xa6T\fX\xa0\xc9\x03\xd5GU\xbd\b[\xc3PE\xac\xb2\xbe\x0e\xe3\xc8\xcf9\x1aRR$\x1e55\xce\xc5|\x0e\xe6z,\xd8*\x8b\xf1\xaf\xe6|g\v\x96d i~\x10fW\xd3[\xffYfC\xf9\xa5\x8arN\xdb30x0, 0x0, &(0x7f00000004c0), 0x0, 0x0, 0x0, &(0x7f0000000540)=0x1, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000004480)={0xffffffffffffffff, 0x10, &(0x7f0000004440)={&(0x7f0000004340)=""/210, 0xd2, r7}}, 0x10) r8 = socket$kcm(0x2b, 0x1, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.evefts\x00\xc6t\xb8\xa6\xa9\xe8b\x94k\xeaXW5*_\xc3\xa6\x8e\xa2\xfd\x03A\xf40C|t\xfc\xd0$\xac<\xb9m\x18\xbf\x9bp\x9a\xea\x16\x7f\x9f\x1e\x18$\xc6\xa9L6\xb0\xda\x1f\x00q\x9d\xa6T\fX\xa0\xc9\x03\xd5GU\xbd\b[\xc3PE\xac\xb2\xbe\x0e\xe3\xc8\xcf9\x1aRR$\x1e55\xce\xc5|\x0e\xe6z,\xd8*\x8b\xf1\xaf\xe6|g\v\x96d i~\x10fW\xd3[\xffYfC\xf9\xa5\x8arN\xdb30xffffffffffffffff, 0x0, 0x19, &(0x7f0000000100)='selinux:posix_acl_access\x00'}, 0x30) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x8, 0x2, 0x1, 0x8, 0x0, 0x1, 0x481, 0xeab58f1762b3cd74, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x4, @perf_config_ext={0x7, 0x9}, 0x5001, 0x1, 0x9, 0x4, 0x7f, 0x0, 0xfffa}, 0x0, 0x1, r5, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 16:06:01 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a08000026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:06:01 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00006010008108040f80ecdb4cb92e0a480e0400000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:06:01 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026000000e8bd6efb35001b000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:06:01 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00586510008108040f80ecdb4cb92e0a480e0400000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:06:07 executing program 5: socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x8983, 0x0) perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="b70200000b000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000002f3753a9c3b630bf92dd696125265586f2043649b89ec9b91dc174d5701424fa24052b2fe97409000000058e4bf0391702519694cd73608fadb119a5ffc8f1460c55bcce412bc1cc14a1f64ad78f7efc6f2233bacac999cbb0468424c2e8ab6cafc7bed227046c4ef20a09f4a46c382c1e7016a71a704c7b3cddf5306b500fda7b4a72bedb7c33a4c7e1f0c42819df5c26d28b450e2a9980b62fe2a57ac040892270e005a2e4ead36494a405cb500badb2b544edf5499098896b66851b823d3dc390934ea9062dd57a13ddb0ce78dbf6619bb0148e4dbb7ac738e4eb6e8061fa9d376fd0a4abf451611aa4aca07c12035ab1b2b55c098a78182c4651c0c3b019f94858fb0dc2ebd1ec689d889bf0839369cf62791d3bbd6c31262839a19f99e860dbed7b9493f9c8c764310e79aa8bd1e9e23f1ed38f91e6a53d265a75ec4fcd4d8b2d06c73ca7efec28b59fbeccfa1dbcd25032f328223bc33acc2449b6e9da679198772ecf1cc7f3886628dcc16c8ff17ff6ca528ef87741fc3e0f242a1037df395cbf0a9912d1b6d0bbc1482efe0712fac17f70f20bb9c6aef2d925d788d93d6c22aee7d387a7eaaada553f98a010533f2aa5a5cea2bdb19fc8c42e5d714ea143ab8a567bf262b03872602bfd2f35062c812cdc2eaf4a1ab92a419708546a70395497f822b5f06f0df2ba672d883b9fcfd34b7f4dc24bb3abdcb6f3e383dad4bc980c08e8e01099afd19cf916b0b9ab158153475d393aac65059df3c2f3d1ba5c9dc1c7e70ec14dd5af0b5b1a748ef9ebde08f72b53a54d2d66f41c5aa1fb1d91dfd6146e77bce93c45de0a0b19580a0ff90bdace7f549b8dcc95be4d596423ca8db0831932067edf32e58beaaa8625b91c05"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r1, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100, 0x0, 0x0, 0x0, 0x0}, 0x40) 16:06:07 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026000000e8bd6efb35001e000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:06:07 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00008110008108040f80ecdb4cb92e0a480e0400000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:06:07 executing program 4: perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, r1, 0x0, 0x0, 0x0, r2}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)={r2}, 0xc) 16:06:07 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a48030026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:06:07 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e0006e610008108040f80ecdb4cb92e0a480e0400000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:06:07 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350020000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:06:15 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00006010008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:06:15 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e0000f010008108040f80ecdb4cb92e0a480e0400000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:06:15 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.evefts\x00\xc6t\xb8\xa6\xa9\xe8b\x94k\xeaXW5*_\xc3\xa6\x8e\xa2\xfd\x03A\xf40C|t\xfc\xd0$\xac<\xb9m\x18\xbf\x9bp\x9a\xea\x16\x7f\x9f\x1e\x18$\xc6\xa9L6\xb0\xda\x1f\x00q\x9d\xa6T\fX\xa0\xc9\x03\xd5GU\xbd\b[\xc3PE\xac\xb2\xbe\x0e\xe3\xc8\xcf9\x1aRR$\x1e55\xce\xc5|\x0e\xe6z,\xd8*\x8b\xf1\xaf\xe6|g\v\x96d i~\x10fW\xd3[\xffYfC\xf9\xa5\x8arN\xdb30x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, r1, 0x0, 0x0, 0x0, r2}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000040)='*eth1\x00', r2}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r3}, 0xc) 16:06:20 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a48350026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:06:22 executing program 5: socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x8983, 0x0) perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r1, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100, 0x0, 0x0, 0x0, 0x0}, 0x40) 16:06:22 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e0000000f008108040f80ecdb4cb92e0a480e0400000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:06:22 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350003000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:06:22 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a48002426000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:06:22 executing program 4: r0 = perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x3, 0x6, 0x4, 0x0, 0x7, 0x800, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x81, 0x0, @perf_config_ext={0x7, 0x8}, 0x2, 0x38, 0x2, 0x9, 0x7fff, 0x2, 0x3}, 0x0, 0x8, r0, 0x6) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0xdb, 0x7, 0x81, 0xff, 0x0, 0x5, 0x40000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x5, @perf_bp={&(0x7f0000000040), 0xb}, 0x1a9, 0x944f, 0x80000001, 0x3, 0x80000000, 0x6, 0x1000}, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r1, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 16:06:22 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000210008108040f80ecdb4cb92e0a480e0400000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:06:22 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350004000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:06:29 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000025008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:06:29 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 16:06:29 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000310008108040f80ecdb4cb92e0a480e0400000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:06:29 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0400000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:06:29 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350005000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:06:31 executing program 5: socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x8983, 0x0) perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="b70200000b000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000002f3753a9c3b630bf92dd696125265586f2043649b89ec9b91dc174d5701424fa24052b2fe97409000000058e4bf0391702519694cd73608fadb119a5ffc8f1460c55bcce412bc1cc14a1f64ad78f7efc6f2233bacac999cbb0468424c2e8ab6cafc7bed227046c4ef20a09f4a46c382c1e7016a71a704c7b3cddf5306b500fda7b4a72bedb7c33a4c7e1f0c42819df5c26d28b450e2a9980b62fe2a57ac040892270e005a2e4ead36494a405cb500badb2b544edf5499098896b66851b823d3dc390934ea9062dd57a13ddb0ce78dbf6619bb0148e4dbb7ac738e4eb6e8061fa9d376fd0a4abf451611aa4aca07c12035ab1b2b55c098a78182c4651c0c3b019f94858fb0dc2ebd1ec689d889bf0839369cf62791d3bbd6c31262839a19f99e860dbed7b9493f9c8c764310e79aa8bd1e9e23f1ed38f91e6a53d265a75ec4fcd4d8b2d06c73ca7efec28b59fbeccfa1dbcd25032f328223bc33acc2449b6e9da679198772ecf1cc7f3886628dcc16c8ff17ff6ca528ef87741fc3e0f242a1037df395cbf0a9912d1b6d0bbc1482efe0712fac17f70f20bb9c6aef2d925d788d93d6c22aee7d387a7eaaada553f98a010533f2aa5a5cea2bdb19fc8c42e5d714ea143ab8a567bf262b03872602bfd2f35062c812cdc2eaf4a1ab92a419708546a70395497f822b5f06f0df2ba672d883b9fcfd34b7f4dc24bb3abdcb6f3e383dad4bc980c08e8e01099afd19cf916b0b9ab158153475d393aac65059df3c2f3d1ba5c9dc1c7e70ec14dd5af0b5b1a748ef9ebde08f72b53a54d2d66f41c5aa1fb1d91dfd6146e77bce93c45de0a0b19580a0ff90bdace7f549b8dcc95be4d596423ca8db0831932067edf32e58beaaa8625b91c05"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r1, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) 16:06:31 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350006000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:06:31 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000410008108040f80ecdb4cb92e0a480e0400000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:06:31 executing program 4: perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.evefts\x00\xc6t\xb8\xa6\xa9\xe8b\x94k\xeaXW5*_\xc3\xa6\x8e\xa2\xfd\x03A\xf40C|t\xfc\xd0$\xac<\xb9m\x18\xbf\x9bp\x9a\xea\x16\x7f\x9f\x1e\x18$\xc6\xa9L6\xb0\xda\x1f\x00q\x9d\xa6T\fX\xa0\xc9\x03\xd5GU\xbd\b[\xc3PE\xac\xb2\xbe\x0e\xe3\xc8\xcf9\x1aRR$\x1e55\xce\xc5|\x0e\xe6z,\xd8*\x8b\xf1\xaf\xe6|g\v\x96d i~\x10fW\xd3[\xffYfC\xf9\xa5\x8arN\xdb30x0}, 0x80, &(0x7f000000eec0)=[{&(0x7f000000dbc0)=""/4096, 0x1000}, {&(0x7f000000ebc0)=""/143, 0x8f}, {&(0x7f000000ec80)=""/156, 0x9c}, {&(0x7f000000ed40)=""/170, 0xaa}, {&(0x7f000000ee00)=""/148, 0x94}], 0x5, &(0x7f000000ef40)=""/18, 0x12}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f000000f040)={0x11, 0x6, &(0x7f0000000180)=@raw=[@exit, @jmp={0x5, 0x0, 0x0, 0xb, 0x2, 0x20, 0xfffffffffffffff0}, @exit, @map_val={0x18, 0x1, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x2}, @jmp={0x5, 0x0, 0x3, 0x4, 0xb, 0xffffffffffffffe0, 0x4}], &(0x7f00000001c0)='GPL\x00', 0x5, 0x0, 0x0, 0x41000, 0x16, [], r3, 0x46c8c98c3173e350, 0xffffffffffffffff, 0x8, &(0x7f000000efc0)={0xa, 0x2}, 0x8, 0x10, &(0x7f000000f000)={0x4, 0x3, 0x2}, 0x10}, 0x78) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000000c0)={0x1, &(0x7f0000000e40)="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", &(0x7f0000000040)=""/65}, 0x20) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='rdma.current\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0x10, &(0x7f0000000480)={&(0x7f0000000380)=""/248, 0xf8, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000540)={r4, 0x10, &(0x7f0000000500)={&(0x7f00000002c0)=""/102, 0x66, r5}}, 0x10) [ 2783.524097][T23179] netlink: 'syz-executor.4': attribute type 23 has an invalid length. [ 2783.537074][T23179] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 16:06:44 executing program 5: socket$kcm(0x2, 0x0, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x8983, 0x0) perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="b70200000b000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000002f3753a9c3b630bf92dd696125265586f2043649b89ec9b91dc174d5701424fa24052b2fe97409000000058e4bf0391702519694cd73608fadb119a5ffc8f1460c55bcce412bc1cc14a1f64ad78f7efc6f2233bacac999cbb0468424c2e8ab6cafc7bed227046c4ef20a09f4a46c382c1e7016a71a704c7b3cddf5306b500fda7b4a72bedb7c33a4c7e1f0c42819df5c26d28b450e2a9980b62fe2a57ac040892270e005a2e4ead36494a405cb500badb2b544edf5499098896b66851b823d3dc390934ea9062dd57a13ddb0ce78dbf6619bb0148e4dbb7ac738e4eb6e8061fa9d376fd0a4abf451611aa4aca07c12035ab1b2b55c098a78182c4651c0c3b019f94858fb0dc2ebd1ec689d889bf0839369cf62791d3bbd6c31262839a19f99e860dbed7b9493f9c8c764310e79aa8bd1e9e23f1ed38f91e6a53d265a75ec4fcd4d8b2d06c73ca7efec28b59fbeccfa1dbcd25032f328223bc33acc2449b6e9da679198772ecf1cc7f3886628dcc16c8ff17ff6ca528ef87741fc3e0f242a1037df395cbf0a9912d1b6d0bbc1482efe0712fac17f70f20bb9c6aef2d925d788d93d6c22aee7d387a7eaaada553f98a010533f2aa5a5cea2bdb19fc8c42e5d714ea143ab8a567bf262b03872602bfd2f35062c812cdc2eaf4a1ab92a419708546a70395497f822b5f06f0df2ba672d883b9fcfd34b7f4dc24bb3abdcb6f3e383dad4bc980c08e8e01099afd19cf916b0b9ab158153475d393aac65059df3c2f3d1ba5c9dc1c7e70ec14dd5af0b5b1a748ef9ebde08f72b53a54d2d66f41c5aa1fb1d91dfd6146e77bce93c45de0a0b19580a0ff90bdace7f549b8dcc95be4d596423ca8db0831932067edf32e58beaaa8625b91c05"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r1, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) 16:06:44 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000c10008108040f80ecdb4cb92e0a480e0400000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:06:44 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026000000e8bd6efb35000a000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:06:44 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.evefts\x00\xc6t\xb8\xa6\xa9\xe8b\x94k\xeaXW5*_\xc3\xa6\x8e\xa2\xfd\x03A\xf40C|t\xfc\xd0$\xac<\xb9m\x18\xbf\x9bp\x9a\xea\x16\x7f\x9f\x1e\x18$\xc6\xa9L6\xb0\xda\x1f\x00q\x9d\xa6T\fX\xa0\xc9\x03\xd5GU\xbd\b[\xc3PE\xac\xb2\xbe\x0e\xe3\xc8\xcf9\x1aRR$\x1e55\xce\xc5|\x0e\xe6z,\xd8*\x8b\xf1\xaf\xe6|g\v\x96d i~\x10fW\xd3[\xffYfC\xf9\xa5\x8arN\xdb30x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f000001a080)=[{&(0x7f0000018e40)=""/48, 0x30}, {&(0x7f0000018e80)=""/114, 0x72}, {&(0x7f0000018f00)=""/145, 0x91}, {&(0x7f0000018fc0)=""/135, 0x87}, {&(0x7f0000019080)=""/4096, 0x1000}], 0x5, &(0x7f000001a100)=""/25, 0x19}, 0x23) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0xc0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=0x5, 0x0, 0x0, 0x0, &(0x7f00000004c0), 0x0, 0x0, 0x0, &(0x7f0000000540)=0x1, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000004480)={0xffffffffffffffff, 0x10, &(0x7f0000004440)={&(0x7f0000004340)=""/210, 0xd2, r3}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f000001a1c0)={0xe, 0x7, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x1}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x200}, @exit, @call={0x85, 0x0, 0x0, 0x3d}]}, &(0x7f0000000080)='syzkaller\x00', 0x4, 0x7c, &(0x7f00000000c0)=""/124, 0x41000, 0x2, [], r2, 0x11, r0, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000001a180)={0x0, 0xa, 0x80000001, 0x6}, 0x10, r3}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) 16:06:54 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0626000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:06:54 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00006010008108040f80ecdb4cb92e0a480e0400000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:06:54 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026000000e8bd6efb35000f000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:06:54 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350010000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:07:08 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0a26000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:07:08 executing program 4: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.evefts\x00\xc6t\xb8\xa6\xa9\xe8b\x94k\xeaXW5*_\xc3\xa6\x8e\xa2\xfd\x03A\xf40C|t\xfc\xd0$\xac<\xb9m\x18\xbf\x9bp\x9a\xea\x16\x7f\x9f\x1e\x18$\xc6\xa9L6\xb0\xda\x1f\x00q\x9d\xa6T\fX\xa0\xc9\x03\xd5GU\xbd\b[\xc3PE\xac\xb2\xbe\x0e\xe3\xc8\xcf9\x1aRR$\x1e55\xce\xc5|\x0e\xe6z,\xd8*\x8b\xf1\xaf\xe6|g\v\x96d i~\x10fW\xd3[\xffYfC\xf9\xa5\x8arN\xdb30x0, 0x0, &(0x7f00000004c0), 0x0, 0x0, 0x0, &(0x7f0000000540)=0x1, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000004480)={0xffffffffffffffff, 0x10, &(0x7f0000004440)={&(0x7f0000004340)=""/210, 0xd2, r4}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xd, 0xd, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, [@alu={0x7, 0x0, 0x8, 0x5, 0x6, 0x50, 0xffffffffffffffce}, @ldst={0x0, 0x1, 0x6, 0x6, 0x2, 0xc, 0x10}, @alu={0x7, 0x1, 0x1, 0x7, 0xb, 0x4, 0x10}, @jmp={0x5, 0x0, 0x6, 0x8, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff}, @jmp={0x5, 0x0, 0xd, 0x8, 0x7, 0x8000000000000039, 0x8}, @jmp={0x5, 0x0, 0x0, 0x8a751edea79be25, 0x9, 0x40, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0xd}, @map={0x18, 0x8, 0x1, 0x0, r1}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}]}, &(0x7f0000000140)='syzkaller\x00', 0xd765, 0x1000, &(0x7f0000000e40)=""/4096, 0x0, 0x16, [], 0x0, 0xd956a0a64de39253, r3, 0x8, &(0x7f0000000180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x0, 0xc, 0x0, 0x3}, 0x10, r4, r0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) r6 = socket$kcm(0x2b, 0x1, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.evefts\x00\xc6t\xb8\xa6\xa9\xe8b\x94k\xeaXW5*_\xc3\xa6\x8e\xa2\xfd\x03A\xf40C|t\xfc\xd0$\xac<\xb9m\x18\xbf\x9bp\x9a\xea\x16\x7f\x9f\x1e\x18$\xc6\xa9L6\xb0\xda\x1f\x00q\x9d\xa6T\fX\xa0\xc9\x03\xd5GU\xbd\b[\xc3PE\xac\xb2\xbe\x0e\xe3\xc8\xcf9\x1aRR$\x1e55\xce\xc5|\x0e\xe6z,\xd8*\x8b\xf1\xaf\xe6|g\v\x96d i~\x10fW\xd3[\xffYfC\xf9\xa5\x8arN\xdb30x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r9, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r10 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f00000007c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc5, 0xc5, 0xa, [@var={0x8, 0x0, 0x0, 0xe, 0x2}, @union={0x8, 0x7, 0x0, 0x5, 0x1, 0x5, [{0x8, 0x1, 0x1}, {0x5, 0x0, 0xdc6}, {0x1, 0x4}, {0x10, 0x1, 0x695}, {0x1, 0x3, 0x1000}, {0xa, 0x1, 0x1}, {0x5, 0x1, 0x400}]}, @restrict={0x7, 0x0, 0x0, 0xb, 0x2}, @datasec={0xc, 0x0, 0x0, 0xf, 0x1, [], "fb"}, @enum={0xe, 0x6, 0x0, 0x6, 0x4, [{0xb, 0x10001}, {0xb, 0x2}, {0x8, 0x32}, {0x5, 0x3}, {0x2, 0x4fe}, {0x0, 0x1}]}]}, {0x0, [0x82c0bb88c04649df, 0x0, 0x2e, 0x61, 0x0, 0x0, 0x94, 0xc2]}}, &(0x7f0000000500)=""/33, 0xea, 0x21, 0x1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x36, 0xb, &(0x7f0000000380)=@raw=[@generic={0xd2, 0x2, 0x8, 0x1, 0x7}, @map_val={0x18, 0x0, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0xfffffe00}, @exit, @jmp={0x5, 0x0, 0x3, 0x4, 0x6ca2ffde47119c0c, 0xffffffffffffffc0}, @ldst={0x3, 0xf41a9b4a793612e8, 0x2, 0x7, 0x7, 0xfffffffffffffff0, 0xffffffffffffffff}, @exit, @call={0x85, 0x0, 0x0, 0x46}, @map={0x18, 0x0, 0x1, 0x0, r7}, @exit], &(0x7f0000000300)='GPL\x00', 0x3, 0x70, &(0x7f0000000400)=""/112, 0x41000, 0x0, [], r9, 0x8, r10, 0x8, &(0x7f0000000700)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000740)={0x3, 0xc, 0x7fffffff, 0x9}, 0x10, r5, r3}, 0x78) 16:07:32 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e6026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:07:32 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350025000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:07:32 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000035008108040f80ecdb4cb92e0a480e0400000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:07:38 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.evefts\x00\xc6t\xb8\xa6\xa9\xe8b\x94k\xeaXW5*_\xc3\xa6\x8e\xa2\xfd\x03A\xf40C|t\xfc\xd0$\xac<\xb9m\x18\xbf\x9bp\x9a\xea\x16\x7f\x9f\x1e\x18$\xc6\xa9L6\xb0\xda\x1f\x00q\x9d\xa6T\fX\xa0\xc9\x03\xd5GU\xbd\b[\xc3PE\xac\xb2\xbe\x0e\xe3\xc8\xcf9\x1aRR$\x1e55\xce\xc5|\x0e\xe6z,\xd8*\x8b\xf1\xaf\xe6|g\v\x96d i~\x10fW\xd3[\xffYfC\xf9\xa5\x8arN\xdb30xffffffffffffffff}) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000000c0)={r2}) perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socket$kcm(0x29, 0x4, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 16:07:52 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026000000e8bd6efb3500090003000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:07:52 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e000000100a8108040f80ecdb4cb92e0a480e0400000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:07:52 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0035000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) [ 2854.907513][T23454] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 16:07:52 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e000000100c8108040f80ecdb4cb92e0a480e0400000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) [ 2855.012149][T23460] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 16:07:59 executing program 5: r0 = perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.evefts\x00\xc6t\xb8\xa6\xa9\xe8b\x94k\xeaXW5*_\xc3\xa6\x8e\xa2\xfd\x03A\xf40C|t\xfc\xd0$\xac<\xb9m\x18\xbf\x9bp\x9a\xea\x16\x7f\x9f\x1e\x18$\xc6\xa9L6\xb0\xda\x1f\x00q\x9d\xa6T\fX\xa0\xc9\x03\xd5GU\xbd\b[\xc3PE\xac\xb2\xbe\x0e\xe3\xc8\xcf9\x1aRR$\x1e55\xce\xc5|\x0e\xe6z,\xd8*\x8b\xf1\xaf\xe6|g\v\x96d i~\x10fW\xd3[\xffYfC\xf9\xa5\x8arN\xdb30x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x5, 0x1}, 0x0, 0x0, &(0x7f00000000c0)={0x5, 0x9, 0x89, 0x8}, &(0x7f0000000100)=0x8, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x80000000}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r2}, 0xc) 16:08:19 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000025008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:08:19 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e0000001000810c040f80ecdb4cb92e0a480e0400000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:08:19 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026000000e8bd6efb3500090a0e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:08:19 executing program 4: perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.evefts\x00\xc6t\xb8\xa6\xa9\xe8b\x94k\xeaXW5*_\xc3\xa6\x8e\xa2\xfd\x03A\xf40C|t\xfc\xd0$\xac<\xb9m\x18\xbf\x9bp\x9a\xea\x16\x7f\x9f\x1e\x18$\xc6\xa9L6\xb0\xda\x1f\x00q\x9d\xa6T\fX\xa0\xc9\x03\xd5GU\xbd\b[\xc3PE\xac\xb2\xbe\x0e\xe3\xc8\xcf9\x1aRR$\x1e55\xce\xc5|\x0e\xe6z,\xd8*\x8b\xf1\xaf\xe6|g\v\x96d i~\x10fW\xd3[\xffYfC\xf9\xa5\x8arN\xdb30x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, r1, 0x0, 0x0, 0x0, r2}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)={r2}, 0xc) 16:08:43 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009600e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:08:43 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb9350a480e0400000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:08:44 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e0000006f008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:08:44 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026000000e8bd6efb3500090020000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:08:44 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e35480e0400000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:08:44 executing program 4: perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000002400)={&(0x7f0000002180)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000002340)=[{&(0x7f0000002200)=""/6, 0x6}, {&(0x7f0000002240)=""/19, 0x13}, {&(0x7f0000002280)=""/141, 0x8d}], 0x3, &(0x7f0000002380)=""/99, 0x63}, 0xd1dada600c314458) r2 = socket$kcm(0x2b, 0x1, 0x0) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140)={0xffffffffffffffff}, 0xc) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000180)=r3) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.evefts\x00\xc6t\xb8\xa6\xa9\xe8b\x94k\xeaXW5*_\xc3\xa6\x8e\xa2\xfd\x03A\xf40C|t\xfc\xd0$\xac<\xb9m\x18\xbf\x9bp\x9a\xea\x16\x7f\x9f\x1e\x18$\xc6\xa9L6\xb0\xda\x1f\x00q\x9d\xa6T\fX\xa0\xc9\x03\xd5GU\xbd\b[\xc3PE\xac\xb2\xbe\x0e\xe3\xc8\xcf9\x1aRR$\x1e55\xce\xc5|\x0e\xe6z,\xd8*\x8b\xf1\xaf\xe6|g\v\x96d i~\x10fW\xd3[\xffYfC\xf9\xa5\x8arN\xdb30x0, 0x0, &(0x7f00000004c0), 0x0, 0x0, 0x0, &(0x7f0000000540)=0x1, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000004480)={0xffffffffffffffff, 0x10, &(0x7f0000004440)={&(0x7f0000004340)=""/210, 0xd2, r5}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000024c0)={0xe, 0x6, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4800000, 0x0, 0x0, 0x0, 0x200}, [@call, @jmp={0x5, 0x0, 0x1, 0x3, 0xb, 0xffffffffffffffff}, @exit]}, &(0x7f0000000080)='syzkaller\x00', 0x3, 0x63, &(0x7f00000000c0)=""/99, 0x41000, 0x2, [], r1, 0x0, r4, 0x8, &(0x7f0000002440)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000002480)={0x3, 0x1, 0x8, 0x100}, 0x10, r5}, 0x78) 16:08:44 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e00260c0000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:08:44 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a48030400000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) [ 2907.285618][T23633] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2907.316990][T23634] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 16:08:54 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e0000001000810c040f80ecdb4cb92e0a480e0400000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:08:54 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026000000e8bd6efb3500090025000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:08:54 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a48350400000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:08:54 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e00260e0000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:08:54 executing program 4: perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) r1 = socket$kcm(0x2b, 0x1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.evefts\x00\xc6t\xb8\xa6\xa9\xe8b\x94k\xeaXW5*_\xc3\xa6\x8e\xa2\xfd\x03A\xf40C|t\xfc\xd0$\xac<\xb9m\x18\xbf\x9bp\x9a\xea\x16\x7f\x9f\x1e\x18$\xc6\xa9L6\xb0\xda\x1f\x00q\x9d\xa6T\fX\xa0\xc9\x03\xd5GU\xbd\b[\xc3PE\xac\xb2\xbe\x0e\xe3\xc8\xcf9\x1aRR$\x1e55\xce\xc5|\x0e\xe6z,\xd8*\x8b\xf1\xaf\xe6|g\v\x96d i~\x10fW\xd3[\xffYfC\xf9\xa5\x8arN\xdb30xffffffffffffffff}) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000080)={0x0, 0x3b, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e00f80ecdb4cb904044865160b00170010000000000004140e000a0002000000dc2976d153b4", 0x235}], 0x1}, 0x0) recvmsg$kcm(r2, &(0x7f00000231c0)={&(0x7f0000022dc0)=@can={0x1d, 0x0}, 0x80, &(0x7f0000023080)=[{&(0x7f0000022e40)=""/11, 0xb}, {&(0x7f0000022e80)=""/16, 0x10}, {&(0x7f0000022ec0)=""/167, 0xa7}, {&(0x7f0000022f80)=""/10, 0xa}, {&(0x7f0000022fc0)=""/165, 0xa5}], 0x5, &(0x7f0000023100)=""/136, 0x88}, 0xa8fd4150d6242707) sendmsg(r1, &(0x7f00000249c0)={&(0x7f0000023200)=@ll={0x11, 0x1, r3, 0x1, 0x34, 0x6, @local}, 0x80, &(0x7f0000023700)=[{&(0x7f0000023280)="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", 0xfe}, {&(0x7f0000023380)="4f524e4c60b814180b1994b9c61f7798dc8f36d9c9836fbf56efc9656e3b0e440153aec19a34f1aff3aff83957389a7138fa9049e01f5dea478fec9302d1de64b6004114caf21c28c488fe05003aabff023385e06055c7ef0bb4e481f80f00ee0d377c1fe9eb85f5819dcf86e0453dabdf6b67d651e98cca8d3567a869e7c472e28f80214798e8286517815771b2f1f6c3a569888ef19da6bd56801fc9dc91d10603a721f80df430", 0xa8}, {&(0x7f0000023440)="422fa17ef8a4a872eac317770e6d0e410914fc9a3422b7bd191401a16b1cbf4fee8060fdc00442a59854636037e2a1c64073ff1eabea857ac5dce5831ba99b6f745829adf7f7134a7494e3274e48417173d1f3509fec9447298c9c059a47164eb5cc666b2d9abaaef1809471e6403a3cb005b54a47a1ea93a143e91a717a7ad8038d932ccec4c78b44f2a83fdc7003bc36e1362fa46893", 0x97}, {&(0x7f0000023500)="b4a752a9b9b03d39cef2de89247e6918eec2d05d16c5dfc9ffb62ac59b4e4590873b305650faa1289bd2d30c0b425837289e5da35eaeac381996f00f752f5a43ee8e6ce7e643e6371f781965f7e587017382b6ffaf61383ffcf23e54c493c4966395959a23a0", 0x66}, {&(0x7f0000023580)="e48fe548d3ca391b8a2b71efbff3253440f042b1f40c2f3bc95f5fe58d0508156988667b363fe0051a46d7ce92b098f5de516b841ae4edf8b21b9657f3e62f755c244e23500e0056901e5cf0095e82d399e4ab498e94ba88595c48fd46338fee16de113dc4d4b362495ce48fd9b143b3092ec8d8af9237c91e783361d671cdc81391accf1acaefd32c78353f8d5b5516739696e1dd7fe49abbb4c457f0235423ae7d1916b32a7f21c3613828a92997a4764230d870de222c06cdeaf2d08bfe419793bafb7518c9004791201fb668dc36dfd426bbcddc8c28d7920d9b9706e5d28aceeaa0be1079a1d9d5fbd47946b715842e19a70caf7a", 0xf7}, {&(0x7f0000023680)="3ffdb56272ebfcf472d9a4f3195d52a1497ea599e10fe6f2c66268bcb6be110cc840769f3863df1f5baa8846f5bb065694c68df6eccc874c18e79d7dd8c92e805d5826036289", 0x46}], 0x6, &(0x7f0000023780)=[{0x38, 0x18a, 0x46, "f544491cf487c70df432380000cb3d8d1d3351ac3296c76b8a075a2f29223995ce56d8d655ce661b"}, {0x80, 0x107, 0x3, "03f59800011afaa24a71eb74fd162695f7af73eed614a5b3e685030d6ba9e15671620ce903f535cbc116a5c29a11613f40c684bb0b7887de769002d110fcdfcaf1729413470826a2d5404888397d4d9db801e471c20bf82343fc0905a49bb1ffbf84cc054896c9d1783c1477f3628a76"}, {0x28, 0x88, 0x9, "aaf40e529710259e3ceef85d05dc7e612916c190"}, {0x48, 0x1, 0xff, "b4e2f3fd09bb9fe5551cb46a77edaeb9ce53ef958b04cc348328ed3dd8acc41664e6ed44fd6f9ef05a802d30bf91650054c84166"}, {0x100, 0x111, 0x5, "85b4a7502cabfbc07d65a620f8b6cde7586c41f00eef8129628d7592f6acf88f0f6f99b289b4cb0e37def19ba535aee31650ef92df918b525efba8b396580ee1d1bfcd10c3216735954d40914ac61d0335b91fe7b9b4387510f9bc6932013b695bb02d83d4d8d536f3a210e0a09b5138212999309ae8ac7101ba910c47a8de986f9e54da340897178d8b2e5da6019954785a709f9b857831e45a4080c9a086ec269ceb92900916b4f54787812cac39d5a8568bec25e7c3763352a40ad8eb2d90dbbff9bdd0bd05d9e935c1e6aec8a8adfc03138809afcbe548c8bde7294f027dd280449d3e8f549b7e"}, {0x1010, 0x10c, 0x3, "92ff9550ade9bc8ca1bf2be5210450fc493a1a0b7db3005e0d69b738abca949b9a178e13b8763c76b3e9382c6c1fbc4c614cb977c71f1e93cc27bd39ee7bdbf7e6ca705248e6000c71f9fe5bb246a03d9189b49e3428e89a1825adcfcba491053038b965b1518ad4079f3ff9560436855c74d6e88a21439083d4bc08969985d26618a22eae0c487076fcd319ab4a629da7a10859af6799bb9227414a29095b1252f15b9e8fc7017904714bb57fda7b67db497cdbea93f1434375fe6b4802cb5f86a4f249567b7a0392f9b48aaf66ab289be904b1b5e9c765eb12ff8d03d12347333a1d5bbddacda684f2a6ebeca90508b724baae8a6a14cd057ef2217bbae7f73700c8067a609e6191e8cfd368340ecea9e597a6754b26ab85ffc40763832e66bed9fb3940f8088e07ffadd706df7e778e98204ab39dcc582b1e6025db26ee0f3bf6d8be44fba3468109ff6afe04e0c2e52ac7e0f03941803aa2b88fc1b29b687ef7134d413f9407d3ab3796557f4ce231db3479e317f8aaccbe6c2751c24627944bf5004b1897d6872fcc4c170632375b1be3b1668dfee315acaab730fb3af47d392d5bb8ab0f4c52eb35231ce9d66bd573599034dc0793c4ca8f4fea39f962209081f2ece4505a7544b168c7f8304f335e79283cf88b5ba32d4bedabd900dcc2849575b26f7ad4ac94f197fda125fe7b3bd235e849082a4d858cfb644619a5a43d9dec93e5aa9496a604de4718a57a8841167cfbc1e7208e3d22a57cbfbffaf390a90dd9c7f03184702c55e3237deb377cded42276baef3dd0a75ad30af307803e6306927b5bb3827a21def85b6a8b4ecb4b733cb209fd6a42bf1fced99f72c17a7a75c9adc5e2406587d99412afe4a398029100429ea1718be4e261e91be6f9c0efecf0208dac9305ebd9460e0fa7734dc3bd2069ac63fd4469bbc8f3fd1901cc6d2c97679a70dd13075dfdd038cb7e31d76184a046277100bb00c7aeef07a38ed90ae1beb00f3204c4e55421bf56d7f7780c133074d32e324c47014ccb9667d58d2835856802577746f6370d76a77dcbde44dc4c2b0dfbeedf1ba058b478efd7da61fde9c30d9c993a0bd5dfaef4ef201987808429ee0a95114de113772b1e7a8a6cf876c4791a42c7d10b27e85be3f7415ef6a12cdc4383fd3027066ab02654d89caff01d3ee1e4bc9404d913ab2b3bedee71a6486131749c9d98e053a28b16d2c5d3db139ae639162853dca849585820efc0ef584be1056deb5dc2786ebd9fd2438908d1a6a11f63ebc1e061a97f1a0ba38abc79b8caf42ac6ff351e4a9e4b0b07b9c4b02d6dfdaf68c0a8b5e343c9ac5e66d8e7d41295a3c80f9839b6c3917f19a118a81ad3a9971080149020e3d708bd22d9697dce9f2b16a79a4853a1cdf8c324ab06fc02fb7e644d348327b24b87f4b633697eae022e76f27102f3e0ab2696f0ec997df93011fb0477c38aeb49670e3e057c88d82be82545ce42cf857013056bd0df9f32bbfdd9451162aa8a98a2c76483d168a7652f72aa0c03aadf796df4ce7175d970351bfad24d05e6ecf98ac0e5b81a6ac36ddf20da1d7fb7e8c92780d31c3bdf073653e4b53e5adce3a193ce86bbfba2d708de92e813d79cd90266fab7b121dcbb0e5a500fdaaeb0eb9c74f5ba43f70e76497a36f5b4e8e1e8e2209d1ee570fb33ecd223226ac06c16e9bf48b9c2c11a702d1c7d41601a765ebd3e760c2cbb28399a6f38dabf7cdd4fc6237f5b3fba19a5b88bf8fa9bfa8ae1d2c4f8ddaf85fd82b9787224b642bca1658a182dd00f03406bb646574b4d85f420781e5b50a44692b6602b472b3d8024b80caa3736140b7db431d9aaf37e6719c45349cdee14af8c9c103d46042519c6fd7d2636e0a30dd17f02fe2511a8ca7f18c0d74ccd8529dfee5b678020b48176bebe4a40fa7f71c75050bb5286c5f5bdc65b87aaa9c5b703fe79b40089126ed80150a705fc0a4575198334f82c6a78566e0e8b444b3515e49fd9eabad16ebb931b605c9be38d6560b93e8157798ad504c33823e5d782d9f233dd7e100960141dd5d092446746a270d0896b03760d4c83e8af9323cd5da7548656705ae9a973cf7fadff6664779d2da786ccfb532d3a7c2109ac882ce65b3908a44dd95b4579a4ec754eb4576850f1ad8078a74201e008ac6c43dcddfe7c01f0d477ef0c2e904ea17fdef74224b6db367f6fc480e20012a4d1aec3df51e8b414c5b1ed3a14613e21817622366ce34eb7b2b8d88f58c7e6bfc1a1d23cdca60850e35033a8385a16070c760bb64b342c0d644ed88214952c9c54ae36da7778a2d94c55331610b03e25d5998c27319ee2ec23bf83425897dfeb07bc78e49b3d0173f2c9455bd6f410f936730f16b4dc7a141283f6be7c4d3401102fce11bcfd9a7bb311ce5c6076ce8e831edc00424647d154b89c8fc148dd4556a3ae80474dd8c3b53ea95d52f0ee16b6354e1e6f35af32193f8331858375357964b0874132ab87f795a6a90418d7f017c4f0803a5da4b33f9a02c13d2d5cc58a943325539c3cc4d0a3e267ae18cac8f426069ef86eaa1d6d15d709838c4e8d178b0ab36b5e514a6e5a2f405d32c635232ced7df9f6a13f0dc04ce8c5f63403195f25a834ee9dc729d66f1a4cf92c71d8ee72e1401d12bf973b9b802e2d7a8e2667c7affcdeea8c39ac7a1603394d39478be54be5f52cd3b2f648b27d2975926ea288a0d7bd3af32a69c4a85b1f955c123d9c1bf26dbc037217dbed25560dd1d18341953f93cad67b92a4ab3ff20bf24b51294d82844deb37069794521e3d29162ec7a2b74544c1865441aefd994a2ded5ba0b8c5bd665cf7ad6a13d5a85ffca2fb81833354d5881dd410f2ed199fd69215483deca1ebea094f0f317f08db0f14fd9b725a2d90823150a362d55b022c57cffb79c7c36dc62fd319efb43101795b17f364454cf5008ec8ff817d520bfb8d7ef082509805d8176aae5c7bda54d0e2ac59d3d932ff458de71c916269e3aa51ceb68ef9269b1d3fd01871fb54a699b5b5cb705e410de6368647ca107dcefa6d1eaaeb66d8146afcfd2c5c1615dd1fe70a6b3633990af2849f315d14bc4bf60891d9f4842574ecac02f91c6f42de56fee47a79c1fabda054a5c014483c5d1948dd398dc96ca12f255415b9406c8f60a1822ba1c5245d9a406a1da844904412c3a256f9409a32678009979946dd8551e965403bf5c63059263d084108e6a29570b1113560ae68e70c14928c3f211baf066026053b871d9ffcd8ab70a84d975f2ef0feddb9a2fee53acde064aab2a058d0054f43c79f862204d9306be0a248b8afaa36639af47f0f3f11fa8504f38885603e0531b4fc20fd6dbd14b27552cb6b94d22d94317de53fdf8fa859bebe2f6d3e84f3092b36ea6cc02238c78ac51d9bbfbc53c4de085f7bfc0e90ca565f0ae58578d1154ab72383c42b3e8a8fdd4a014cd588642dd4d918b2d188f65348bf65562e3a0de221ec9ec31b1c45169cb3b74470c5ba96d3ba55dbef25ee41c3cb83800f8c366bb4f8dbdb9f6a18f28da6d6ec86cd1097f2f71090891d9ad2b923b2b54b432db67a8d5cd144b2f2b9dc39978f868132a9b2caa270012b2e9715b87318b14751c92b84e479b1bfd27e4b14660030aea889897254a6936dfe8fe577ad8ef692b523fd6384397b7cdefef5e08db470be15002efc7ecf6fec0613409febb3302e6ab76f7d9de34f03e79fa4c91a9aa97cf2d3a0e7294c7def93bb5162e068304587c1c1ff169083f17eb5c1eb863d3afebbcc98fc1a3fd912edf98b3e79b3b2209810d408ed43fc8f0d1d625b986376fa22ad508f3aed7288ba65e3ad2cada5a961972d1967ffce62ea6036f311330cbd33337e3f2c6fdc8d179abc35696c10e023fca4baf1db22b9366c0fbd38a12afbf20e7f1ef5d808fc812dd0ad8de157bd00aaa1e47cafc1e631561db02c438e3fc7532b67395eca6022359832377c09ff422d66521e483115736bf42f0150513e10bd6b5ba9398f6aff3e0dacb5e92bd274cde723b3bfc33cb18fd3f83b50e4f0d3505664e38ed115c3bb8347caf3f4acb3dc308723bcd8b0f5edb6d50f9cc5668f1820568ab175dc4308ba53d07bc1aeb879f03fe302f8ee97e153b091d0660efe29c0a63ae470e89c31551abb8c8c7dc65b53bb01f37045f38f4144ee23e915ba8d90e348ff3d829401a5e7bcd669a7af1fcd4dfdf80124fd0c304e42ffdb39dadf7c6df9f6a82821a98fa431962716e96a1eea004ea8a317ddb857f525bfd4bf2c5b1fb6ff6ced109676f543b0734046aa3202e32017938b5e78d1f96369bcebd584ba964e38b8397a1682065a7e9b22e840ca2a557b1076bfe94f77a742c49616e7bc2d0e6d2057373678af11dd88a9c5b5463749a4a75d8de5e3983cb63c6966c5f7b43cdc5d0e6bb285ad869312a64edeb2352741c3ce9ff41bd65074265565a7d3f725e707480ba52aeec0e41630ba9d04d03b70485a8f1c2154002a6a3841eb44e6776ff67d7c58003f88631c31fb8d45e0b5614ee69111e3ce2c4aa27ef457d28a70e07759332e2cf71f5253cd290b2dc79803242138cac08265535b7b4f06f79a7be794df4f6f10b7724563fa9cdf93fd7de826dde39415e16c94e3e38166392ada61959ca21c310aa74558e594354862b28e7a0b73f10f59b9ab95ed963a6cf055a9d1f86e0ca57f9e0dcb5318eeebb965b02218706d27b61318b1cfa0276d3907e292ab33f452bb878866c03ad1d89750c8a48c66f46e19da0dd09729e4ab1f404525d52d3a73c5f0fab7e70b4a42a776220db42c1cdec93bc65a66d2b51811008863f966d22c98e050b753bcb8c61b293b5b723c3aa77b3ffef4d39b16473e5fa67086673cd20b80d29e371f659e04a9b32185517594502478376d876070d3b1ca240a6ad8dcd6c2d9fe7eaf7b7a8e6321d6640f083ec9bd85e16ced8095de3c74472ddc8b9a3c43130bd56b8feafa926a7e7533ff00e11e80438dba4319786d65845733fd50a26eea5a3e363d672c9a1f5424dee70a54f4bd00e675777d47a034227bb05aade6c2615ab4bbe43864f17aa6de29bd4fa45ad8e7aacf85e8e1618dd2cca7149ebdde29011bee8b27bbe1aafa70638ae9787b5c48921b5987d7043ed93a035b381f8c1a537bc92cc7cb36d3d1844dff33d62eace58c6bc5e190df2e5c88caae233948d7e843a69ce06e8c11ff22e3b54ad4daa4e6ce3b79e6d489499292a8b5e9b858c8a8ba89e14d90e20603fd6c4bd40ec1bc3b04fd1619dbe006c28d38d7221ae4361e854b3a9698157598c4ff85af2c4ae92f64258273a0766a69e10a39f6ffadd3b59c09f250d14f85cfd749fee09b66ad4b4cc1b075616a89e8fbce333f89453bb23f1a0024ced9bc4b166916cb7cec10684f9509c7d80d117887530bde29a7478b2af1a23f164bc4565a4671dd12391edcaabbb27eb44c865af64e3975c1e9bed28389638265c9886bb560bdf60b52c10c838227b5011d76479d8c949591bed341dcc764bc3a667e494c2c12b5f1ca2208e9b5361c1d7408cc4091f37ed2e3fafffd7b567f46410246ccf5f1653652f9a7896a13d6e7501fbd32173571d15c4164209f1410369d2ed5f98716cfc4c5285fd19f34008dd608dc3138df11c40879a3474e3fbe8ffdeebbeea917a05ee13e9cf13a644b9721796fff972b1e8f7d023dec1ceb9e9cdbd1dca61bb1b436fda2a751b25031b077bf0b37131c09606d04e46bb260b41f158b0f3970628463017ca83aa08ad3d699fec6b6ef45"}], 0x1238}, 0x81) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 16:09:17 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026000300e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) [ 2940.344143][T23758] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2940.377380][T23760] netlink: 'syz-executor.4': attribute type 23 has an invalid length. 16:09:17 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026000000e8bd6efb3500090000240100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) [ 2940.383926][T23763] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2940.413428][T23760] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 2940.504129][T23774] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2940.517882][T23775] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 16:09:26 executing program 5: perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) socket$kcm(0x2b, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.evefts\x00\xc6t\xb8\xa6\xa9\xe8b\x94k\xeaXW5*_\xc3\xa6\x8e\xa2\xfd\x03A\xf40C|t\xfc\xd0$\xac<\xb9m\x18\xbf\x9bp\x9a\xea\x16\x7f\x9f\x1e\x18$\xc6\xa9L6\xb0\xda\x1f\x00q\x9d\xa6T\fX\xa0\xc9\x03\xd5GU\xbd\b[\xc3PE\xac\xb2\xbe\x0e\xe3\xc8\xcf9\x1aRR$\x1e55\xce\xc5|\x0e\xe6z,\xd8*\x8b\xf1\xaf\xe6|g\v\x96d i~\x10fW\xd3[\xffYfC\xf9\xa5\x8arN\xdb30x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r5, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r6 = socket$kcm(0x2b, 0x1, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.evefts\x00\xc6t\xb8\xa6\xa9\xe8b\x94k\xeaXW5*_\xc3\xa6\x8e\xa2\xfd\x03A\xf40C|t\xfc\xd0$\xac<\xb9m\x18\xbf\x9bp\x9a\xea\x16\x7f\x9f\x1e\x18$\xc6\xa9L6\xb0\xda\x1f\x00q\x9d\xa6T\fX\xa0\xc9\x03\xd5GU\xbd\b[\xc3PE\xac\xb2\xbe\x0e\xe3\xc8\xcf9\x1aRR$\x1e55\xce\xc5|\x0e\xe6z,\xd8*\x8b\xf1\xaf\xe6|g\v\x96d i~\x10fW\xd3[\xffYfC\xf9\xa5\x8arN\xdb30x0, 0x0, &(0x7f00000004c0), 0x0, 0x0, 0x0, &(0x7f0000000540)=0x1, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000004480)={0xffffffffffffffff, 0x10, &(0x7f0000004440)={&(0x7f0000004340)=""/210, 0xd2, r8}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x18, 0x1, &(0x7f0000000040)=@raw=[@alu={0x0, 0x0, 0x7, 0x9, 0x8, 0x0, 0xffffffffffffffff}], &(0x7f0000000080)='GPL\x00', 0x6, 0x1b, &(0x7f00000000c0)=""/27, 0x41000, 0x8, [], r5, 0x6, r7, 0x8, &(0x7f0000000100)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000140)={0x3, 0x5, 0xfffffff9, 0x3}, 0x10, r8, r0}, 0x78) 16:09:42 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010068108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) [ 2965.745053][T23881] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2965.757518][T23882] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 16:09:43 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e04000e0000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:09:43 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e060100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:09:43 executing program 4: r0 = perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x40200, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r1, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 16:09:43 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e04000f0000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:09:43 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026000f00e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) [ 2965.930804][T23895] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2965.966684][T23896] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 16:09:43 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e0a0100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) [ 2966.124771][T23905] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2966.140213][T23907] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.0'. 16:09:49 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0400400000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:09:49 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e0c0100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:09:49 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026003f00e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:09:49 executing program 4: perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000005}, 0x144a0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f088a8d501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 16:09:49 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0410000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:09:49 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e000000100a8108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:09:49 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0465580000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:09:49 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0026000000e8bd6efb350009000e0e0100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:09:49 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e0400600000e8bd6efb350009000e000100400000ff050005001201", 0x33fe0}], 0x1, 0x0, 0x0, 0x6558}, 0x0) 16:09:49 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.evefts\x00\xc6t\xb8\xa6\xa9\xe8b\x94k\xeaXW5*_\xc3\xa6\x8e\xa2\xfd\x03A\xf40C|t\xfc\xd0$\xac<\xb9m\x18\xbf\x9bp\x9a\xea\x16\x7f\x9f\x1e\x18$\xc6\xa9L6\xb0\xda\x1f\x00q\x9d\xa6T\fX\xa0\xc9\x03\xd5GU\xbd\b[\xc3PE\xac\xb2\xbe\x0e\xe3\xc8\xcf9\x1aRR$\x1e55\xce\xc5|\x0e\xe6z,\xd8*\x8b\xf1\xaf\xe6|g\v\x96d i~\x10fW\xd3[\xffYfC\xf9\xa5\x8arN\xdb30x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x1f, 0xfffffef0, 0x0, 0x0, 0x0, [], r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x70) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f0000000080)=r3) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000100)=r1, 0x4) perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0xa, 0x3, 0x0, &(0x7f0000000040)) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"/740], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r5 = socket$kcm(0x2b, 0x1, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.evefts\x00\xc6t\xb8\xa6\xa9\xe8b\x94k\xeaXW5*_\xc3\xa6\x8e\xa2\xfd\x03A\xf40C|t\xfc\xd0$\xac<\xb9m\x18\xbf\x9bp\x9a\xea\x16\x7f\x9f\x1e\x18$\xc6\xa9L6\xb0\xda\x1f\x00q\x9d\xa6T\fX\xa0\xc9\x03\xd5GU\xbd\b[\xc3PE\xac\xb2\xbe\x0e\xe3\xc8\xcf9\x1aRR$\x1e55\xce\xc5|\x0e\xe6z,\xd8*\x8b\xf1\xaf\xe6|g\v\x96d i~\x10fW\xd3[\xffYfC\xf9\xa5\x8arN\xdb3r1, r0, 0x0, 0xa, &(0x7f0000000180)='syzkaller\x00'}, 0x30) r4 = socket$kcm(0x2b, 0x1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.evefts\x00\xc6t\xb8\xa6\xa9\xe8b\x94k\xeaXW5*_\xc3\xa6\x8e\xa2\xfd\x03A\xf40C|t\xfc\xd0$\xac<\xb9m\x18\xbf\x9bp\x9a\xea\x16\x7f\x9f\x1e\x18$\xc6\xa9L6\xb0\xda\x1f\x00q\x9d\xa6T\fX\xa0\xc9\x03\xd5GU\xbd\b[\xc3PE\xac\xb2\xbe\x0e\xe3\xc8\xcf9\x1aRR$\x1e55\xce\xc5|\x0e\xe6z,\xd8*\x8b\xf1\xaf\xe6|g\v\x96d i~\x10fW\xd3[\xffYfC\xf9\xa5\x8arN\xdb3 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2991.200828][T24020] RSP: 002b:00007f6c399f7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2991.209244][T24020] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a919 [ 2991.217299][T24020] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 2991.225265][T24020] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2991.233233][T24020] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6c399f86d4 [ 2991.241202][T24020] R13: 00000000004c99b6 R14: 00000000004e1888 R15: 00000000ffffffff [ 2991.249186][T24020] [ 2991.251524][T24020] Allocated by task 20908: [ 2991.255946][T24020] save_stack+0x23/0x90 [ 2991.260102][T24020] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2991.265761][T24020] kasan_kmalloc+0x9/0x10 [ 2991.270105][T24020] __kmalloc_node+0x4e/0x70 [ 2991.275613][T24020] kvmalloc_node+0x68/0x100 [ 2991.280150][T24020] alloc_netdev_mqs+0x98/0xde0 [ 2991.285040][T24020] rtnl_create_link+0x22d/0xab0 [ 2991.289909][T24020] __rtnl_newlink+0xfa0/0x1790 [ 2991.294880][T24020] rtnl_newlink+0x69/0xa0 [ 2991.299391][T24020] rtnetlink_rcv_msg+0x45e/0xaf0 [ 2991.306697][T24020] netlink_rcv_skb+0x177/0x450 [ 2991.311474][T24020] rtnetlink_rcv+0x1d/0x30 [ 2991.315911][T24020] netlink_unicast+0x58c/0x7d0 [ 2991.320680][T24020] netlink_sendmsg+0x91c/0xea0 [ 2991.325459][T24020] sock_sendmsg+0xd7/0x130 [ 2991.329883][T24020] __sys_sendto+0x262/0x380 [ 2991.334408][T24020] __x64_sys_sendto+0xe1/0x1a0 [ 2991.339300][T24020] do_syscall_64+0xfa/0x790 [ 2991.343828][T24020] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2991.349727][T24020] [ 2991.352159][T24020] Freed by task 13955: [ 2991.356246][T24020] save_stack+0x23/0x90 [ 2991.360407][T24020] __kasan_slab_free+0x102/0x150 [ 2991.365396][T24020] kasan_slab_free+0xe/0x10 [ 2991.369998][T24020] kfree+0x10a/0x2c0 [ 2991.373906][T24020] skb_free_head+0x93/0xb0 [ 2991.378321][T24020] skb_release_data+0x551/0x8d0 [ 2991.383184][T24020] skb_release_all+0x4d/0x60 [ 2991.387798][T24020] consume_skb+0xfb/0x410 [ 2991.392217][T24020] nsim_dev_trap_report_work+0x7cb/0xaf0 [ 2991.397886][T24020] process_one_work+0x9af/0x1740 [ 2991.402846][T24020] worker_thread+0x98/0xe40 [ 2991.407353][T24020] kthread+0x361/0x430 [ 2991.411455][T24020] ret_from_fork+0x24/0x30 [ 2991.415867][T24020] [ 2991.418195][T24020] The buggy address belongs to the object at ffff8880a37fe000 [ 2991.418195][T24020] which belongs to the cache kmalloc-4k of size 4096 [ 2991.432282][T24020] The buggy address is located 3288 bytes inside of [ 2991.432282][T24020] 4096-byte region [ffff8880a37fe000, ffff8880a37ff000) [ 2991.445738][T24020] The buggy address belongs to the page: [ 2991.451396][T24020] page:ffffea00028dff80 refcount:1 mapcount:0 mapping:ffff8880aa402000 index:0x0 compound_mapcount: 0 [ 2991.462453][T24020] raw: 00fffe0000010200 ffffea0002536308 ffffea0002a05908 ffff8880aa402000 [ 2991.471052][T24020] raw: 0000000000000000 ffff8880a37fe000 0000000100000001 0000000000000000 [ 2991.479732][T24020] page dumped because: kasan: bad access detected [ 2991.486163][T24020] [ 2991.488490][T24020] Memory state around the buggy address: [ 2991.494220][T24020] ffff8880a37feb80: 00 00 00 00 00 00 00 00 07 fc fc fc fc fc fc fc [ 2991.502368][T24020] ffff8880a37fec00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2991.510429][T24020] >ffff8880a37fec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2991.518510][T24020] ^ [ 2991.525461][T24020] ffff8880a37fed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2991.533541][T24020] ffff8880a37fed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2991.543268][T24020] ================================================================== [ 2991.552680][T24020] Disabling lock debugging due to kernel taint [ 2991.565007][T24020] Kernel panic - not syncing: panic_on_warn set ... [ 2991.571640][T24020] CPU: 1 PID: 24020 Comm: syz-executor.0 Tainted: G B 5.5.0-rc2-syzkaller #0 [ 2991.581693][T24020] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2991.591830][T24020] Call Trace: [ 2991.595214][T24020] dump_stack+0x197/0x210 [ 2991.599594][T24020] panic+0x2e3/0x75c [ 2991.603474][T24020] ? add_taint.cold+0x16/0x16 [ 2991.608144][T24020] ? hsr_debugfs_rename+0xa8/0xc0 [ 2991.613157][T24020] ? preempt_schedule+0x4b/0x60 [ 2991.618014][T24020] ? ___preempt_schedule+0x16/0x18 [ 2991.623123][T24020] ? trace_hardirqs_on+0x5e/0x240 [ 2991.628276][T24020] ? hsr_debugfs_rename+0xa8/0xc0 [ 2991.633307][T24020] end_report+0x47/0x4f [ 2991.637453][T24020] ? hsr_debugfs_rename+0xa8/0xc0 [ 2991.642462][T24020] __kasan_report.cold+0xe/0x41 [ 2991.647303][T24020] ? hsr_debugfs_rename+0xa8/0xc0 [ 2991.652314][T24020] kasan_report+0x12/0x20 [ 2991.656627][T24020] __asan_report_load8_noabort+0x14/0x20 [ 2991.662240][T24020] hsr_debugfs_rename+0xa8/0xc0 [ 2991.667074][T24020] hsr_netdev_notify+0x6c8/0xa00 [ 2991.672000][T24020] notifier_call_chain+0xc2/0x230 [ 2991.677017][T24020] raw_notifier_call_chain+0x2e/0x40 [ 2991.682298][T24020] call_netdevice_notifiers_info+0xba/0x130 [ 2991.688172][T24020] dev_change_name+0x504/0x930 [ 2991.692973][T24020] ? netdev_adjacent_rename_links+0x2d0/0x2d0 [ 2991.699045][T24020] do_setlink+0x2d28/0x3720 [ 2991.703543][T24020] ? do_setlink+0x2d28/0x3720 [ 2991.708212][T24020] ? __kasan_check_read+0x11/0x20 [ 2991.713224][T24020] ? mark_lock+0xc2/0x1220 [ 2991.717631][T24020] ? rtnl_getlink+0xb40/0xb40 [ 2991.722290][T24020] ? __kasan_check_read+0x11/0x20 [ 2991.727309][T24020] ? mark_lock+0xc2/0x1220 [ 2991.731720][T24020] ? perf_trace_lock_acquire+0xf5/0x530 [ 2991.737251][T24020] ? __kasan_check_read+0x11/0x20 [ 2991.742271][T24020] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2991.748158][T24020] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2991.754393][T24020] ? __nla_validate_parse+0x2d0/0x1ee0 [ 2991.759859][T24020] ? nla_memcpy+0xb0/0xb0 [ 2991.764190][T24020] ? perf_trace_lock_acquire+0xf5/0x530 [ 2991.769753][T24020] ? mark_lock+0xc2/0x1220 [ 2991.774182][T24020] ? is_bpf_text_address+0xac/0x160 [ 2991.779389][T24020] ? __kasan_check_read+0x11/0x20 [ 2991.784441][T24020] __rtnl_newlink+0xbf0/0x1790 [ 2991.789212][T24020] ? rtnl_link_unregister+0x250/0x250 [ 2991.794585][T24020] ? is_bpf_text_address+0xce/0x160 [ 2991.799799][T24020] ? kernel_text_address+0x73/0xf0 [ 2991.804934][T24020] ? unwind_get_return_address+0x61/0xa0 [ 2991.810552][T24020] ? profile_setup.cold+0xbb/0xbb [ 2991.815568][T24020] ? arch_stack_walk+0x97/0xf0 [ 2991.820332][T24020] ? stack_trace_save+0xac/0xe0 [ 2991.825175][T24020] ? stack_trace_consume_entry+0x190/0x190 [ 2991.830964][T24020] ? debug_check_no_obj_freed+0x20a/0x43f [ 2991.836670][T24020] ? trace_hardirqs_off+0x62/0x240 [ 2991.841768][T24020] ? save_stack+0x5c/0x90 [ 2991.846077][T24020] ? save_stack+0x23/0x90 [ 2991.850392][T24020] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2991.856428][T24020] ? kasan_kmalloc+0x9/0x10 [ 2991.861098][T24020] ? kmem_cache_alloc_trace+0x158/0x790 [ 2991.866650][T24020] ? rtnl_newlink+0x4b/0xa0 [ 2991.871139][T24020] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2991.876669][T24020] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 2991.882638][T24020] ? kmem_cache_alloc_trace+0x397/0x790 [ 2991.888170][T24020] rtnl_newlink+0x69/0xa0 [ 2991.892497][T24020] ? __rtnl_newlink+0x1790/0x1790 [ 2991.897505][T24020] rtnetlink_rcv_msg+0x45e/0xaf0 [ 2991.902428][T24020] ? rtnl_bridge_getlink+0x910/0x910 [ 2991.907706][T24020] ? netlink_deliver_tap+0x228/0xbe0 [ 2991.912977][T24020] ? find_held_lock+0x35/0x130 [ 2991.917724][T24020] netlink_rcv_skb+0x177/0x450 [ 2991.922473][T24020] ? rtnl_bridge_getlink+0x910/0x910 [ 2991.927743][T24020] ? netlink_ack+0xb50/0xb50 [ 2991.932334][T24020] ? __rcu_read_unlock+0x224/0x710 [ 2991.937436][T24020] ? __kasan_check_read+0x11/0x20 [ 2991.942445][T24020] ? netlink_deliver_tap+0x24a/0xbe0 [ 2991.947714][T24020] rtnetlink_rcv+0x1d/0x30 [ 2991.952117][T24020] netlink_unicast+0x58c/0x7d0 [ 2991.956880][T24020] ? netlink_attachskb+0x870/0x870 [ 2991.961972][T24020] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2991.967682][T24020] ? __check_object_size+0x3d/0x437 [ 2991.972869][T24020] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2991.978781][T24020] netlink_sendmsg+0x91c/0xea0 [ 2991.983965][T24020] ? netlink_unicast+0x7d0/0x7d0 [ 2991.988887][T24020] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 2991.994432][T24020] ? apparmor_socket_sendmsg+0x2a/0x30 [ 2991.999876][T24020] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2992.006098][T24020] ? security_socket_sendmsg+0x8d/0xc0 [ 2992.012504][T24020] ? netlink_unicast+0x7d0/0x7d0 [ 2992.017423][T24020] sock_sendmsg+0xd7/0x130 [ 2992.021832][T24020] ____sys_sendmsg+0x753/0x880 [ 2992.026576][T24020] ? kernel_sendmsg+0x50/0x50 [ 2992.031235][T24020] ? __fget+0x35d/0x550 [ 2992.035378][T24020] ? find_held_lock+0x35/0x130 [ 2992.040130][T24020] ___sys_sendmsg+0x100/0x170 [ 2992.044792][T24020] ? sendmsg_copy_msghdr+0x70/0x70 [ 2992.049892][T24020] ? __kasan_check_read+0x11/0x20 [ 2992.054900][T24020] ? __fget+0x37f/0x550 [ 2992.059037][T24020] ? ksys_dup3+0x3e0/0x3e0 [ 2992.063441][T24020] ? __fget_light+0x1a9/0x230 [ 2992.068101][T24020] ? __fdget+0x1b/0x20 [ 2992.072164][T24020] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2992.078396][T24020] __sys_sendmsg+0x105/0x1d0 [ 2992.082970][T24020] ? __sys_sendmsg_sock+0xc0/0xc0 [ 2992.087983][T24020] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2992.093435][T24020] ? do_syscall_64+0x26/0x790 [ 2992.098096][T24020] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2992.104147][T24020] ? do_syscall_64+0x26/0x790 [ 2992.108824][T24020] __x64_sys_sendmsg+0x78/0xb0 [ 2992.113576][T24020] do_syscall_64+0xfa/0x790 [ 2992.118149][T24020] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2992.124030][T24020] RIP: 0033:0x45a919 [ 2992.127915][T24020] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2992.147685][T24020] RSP: 002b:00007f6c399f7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2992.156090][T24020] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a919 [ 2992.164133][T24020] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 2992.172107][T24020] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2992.180060][T24020] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6c399f86d4 [ 2992.188022][T24020] R13: 00000000004c99b6 R14: 00000000004e1888 R15: 00000000ffffffff [ 2992.197497][T24020] Kernel Offset: disabled [ 2992.201825][T24020] Rebooting in 86400 seconds..