xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.events\x00', 0x0, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="c30bea420c68d4c488ea340557dd81"], 0xf) openat$cgroup_ro(r2, &(0x7f0000000080)='cpuacct.usage_all\x00', 0x0, 0x0) socketpair(0x19, 0x7, 0x1, &(0x7f00000000c0)) 12:37:45 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0x80, 0x0}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:37:45 executing program 3: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:37:45 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x19, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd842"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) [ 339.051147] protocol 88fb is buggy, dev hsr_slave_0 [ 339.056328] protocol 88fb is buggy, dev hsr_slave_1 12:37:45 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) [ 339.202505] protocol 88fb is buggy, dev hsr_slave_0 [ 339.207749] protocol 88fb is buggy, dev hsr_slave_1 12:37:45 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) [ 339.282488] protocol 88fb is buggy, dev hsr_slave_0 [ 339.287636] protocol 88fb is buggy, dev hsr_slave_1 12:37:45 executing program 3: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:37:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) [ 339.648017] device nr0 entered promiscuous mode 12:37:46 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000040)=0x2000000040000000, 0x4) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="c3dd8100000000000000f7ff000000"], 0xf) 12:37:46 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:37:46 executing program 3: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:37:46 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="5e8b87ee5d80bf447d6eede8c30bea420c68d4c488ea340557dd81"], 0xf) [ 340.229391] device nr0 entered promiscuous mode 12:37:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:37:46 executing program 3: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:37:46 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:37:46 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) socket$kcm(0x29, 0x5, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x5, 0xfffffffffffffffe, 0x4, 0x8, 0x0, 0x8000, 0x250, 0xa, 0xc5, 0x7, 0x9, 0xf4, 0x3, 0x4, 0x5, 0x3, 0x0, 0x9, 0x10001, 0x21b, 0x5, 0x1, 0xb8, 0x7, 0x3ff, 0xff, 0xfff, 0x1000000000000000, 0x4, 0x80000000, 0x4, 0x9, 0x100000000, 0xffffffffffffffff, 0x5, 0x1, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000040), 0x8}, 0x2021, 0x800, 0x0, 0x9, 0x4, 0x7, 0xb95}, 0xffffffffffffffff, 0x3, 0xffffffffffffff9c, 0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cpuset.effective_cpus\x00', 0x0, 0x0) openat$cgroup(r2, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x3, 0x5, 0x10000, 0x0, 0x3, 0x10000, 0x1, 0x9, 0x800000000000000, 0x0, 0x3, 0xfffffffffffffff7, 0x800, 0x81, 0x8001, 0x6, 0x27c302e3, 0x7, 0x5, 0x1, 0xd0000000, 0x5, 0x3f, 0x1, 0xb693, 0x6, 0x1000, 0x6, 0x0, 0x7f, 0x1, 0x7, 0x0, 0x40, 0x9, 0x0, 0x0, 0x7, @perf_bp={&(0x7f0000000140), 0x4}, 0x4, 0x9, 0x6, 0xf, 0xffff, 0x3, 0xfffffffffffffffa}, 0x0, 0x6, 0xffffffffffffff9c, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, r3, 0x0, 0xd, &(0x7f00000002c0)='/dev/net/tun\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x1, 0x0, 0x7, 0x8000, 0x0, 0x44, 0x1a30, 0x6, 0xfdf0, 0x401, 0x7, 0x5, 0x800, 0x5, 0xb6, 0x5, 0x7, 0x2, 0x10001, 0x2, 0xf3b8, 0x54e, 0x1d9, 0x945bc4f, 0x5, 0x80000000, 0x5, 0x0, 0x60000000, 0x4, 0x6, 0xe0000000000, 0x4, 0x2, 0x9, 0x7, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000200), 0x1}, 0x10001, 0x4, 0x101, 0x0, 0xfd17, 0x0, 0x6}, r4, 0x7, r1, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="c30bea420c68d4c488ea340557dd81"], 0xf) 12:37:46 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0x80, 0x0}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:37:47 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000040)=0x2000000040000000, 0x4) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="c3dd8100000000000000f7ff000000"], 0xf) [ 340.588863] device nr0 entered promiscuous mode 12:37:47 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r2 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="c30bea420c68d4c488ea340557dd81"], 0xf) 12:37:47 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:37:47 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000200)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./\x00gro\xffp/syz1\x00\x1f\x12\x9d\xbeo\xba\x8c[\"\xa2\x9f\xec}rQ\xbeghn\xf6\xf2\xcb\x0e-\xd7\x12X+\xd57\x93d\xa6(!\x18\xf6~\xd8\x17\x16\x1d\xd7]\xd4\xeegB\x12k%\x8d\x1e^\x10\xbc\xa7UE\xd3\xef\x05\x9c\fb#ewl\x88\x83\xf8\xe1\xf7r\x06\xa2\x16\xbe\xeeq\xcc~U\xd3\xe33\x8d\x00u\x1e\x95\x1a\xf96\rH\xad\xa4\x9e\xb8U\xb3\x05t\xaba\xcb*\xcd\xa5\xf4\xe2\xbb\x81Z\x1e\x87\xd2\xe1\x15\xd1\x1cY0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0xa, &(0x7f0000000140)='\xd0em1)eth1\x00'}, 0x30) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000280)='bdev]/\x00') r3 = perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x9, 0xb92, 0xdb, 0x8, 0x0, 0x3, 0x24010, 0x8, 0x0, 0xf92, 0x6, 0x7, 0x3, 0x40, 0x3d2d, 0x8, 0xffffffff80000000, 0x0, 0x7, 0x0, 0x9ac, 0x4, 0x7ff, 0x7, 0x4, 0x369, 0xef1, 0x100000000, 0x7, 0x7, 0x1ff, 0x2, 0x7, 0x81, 0x7, 0xdeb, 0x0, 0x7, 0x2, @perf_bp={&(0x7f00000001c0), 0x8}, 0x4, 0x80, 0x10000, 0x6, 0x21f4, 0x20, 0xfff}, 0x0, 0x8, 0xffffffffffffff9c, 0x9) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x1, 0x400, 0x5, 0x0, 0x0, 0x101, 0x8, 0x4, 0x7fff, 0x5, 0x10001, 0xc0, 0x7, 0x85, 0xcd9, 0x0, 0x3c, 0x45, 0x6, 0x8001, 0x100000001, 0x0, 0x2b, 0x7, 0x2ec, 0x6a6, 0x8, 0xfffffffffffffff9, 0x7, 0xad5f, 0x9, 0x2, 0x10001, 0x2, 0x6, 0x800, 0x0, 0x7fff, 0x0, @perf_config_ext={0x5, 0x10001}, 0x400, 0x3, 0x5, 0x6, 0x1, 0xa123, 0x800}, r1, 0x7, r3, 0x1) r4 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="c3dd8100000000000000f7ff000000"], 0xf) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) 12:37:50 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) [ 344.505353] device nr0 entered promiscuous mode 12:37:51 executing program 1: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="c3dd8100000000000000f7ff000000"], 0xf) 12:37:51 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') close(r1) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="c30b96e6a20c68d4c488ea340557dd81"], 0xf) 12:37:51 executing program 3: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x19, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd842"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) [ 344.562481] protocol 88fb is buggy, dev hsr_slave_0 [ 344.567618] protocol 88fb is buggy, dev hsr_slave_1 12:37:51 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:37:51 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:37:51 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:37:51 executing program 3: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:37:51 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:37:51 executing program 3: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:37:51 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:37:51 executing program 1: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="c3dd8100000000000000f7ff000000"], 0xf) 12:37:51 executing program 0: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x19, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd842"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:37:51 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='pids.current\x00', 0x0, 0x0) write$cgroup_subtree(r2, &(0x7f0000000140)={[{0x2d, 'pids'}, {0x2f, 'cpu'}, {0x2f, 'memory'}, {0x2b, 'cpu'}]}, 0x18) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x2100, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="c30bea42dd81025a1c37324d84bef4bd53bd01b7ded55504874e7c53a677edc81071d7afc4e0fbd6e2cf2a2f6ab4946b197e3b10ac1f5e350fd3b2ee328a77e3c6af44ebd28ca1224263a60c59bef406b52d3472429210efa92f8b0000000000081a2e823b82ba3b1b8404151292"], 0xf) 12:37:51 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:37:51 executing program 3: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) [ 345.282529] protocol 88fb is buggy, dev hsr_slave_0 [ 345.287715] protocol 88fb is buggy, dev hsr_slave_1 12:37:51 executing program 2: unlink(&(0x7f0000000040)='./file0\x00') r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="c30bea03ea8b99c4740058bcf6adbd"], 0xf) 12:37:51 executing program 1: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="c3dd8100000000000000f7ff000000"], 0xf) 12:37:51 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) [ 345.442540] protocol 88fb is buggy, dev hsr_slave_0 [ 345.447674] protocol 88fb is buggy, dev hsr_slave_1 12:37:52 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='pids.current\x00', 0x0, 0x0) write$cgroup_subtree(r2, &(0x7f0000000140)={[{0x2d, 'pids'}, {0x2f, 'cpu'}, {0x2f, 'memory'}, {0x2b, 'cpu'}]}, 0x18) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x2100, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="c30bea42dd81025a1c37324d84bef4bd53bd01b7ded55504874e7c53a677edc81071d7afc4e0fbd6e2cf2a2f6ab4946b197e3b10ac1f5e350fd3b2ee328a77e3c6af44ebd28ca1224263a60c59bef406b52d3472429210efa92f8b0000000000081a2e823b82ba3b1b8404151292"], 0xf) 12:37:52 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffff9c, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)=r2, 0x4) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040), 0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000080)=r3) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="c30bea420c68d4c488ea340557dd81"], 0xf) 12:37:52 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:37:52 executing program 3: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf3107"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:37:52 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="c3dd8100000000000000f7ff000000"], 0xf) [ 345.640991] device nr0 entered promiscuous mode 12:37:52 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:37:52 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0xd, &(0x7f0000000040)='/dev/net/tun\x00'}, 0x30) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="830bea420c68d4c488ea340557dd81"], 0xf) 12:37:52 executing program 3: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf3107"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:37:52 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x13, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:37:52 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) socket$kcm(0x11, 0x2, 0x300) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000440)=r1, 0x4) 12:37:52 executing program 3: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf3107"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:37:52 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) socket$kcm(0x11, 0x2, 0x300) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000440)=r1, 0x4) [ 346.347835] device nr0 entered promiscuous mode 12:37:53 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x0, &(0x7f0000000280)=ANY=[], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:37:53 executing program 3: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:37:53 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) socket$kcm(0x11, 0x2, 0x300) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000440)=r1, 0x4) 12:37:53 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x13, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:37:53 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) socket$kcm(0x29, 0x5, 0x0) r1 = perf_event_open$cgroup(&(0x7f0000000140)={0x1, 0x70, 0x3, 0x9, 0x1, 0x3, 0x0, 0x4, 0x1002, 0x1, 0x4, 0x3, 0x8, 0x0, 0x8f, 0x8000, 0xfffffffffffffffe, 0xffff, 0x8001, 0x5, 0x8, 0x1, 0x9, 0x4bb4, 0x9, 0x100000000000, 0x3, 0x5, 0x0, 0xb000000000000000, 0x6, 0x80000000, 0x1, 0x4, 0x0, 0x6, 0x3, 0x9, 0x0, 0x6, 0x7, @perf_bp={&(0x7f0000000000), 0x4}, 0x408, 0x1, 0x1f, 0x0, 0x8, 0x1, 0x7}, 0xffffffffffffff9c, 0x8, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000000c0)=0x5) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='wlan1&\xf5\x00') write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="c30bea420c0afc21c940d421f769bef40168d4c488ea340557dd81"], 0xf) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='cgroupvmnet1keyringvboxnet1GPL&\x00', r2}, 0x10) 12:37:53 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="c3dd8100000000000000f7ff000000"], 0xf) 12:37:53 executing program 3: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:37:53 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) [ 346.758897] device nr0 entered promiscuous mode 12:37:53 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, 0x0, 0x0) 12:37:53 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0), 0x9}, 0x2) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000440)=r1, 0x4) 12:37:53 executing program 3: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:37:53 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x13, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:37:53 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, 0x0, 0x0) 12:37:53 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x13, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:37:53 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:37:53 executing program 3: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:37:54 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) 12:37:54 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x17, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:37:54 executing program 3: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:37:54 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="c3dd8100000000000000f7ff000000"], 0xf) 12:37:54 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x13, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:37:54 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, 0x0, 0x0) 12:37:54 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, 0x0, 0x0) [ 347.849711] device nr0 entered promiscuous mode 12:37:54 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:37:54 executing program 3: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:37:54 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x17, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:37:54 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:37:54 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440), 0x4) 12:37:54 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 12:37:54 executing program 3: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:37:54 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x17, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:37:55 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="c3dd8100000000000000f7ff000000"], 0xf) 12:37:55 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000440)=r1, 0x4) 12:37:55 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440), 0x4) 12:37:55 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440), 0x4) 12:37:55 executing program 3: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:37:55 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x18, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf14"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) [ 348.722677] net_ratelimit: 6 callbacks suppressed [ 348.722685] protocol 88fb is buggy, dev hsr_slave_0 [ 348.732775] protocol 88fb is buggy, dev hsr_slave_1 12:37:55 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="c3dd8100000000000000f7ff000000"], 0xf) 12:37:55 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0x80, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) 12:37:55 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0x80, 0x0}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:37:55 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440), 0x4) 12:37:55 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x18, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf14"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:37:55 executing program 3: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:37:55 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="c3dd8100000000000000f7ff000000"], 0xf) 12:37:55 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0x80, 0x0}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:37:55 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440), 0x4) 12:37:55 executing program 3: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) socket$kcm(0x11, 0x2, 0x300) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000440)=r1, 0x4) [ 349.448143] protocol 88fb is buggy, dev hsr_slave_0 [ 349.454005] protocol 88fb is buggy, dev hsr_slave_1 12:37:56 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0x80, 0x0}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:37:56 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="c3dd8100000000000000f7ff000000"], 0xf) [ 349.522657] protocol 88fb is buggy, dev hsr_slave_0 [ 349.527766] protocol 88fb is buggy, dev hsr_slave_1 12:37:56 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x18, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf14"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:37:56 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0x80, 0x0}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:37:56 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0x80, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) [ 349.603052] protocol 88fb is buggy, dev hsr_slave_0 [ 349.609045] protocol 88fb is buggy, dev hsr_slave_1 [ 349.682504] protocol 88fb is buggy, dev hsr_slave_0 [ 349.687681] protocol 88fb is buggy, dev hsr_slave_1 12:37:56 executing program 3: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) socket$kcm(0x11, 0x2, 0x300) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000440)=r1, 0x4) 12:37:56 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="c3dd8100000000000000f7ff000000"], 0xf) 12:37:56 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0x80, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) 12:37:56 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, 0x0, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:37:56 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) socket$kcm(0x11, 0x2, 0x300) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) 12:37:56 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, 0x0, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:37:56 executing program 3: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) socket$kcm(0x11, 0x2, 0x300) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000440)=r1, 0x4) 12:37:56 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x19, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd842"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:37:56 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0), 0x9}, 0x2) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) socket$kcm(0x11, 0x2, 0x300) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) 12:37:56 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="c3dd8100000000000000f7ff000000"], 0xf) 12:37:56 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) socket$kcm(0x11, 0x2, 0x300) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) 12:37:56 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00'}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="c3dd8100000000000000f7ff000000"], 0xf) 12:37:56 executing program 3: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, 0x0, 0x0) 12:37:56 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:37:56 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) 12:37:57 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:37:57 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x19, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd842"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:37:57 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:37:57 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00'}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="c3dd8100000000000000f7ff000000"], 0xf) 12:37:57 executing program 3: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, 0x0, 0x0) 12:37:57 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) 12:37:57 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x19, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd842"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:37:57 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00'}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="c3dd8100000000000000f7ff000000"], 0xf) 12:37:57 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) 12:37:57 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) 12:37:57 executing program 3: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, 0x0, 0x0) 12:37:57 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="c3dd8100000000000000f7ff000000"], 0xf) 12:37:57 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) 12:37:57 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) 12:37:58 executing program 2: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0), 0x9}, 0x2) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:37:58 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:37:58 executing program 3: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440), 0x4) 12:37:58 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) socket$kcm(0x11, 0x2, 0x300) 12:37:58 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="c3dd8100000000000000f7ff000000"], 0xf) 12:37:58 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) socket$kcm(0x11, 0x2, 0x300) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) 12:37:58 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="c3dd8100000000000000f7ff000000"], 0xf) 12:37:58 executing program 3: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440), 0x4) 12:37:58 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0), 0x9}, 0x2) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000440)=r1, 0x4) 12:37:58 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0), 0x9}, 0x2) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000440)=r1, 0x4) 12:37:58 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) socket$kcm(0x11, 0x2, 0x300) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) 12:37:58 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="c3dd8100000000000000f7ff000000"], 0xf) 12:37:58 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0), 0x9}, 0x2) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:37:58 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:37:58 executing program 3: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440), 0x4) 12:37:58 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:37:58 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="c3dd8100000000000000f7ff000000"], 0xf) 12:37:58 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0), 0x9}, 0x2) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:37:59 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0), 0x9}, 0x2) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:37:59 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:37:59 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="c3dd8100000000000000f7ff000000"], 0xf) 12:37:59 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0), 0x9}, 0x2) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000440)=r1, 0x4) 12:37:59 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0), 0x9}, 0x2) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000440)=r1, 0x4) 12:37:59 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0), 0x9}, 0x2) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r0 = socket$kcm(0x11, 0x2, 0x300) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000440)=r1, 0x4) 12:37:59 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf3107"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:37:59 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0), 0x9}, 0x2) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:37:59 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, 0x0) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="c3dd8100000000000000f7ff000000"], 0xf) 12:37:59 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0), 0x9}, 0x2) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:37:59 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0), 0x9}, 0x2) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r2 = socket$kcm(0x11, 0x2, 0x300) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000440), 0x4) 12:38:00 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf3107"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:00 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r2 = socket$kcm(0x11, 0x2, 0x300) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000440)=r3, 0x4) [ 353.762541] net_ratelimit: 10 callbacks suppressed [ 353.762549] protocol 88fb is buggy, dev hsr_slave_0 [ 353.772717] protocol 88fb is buggy, dev hsr_slave_1 12:38:00 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, 0x0) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="c3dd8100000000000000f7ff000000"], 0xf) [ 353.812323] protocol 88fb is buggy, dev hsr_slave_0 [ 353.817933] protocol 88fb is buggy, dev hsr_slave_1 [ 353.842493] protocol 88fb is buggy, dev hsr_slave_0 [ 353.847581] protocol 88fb is buggy, dev hsr_slave_1 12:38:00 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, 0x0) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="c3dd8100000000000000f7ff000000"], 0xf) 12:38:00 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0), 0x9}, 0x2) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r2 = socket$kcm(0x11, 0x2, 0x300) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000440), 0x4) 12:38:00 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={0x0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, &(0x7f00000002c0)=""/212}, 0x18) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x20000400000037, 0x0, 0xffffffffffffffff}, 0x2c) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8946, &(0x7f0000000100)='lo\x00\x96o\xd6Q\xb1Y\xa9\xc8J,`\xd2\x98\x00\x00\x00 ') r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) r4 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="c30bea420c68d4c488ea340557dd81"], 0xf) ioctl$TUNDETACHFILTER(r3, 0x401054d6, 0x0) 12:38:00 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={0x0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, &(0x7f00000002c0)=""/212}, 0x18) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x20000400000037, 0x0, 0xffffffffffffffff}, 0x2c) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8946, &(0x7f0000000100)='lo\x00\x96o\xd6Q\xb1Y\xa9\xc8J,`\xd2\x98\x00\x00\x00 ') r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) r4 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="c30bea420c68d4c488ea340557dd81"], 0xf) ioctl$TUNDETACHFILTER(r3, 0x401054d6, 0x0) 12:38:00 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf3107"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:00 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r2 = socket$kcm(0x11, 0x2, 0x300) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000440)=r3, 0x4) 12:38:00 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="c3dd8100000000000000f7ff000000"], 0xf) 12:38:00 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0), 0x9}, 0x2) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) socket$kcm(0x11, 0x2, 0x300) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) 12:38:00 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={0x0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, &(0x7f00000002c0)=""/212}, 0x18) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x20000400000037, 0x0, 0xffffffffffffffff}, 0x2c) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8946, &(0x7f0000000100)='lo\x00\x96o\xd6Q\xb1Y\xa9\xc8J,`\xd2\x98\x00\x00\x00 ') r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) r4 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="c30bea420c68d4c488ea340557dd81"], 0xf) ioctl$TUNDETACHFILTER(r3, 0x401054d6, 0x0) [ 354.409016] device nr0 entered promiscuous mode 12:38:01 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0), 0x9}, 0x2) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:01 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:01 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0), 0x9}, 0x2) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:01 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) [ 354.965081] protocol 88fb is buggy, dev hsr_slave_0 [ 354.971005] protocol 88fb is buggy, dev hsr_slave_1 12:38:01 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0), 0x9}, 0x2) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:01 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0), 0x9}, 0x2) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r2 = socket$kcm(0x11, 0x2, 0x300) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000440), 0x4) 12:38:01 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={0x0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, &(0x7f00000002c0)=""/212}, 0x18) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x20000400000037, 0x0, 0xffffffffffffffff}, 0x2c) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8946, &(0x7f0000000100)='lo\x00\x96o\xd6Q\xb1Y\xa9\xc8J,`\xd2\x98\x00\x00\x00 ') r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) r4 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="c30bea420c68d4c488ea340557dd81"], 0xf) ioctl$TUNDETACHFILTER(r3, 0x401054d6, 0x0) 12:38:01 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:01 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="c3dd8100000000000000f7ff000000"], 0xf) 12:38:02 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0), 0x9}, 0x2) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) socket$kcm(0x11, 0x2, 0x300) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) 12:38:02 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0), 0x9}, 0x2) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r2 = socket$kcm(0x11, 0x2, 0x300) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000440), 0x4) [ 355.501465] device nr0 entered promiscuous mode 12:38:02 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0), 0x9}, 0x2) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r2 = socket$kcm(0x11, 0x2, 0x300) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000440)=r3, 0x4) 12:38:02 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) [ 355.682533] protocol 88fb is buggy, dev hsr_slave_0 [ 355.687679] protocol 88fb is buggy, dev hsr_slave_1 12:38:02 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0), 0x9}, 0x2) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) socket$kcm(0x11, 0x2, 0x300) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) 12:38:02 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0), 0x9}, 0x2) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r2 = socket$kcm(0x11, 0x2, 0x300) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000440)=r3, 0x4) openat$cgroup_subtree(r1, &(0x7f0000000200)='cgroup.subtree_control\x00', 0x2, 0x0) 12:38:02 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0), 0x9}, 0x2) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) socket$kcm(0x11, 0x2, 0x300) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) 12:38:02 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:03 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0), 0x9}, 0x2) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r2 = socket$kcm(0x11, 0x2, 0x300) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000440)=r3, 0x4) openat$cgroup_subtree(r1, &(0x7f0000000200)='cgroup.subtree_control\x00', 0x2, 0x0) 12:38:03 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:03 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0), 0x9}, 0x2) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r2 = socket$kcm(0x11, 0x2, 0x300) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], &(0x7f00000011c0)='syzkaller\x00', 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000440)=r3, 0x4) openat$cgroup_subtree(r1, &(0x7f0000000200)='cgroup.subtree_control\x00', 0x2, 0x0) r4 = openat$cgroup_int(r1, &(0x7f0000000100)='cgroup.max.depth\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000140)=0x5, 0x12) 12:38:03 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="c3dd8100000000000000f7ff000000"], 0xf) 12:38:03 executing program 5 (fault-call:2 fault-nth:0): r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:03 executing program 3 (fault-call:3 fault-nth:0): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:03 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) [ 356.830889] FAULT_INJECTION: forcing a failure. [ 356.830889] name failslab, interval 1, probability 0, space 0, times 0 [ 356.855082] FAULT_INJECTION: forcing a failure. [ 356.855082] name failslab, interval 1, probability 0, space 0, times 0 [ 356.911696] CPU: 1 PID: 19376 Comm: syz-executor.5 Not tainted 5.0.0-rc4+ #39 [ 356.919015] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 356.928366] Call Trace: [ 356.928395] dump_stack+0x172/0x1f0 [ 356.928422] should_fail.cold+0xa/0x1b [ 356.928443] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 356.931647] device nr0 entered promiscuous mode [ 356.934638] ? lock_downgrade+0x810/0x810 [ 356.934658] ? ___might_sleep+0x163/0x280 [ 356.934676] __should_failslab+0x121/0x190 [ 356.934696] should_failslab+0x9/0x14 [ 356.934710] __kmalloc+0x2dc/0x740 [ 356.934731] ? find_held_lock+0x35/0x130 [ 356.972326] ? __might_fault+0x12b/0x1e0 [ 356.976399] ? rw_copy_check_uvector+0x28c/0x330 [ 356.981166] rw_copy_check_uvector+0x28c/0x330 [ 356.985758] ? lock_downgrade+0x810/0x810 [ 356.989923] import_iovec+0xbf/0x200 [ 356.993650] ? dup_iter+0x260/0x260 [ 356.997286] ? _copy_from_user+0xdd/0x150 [ 357.001445] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 357.007112] copy_msghdr_from_user+0x2c8/0x430 [ 357.011719] ? move_addr_to_kernel.part.0+0x110/0x110 [ 357.016926] ? __lock_is_held+0xb6/0x140 [ 357.021008] ___sys_sendmsg+0x10b/0x930 [ 357.025000] ? copy_msghdr_from_user+0x430/0x430 [ 357.029776] ? lock_downgrade+0x810/0x810 [ 357.033937] ? kasan_check_read+0x11/0x20 [ 357.038173] ? __fget+0x367/0x540 [ 357.041747] ? __fget_light+0x1a9/0x230 [ 357.045732] ? __fdget+0x1b/0x20 [ 357.049107] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 357.054663] __sys_sendmsg+0x105/0x1d0 [ 357.058578] ? __ia32_sys_shutdown+0x80/0x80 [ 357.062998] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 357.068548] ? fput+0x128/0x1a0 [ 357.071859] ? ksys_write+0x166/0x1f0 [ 357.075679] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 357.080449] ? do_syscall_64+0x26/0x610 [ 357.084435] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 357.089800] ? do_syscall_64+0x26/0x610 [ 357.093783] __x64_sys_sendmsg+0x78/0xb0 [ 357.097854] do_syscall_64+0x103/0x610 [ 357.101756] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 357.106951] RIP: 0033:0x457e29 [ 357.110147] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 357.129050] RSP: 002b:00007f28df43ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 357.136767] RAX: ffffffffffffffda RBX: 00007f28df43ec90 RCX: 0000000000457e29 [ 357.144042] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000003 [ 357.151321] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 357.158595] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f28df43f6d4 [ 357.165873] R13: 00000000004c53f7 R14: 00000000004d9208 R15: 0000000000000004 [ 357.173173] CPU: 0 PID: 19377 Comm: syz-executor.3 Not tainted 5.0.0-rc4+ #39 [ 357.180464] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 357.189827] Call Trace: [ 357.192432] dump_stack+0x172/0x1f0 [ 357.196070] should_fail.cold+0xa/0x1b [ 357.199968] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 357.205081] ? lock_downgrade+0x810/0x810 [ 357.209243] ? ___might_sleep+0x163/0x280 [ 357.213400] __should_failslab+0x121/0x190 [ 357.217640] should_failslab+0x9/0x14 [ 357.221449] __kmalloc+0x2dc/0x740 [ 357.224990] ? find_held_lock+0x35/0x130 [ 357.229052] ? __might_fault+0x12b/0x1e0 [ 357.233207] ? rw_copy_check_uvector+0x28c/0x330 [ 357.237979] rw_copy_check_uvector+0x28c/0x330 [ 357.242577] ? lock_downgrade+0x810/0x810 [ 357.246738] import_iovec+0xbf/0x200 [ 357.250454] ? dup_iter+0x260/0x260 [ 357.254079] ? _copy_from_user+0xdd/0x150 [ 357.258231] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 357.263774] copy_msghdr_from_user+0x2c8/0x430 [ 357.268362] ? move_addr_to_kernel.part.0+0x110/0x110 [ 357.273581] ? __lock_is_held+0xb6/0x140 [ 357.277657] ___sys_sendmsg+0x10b/0x930 [ 357.281636] ? copy_msghdr_from_user+0x430/0x430 [ 357.286401] ? lock_downgrade+0x810/0x810 [ 357.290564] ? kasan_check_read+0x11/0x20 [ 357.294731] ? __fget+0x367/0x540 [ 357.298210] ? __fget_light+0x1a9/0x230 [ 357.302187] ? __fdget+0x1b/0x20 [ 357.305566] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 357.311203] __sys_sendmsg+0x105/0x1d0 [ 357.315093] ? __ia32_sys_shutdown+0x80/0x80 [ 357.319501] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 357.325040] ? fput+0x128/0x1a0 [ 357.328319] ? ksys_write+0x166/0x1f0 [ 357.332127] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 357.336882] ? do_syscall_64+0x26/0x610 [ 357.340861] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 357.346226] ? do_syscall_64+0x26/0x610 [ 357.350225] __x64_sys_sendmsg+0x78/0xb0 [ 357.354294] do_syscall_64+0x103/0x610 [ 357.358194] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 357.363394] RIP: 0033:0x457e29 [ 357.366603] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 357.385506] RSP: 002b:00007f9603419c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 357.393213] RAX: ffffffffffffffda RBX: 00007f9603419c90 RCX: 0000000000457e29 [ 357.400481] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000004 [ 357.407745] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 357.415017] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f960341a6d4 [ 357.422287] R13: 00000000004c53f7 R14: 00000000004d9208 R15: 0000000000000005 12:38:04 executing program 3 (fault-call:3 fault-nth:1): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:04 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:04 executing program 2 (fault-call:3 fault-nth:0): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) [ 357.593174] FAULT_INJECTION: forcing a failure. [ 357.593174] name failslab, interval 1, probability 0, space 0, times 0 [ 357.612343] CPU: 1 PID: 19391 Comm: syz-executor.3 Not tainted 5.0.0-rc4+ #39 [ 357.619768] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 357.629124] Call Trace: [ 357.631721] dump_stack+0x172/0x1f0 [ 357.635360] should_fail.cold+0xa/0x1b [ 357.639257] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 357.644366] ? lock_downgrade+0x810/0x810 [ 357.648520] ? ___might_sleep+0x163/0x280 [ 357.652687] __should_failslab+0x121/0x190 [ 357.656926] should_failslab+0x9/0x14 [ 357.660727] kmem_cache_alloc_node+0x265/0x710 [ 357.665316] ? mark_held_locks+0x100/0x100 [ 357.669549] ? check_noncircular+0x20/0x20 [ 357.673836] __alloc_skb+0xd5/0x5e0 [ 357.677471] ? skb_scrub_packet+0x440/0x440 [ 357.681791] ? find_held_lock+0x35/0x130 [ 357.685928] ? ip6_mtu+0x2e6/0x460 [ 357.689482] __ip6_append_data.isra.0+0x29ed/0x3600 [ 357.694533] ? rawv6_mh_filter_unregister+0x20/0x20 [ 357.699581] ? dst_output+0x180/0x180 [ 357.703387] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 357.708237] ip6_append_data+0x1e5/0x320 [ 357.712307] ? rawv6_mh_filter_unregister+0x20/0x20 [ 357.717333] ? rawv6_mh_filter_unregister+0x20/0x20 [ 357.722359] rawv6_sendmsg+0x146b/0x35f0 [ 357.726466] ? __audit_ptrace+0x1f1/0x590 [ 357.730621] ? compat_rawv6_getsockopt+0x150/0x150 [ 357.735625] ? aa_profile_af_perm+0x320/0x320 [ 357.740130] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 357.745146] ? rw_copy_check_uvector+0x2a6/0x330 [ 357.749916] ? ___might_sleep+0x163/0x280 [ 357.754085] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 357.758987] inet_sendmsg+0x147/0x5d0 [ 357.762795] ? compat_rawv6_getsockopt+0x150/0x150 [ 357.767726] ? inet_sendmsg+0x147/0x5d0 [ 357.771700] ? ipip_gro_receive+0x100/0x100 [ 357.776025] sock_sendmsg+0xdd/0x130 [ 357.779742] ___sys_sendmsg+0x806/0x930 [ 357.783721] ? copy_msghdr_from_user+0x430/0x430 [ 357.788482] ? lock_downgrade+0x810/0x810 [ 357.792635] ? kasan_check_read+0x11/0x20 [ 357.796796] ? __fget+0x367/0x540 [ 357.800267] ? __fget_light+0x1a9/0x230 [ 357.804245] ? __fdget+0x1b/0x20 [ 357.807616] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 357.813160] __sys_sendmsg+0x105/0x1d0 [ 357.817050] ? __ia32_sys_shutdown+0x80/0x80 [ 357.821461] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 357.826998] ? fput+0x128/0x1a0 [ 357.830290] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 357.835045] ? do_syscall_64+0x26/0x610 [ 357.839030] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 357.844390] ? do_syscall_64+0x26/0x610 [ 357.848377] __x64_sys_sendmsg+0x78/0xb0 [ 357.852444] do_syscall_64+0x103/0x610 [ 357.856338] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 357.861525] RIP: 0033:0x457e29 [ 357.864716] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 357.883617] RSP: 002b:00007f9603419c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 12:38:04 executing program 0 (fault-call:2 fault-nth:0): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) 12:38:04 executing program 5 (fault-call:2 fault-nth:1): r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) [ 357.891325] RAX: ffffffffffffffda RBX: 00007f9603419c90 RCX: 0000000000457e29 [ 357.898594] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000004 [ 357.905862] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 357.913128] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f960341a6d4 [ 357.920393] R13: 00000000004c53f7 R14: 00000000004d9208 R15: 0000000000000005 [ 357.975911] FAULT_INJECTION: forcing a failure. [ 357.975911] name failslab, interval 1, probability 0, space 0, times 0 [ 358.019726] FAULT_INJECTION: forcing a failure. [ 358.019726] name failslab, interval 1, probability 0, space 0, times 0 [ 358.044830] FAULT_INJECTION: forcing a failure. [ 358.044830] name failslab, interval 1, probability 0, space 0, times 0 [ 358.056385] CPU: 1 PID: 19401 Comm: syz-executor.5 Not tainted 5.0.0-rc4+ #39 [ 358.063670] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 358.073016] Call Trace: [ 358.075611] dump_stack+0x172/0x1f0 [ 358.079251] should_fail.cold+0xa/0x1b [ 358.083144] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 358.088249] ? lock_downgrade+0x810/0x810 [ 358.092402] ? ___might_sleep+0x163/0x280 [ 358.096556] __should_failslab+0x121/0x190 [ 358.100813] should_failslab+0x9/0x14 [ 358.104619] kmem_cache_alloc_node+0x265/0x710 [ 358.109202] ? mark_held_locks+0x100/0x100 [ 358.113439] ? check_noncircular+0x20/0x20 [ 358.117684] __alloc_skb+0xd5/0x5e0 [ 358.121316] ? skb_scrub_packet+0x440/0x440 [ 358.125636] ? find_held_lock+0x35/0x130 [ 358.129702] ? ip6_mtu+0x2e6/0x460 [ 358.133252] __ip6_append_data.isra.0+0x29ed/0x3600 [ 358.138281] ? rawv6_mh_filter_unregister+0x20/0x20 [ 358.143313] ? dst_output+0x180/0x180 [ 358.147117] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 358.151965] ip6_append_data+0x1e5/0x320 [ 358.156026] ? rawv6_mh_filter_unregister+0x20/0x20 [ 358.161048] ? rawv6_mh_filter_unregister+0x20/0x20 [ 358.166083] rawv6_sendmsg+0x146b/0x35f0 [ 358.170152] ? __audit_ptrace+0x1f1/0x590 [ 358.174305] ? compat_rawv6_getsockopt+0x150/0x150 [ 358.179243] ? aa_profile_af_perm+0x320/0x320 [ 358.183745] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 358.188765] ? rw_copy_check_uvector+0x2a6/0x330 [ 358.193538] ? ___might_sleep+0x163/0x280 [ 358.197714] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 358.202570] inet_sendmsg+0x147/0x5d0 [ 358.206372] ? compat_rawv6_getsockopt+0x150/0x150 [ 358.211302] ? inet_sendmsg+0x147/0x5d0 [ 358.215276] ? ipip_gro_receive+0x100/0x100 [ 358.219603] sock_sendmsg+0xdd/0x130 [ 358.223319] ___sys_sendmsg+0x806/0x930 [ 358.227298] ? copy_msghdr_from_user+0x430/0x430 [ 358.232062] ? lock_downgrade+0x810/0x810 [ 358.236220] ? kasan_check_read+0x11/0x20 [ 358.240370] ? __fget+0x367/0x540 [ 358.243841] ? __fget_light+0x1a9/0x230 [ 358.247820] ? __fdget+0x1b/0x20 [ 358.251183] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 358.256724] __sys_sendmsg+0x105/0x1d0 [ 358.260617] ? __ia32_sys_shutdown+0x80/0x80 [ 358.265029] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 358.270577] ? fput+0x128/0x1a0 [ 358.273869] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 358.278624] ? do_syscall_64+0x26/0x610 [ 358.282602] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 358.287968] ? do_syscall_64+0x26/0x610 [ 358.291948] __x64_sys_sendmsg+0x78/0xb0 [ 358.296014] do_syscall_64+0x103/0x610 [ 358.299912] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 358.305102] RIP: 0033:0x457e29 [ 358.308295] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 358.327191] RSP: 002b:00007f28df43ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 358.334901] RAX: ffffffffffffffda RBX: 00007f28df43ec90 RCX: 0000000000457e29 [ 358.342163] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000003 [ 358.349430] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 358.356695] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f28df43f6d4 [ 358.363963] R13: 00000000004c53f7 R14: 00000000004d9208 R15: 0000000000000004 [ 358.374707] CPU: 1 PID: 19396 Comm: syz-executor.2 Not tainted 5.0.0-rc4+ #39 [ 358.382011] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 358.391365] Call Trace: [ 358.393970] dump_stack+0x172/0x1f0 [ 358.397618] should_fail.cold+0xa/0x1b [ 358.401522] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 358.406649] ? lock_downgrade+0x810/0x810 [ 358.410807] ? ___might_sleep+0x163/0x280 [ 358.414963] __should_failslab+0x121/0x190 [ 358.419206] should_failslab+0x9/0x14 [ 358.423021] __kmalloc+0x2dc/0x740 [ 358.426576] ? find_held_lock+0x35/0x130 [ 358.430645] ? __might_fault+0x12b/0x1e0 [ 358.434712] ? rw_copy_check_uvector+0x28c/0x330 [ 358.439473] rw_copy_check_uvector+0x28c/0x330 [ 358.444213] ? lock_downgrade+0x810/0x810 [ 358.448376] import_iovec+0xbf/0x200 [ 358.452105] ? dup_iter+0x260/0x260 [ 358.455735] ? _copy_from_user+0xdd/0x150 [ 358.459893] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 358.465444] copy_msghdr_from_user+0x2c8/0x430 [ 358.470036] ? move_addr_to_kernel.part.0+0x110/0x110 [ 358.475243] ? __lock_is_held+0xb6/0x140 [ 358.479317] ___sys_sendmsg+0x10b/0x930 [ 358.483301] ? copy_msghdr_from_user+0x430/0x430 [ 358.488065] ? lock_downgrade+0x810/0x810 [ 358.492225] ? kasan_check_read+0x11/0x20 [ 358.496376] ? __fget+0x367/0x540 [ 358.499843] ? __fget_light+0x1a9/0x230 [ 358.503819] ? __fdget+0x1b/0x20 [ 358.507182] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 358.512730] __sys_sendmsg+0x105/0x1d0 [ 358.516624] ? __ia32_sys_shutdown+0x80/0x80 [ 358.521036] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 358.526579] ? fput+0x128/0x1a0 [ 358.529860] ? ksys_write+0x166/0x1f0 [ 358.533666] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 358.538424] ? do_syscall_64+0x26/0x610 [ 358.542398] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 358.547763] ? do_syscall_64+0x26/0x610 [ 358.551745] __x64_sys_sendmsg+0x78/0xb0 [ 358.555807] do_syscall_64+0x103/0x610 [ 358.559701] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 358.564893] RIP: 0033:0x457e29 [ 358.568092] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 358.586993] RSP: 002b:00007f56f3de4c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 358.594699] RAX: ffffffffffffffda RBX: 00007f56f3de4c90 RCX: 0000000000457e29 [ 358.601962] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000003 [ 358.609227] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 358.616492] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f56f3de56d4 12:38:05 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) [ 358.623758] R13: 00000000004c53f7 R14: 00000000004d9208 R15: 0000000000000004 [ 358.651257] CPU: 1 PID: 19404 Comm: syz-executor.0 Not tainted 5.0.0-rc4+ #39 [ 358.658550] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 358.667918] Call Trace: [ 358.670523] dump_stack+0x172/0x1f0 [ 358.674180] should_fail.cold+0xa/0x1b [ 358.678090] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 358.683203] ? lock_downgrade+0x810/0x810 [ 358.687367] ? ___might_sleep+0x163/0x280 [ 358.691523] __should_failslab+0x121/0x190 [ 358.695777] should_failslab+0x9/0x14 [ 358.699592] __kmalloc+0x2dc/0x740 [ 358.703137] ? find_held_lock+0x35/0x130 [ 358.707207] ? __might_fault+0x12b/0x1e0 [ 358.711587] ? rw_copy_check_uvector+0x28c/0x330 [ 358.716356] rw_copy_check_uvector+0x28c/0x330 [ 358.720943] ? lock_downgrade+0x810/0x810 [ 358.725115] import_iovec+0xbf/0x200 [ 358.728838] ? dup_iter+0x260/0x260 [ 358.732470] ? _copy_from_user+0xdd/0x150 [ 358.736629] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 358.742179] copy_msghdr_from_user+0x2c8/0x430 [ 358.746773] ? move_addr_to_kernel.part.0+0x110/0x110 [ 358.751963] ? __lock_is_held+0xb6/0x140 [ 358.756018] ___sys_sendmsg+0x10b/0x930 [ 358.759987] ? copy_msghdr_from_user+0x430/0x430 [ 358.764748] ? lock_downgrade+0x810/0x810 [ 358.768896] ? kasan_check_read+0x11/0x20 [ 358.773034] ? __fget+0x367/0x540 [ 358.776499] ? __fget_light+0x1a9/0x230 [ 358.780477] ? __fdget+0x1b/0x20 [ 358.783841] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 358.789388] __sys_sendmsg+0x105/0x1d0 [ 358.793276] ? __ia32_sys_shutdown+0x80/0x80 [ 358.797682] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 358.803227] ? fput+0x128/0x1a0 [ 358.806508] ? ksys_write+0x166/0x1f0 [ 358.810299] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 358.815037] ? do_syscall_64+0x26/0x610 [ 358.819011] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 358.824371] ? do_syscall_64+0x26/0x610 [ 358.828335] __x64_sys_sendmsg+0x78/0xb0 [ 358.832388] do_syscall_64+0x103/0x610 [ 358.836284] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 358.841458] RIP: 0033:0x457e29 [ 358.844634] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 358.863555] RSP: 002b:00007fbce6d70c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 358.871256] RAX: ffffffffffffffda RBX: 00007fbce6d70c90 RCX: 0000000000457e29 [ 358.878513] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000004 [ 358.885782] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 358.893047] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbce6d716d4 [ 358.900328] R13: 00000000004c53f7 R14: 00000000004d9208 R15: 0000000000000005 12:38:05 executing program 5 (fault-call:2 fault-nth:2): r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:05 executing program 3 (fault-call:3 fault-nth:2): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:05 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, 0x0, 0x0) 12:38:05 executing program 2 (fault-call:3 fault-nth:1): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:05 executing program 0 (fault-call:2 fault-nth:1): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) 12:38:05 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) socket$kcm(0x11, 0x2, 0x300) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000440)=r1, 0x4) [ 359.040005] FAULT_INJECTION: forcing a failure. [ 359.040005] name failslab, interval 1, probability 0, space 0, times 0 [ 359.063639] FAULT_INJECTION: forcing a failure. [ 359.063639] name failslab, interval 1, probability 0, space 0, times 0 [ 359.101727] FAULT_INJECTION: forcing a failure. [ 359.101727] name failslab, interval 1, probability 0, space 0, times 0 [ 359.121642] CPU: 1 PID: 19418 Comm: syz-executor.3 Not tainted 5.0.0-rc4+ #39 [ 359.128932] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 359.138287] Call Trace: [ 359.140895] dump_stack+0x172/0x1f0 [ 359.144545] should_fail.cold+0xa/0x1b [ 359.148465] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 359.153591] ? lock_downgrade+0x810/0x810 [ 359.157750] ? ___might_sleep+0x163/0x280 [ 359.161906] __should_failslab+0x121/0x190 [ 359.166154] should_failslab+0x9/0x14 [ 359.170047] kmem_cache_alloc_node_trace+0x270/0x720 [ 359.175169] ? __alloc_skb+0xd5/0x5e0 [ 359.179056] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 359.181482] FAULT_INJECTION: forcing a failure. [ 359.181482] name failslab, interval 1, probability 0, space 0, times 0 [ 359.184842] __kmalloc_node_track_caller+0x3d/0x70 [ 359.184863] __kmalloc_reserve.isra.0+0x40/0xf0 [ 359.184882] __alloc_skb+0x10b/0x5e0 [ 359.184904] ? skb_scrub_packet+0x440/0x440 [ 359.213656] ? find_held_lock+0x35/0x130 [ 359.217727] ? ip6_mtu+0x2e6/0x460 [ 359.221276] __ip6_append_data.isra.0+0x29ed/0x3600 [ 359.226305] ? rawv6_mh_filter_unregister+0x20/0x20 [ 359.231346] ? dst_output+0x180/0x180 [ 359.235158] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 359.240013] ip6_append_data+0x1e5/0x320 [ 359.244085] ? rawv6_mh_filter_unregister+0x20/0x20 [ 359.249111] ? rawv6_mh_filter_unregister+0x20/0x20 [ 359.254134] rawv6_sendmsg+0x146b/0x35f0 [ 359.258207] ? __audit_ptrace+0x1f1/0x590 [ 359.262365] ? compat_rawv6_getsockopt+0x150/0x150 [ 359.267302] ? aa_profile_af_perm+0x320/0x320 [ 359.271812] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 359.276842] ? rw_copy_check_uvector+0x2a6/0x330 [ 359.281615] ? ___might_sleep+0x163/0x280 [ 359.285784] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 359.290642] inet_sendmsg+0x147/0x5d0 [ 359.294451] ? compat_rawv6_getsockopt+0x150/0x150 [ 359.299386] ? inet_sendmsg+0x147/0x5d0 [ 359.303368] ? ipip_gro_receive+0x100/0x100 [ 359.307699] sock_sendmsg+0xdd/0x130 [ 359.311422] ___sys_sendmsg+0x806/0x930 [ 359.315404] ? copy_msghdr_from_user+0x430/0x430 [ 359.320170] ? lock_downgrade+0x810/0x810 [ 359.324325] ? kasan_check_read+0x11/0x20 [ 359.328479] ? __fget+0x367/0x540 [ 359.331958] ? __fget_light+0x1a9/0x230 [ 359.335941] ? __fdget+0x1b/0x20 [ 359.339313] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 359.344860] __sys_sendmsg+0x105/0x1d0 [ 359.348784] ? __ia32_sys_shutdown+0x80/0x80 [ 359.353197] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 359.358736] ? fput+0x128/0x1a0 [ 359.362030] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 359.366787] ? do_syscall_64+0x26/0x610 [ 359.370769] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 359.376402] ? do_syscall_64+0x26/0x610 [ 359.380392] __x64_sys_sendmsg+0x78/0xb0 [ 359.384463] do_syscall_64+0x103/0x610 [ 359.388365] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 359.393570] RIP: 0033:0x457e29 [ 359.396766] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 359.416084] RSP: 002b:00007f9603419c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 359.423799] RAX: ffffffffffffffda RBX: 00007f9603419c90 RCX: 0000000000457e29 [ 359.431077] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000004 [ 359.438345] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 359.445616] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f960341a6d4 [ 359.452887] R13: 00000000004c53f7 R14: 00000000004d9208 R15: 0000000000000005 [ 359.460178] CPU: 0 PID: 19420 Comm: syz-executor.5 Not tainted 5.0.0-rc4+ #39 [ 359.460503] net_ratelimit: 12 callbacks suppressed [ 359.460511] protocol 88fb is buggy, dev hsr_slave_0 [ 359.467457] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 359.467463] Call Trace: [ 359.467485] dump_stack+0x172/0x1f0 [ 359.467510] should_fail.cold+0xa/0x1b [ 359.472511] protocol 88fb is buggy, dev hsr_slave_1 [ 359.477437] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 359.486941] protocol 88fb is buggy, dev hsr_slave_0 [ 359.489350] ? lock_downgrade+0x810/0x810 [ 359.493031] protocol 88fb is buggy, dev hsr_slave_1 [ 359.496845] ? ___might_sleep+0x163/0x280 [ 359.525217] __should_failslab+0x121/0x190 [ 359.529462] should_failslab+0x9/0x14 [ 359.533270] kmem_cache_alloc_node_trace+0x270/0x720 [ 359.538377] ? __alloc_skb+0xd5/0x5e0 [ 359.542184] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 359.547641] __kmalloc_node_track_caller+0x3d/0x70 [ 359.552605] __kmalloc_reserve.isra.0+0x40/0xf0 [ 359.557302] __alloc_skb+0x10b/0x5e0 [ 359.561022] ? skb_scrub_packet+0x440/0x440 [ 359.565344] ? find_held_lock+0x35/0x130 [ 359.569408] ? ip6_mtu+0x2e6/0x460 [ 359.573090] __ip6_append_data.isra.0+0x29ed/0x3600 [ 359.578227] ? rawv6_mh_filter_unregister+0x20/0x20 [ 359.583282] ? dst_output+0x180/0x180 [ 359.587108] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 359.591967] ip6_append_data+0x1e5/0x320 [ 359.596027] ? rawv6_mh_filter_unregister+0x20/0x20 [ 359.601051] ? rawv6_mh_filter_unregister+0x20/0x20 [ 359.606076] rawv6_sendmsg+0x146b/0x35f0 [ 359.610150] ? __audit_ptrace+0x1f1/0x590 [ 359.614305] ? compat_rawv6_getsockopt+0x150/0x150 [ 359.619241] ? aa_profile_af_perm+0x320/0x320 [ 359.623746] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 359.628767] ? rw_copy_check_uvector+0x2a6/0x330 [ 359.633539] ? ___might_sleep+0x163/0x280 [ 359.637724] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 359.642592] inet_sendmsg+0x147/0x5d0 [ 359.646396] ? compat_rawv6_getsockopt+0x150/0x150 [ 359.651331] ? inet_sendmsg+0x147/0x5d0 [ 359.655313] ? ipip_gro_receive+0x100/0x100 [ 359.659665] sock_sendmsg+0xdd/0x130 [ 359.663384] ___sys_sendmsg+0x806/0x930 [ 359.667367] ? copy_msghdr_from_user+0x430/0x430 [ 359.672131] ? lock_downgrade+0x810/0x810 [ 359.676283] ? kasan_check_read+0x11/0x20 [ 359.680436] ? __fget+0x367/0x540 [ 359.683903] ? __fget_light+0x1a9/0x230 [ 359.687879] ? __fdget+0x1b/0x20 [ 359.691254] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 359.696803] __sys_sendmsg+0x105/0x1d0 [ 359.700695] ? __ia32_sys_shutdown+0x80/0x80 [ 359.705117] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 359.710656] ? fput+0x128/0x1a0 [ 359.713948] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 359.718705] ? do_syscall_64+0x26/0x610 [ 359.722685] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 359.728048] ? do_syscall_64+0x26/0x610 [ 359.732039] __x64_sys_sendmsg+0x78/0xb0 [ 359.736109] do_syscall_64+0x103/0x610 [ 359.740005] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 359.745190] RIP: 0033:0x457e29 [ 359.748380] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 359.767278] RSP: 002b:00007f28df43ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 359.774987] RAX: ffffffffffffffda RBX: 00007f28df43ec90 RCX: 0000000000457e29 [ 359.782250] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000003 [ 359.789517] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 359.796782] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f28df43f6d4 [ 359.804049] R13: 00000000004c53f7 R14: 00000000004d9208 R15: 0000000000000004 [ 359.812864] CPU: 1 PID: 19431 Comm: syz-executor.0 Not tainted 5.0.0-rc4+ #39 [ 359.820163] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 359.829511] Call Trace: [ 359.829533] dump_stack+0x172/0x1f0 [ 359.829554] should_fail.cold+0xa/0x1b [ 359.829588] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 359.844761] ? lock_downgrade+0x810/0x810 [ 359.848920] ? ___might_sleep+0x163/0x280 [ 359.853082] __should_failslab+0x121/0x190 [ 359.857332] should_failslab+0x9/0x14 [ 359.861140] kmem_cache_alloc_node+0x265/0x710 [ 359.865728] ? mark_held_locks+0x100/0x100 [ 359.869968] ? check_noncircular+0x20/0x20 [ 359.874213] __alloc_skb+0xd5/0x5e0 [ 359.874232] ? skb_scrub_packet+0x440/0x440 [ 359.874246] ? find_held_lock+0x35/0x130 [ 359.874265] ? ip6_mtu+0x2e6/0x460 [ 359.874287] __ip6_append_data.isra.0+0x29ed/0x3600 [ 359.874308] ? rawv6_mh_filter_unregister+0x20/0x20 [ 359.882256] ? dst_output+0x180/0x180 [ 359.882276] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 359.882295] ip6_append_data+0x1e5/0x320 [ 359.899889] ? rawv6_mh_filter_unregister+0x20/0x20 [ 359.899910] ? rawv6_mh_filter_unregister+0x20/0x20 [ 359.899930] rawv6_sendmsg+0x146b/0x35f0 [ 359.899952] ? __audit_ptrace+0x1f1/0x590 [ 359.912646] ? compat_rawv6_getsockopt+0x150/0x150 [ 359.912667] ? aa_profile_af_perm+0x320/0x320 [ 359.912688] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 359.912705] ? rw_copy_check_uvector+0x2a6/0x330 [ 359.912733] ? ___might_sleep+0x163/0x280 [ 359.922758] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 359.922781] inet_sendmsg+0x147/0x5d0 [ 359.922796] ? compat_rawv6_getsockopt+0x150/0x150 [ 359.922813] ? inet_sendmsg+0x147/0x5d0 [ 359.931002] ? ipip_gro_receive+0x100/0x100 [ 359.931022] sock_sendmsg+0xdd/0x130 [ 359.931041] ___sys_sendmsg+0x806/0x930 [ 359.931060] ? copy_msghdr_from_user+0x430/0x430 [ 359.940478] ? lock_downgrade+0x810/0x810 [ 359.940499] ? kasan_check_read+0x11/0x20 [ 359.940517] ? __fget+0x367/0x540 [ 359.950282] ? __fget_light+0x1a9/0x230 [ 359.950299] ? __fdget+0x1b/0x20 [ 359.950314] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 359.950336] __sys_sendmsg+0x105/0x1d0 [ 359.950353] ? __ia32_sys_shutdown+0x80/0x80 [ 359.959339] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 359.959355] ? fput+0x128/0x1a0 [ 359.959384] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 359.968091] ? do_syscall_64+0x26/0x610 [ 359.968111] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 359.968125] ? do_syscall_64+0x26/0x610 [ 359.968147] __x64_sys_sendmsg+0x78/0xb0 [ 359.973682] device nr0 entered promiscuous mode [ 359.976422] do_syscall_64+0x103/0x610 [ 359.976445] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 359.976462] RIP: 0033:0x457e29 [ 360.069448] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 360.088348] RSP: 002b:00007fbce6d4fc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 360.096059] RAX: ffffffffffffffda RBX: 00007fbce6d4fc90 RCX: 0000000000457e29 [ 360.103330] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000003 [ 360.110602] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 360.117868] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fbce6d506d4 [ 360.125140] R13: 00000000004c53f7 R14: 00000000004d9208 R15: 0000000000000004 [ 360.132430] CPU: 0 PID: 19424 Comm: syz-executor.2 Not tainted 5.0.0-rc4+ #39 [ 360.132746] protocol 88fb is buggy, dev hsr_slave_0 [ 360.139721] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 360.144818] protocol 88fb is buggy, dev hsr_slave_1 [ 360.154060] Call Trace: [ 360.154088] dump_stack+0x172/0x1f0 [ 360.154109] should_fail.cold+0xa/0x1b [ 360.154126] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 360.159222] protocol 88fb is buggy, dev hsr_slave_0 [ 360.161703] ? lock_downgrade+0x810/0x810 [ 360.165378] protocol 88fb is buggy, dev hsr_slave_1 [ 360.169195] ? ___might_sleep+0x163/0x280 [ 360.192578] __should_failslab+0x121/0x190 [ 360.196825] should_failslab+0x9/0x14 [ 360.200633] kmem_cache_alloc_node+0x265/0x710 [ 360.205224] ? mark_held_locks+0x100/0x100 [ 360.209459] ? check_noncircular+0x20/0x20 [ 360.213699] __alloc_skb+0xd5/0x5e0 [ 360.217330] ? skb_scrub_packet+0x440/0x440 [ 360.221657] ? find_held_lock+0x35/0x130 [ 360.225720] ? ip6_mtu+0x2e6/0x460 [ 360.229266] __ip6_append_data.isra.0+0x29ed/0x3600 [ 360.234297] ? rawv6_mh_filter_unregister+0x20/0x20 [ 360.239357] ? dst_output+0x180/0x180 [ 360.243166] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 360.248014] ip6_append_data+0x1e5/0x320 [ 360.252077] ? rawv6_mh_filter_unregister+0x20/0x20 [ 360.257098] ? rawv6_mh_filter_unregister+0x20/0x20 [ 360.262120] rawv6_sendmsg+0x146b/0x35f0 [ 360.266190] ? __audit_ptrace+0x1f1/0x590 [ 360.270343] ? compat_rawv6_getsockopt+0x150/0x150 [ 360.275287] ? aa_profile_af_perm+0x320/0x320 [ 360.279798] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 360.284821] ? rw_copy_check_uvector+0x2a6/0x330 [ 360.289606] ? ___might_sleep+0x163/0x280 [ 360.293772] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 360.298620] inet_sendmsg+0x147/0x5d0 [ 360.302421] ? compat_rawv6_getsockopt+0x150/0x150 [ 360.307358] ? inet_sendmsg+0x147/0x5d0 [ 360.311341] ? ipip_gro_receive+0x100/0x100 [ 360.315669] sock_sendmsg+0xdd/0x130 [ 360.319386] ___sys_sendmsg+0x806/0x930 [ 360.323365] ? copy_msghdr_from_user+0x430/0x430 [ 360.328130] ? lock_downgrade+0x810/0x810 [ 360.332282] ? kasan_check_read+0x11/0x20 [ 360.336438] ? __fget+0x367/0x540 [ 360.339909] ? __fget_light+0x1a9/0x230 [ 360.343889] ? __fdget+0x1b/0x20 [ 360.347254] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 360.352802] __sys_sendmsg+0x105/0x1d0 [ 360.356691] ? __ia32_sys_shutdown+0x80/0x80 [ 360.361103] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 360.366640] ? fput+0x128/0x1a0 [ 360.369930] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 360.375033] ? do_syscall_64+0x26/0x610 [ 360.379039] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 360.384404] ? do_syscall_64+0x26/0x610 [ 360.388386] __x64_sys_sendmsg+0x78/0xb0 [ 360.392454] do_syscall_64+0x103/0x610 [ 360.396349] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 360.401536] RIP: 0033:0x457e29 [ 360.404744] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 360.423645] RSP: 002b:00007f56f3de4c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 360.431354] RAX: ffffffffffffffda RBX: 00007f56f3de4c90 RCX: 0000000000457e29 [ 360.438618] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000003 [ 360.446357] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 360.453627] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f56f3de56d4 [ 360.460890] R13: 00000000004c53f7 R14: 00000000004d9208 R15: 0000000000000004 [ 360.468763] protocol 88fb is buggy, dev hsr_slave_0 [ 360.473905] protocol 88fb is buggy, dev hsr_slave_1 12:38:07 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) 12:38:07 executing program 5 (fault-call:2 fault-nth:3): r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:07 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) socket$kcm(0x11, 0x2, 0x300) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000440)=r1, 0x4) 12:38:07 executing program 3 (fault-call:3 fault-nth:3): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) [ 360.628024] FAULT_INJECTION: forcing a failure. [ 360.628024] name failslab, interval 1, probability 0, space 0, times 0 [ 360.656912] CPU: 0 PID: 19447 Comm: syz-executor.5 Not tainted 5.0.0-rc4+ #39 [ 360.664204] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 360.673567] Call Trace: [ 360.676174] dump_stack+0x172/0x1f0 [ 360.679817] should_fail.cold+0xa/0x1b [ 360.683716] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 360.688824] ? lock_downgrade+0x810/0x810 [ 360.692982] ? ___might_sleep+0x163/0x280 [ 360.697132] __should_failslab+0x121/0x190 [ 360.701371] should_failslab+0x9/0x14 [ 360.705177] kmem_cache_alloc_node+0x265/0x710 [ 360.709766] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 360.715359] ? ip_generic_getfrag+0x120/0x230 [ 360.719868] __alloc_skb+0xd5/0x5e0 [ 360.723501] ? skb_scrub_packet+0x440/0x440 [ 360.727829] ? raw6_getfrag+0x164/0x230 [ 360.731799] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 360.736827] __ip6_append_data.isra.0+0x29ed/0x3600 [ 360.741854] ? rawv6_mh_filter_unregister+0x20/0x20 [ 360.746891] ? dst_output+0x180/0x180 [ 360.750703] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 360.755552] ip6_append_data+0x1e5/0x320 [ 360.759632] ? rawv6_mh_filter_unregister+0x20/0x20 [ 360.764660] ? rawv6_mh_filter_unregister+0x20/0x20 [ 360.769681] rawv6_sendmsg+0x146b/0x35f0 [ 360.773750] ? __audit_ptrace+0x1f1/0x590 [ 360.777906] ? compat_rawv6_getsockopt+0x150/0x150 [ 360.782839] ? aa_profile_af_perm+0x320/0x320 [ 360.787345] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 360.792363] ? rw_copy_check_uvector+0x2a6/0x330 [ 360.797162] ? ___might_sleep+0x163/0x280 [ 360.801335] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 360.806192] inet_sendmsg+0x147/0x5d0 [ 360.810014] ? compat_rawv6_getsockopt+0x150/0x150 [ 360.814953] ? inet_sendmsg+0x147/0x5d0 [ 360.818931] ? ipip_gro_receive+0x100/0x100 [ 360.823255] sock_sendmsg+0xdd/0x130 [ 360.826970] ___sys_sendmsg+0x806/0x930 [ 360.830954] ? copy_msghdr_from_user+0x430/0x430 [ 360.835720] ? lock_downgrade+0x810/0x810 [ 360.839880] ? kasan_check_read+0x11/0x20 [ 360.844031] ? __fget+0x367/0x540 [ 360.847501] ? __fget_light+0x1a9/0x230 [ 360.851474] ? __fdget+0x1b/0x20 [ 360.854860] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 360.860412] __sys_sendmsg+0x105/0x1d0 [ 360.864305] ? __ia32_sys_shutdown+0x80/0x80 [ 360.868716] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 360.874259] ? fput+0x128/0x1a0 [ 360.877566] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 360.882328] ? do_syscall_64+0x26/0x610 [ 360.886308] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 360.891713] ? do_syscall_64+0x26/0x610 [ 360.895701] __x64_sys_sendmsg+0x78/0xb0 [ 360.899764] do_syscall_64+0x103/0x610 [ 360.903662] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 360.908847] RIP: 0033:0x457e29 [ 360.912040] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 360.930935] RSP: 002b:00007f28df43ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 360.938642] RAX: ffffffffffffffda RBX: 00007f28df43ec90 RCX: 0000000000457e29 [ 360.945915] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000003 [ 360.953185] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 360.960451] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f28df43f6d4 [ 360.967725] R13: 00000000004c53f7 R14: 00000000004d9208 R15: 0000000000000004 [ 360.979897] FAULT_INJECTION: forcing a failure. [ 360.979897] name failslab, interval 1, probability 0, space 0, times 0 [ 361.005992] CPU: 1 PID: 19455 Comm: syz-executor.3 Not tainted 5.0.0-rc4+ #39 [ 361.013282] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 361.022630] Call Trace: [ 361.025233] dump_stack+0x172/0x1f0 [ 361.028879] should_fail.cold+0xa/0x1b [ 361.032786] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 361.037901] ? lock_downgrade+0x810/0x810 [ 361.042061] ? ___might_sleep+0x163/0x280 [ 361.046234] __should_failslab+0x121/0x190 [ 361.050475] should_failslab+0x9/0x14 [ 361.054286] kmem_cache_alloc_node+0x265/0x710 [ 361.058879] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 361.064425] ? ip_generic_getfrag+0x120/0x230 [ 361.068942] __alloc_skb+0xd5/0x5e0 [ 361.072927] ? skb_scrub_packet+0x440/0x440 [ 361.077256] ? raw6_getfrag+0x164/0x230 [ 361.081234] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 361.086261] __ip6_append_data.isra.0+0x29ed/0x3600 [ 361.091290] ? rawv6_mh_filter_unregister+0x20/0x20 [ 361.096322] ? dst_output+0x180/0x180 [ 361.100132] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 361.104987] ip6_append_data+0x1e5/0x320 [ 361.109051] ? rawv6_mh_filter_unregister+0x20/0x20 [ 361.114089] ? rawv6_mh_filter_unregister+0x20/0x20 [ 361.119114] rawv6_sendmsg+0x146b/0x35f0 [ 361.123197] ? __audit_ptrace+0x1f1/0x590 [ 361.127352] ? compat_rawv6_getsockopt+0x150/0x150 [ 361.132294] ? aa_profile_af_perm+0x320/0x320 [ 361.136802] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 361.141823] ? rw_copy_check_uvector+0x2a6/0x330 [ 361.146610] ? ___might_sleep+0x163/0x280 [ 361.150783] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 361.155669] inet_sendmsg+0x147/0x5d0 [ 361.159480] ? compat_rawv6_getsockopt+0x150/0x150 [ 361.164419] ? inet_sendmsg+0x147/0x5d0 [ 361.168400] ? ipip_gro_receive+0x100/0x100 [ 361.172734] sock_sendmsg+0xdd/0x130 [ 361.176457] ___sys_sendmsg+0x806/0x930 [ 361.180439] ? copy_msghdr_from_user+0x430/0x430 [ 361.185597] ? lock_downgrade+0x810/0x810 [ 361.189755] ? kasan_check_read+0x11/0x20 [ 361.193911] ? __fget+0x367/0x540 [ 361.197387] ? __fget_light+0x1a9/0x230 [ 361.201363] ? __fdget+0x1b/0x20 [ 361.204734] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 361.210281] __sys_sendmsg+0x105/0x1d0 [ 361.214185] ? __ia32_sys_shutdown+0x80/0x80 [ 361.218606] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 361.224150] ? fput+0x128/0x1a0 [ 361.227443] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 361.232213] ? do_syscall_64+0x26/0x610 [ 361.236193] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 361.241568] ? do_syscall_64+0x26/0x610 [ 361.245569] __x64_sys_sendmsg+0x78/0xb0 [ 361.249641] do_syscall_64+0x103/0x610 [ 361.253538] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 361.258746] RIP: 0033:0x457e29 [ 361.261948] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 12:38:07 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x2, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) 12:38:07 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) [ 361.281111] RSP: 002b:00007f9603419c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 361.288824] RAX: ffffffffffffffda RBX: 00007f9603419c90 RCX: 0000000000457e29 [ 361.288834] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000004 [ 361.288843] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 361.288852] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f960341a6d4 [ 361.288862] R13: 00000000004c53f7 R14: 00000000004d9208 R15: 0000000000000005 12:38:07 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x2, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:07 executing program 5 (fault-call:2 fault-nth:4): r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:07 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, 0x0, 0x0) 12:38:07 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) socket$kcm(0x11, 0x2, 0x300) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000440)=r1, 0x4) 12:38:07 executing program 3 (fault-call:3 fault-nth:4): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) [ 361.416904] FAULT_INJECTION: forcing a failure. [ 361.416904] name failslab, interval 1, probability 0, space 0, times 0 [ 361.456451] CPU: 1 PID: 19466 Comm: syz-executor.5 Not tainted 5.0.0-rc4+ #39 [ 361.463760] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 361.473116] Call Trace: [ 361.475719] dump_stack+0x172/0x1f0 [ 361.479369] should_fail.cold+0xa/0x1b [ 361.483269] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 361.488379] ? lock_downgrade+0x810/0x810 [ 361.492535] ? ___might_sleep+0x163/0x280 [ 361.496696] __should_failslab+0x121/0x190 [ 361.500938] should_failslab+0x9/0x14 [ 361.504739] kmem_cache_alloc_node_trace+0x270/0x720 [ 361.509845] ? __alloc_skb+0xd5/0x5e0 [ 361.513651] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 361.519115] __kmalloc_node_track_caller+0x3d/0x70 [ 361.524056] __kmalloc_reserve.isra.0+0x40/0xf0 [ 361.528739] __alloc_skb+0x10b/0x5e0 [ 361.532460] ? skb_scrub_packet+0x440/0x440 [ 361.536789] ? raw6_getfrag+0x164/0x230 [ 361.540763] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 361.545786] __ip6_append_data.isra.0+0x29ed/0x3600 [ 361.550821] ? rawv6_mh_filter_unregister+0x20/0x20 [ 361.555855] ? dst_output+0x180/0x180 [ 361.559658] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 361.564509] ip6_append_data+0x1e5/0x320 [ 361.568578] ? rawv6_mh_filter_unregister+0x20/0x20 [ 361.573694] ? rawv6_mh_filter_unregister+0x20/0x20 [ 361.578717] rawv6_sendmsg+0x146b/0x35f0 [ 361.582787] ? __audit_ptrace+0x1f1/0x590 [ 361.586938] ? compat_rawv6_getsockopt+0x150/0x150 [ 361.591871] ? aa_profile_af_perm+0x320/0x320 [ 361.596375] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 361.601391] ? rw_copy_check_uvector+0x2a6/0x330 [ 361.606162] ? ___might_sleep+0x163/0x280 [ 361.610332] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 361.615186] inet_sendmsg+0x147/0x5d0 [ 361.618988] ? compat_rawv6_getsockopt+0x150/0x150 [ 361.623919] ? inet_sendmsg+0x147/0x5d0 [ 361.627895] ? ipip_gro_receive+0x100/0x100 [ 361.632219] sock_sendmsg+0xdd/0x130 [ 361.635935] ___sys_sendmsg+0x806/0x930 [ 361.639915] ? copy_msghdr_from_user+0x430/0x430 [ 361.644675] ? lock_downgrade+0x810/0x810 [ 361.648830] ? kasan_check_read+0x11/0x20 [ 361.652984] ? __fget+0x367/0x540 [ 361.656456] ? __fget_light+0x1a9/0x230 [ 361.660432] ? __fdget+0x1b/0x20 [ 361.663796] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 361.669338] __sys_sendmsg+0x105/0x1d0 [ 361.673228] ? __ia32_sys_shutdown+0x80/0x80 [ 361.677638] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 361.683176] ? fput+0x128/0x1a0 [ 361.686462] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 361.691217] ? do_syscall_64+0x26/0x610 [ 361.695198] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 361.700571] ? do_syscall_64+0x26/0x610 [ 361.704553] __x64_sys_sendmsg+0x78/0xb0 [ 361.708625] do_syscall_64+0x103/0x610 [ 361.712518] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 361.717704] RIP: 0033:0x457e29 [ 361.720899] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 361.739798] RSP: 002b:00007f28df43ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 361.747506] RAX: ffffffffffffffda RBX: 00007f28df43ec90 RCX: 0000000000457e29 [ 361.754772] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000003 12:38:08 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x3, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) [ 361.762034] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 361.769301] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f28df43f6d4 [ 361.776578] R13: 00000000004c53f7 R14: 00000000004d9208 R15: 0000000000000004 [ 361.885609] device nr0 entered promiscuous mode 12:38:08 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x3, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:08 executing program 5 (fault-call:2 fault-nth:5): r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:08 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:08 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, 0x0, 0x0) 12:38:08 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x4, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) [ 362.119578] FAULT_INJECTION: forcing a failure. [ 362.119578] name failslab, interval 1, probability 0, space 0, times 0 12:38:08 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x4, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:08 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x5, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) [ 362.207237] CPU: 0 PID: 19499 Comm: syz-executor.5 Not tainted 5.0.0-rc4+ #39 [ 362.214551] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 362.223915] Call Trace: [ 362.223943] dump_stack+0x172/0x1f0 [ 362.223966] should_fail.cold+0xa/0x1b [ 362.223989] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 362.224007] ? lock_downgrade+0x810/0x810 [ 362.224029] ? ___might_sleep+0x163/0x280 [ 362.224051] __should_failslab+0x121/0x190 [ 362.251727] should_failslab+0x9/0x14 [ 362.255539] kmem_cache_alloc_node+0x265/0x710 [ 362.260140] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 362.260157] ? ip_generic_getfrag+0x120/0x230 [ 362.260180] __alloc_skb+0xd5/0x5e0 [ 362.260198] ? skb_scrub_packet+0x440/0x440 [ 362.278151] ? raw6_getfrag+0x164/0x230 [ 362.282134] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 362.287172] __ip6_append_data.isra.0+0x29ed/0x3600 [ 362.292206] ? rawv6_mh_filter_unregister+0x20/0x20 [ 362.297257] ? dst_output+0x180/0x180 [ 362.297283] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 362.297317] ip6_append_data+0x1e5/0x320 [ 362.309991] ? rawv6_mh_filter_unregister+0x20/0x20 [ 362.315020] ? rawv6_mh_filter_unregister+0x20/0x20 [ 362.320053] rawv6_sendmsg+0x146b/0x35f0 [ 362.324132] ? __audit_ptrace+0x1f1/0x590 [ 362.328287] ? compat_rawv6_getsockopt+0x150/0x150 [ 362.333224] ? aa_profile_af_perm+0x320/0x320 [ 362.337730] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 362.342752] ? rw_copy_check_uvector+0x2a6/0x330 [ 362.347540] ? ___might_sleep+0x163/0x280 [ 362.351748] ? aa_sock_msg_perm.isra.0+0xba/0x170 12:38:08 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x6, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) [ 362.356620] inet_sendmsg+0x147/0x5d0 [ 362.360431] ? compat_rawv6_getsockopt+0x150/0x150 [ 362.365367] ? inet_sendmsg+0x147/0x5d0 [ 362.369347] ? ipip_gro_receive+0x100/0x100 [ 362.373685] sock_sendmsg+0xdd/0x130 [ 362.377415] ___sys_sendmsg+0x806/0x930 [ 362.381404] ? copy_msghdr_from_user+0x430/0x430 [ 362.386188] ? lock_downgrade+0x810/0x810 [ 362.390353] ? kasan_check_read+0x11/0x20 [ 362.394545] ? __fget+0x367/0x540 [ 362.398058] ? __fget_light+0x1a9/0x230 [ 362.402051] ? __fdget+0x1b/0x20 [ 362.405435] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 362.410995] __sys_sendmsg+0x105/0x1d0 [ 362.414910] ? __ia32_sys_shutdown+0x80/0x80 [ 362.419326] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 362.424872] ? fput+0x128/0x1a0 [ 362.428202] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 362.433005] ? do_syscall_64+0x26/0x610 [ 362.437000] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 362.442901] ? do_syscall_64+0x26/0x610 [ 362.446895] __x64_sys_sendmsg+0x78/0xb0 [ 362.450988] do_syscall_64+0x103/0x610 [ 362.454908] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 362.460098] RIP: 0033:0x457e29 [ 362.463296] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 362.482209] RSP: 002b:00007f28df43ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 362.489941] RAX: ffffffffffffffda RBX: 00007f28df43ec90 RCX: 0000000000457e29 [ 362.497231] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000003 [ 362.504505] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 362.511777] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f28df43f6d4 [ 362.519052] R13: 00000000004c53f7 R14: 00000000004d9208 R15: 0000000000000004 12:38:09 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, 0x0, 0x0) 12:38:09 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x7, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) 12:38:09 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, 0x0, 0x0) 12:38:09 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x5, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:09 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x2, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:09 executing program 5 (fault-call:2 fault-nth:6): r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) [ 362.799913] FAULT_INJECTION: forcing a failure. [ 362.799913] name failslab, interval 1, probability 0, space 0, times 0 [ 362.827989] CPU: 0 PID: 19531 Comm: syz-executor.5 Not tainted 5.0.0-rc4+ #39 [ 362.835286] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 362.844647] Call Trace: 12:38:09 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x8, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) [ 362.847255] dump_stack+0x172/0x1f0 [ 362.850901] should_fail.cold+0xa/0x1b [ 362.854817] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 362.859936] ? lock_downgrade+0x810/0x810 [ 362.864127] ? ___might_sleep+0x163/0x280 [ 362.868284] __should_failslab+0x121/0x190 [ 362.868305] should_failslab+0x9/0x14 [ 362.868321] kmem_cache_alloc_node_trace+0x270/0x720 [ 362.868340] ? __alloc_skb+0xd5/0x5e0 [ 362.876373] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 362.876395] __kmalloc_node_track_caller+0x3d/0x70 [ 362.876414] __kmalloc_reserve.isra.0+0x40/0xf0 12:38:09 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x9, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) [ 362.900341] __alloc_skb+0x10b/0x5e0 [ 362.904071] ? skb_scrub_packet+0x440/0x440 [ 362.908400] ? raw6_getfrag+0x164/0x230 [ 362.912390] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 362.917425] __ip6_append_data.isra.0+0x29ed/0x3600 [ 362.922462] ? rawv6_mh_filter_unregister+0x20/0x20 [ 362.927499] ? dst_output+0x180/0x180 [ 362.931308] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 362.936175] ip6_append_data+0x1e5/0x320 [ 362.940246] ? rawv6_mh_filter_unregister+0x20/0x20 [ 362.945276] ? rawv6_mh_filter_unregister+0x20/0x20 12:38:09 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0xa, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) [ 362.950304] rawv6_sendmsg+0x146b/0x35f0 [ 362.954382] ? __audit_ptrace+0x1f1/0x590 [ 362.958546] ? compat_rawv6_getsockopt+0x150/0x150 [ 362.963506] ? aa_profile_af_perm+0x320/0x320 [ 362.968012] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 362.973039] ? rw_copy_check_uvector+0x2a6/0x330 [ 362.977836] ? ___might_sleep+0x163/0x280 [ 362.982019] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 362.986881] inet_sendmsg+0x147/0x5d0 [ 362.990696] ? compat_rawv6_getsockopt+0x150/0x150 [ 362.995633] ? inet_sendmsg+0x147/0x5d0 [ 362.999628] ? ipip_gro_receive+0x100/0x100 [ 363.003961] sock_sendmsg+0xdd/0x130 [ 363.007689] ___sys_sendmsg+0x806/0x930 [ 363.011683] ? copy_msghdr_from_user+0x430/0x430 [ 363.016454] ? lock_downgrade+0x810/0x810 [ 363.020619] ? kasan_check_read+0x11/0x20 [ 363.024788] ? __fget+0x367/0x540 [ 363.028266] ? __fget_light+0x1a9/0x230 [ 363.032249] ? __fdget+0x1b/0x20 [ 363.035628] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 363.041187] __sys_sendmsg+0x105/0x1d0 [ 363.045089] ? __ia32_sys_shutdown+0x80/0x80 12:38:09 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0xe, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) [ 363.049508] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 363.055057] ? fput+0x128/0x1a0 [ 363.058353] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 363.063117] ? do_syscall_64+0x26/0x610 [ 363.067100] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 363.072467] ? do_syscall_64+0x26/0x610 [ 363.076460] __x64_sys_sendmsg+0x78/0xb0 [ 363.080534] do_syscall_64+0x103/0x610 [ 363.084460] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 363.089648] RIP: 0033:0x457e29 [ 363.089665] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 363.089673] RSP: 002b:00007f28df43ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 363.089689] RAX: ffffffffffffffda RBX: 00007f28df43ec90 RCX: 0000000000457e29 [ 363.089697] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000003 [ 363.089709] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 363.111796] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f28df43f6d4 [ 363.111806] R13: 00000000004c53f7 R14: 00000000004d9208 R15: 0000000000000004 12:38:09 executing program 5 (fault-call:2 fault-nth:7): r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:09 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x6, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:09 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x0) 12:38:09 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x3, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:09 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, 0x0, 0x0) [ 363.338218] FAULT_INJECTION: forcing a failure. [ 363.338218] name failslab, interval 1, probability 0, space 0, times 0 12:38:09 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x4, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) [ 363.381120] device nr0 entered promiscuous mode [ 363.412653] CPU: 0 PID: 19571 Comm: syz-executor.5 Not tainted 5.0.0-rc4+ #39 [ 363.419948] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 363.429301] Call Trace: [ 363.431902] dump_stack+0x172/0x1f0 [ 363.435546] should_fail.cold+0xa/0x1b [ 363.439469] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 363.444600] ? lock_downgrade+0x810/0x810 [ 363.448758] ? ___might_sleep+0x163/0x280 [ 363.452925] __should_failslab+0x121/0x190 [ 363.457169] should_failslab+0x9/0x14 [ 363.460974] kmem_cache_alloc_node+0x265/0x710 [ 363.465587] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 363.471132] ? ip_generic_getfrag+0x120/0x230 [ 363.475638] __alloc_skb+0xd5/0x5e0 [ 363.479271] ? skb_scrub_packet+0x440/0x440 [ 363.483607] ? raw6_getfrag+0x164/0x230 [ 363.487597] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 363.492630] __ip6_append_data.isra.0+0x29ed/0x3600 [ 363.497661] ? rawv6_mh_filter_unregister+0x20/0x20 [ 363.502697] ? dst_output+0x180/0x180 [ 363.506506] ? ip6_autoflowlabel.part.0+0x70/0x70 12:38:10 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x10, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) [ 363.511361] ip6_append_data+0x1e5/0x320 [ 363.515425] ? rawv6_mh_filter_unregister+0x20/0x20 [ 363.520449] ? rawv6_mh_filter_unregister+0x20/0x20 [ 363.525487] rawv6_sendmsg+0x146b/0x35f0 [ 363.529733] ? __audit_ptrace+0x1f1/0x590 [ 363.533896] ? compat_rawv6_getsockopt+0x150/0x150 [ 363.538839] ? aa_profile_af_perm+0x320/0x320 [ 363.543347] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 363.548379] ? rw_copy_check_uvector+0x2a6/0x330 [ 363.553158] ? ___might_sleep+0x163/0x280 [ 363.557338] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 363.562199] inet_sendmsg+0x147/0x5d0 [ 363.566003] ? compat_rawv6_getsockopt+0x150/0x150 [ 363.570937] ? inet_sendmsg+0x147/0x5d0 [ 363.575068] ? ipip_gro_receive+0x100/0x100 [ 363.579406] sock_sendmsg+0xdd/0x130 [ 363.583134] ___sys_sendmsg+0x806/0x930 [ 363.587120] ? copy_msghdr_from_user+0x430/0x430 [ 363.591890] ? lock_downgrade+0x810/0x810 [ 363.596054] ? kasan_check_read+0x11/0x20 [ 363.600213] ? __fget+0x367/0x540 [ 363.603692] ? __fget_light+0x1a9/0x230 [ 363.607669] ? __fdget+0x1b/0x20 [ 363.611037] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 363.616603] __sys_sendmsg+0x105/0x1d0 [ 363.620500] ? __ia32_sys_shutdown+0x80/0x80 [ 363.624921] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 363.630467] ? fput+0x128/0x1a0 [ 363.633772] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 363.638531] ? do_syscall_64+0x26/0x610 [ 363.642535] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 363.647923] ? do_syscall_64+0x26/0x610 [ 363.651915] __x64_sys_sendmsg+0x78/0xb0 [ 363.655984] do_syscall_64+0x103/0x610 12:38:10 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x60, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) [ 363.659896] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 363.665084] RIP: 0033:0x457e29 [ 363.668283] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 363.687191] RSP: 002b:00007f28df43ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 363.694902] RAX: ffffffffffffffda RBX: 00007f28df43ec90 RCX: 0000000000457e29 [ 363.702176] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000003 12:38:10 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x7, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) [ 363.709448] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 363.716729] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f28df43f6d4 [ 363.724010] R13: 00000000004c53f7 R14: 00000000004d9208 R15: 0000000000000004 12:38:10 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0xaa, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) 12:38:10 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x5, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:10 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440), 0x4) 12:38:10 executing program 5 (fault-call:2 fault-nth:8): r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:10 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x8, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:10 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x0) 12:38:10 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0xb5, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) 12:38:10 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x6, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) [ 364.040889] FAULT_INJECTION: forcing a failure. [ 364.040889] name failslab, interval 1, probability 0, space 0, times 0 [ 364.116689] CPU: 1 PID: 19609 Comm: syz-executor.5 Not tainted 5.0.0-rc4+ #39 [ 364.124006] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 364.133358] Call Trace: [ 364.135951] dump_stack+0x172/0x1f0 [ 364.139599] should_fail.cold+0xa/0x1b [ 364.143506] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 364.148628] ? lock_downgrade+0x810/0x810 [ 364.152779] ? ___might_sleep+0x163/0x280 [ 364.156932] __should_failslab+0x121/0x190 [ 364.161173] should_failslab+0x9/0x14 [ 364.164984] kmem_cache_alloc_node+0x265/0x710 [ 364.169584] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 364.175130] ? ip_generic_getfrag+0x120/0x230 [ 364.179641] __alloc_skb+0xd5/0x5e0 [ 364.183279] ? skb_scrub_packet+0x440/0x440 [ 364.187612] ? raw6_getfrag+0x164/0x230 [ 364.191602] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 364.196638] __ip6_append_data.isra.0+0x29ed/0x3600 [ 364.201674] ? rawv6_mh_filter_unregister+0x20/0x20 [ 364.206715] ? dst_output+0x180/0x180 [ 364.210533] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 364.215402] ip6_append_data+0x1e5/0x320 [ 364.219472] ? rawv6_mh_filter_unregister+0x20/0x20 [ 364.224507] ? rawv6_mh_filter_unregister+0x20/0x20 [ 364.224528] rawv6_sendmsg+0x146b/0x35f0 [ 364.224553] ? __audit_ptrace+0x1f1/0x590 [ 364.224581] ? compat_rawv6_getsockopt+0x150/0x150 [ 364.224607] ? aa_profile_af_perm+0x320/0x320 [ 364.233674] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 364.233691] ? rw_copy_check_uvector+0x2a6/0x330 [ 364.233719] ? ___might_sleep+0x163/0x280 [ 364.233750] ? aa_sock_msg_perm.isra.0+0xba/0x170 12:38:10 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x9, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) [ 364.242794] inet_sendmsg+0x147/0x5d0 [ 364.242810] ? compat_rawv6_getsockopt+0x150/0x150 [ 364.242825] ? inet_sendmsg+0x147/0x5d0 [ 364.242842] ? ipip_gro_receive+0x100/0x100 [ 364.242860] sock_sendmsg+0xdd/0x130 [ 364.252352] ___sys_sendmsg+0x806/0x930 [ 364.252373] ? copy_msghdr_from_user+0x430/0x430 [ 364.252393] ? lock_downgrade+0x810/0x810 [ 364.261280] ? kasan_check_read+0x11/0x20 [ 364.261300] ? __fget+0x367/0x540 [ 364.261330] ? __fget_light+0x1a9/0x230 [ 364.269935] ? __fdget+0x1b/0x20 12:38:10 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x300, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) [ 364.269951] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 364.269977] __sys_sendmsg+0x105/0x1d0 [ 364.278855] ? __ia32_sys_shutdown+0x80/0x80 [ 364.278872] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 364.278888] ? fput+0x128/0x1a0 [ 364.278911] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 364.286911] ? do_syscall_64+0x26/0x610 [ 364.286931] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 364.286945] ? do_syscall_64+0x26/0x610 [ 364.286967] __x64_sys_sendmsg+0x78/0xb0 [ 364.295671] do_syscall_64+0x103/0x610 [ 364.295693] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 364.295706] RIP: 0033:0x457e29 [ 364.295720] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 364.295731] RSP: 002b:00007f28df43ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 364.304004] RAX: ffffffffffffffda RBX: 00007f28df43ec90 RCX: 0000000000457e29 [ 364.304013] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000003 12:38:10 executing program 5 (fault-call:2 fault-nth:9): r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) [ 364.304023] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 364.304032] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f28df43f6d4 [ 364.304041] R13: 00000000004c53f7 R14: 00000000004d9208 R15: 0000000000000004 12:38:11 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440), 0x4) [ 364.475060] FAULT_INJECTION: forcing a failure. [ 364.475060] name failslab, interval 1, probability 0, space 0, times 0 [ 364.511316] CPU: 0 PID: 19637 Comm: syz-executor.5 Not tainted 5.0.0-rc4+ #39 [ 364.518629] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 364.527983] Call Trace: [ 364.530599] dump_stack+0x172/0x1f0 [ 364.534247] should_fail.cold+0xa/0x1b [ 364.538149] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 364.543266] ? lock_downgrade+0x810/0x810 [ 364.547426] ? ___might_sleep+0x163/0x280 [ 364.551605] __should_failslab+0x121/0x190 [ 364.555855] should_failslab+0x9/0x14 [ 364.559679] kmem_cache_alloc_node+0x265/0x710 [ 364.564273] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 364.569817] ? ip_generic_getfrag+0x120/0x230 12:38:11 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0xa, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:11 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x7, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) [ 364.574325] __alloc_skb+0xd5/0x5e0 [ 364.577966] ? skb_scrub_packet+0x440/0x440 [ 364.582303] ? raw6_getfrag+0x164/0x230 [ 364.586292] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 364.591331] __ip6_append_data.isra.0+0x29ed/0x3600 [ 364.596372] ? rawv6_mh_filter_unregister+0x20/0x20 [ 364.601416] ? dst_output+0x180/0x180 [ 364.605226] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 364.610084] ip6_append_data+0x1e5/0x320 [ 364.614154] ? rawv6_mh_filter_unregister+0x20/0x20 [ 364.619190] ? rawv6_mh_filter_unregister+0x20/0x20 12:38:11 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x0) [ 364.624219] rawv6_sendmsg+0x146b/0x35f0 [ 364.628300] ? __audit_ptrace+0x1f1/0x590 [ 364.632471] ? compat_rawv6_getsockopt+0x150/0x150 [ 364.637413] ? aa_profile_af_perm+0x320/0x320 [ 364.641929] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 364.646955] ? rw_copy_check_uvector+0x2a6/0x330 [ 364.651739] ? ___might_sleep+0x163/0x280 [ 364.655921] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 364.660790] inet_sendmsg+0x147/0x5d0 [ 364.664615] ? compat_rawv6_getsockopt+0x150/0x150 [ 364.669555] ? inet_sendmsg+0x147/0x5d0 [ 364.669590] ? ipip_gro_receive+0x100/0x100 [ 364.669618] sock_sendmsg+0xdd/0x130 [ 364.669637] ___sys_sendmsg+0x806/0x930 [ 364.677922] ? copy_msghdr_from_user+0x430/0x430 [ 364.685602] ? lock_downgrade+0x810/0x810 [ 364.685623] ? kasan_check_read+0x11/0x20 [ 364.685643] ? __fget+0x367/0x540 [ 364.685675] ? __fget_light+0x1a9/0x230 [ 364.685695] ? __fdget+0x1b/0x20 [ 364.685713] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 364.685733] __sys_sendmsg+0x105/0x1d0 [ 364.698752] ? __ia32_sys_shutdown+0x80/0x80 [ 364.698769] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 364.698785] ? fput+0x128/0x1a0 [ 364.698813] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 364.706213] ? do_syscall_64+0x26/0x610 [ 364.706231] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 364.706246] ? do_syscall_64+0x26/0x610 [ 364.706269] __x64_sys_sendmsg+0x78/0xb0 [ 364.706287] do_syscall_64+0x103/0x610 [ 364.706308] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 364.706320] RIP: 0033:0x457e29 12:38:11 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x471, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) [ 364.706334] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 364.706342] RSP: 002b:00007f28df43ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 364.715238] RAX: ffffffffffffffda RBX: 00007f28df43ec90 RCX: 0000000000457e29 [ 364.715247] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000003 [ 364.715257] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 364.715266] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f28df43f6d4 [ 364.715276] R13: 00000000004c53f7 R14: 00000000004d9208 R15: 0000000000000004 [ 364.715503] net_ratelimit: 22 callbacks suppressed [ 364.715511] protocol 88fb is buggy, dev hsr_slave_0 [ 364.729295] protocol 88fb is buggy, dev hsr_slave_1 [ 364.737463] protocol 88fb is buggy, dev hsr_slave_0 [ 364.746843] protocol 88fb is buggy, dev hsr_slave_1 12:38:11 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x500, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) 12:38:11 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440), 0x4) 12:38:11 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x8, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) [ 364.894424] device nr0 entered promiscuous mode 12:38:11 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0xe, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:11 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x58c, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) 12:38:11 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x9, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:11 executing program 5 (fault-call:2 fault-nth:10): r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:11 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0xa, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:11 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x10, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:11 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x5a8, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) [ 365.427079] FAULT_INJECTION: forcing a failure. [ 365.427079] name failslab, interval 1, probability 0, space 0, times 0 [ 365.460019] CPU: 1 PID: 19696 Comm: syz-executor.5 Not tainted 5.0.0-rc4+ #39 [ 365.467616] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 365.476969] Call Trace: [ 365.479589] dump_stack+0x172/0x1f0 [ 365.483242] should_fail.cold+0xa/0x1b [ 365.487137] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 365.492244] ? lock_downgrade+0x810/0x810 [ 365.496408] ? ___might_sleep+0x163/0x280 [ 365.500569] __should_failslab+0x121/0x190 [ 365.504811] should_failslab+0x9/0x14 [ 365.508619] kmem_cache_alloc_node_trace+0x270/0x720 [ 365.513725] ? __alloc_skb+0xd5/0x5e0 [ 365.517525] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 365.523191] __kmalloc_node_track_caller+0x3d/0x70 [ 365.528125] __kmalloc_reserve.isra.0+0x40/0xf0 [ 365.532796] __alloc_skb+0x10b/0x5e0 [ 365.536514] ? skb_scrub_packet+0x440/0x440 [ 365.540837] ? raw6_getfrag+0x164/0x230 [ 365.544808] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 365.549830] __ip6_append_data.isra.0+0x29ed/0x3600 [ 365.554856] ? rawv6_mh_filter_unregister+0x20/0x20 [ 365.559888] ? dst_output+0x180/0x180 [ 365.563695] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 365.568542] ip6_append_data+0x1e5/0x320 [ 365.573115] ? rawv6_mh_filter_unregister+0x20/0x20 [ 365.578139] ? rawv6_mh_filter_unregister+0x20/0x20 [ 365.583164] rawv6_sendmsg+0x146b/0x35f0 [ 365.587232] ? __audit_ptrace+0x1f1/0x590 [ 365.591388] ? compat_rawv6_getsockopt+0x150/0x150 [ 365.596325] ? aa_profile_af_perm+0x320/0x320 [ 365.600829] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 365.605845] ? rw_copy_check_uvector+0x2a6/0x330 [ 365.610929] ? ___might_sleep+0x163/0x280 [ 365.615105] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 365.619956] inet_sendmsg+0x147/0x5d0 [ 365.623761] ? compat_rawv6_getsockopt+0x150/0x150 [ 365.628688] ? inet_sendmsg+0x147/0x5d0 [ 365.632668] ? ipip_gro_receive+0x100/0x100 [ 365.636997] sock_sendmsg+0xdd/0x130 [ 365.640718] ___sys_sendmsg+0x806/0x930 [ 365.644697] ? copy_msghdr_from_user+0x430/0x430 [ 365.649457] ? lock_downgrade+0x810/0x810 [ 365.653609] ? kasan_check_read+0x11/0x20 [ 365.657763] ? __fget+0x367/0x540 [ 365.661231] ? __fget_light+0x1a9/0x230 [ 365.665209] ? __fdget+0x1b/0x20 [ 365.668583] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 365.674127] __sys_sendmsg+0x105/0x1d0 [ 365.678022] ? __ia32_sys_shutdown+0x80/0x80 [ 365.682433] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 365.687972] ? fput+0x128/0x1a0 [ 365.691263] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 365.696018] ? do_syscall_64+0x26/0x610 [ 365.699995] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 365.705360] ? do_syscall_64+0x26/0x610 [ 365.709344] __x64_sys_sendmsg+0x78/0xb0 [ 365.713437] do_syscall_64+0x103/0x610 [ 365.717329] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 365.722518] RIP: 0033:0x457e29 [ 365.725712] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 365.744611] RSP: 002b:00007f28df43ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 365.752319] RAX: ffffffffffffffda RBX: 00007f28df43ec90 RCX: 0000000000457e29 [ 365.759588] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000003 [ 365.766854] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 365.774119] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f28df43f6d4 [ 365.781384] R13: 00000000004c53f7 R14: 00000000004d9208 R15: 0000000000000004 12:38:12 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0) 12:38:12 executing program 4 (fault-call:3 fault-nth:0): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:12 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x5dc, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) 12:38:12 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x11, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:12 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0xe, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:12 executing program 5 (fault-call:2 fault-nth:11): r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) [ 365.922512] protocol 88fb is buggy, dev hsr_slave_0 [ 365.927636] protocol 88fb is buggy, dev hsr_slave_1 [ 365.933007] protocol 88fb is buggy, dev hsr_slave_0 [ 365.938090] protocol 88fb is buggy, dev hsr_slave_1 [ 365.942187] FAULT_INJECTION: forcing a failure. [ 365.942187] name failslab, interval 1, probability 0, space 0, times 0 [ 365.966638] device nr0 entered promiscuous mode 12:38:12 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x600, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) [ 365.989758] CPU: 0 PID: 19708 Comm: syz-executor.4 Not tainted 5.0.0-rc4+ #39 [ 365.989875] FAULT_INJECTION: forcing a failure. [ 365.989875] name failslab, interval 1, probability 0, space 0, times 0 [ 365.997055] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 365.997063] Call Trace: [ 365.997090] dump_stack+0x172/0x1f0 [ 365.997118] should_fail.cold+0xa/0x1b [ 365.997141] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 365.997159] ? lock_downgrade+0x810/0x810 [ 365.997182] ? ___might_sleep+0x163/0x280 [ 366.041135] __should_failslab+0x121/0x190 [ 366.045384] should_failslab+0x9/0x14 [ 366.049192] __kmalloc+0x2dc/0x740 [ 366.052752] ? find_held_lock+0x35/0x130 [ 366.056848] ? __might_fault+0x12b/0x1e0 [ 366.060924] ? rw_copy_check_uvector+0x28c/0x330 [ 366.065695] rw_copy_check_uvector+0x28c/0x330 [ 366.070287] ? lock_downgrade+0x810/0x810 [ 366.074452] import_iovec+0xbf/0x200 [ 366.078174] ? dup_iter+0x260/0x260 [ 366.081846] ? _copy_from_user+0xdd/0x150 12:38:12 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x700, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) [ 366.086012] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 366.091580] copy_msghdr_from_user+0x2c8/0x430 [ 366.096177] ? move_addr_to_kernel.part.0+0x110/0x110 [ 366.101380] ? lockdep_hardirqs_on+0x415/0x5d0 [ 366.105978] ? retint_kernel+0x2d/0x2d [ 366.109908] ? trace_hardirqs_on_caller+0x6a/0x220 [ 366.114849] ? retint_kernel+0x2d/0x2d [ 366.118754] ___sys_sendmsg+0x10b/0x930 [ 366.122742] ? copy_msghdr_from_user+0x430/0x430 [ 366.127506] ? retint_kernel+0x2d/0x2d [ 366.131413] ? lock_downgrade+0x810/0x810 [ 366.135600] ? kasan_check_read+0x11/0x20 12:38:12 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x10, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) [ 366.139763] ? __fget+0x367/0x540 [ 366.143246] ? __fget_light+0x1a9/0x230 [ 366.147230] ? __fdget+0x1b/0x20 [ 366.150618] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 366.156176] __sys_sendmsg+0x105/0x1d0 [ 366.160075] ? __ia32_sys_shutdown+0x80/0x80 [ 366.164497] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 366.170046] ? fput+0x128/0x1a0 [ 366.173352] ? ksys_write+0x166/0x1f0 [ 366.177167] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 366.181932] ? do_syscall_64+0x26/0x610 12:38:12 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x8a4, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) [ 366.185914] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 366.191288] ? do_syscall_64+0x26/0x610 [ 366.195284] __x64_sys_sendmsg+0x78/0xb0 [ 366.199354] do_syscall_64+0x103/0x610 [ 366.203270] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 366.208463] RIP: 0033:0x457e29 [ 366.211677] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 366.230604] RSP: 002b:00007fd0bf1a9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 366.238315] RAX: ffffffffffffffda RBX: 00007fd0bf1a9c90 RCX: 0000000000457e29 [ 366.245592] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000004 [ 366.245606] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 366.245616] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd0bf1aa6d4 [ 366.245625] R13: 00000000004c53f7 R14: 00000000004d9208 R15: 0000000000000005 [ 366.248136] CPU: 0 PID: 19720 Comm: syz-executor.5 Not tainted 5.0.0-rc4+ #39 [ 366.260175] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 366.260180] Call Trace: [ 366.260201] dump_stack+0x172/0x1f0 [ 366.260221] should_fail.cold+0xa/0x1b [ 366.260239] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 366.274773] ? lock_downgrade+0x810/0x810 [ 366.274798] ? ___might_sleep+0x163/0x280 [ 366.274817] __should_failslab+0x121/0x190 [ 366.274836] should_failslab+0x9/0x14 [ 366.274853] kmem_cache_alloc_node_trace+0x270/0x720 [ 366.274871] ? __alloc_skb+0xd5/0x5e0 [ 366.274888] ? rcu_lockdep_current_cpu_online+0xe3/0x130 12:38:12 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x13, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) [ 366.274907] __kmalloc_node_track_caller+0x3d/0x70 [ 366.274924] __kmalloc_reserve.isra.0+0x40/0xf0 [ 366.274942] __alloc_skb+0x10b/0x5e0 [ 366.274959] ? skb_scrub_packet+0x440/0x440 [ 366.274976] ? raw6_getfrag+0x164/0x230 [ 366.274989] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 366.275010] __ip6_append_data.isra.0+0x29ed/0x3600 [ 366.275032] ? rawv6_mh_filter_unregister+0x20/0x20 [ 366.275057] ? dst_output+0x180/0x180 [ 366.275075] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 366.275095] ip6_append_data+0x1e5/0x320 [ 366.275113] ? rawv6_mh_filter_unregister+0x20/0x20 [ 366.291733] ? rawv6_mh_filter_unregister+0x20/0x20 [ 366.291755] rawv6_sendmsg+0x146b/0x35f0 [ 366.291780] ? __audit_ptrace+0x1f1/0x590 [ 366.291799] ? compat_rawv6_getsockopt+0x150/0x150 [ 366.298004] ? aa_profile_af_perm+0x320/0x320 [ 366.298033] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 366.298053] ? rw_copy_check_uvector+0x2a6/0x330 [ 366.298082] ? ___might_sleep+0x163/0x280 [ 366.307066] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 366.307088] inet_sendmsg+0x147/0x5d0 12:38:12 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x900, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) [ 366.307104] ? compat_rawv6_getsockopt+0x150/0x150 [ 366.307119] ? inet_sendmsg+0x147/0x5d0 [ 366.307137] ? ipip_gro_receive+0x100/0x100 [ 366.307155] sock_sendmsg+0xdd/0x130 [ 366.307175] ___sys_sendmsg+0x806/0x930 [ 366.307195] ? copy_msghdr_from_user+0x430/0x430 [ 366.307215] ? lock_downgrade+0x810/0x810 [ 366.307233] ? kasan_check_read+0x11/0x20 [ 366.307251] ? __fget+0x367/0x540 [ 366.322518] protocol 88fb is buggy, dev hsr_slave_0 [ 366.323554] ? __fget_light+0x1a9/0x230 [ 366.323587] ? __fdget+0x1b/0x20 [ 366.323602] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 366.323622] __sys_sendmsg+0x105/0x1d0 [ 366.328765] protocol 88fb is buggy, dev hsr_slave_1 [ 366.332504] ? __ia32_sys_shutdown+0x80/0x80 [ 366.332520] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 366.332535] ? fput+0x128/0x1a0 [ 366.332569] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 366.359596] ? do_syscall_64+0x26/0x610 [ 366.359617] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 366.359636] ? do_syscall_64+0x26/0x610 [ 366.359661] __x64_sys_sendmsg+0x78/0xb0 [ 366.383289] do_syscall_64+0x103/0x610 [ 366.383313] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 366.383325] RIP: 0033:0x457e29 [ 366.383341] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 366.383349] RSP: 002b:00007f28df43ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 366.383364] RAX: ffffffffffffffda RBX: 00007f28df43ec90 RCX: 0000000000457e29 [ 366.383373] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000003 [ 366.383381] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 366.383390] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f28df43f6d4 [ 366.383398] R13: 00000000004c53f7 R14: 00000000004d9208 R15: 0000000000000004 12:38:13 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0) 12:38:13 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0xa00, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) 12:38:13 executing program 4 (fault-call:3 fault-nth:1): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:13 executing program 5 (fault-call:2 fault-nth:12): r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:13 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x11, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:13 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x60, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) [ 366.976279] FAULT_INJECTION: forcing a failure. [ 366.976279] name failslab, interval 1, probability 0, space 0, times 0 [ 367.004967] FAULT_INJECTION: forcing a failure. [ 367.004967] name failslab, interval 1, probability 0, space 0, times 0 [ 367.038001] CPU: 1 PID: 19757 Comm: syz-executor.4 Not tainted 5.0.0-rc4+ #39 [ 367.045295] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 367.054644] Call Trace: [ 367.057241] dump_stack+0x172/0x1f0 [ 367.060883] should_fail.cold+0xa/0x1b [ 367.064782] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 367.069889] ? lock_downgrade+0x810/0x810 [ 367.074051] ? ___might_sleep+0x163/0x280 [ 367.078219] __should_failslab+0x121/0x190 [ 367.082460] should_failslab+0x9/0x14 [ 367.086613] kmem_cache_alloc_node+0x265/0x710 [ 367.091208] ? mark_held_locks+0x100/0x100 [ 367.095449] ? check_noncircular+0x20/0x20 [ 367.099697] __alloc_skb+0xd5/0x5e0 [ 367.103337] ? skb_scrub_packet+0x440/0x440 [ 367.107664] ? find_held_lock+0x35/0x130 [ 367.111734] ? ip6_mtu+0x2e6/0x460 [ 367.115282] __ip6_append_data.isra.0+0x29ed/0x3600 [ 367.120309] ? rawv6_mh_filter_unregister+0x20/0x20 [ 367.125343] ? dst_output+0x180/0x180 [ 367.129149] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 367.134009] ip6_append_data+0x1e5/0x320 [ 367.138080] ? rawv6_mh_filter_unregister+0x20/0x20 [ 367.143116] ? rawv6_mh_filter_unregister+0x20/0x20 [ 367.148137] rawv6_sendmsg+0x146b/0x35f0 [ 367.152213] ? __audit_ptrace+0x1f1/0x590 [ 367.156367] ? compat_rawv6_getsockopt+0x150/0x150 [ 367.161306] ? aa_profile_af_perm+0x320/0x320 [ 367.165812] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 367.170834] ? rw_copy_check_uvector+0x2a6/0x330 [ 367.175612] ? ___might_sleep+0x163/0x280 [ 367.179786] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 367.184642] inet_sendmsg+0x147/0x5d0 [ 367.188444] ? compat_rawv6_getsockopt+0x150/0x150 [ 367.193374] ? inet_sendmsg+0x147/0x5d0 [ 367.197351] ? ipip_gro_receive+0x100/0x100 [ 367.201681] sock_sendmsg+0xdd/0x130 [ 367.205401] ___sys_sendmsg+0x806/0x930 [ 367.209624] ? copy_msghdr_from_user+0x430/0x430 [ 367.214387] ? lock_downgrade+0x810/0x810 [ 367.218542] ? kasan_check_read+0x11/0x20 [ 367.222710] ? __fget+0x367/0x540 [ 367.226182] ? __fget_light+0x1a9/0x230 [ 367.230162] ? __fdget+0x1b/0x20 [ 367.233531] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 367.239090] __sys_sendmsg+0x105/0x1d0 [ 367.242984] ? __ia32_sys_shutdown+0x80/0x80 [ 367.247402] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 367.252947] ? fput+0x128/0x1a0 [ 367.256243] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 367.261002] ? do_syscall_64+0x26/0x610 [ 367.264982] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 367.270349] ? do_syscall_64+0x26/0x610 [ 367.274335] __x64_sys_sendmsg+0x78/0xb0 [ 367.278403] do_syscall_64+0x103/0x610 [ 367.282302] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 367.287491] RIP: 0033:0x457e29 [ 367.290686] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 367.309592] RSP: 002b:00007fd0bf1a9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 367.317303] RAX: ffffffffffffffda RBX: 00007fd0bf1a9c90 RCX: 0000000000457e29 [ 367.324580] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000004 [ 367.331852] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 367.339126] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd0bf1aa6d4 [ 367.346394] R13: 00000000004c53f7 R14: 00000000004d9208 R15: 0000000000000005 [ 367.353689] CPU: 0 PID: 19762 Comm: syz-executor.5 Not tainted 5.0.0-rc4+ #39 [ 367.360978] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 367.370330] Call Trace: [ 367.372924] dump_stack+0x172/0x1f0 [ 367.376596] should_fail.cold+0xa/0x1b [ 367.380509] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 367.385615] ? lock_downgrade+0x810/0x810 [ 367.389766] ? ___might_sleep+0x163/0x280 [ 367.393919] __should_failslab+0x121/0x190 [ 367.398158] should_failslab+0x9/0x14 [ 367.401960] kmem_cache_alloc_node_trace+0x270/0x720 [ 367.407089] ? __alloc_skb+0xd5/0x5e0 [ 367.410895] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 367.416356] __kmalloc_node_track_caller+0x3d/0x70 [ 367.421286] __kmalloc_reserve.isra.0+0x40/0xf0 [ 367.425958] __alloc_skb+0x10b/0x5e0 [ 367.429673] ? skb_scrub_packet+0x440/0x440 [ 367.434018] ? raw6_getfrag+0x164/0x230 [ 367.437990] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 367.443014] __ip6_append_data.isra.0+0x29ed/0x3600 [ 367.448037] ? rawv6_mh_filter_unregister+0x20/0x20 [ 367.453064] ? dst_output+0x180/0x180 [ 367.456871] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 367.461724] ip6_append_data+0x1e5/0x320 [ 367.465783] ? rawv6_mh_filter_unregister+0x20/0x20 [ 367.470807] ? rawv6_mh_filter_unregister+0x20/0x20 [ 367.475836] rawv6_sendmsg+0x146b/0x35f0 [ 367.479910] ? __audit_ptrace+0x1f1/0x590 [ 367.484075] ? compat_rawv6_getsockopt+0x150/0x150 [ 367.489035] ? aa_profile_af_perm+0x320/0x320 [ 367.493532] ? __sanitizer_cov_trace_pc+0x44/0x50 [ 367.498379] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 367.503398] ? rw_copy_check_uvector+0x2a6/0x330 [ 367.508179] ? ___might_sleep+0x163/0x280 [ 367.512366] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 367.517224] inet_sendmsg+0x147/0x5d0 [ 367.521025] ? compat_rawv6_getsockopt+0x150/0x150 [ 367.525956] ? inet_sendmsg+0x147/0x5d0 [ 367.529935] ? ipip_gro_receive+0x100/0x100 [ 367.534266] sock_sendmsg+0xdd/0x130 [ 367.537990] ___sys_sendmsg+0x806/0x930 [ 367.541972] ? copy_msghdr_from_user+0x430/0x430 [ 367.546735] ? lock_downgrade+0x810/0x810 [ 367.550888] ? kasan_check_read+0x11/0x20 [ 367.555038] ? __fget+0x367/0x540 [ 367.558509] ? __fget_light+0x1a9/0x230 [ 367.562487] ? __fdget+0x1b/0x20 [ 367.565853] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 367.571400] __sys_sendmsg+0x105/0x1d0 [ 367.575413] ? __ia32_sys_shutdown+0x80/0x80 [ 367.579821] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 367.585365] ? fput+0x128/0x1a0 [ 367.588664] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 367.593430] ? do_syscall_64+0x26/0x610 [ 367.597416] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 367.602779] ? do_syscall_64+0x26/0x610 [ 367.606767] __x64_sys_sendmsg+0x78/0xb0 [ 367.610860] do_syscall_64+0x103/0x610 [ 367.614758] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 367.619947] RIP: 0033:0x457e29 [ 367.623138] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 367.642035] RSP: 002b:00007f28df43ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 367.649748] RAX: ffffffffffffffda RBX: 00007f28df43ec90 RCX: 0000000000457e29 [ 367.657019] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000003 [ 367.664295] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 367.671559] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f28df43f6d4 [ 367.678839] R13: 00000000004c53f7 R14: 00000000004d9208 R15: 0000000000000004 12:38:14 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0xb34, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) [ 367.700331] device nr0 entered promiscuous mode 12:38:14 executing program 4 (fault-call:3 fault-nth:2): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:14 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x13, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:14 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0xaf, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) [ 367.829763] FAULT_INJECTION: forcing a failure. [ 367.829763] name failslab, interval 1, probability 0, space 0, times 0 [ 367.867189] CPU: 0 PID: 19779 Comm: syz-executor.4 Not tainted 5.0.0-rc4+ #39 12:38:14 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x60, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) [ 367.874494] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 367.883847] Call Trace: [ 367.886454] dump_stack+0x172/0x1f0 [ 367.890094] should_fail.cold+0xa/0x1b [ 367.893994] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 367.899103] ? lock_downgrade+0x810/0x810 [ 367.903261] ? ___might_sleep+0x163/0x280 [ 367.907415] __should_failslab+0x121/0x190 [ 367.911661] should_failslab+0x9/0x14 [ 367.915475] kmem_cache_alloc_node+0x265/0x710 [ 367.920066] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 367.924838] __alloc_skb+0xd5/0x5e0 12:38:14 executing program 5: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) [ 367.928497] ? skb_scrub_packet+0x440/0x440 [ 367.932843] ? __ip6_append_data.isra.0+0x1ec8/0x3600 [ 367.938050] __ip6_append_data.isra.0+0x29ed/0x3600 [ 367.943085] ? rawv6_mh_filter_unregister+0x20/0x20 [ 367.948122] ? dst_output+0x180/0x180 [ 367.951937] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 367.956797] ip6_append_data+0x1e5/0x320 [ 367.960863] ? rawv6_mh_filter_unregister+0x20/0x20 [ 367.965895] ? rawv6_mh_filter_unregister+0x20/0x20 [ 367.970921] rawv6_sendmsg+0x146b/0x35f0 [ 367.975005] ? __audit_ptrace+0x1f1/0x590 [ 367.979166] ? compat_rawv6_getsockopt+0x150/0x150 [ 367.984111] ? aa_profile_af_perm+0x320/0x320 [ 367.988618] ? __sanitizer_cov_trace_pc+0x18/0x50 [ 367.993467] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 367.998490] ? rw_copy_check_uvector+0x2a6/0x330 [ 368.003265] ? ___might_sleep+0x163/0x280 [ 368.007443] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 368.012299] inet_sendmsg+0x147/0x5d0 [ 368.016110] ? compat_rawv6_getsockopt+0x150/0x150 [ 368.021046] ? inet_sendmsg+0x147/0x5d0 [ 368.025030] ? ipip_gro_receive+0x100/0x100 [ 368.029360] sock_sendmsg+0xdd/0x130 [ 368.035161] ___sys_sendmsg+0x806/0x930 [ 368.035181] ? copy_msghdr_from_user+0x430/0x430 [ 368.035202] ? lock_downgrade+0x810/0x810 [ 368.035222] ? kasan_check_read+0x11/0x20 [ 368.035241] ? __fget+0x367/0x540 [ 368.035270] ? __fget_light+0x1a9/0x230 [ 368.059649] ? __fdget+0x1b/0x20 [ 368.059666] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 368.059699] __sys_sendmsg+0x105/0x1d0 [ 368.059719] ? __ia32_sys_shutdown+0x80/0x80 [ 368.076879] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 368.082420] ? fput+0x128/0x1a0 [ 368.085715] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 368.085732] ? do_syscall_64+0x26/0x610 [ 368.085751] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 368.085768] ? do_syscall_64+0x26/0x610 [ 368.103816] __x64_sys_sendmsg+0x78/0xb0 [ 368.107900] do_syscall_64+0x103/0x610 [ 368.111801] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 368.116993] RIP: 0033:0x457e29 [ 368.120195] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 368.139100] RSP: 002b:00007fd0bf1a9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 368.146819] RAX: ffffffffffffffda RBX: 00007fd0bf1a9c90 RCX: 0000000000457e29 [ 368.154089] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000004 [ 368.161357] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 368.168629] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd0bf1aa6d4 [ 368.175901] R13: 00000000004c53f7 R14: 00000000004d9208 R15: 0000000000000005 12:38:14 executing program 4 (fault-call:3 fault-nth:3): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:14 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0xb50, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) 12:38:14 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0xfc, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:14 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0xaf, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:14 executing program 5: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x2, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:14 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0) 12:38:15 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0xc60, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) 12:38:15 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0xfc, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:15 executing program 5: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x3, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) [ 368.511768] FAULT_INJECTION: forcing a failure. [ 368.511768] name failslab, interval 1, probability 0, space 0, times 0 [ 368.534853] device nr0 entered promiscuous mode [ 368.583307] CPU: 0 PID: 19816 Comm: syz-executor.4 Not tainted 5.0.0-rc4+ #39 [ 368.590627] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 368.599989] Call Trace: [ 368.602609] dump_stack+0x172/0x1f0 [ 368.606256] should_fail.cold+0xa/0x1b [ 368.606280] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 368.615257] ? lock_downgrade+0x810/0x810 [ 368.615276] ? ___might_sleep+0x163/0x280 [ 368.615294] __should_failslab+0x121/0x190 [ 368.615314] should_failslab+0x9/0x14 12:38:15 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x103, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:15 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0xe00, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) [ 368.615331] kmem_cache_alloc_node_trace+0x270/0x720 [ 368.615351] ? retint_kernel+0x2d/0x2d [ 368.640674] ? __alloc_skb+0xd5/0x5e0 [ 368.644490] __kmalloc_node_track_caller+0x3d/0x70 [ 368.649437] __kmalloc_reserve.isra.0+0x40/0xf0 [ 368.654116] __alloc_skb+0x10b/0x5e0 [ 368.657846] ? skb_scrub_packet+0x440/0x440 [ 368.662174] ? find_held_lock+0x35/0x130 [ 368.666246] ? ip6_mtu+0x2e6/0x460 [ 368.669800] __ip6_append_data.isra.0+0x29ed/0x3600 [ 368.674833] ? rawv6_mh_filter_unregister+0x20/0x20 [ 368.679866] ? dst_output+0x180/0x180 [ 368.683682] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 368.688538] ip6_append_data+0x1e5/0x320 [ 368.688555] ? rawv6_mh_filter_unregister+0x20/0x20 [ 368.688592] ? rawv6_mh_filter_unregister+0x20/0x20 [ 368.688616] rawv6_sendmsg+0x146b/0x35f0 [ 368.697682] ? __audit_ptrace+0x1f1/0x590 [ 368.697703] ? compat_rawv6_getsockopt+0x150/0x150 [ 368.697724] ? aa_profile_af_perm+0x320/0x320 [ 368.697741] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 368.697761] ? trace_hardirqs_on_caller+0x6a/0x220 [ 368.730031] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 368.734806] ? ___might_sleep+0x163/0x280 [ 368.738973] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 368.743844] inet_sendmsg+0x147/0x5d0 [ 368.747648] ? compat_rawv6_getsockopt+0x150/0x150 [ 368.752590] ? inet_sendmsg+0x147/0x5d0 [ 368.756585] ? ipip_gro_receive+0x100/0x100 [ 368.760911] sock_sendmsg+0xdd/0x130 [ 368.764633] ___sys_sendmsg+0x806/0x930 [ 368.768611] ? copy_msghdr_from_user+0x430/0x430 [ 368.773369] ? retint_kernel+0x2d/0x2d [ 368.777260] ? lock_downgrade+0x810/0x810 [ 368.781409] ? kasan_check_read+0x11/0x20 [ 368.785578] ? __fget+0x367/0x540 [ 368.789050] ? __fget_light+0x1a9/0x230 [ 368.793024] ? __fdget+0x1b/0x20 [ 368.796396] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 368.801938] __sys_sendmsg+0x105/0x1d0 [ 368.805826] ? __ia32_sys_shutdown+0x80/0x80 [ 368.810238] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 368.815775] ? fput+0x128/0x1a0 [ 368.819063] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 368.823821] ? do_syscall_64+0x26/0x610 [ 368.827798] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 368.833163] ? do_syscall_64+0x26/0x610 [ 368.837144] __x64_sys_sendmsg+0x78/0xb0 [ 368.841205] do_syscall_64+0x103/0x610 [ 368.845109] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 368.850300] RIP: 0033:0x457e29 [ 368.853493] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 368.872391] RSP: 002b:00007fd0bf1a9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 368.880104] RAX: ffffffffffffffda RBX: 00007fd0bf1a9c90 RCX: 0000000000457e29 [ 368.887371] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000004 [ 368.894636] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 368.901909] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd0bf1aa6d4 [ 368.909182] R13: 00000000004c53f7 R14: 00000000004d9208 R15: 0000000000000005 12:38:15 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x103, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:15 executing program 4 (fault-call:3 fault-nth:4): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:15 executing program 5: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x4, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:15 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x2dc, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:15 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x1093, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) 12:38:15 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x2dc, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) [ 369.247431] FAULT_INJECTION: forcing a failure. [ 369.247431] name failslab, interval 1, probability 0, space 0, times 0 [ 369.264065] CPU: 1 PID: 19863 Comm: syz-executor.4 Not tainted 5.0.0-rc4+ #39 [ 369.271363] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 369.280714] Call Trace: [ 369.283314] dump_stack+0x172/0x1f0 [ 369.286954] should_fail.cold+0xa/0x1b [ 369.290852] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 369.295957] ? lock_downgrade+0x810/0x810 [ 369.300116] ? ___might_sleep+0x163/0x280 [ 369.304270] __should_failslab+0x121/0x190 [ 369.308514] should_failslab+0x9/0x14 [ 369.312321] kmem_cache_alloc_node+0x265/0x710 [ 369.316907] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 369.322451] ? ip_generic_getfrag+0x120/0x230 [ 369.326959] __alloc_skb+0xd5/0x5e0 [ 369.330601] ? skb_scrub_packet+0x440/0x440 [ 369.334930] ? raw6_getfrag+0x164/0x230 [ 369.338904] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 369.343930] __ip6_append_data.isra.0+0x29ed/0x3600 [ 369.348956] ? rawv6_mh_filter_unregister+0x20/0x20 [ 369.353985] ? dst_output+0x180/0x180 [ 369.357794] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 369.362650] ip6_append_data+0x1e5/0x320 [ 369.366713] ? rawv6_mh_filter_unregister+0x20/0x20 [ 369.371741] ? rawv6_mh_filter_unregister+0x20/0x20 [ 369.376760] rawv6_sendmsg+0x146b/0x35f0 [ 369.380813] ? __audit_ptrace+0x1f1/0x590 [ 369.384947] ? compat_rawv6_getsockopt+0x150/0x150 [ 369.389865] ? aa_profile_af_perm+0x320/0x320 [ 369.394349] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 369.399352] ? rw_copy_check_uvector+0x2a6/0x330 [ 369.404106] ? ___might_sleep+0x163/0x280 [ 369.408252] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 369.413092] inet_sendmsg+0x147/0x5d0 [ 369.416881] ? compat_rawv6_getsockopt+0x150/0x150 [ 369.421791] ? inet_sendmsg+0x147/0x5d0 [ 369.425750] ? ipip_gro_receive+0x100/0x100 [ 369.430060] sock_sendmsg+0xdd/0x130 [ 369.433762] ___sys_sendmsg+0x806/0x930 [ 369.437723] ? copy_msghdr_from_user+0x430/0x430 [ 369.442467] ? lock_downgrade+0x810/0x810 [ 369.446604] ? kasan_check_read+0x11/0x20 [ 369.450738] ? __fget+0x367/0x540 [ 369.454187] ? __fget_light+0x1a9/0x230 [ 369.458142] ? __fdget+0x1b/0x20 [ 369.461490] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 369.467025] __sys_sendmsg+0x105/0x1d0 [ 369.470904] ? __ia32_sys_shutdown+0x80/0x80 [ 369.475299] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 369.480822] ? fput+0x128/0x1a0 [ 369.484093] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 369.488831] ? do_syscall_64+0x26/0x610 [ 369.492797] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 369.498142] ? do_syscall_64+0x26/0x610 [ 369.502110] __x64_sys_sendmsg+0x78/0xb0 [ 369.506154] do_syscall_64+0x103/0x610 [ 369.510025] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 369.515198] RIP: 0033:0x457e29 [ 369.518376] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 369.537264] RSP: 002b:00007fd0bf1a9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 369.544972] RAX: ffffffffffffffda RBX: 00007fd0bf1a9c90 RCX: 0000000000457e29 [ 369.552224] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000004 [ 369.559472] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 369.566724] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd0bf1aa6d4 [ 369.573971] R13: 00000000004c53f7 R14: 00000000004d9208 R15: 0000000000000005 12:38:16 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="c3dd810000000000"], 0x8) 12:38:16 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x10dc, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) 12:38:16 executing program 5: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x5, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:16 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x300, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:16 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x300, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:16 executing program 4 (fault-call:3 fault-nth:5): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) [ 369.792095] device nr0 entered promiscuous mode 12:38:16 executing program 5: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x6, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:16 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x301, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:16 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x10f8, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) 12:38:16 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x301, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) [ 369.881589] FAULT_INJECTION: forcing a failure. [ 369.881589] name failslab, interval 1, probability 0, space 0, times 0 [ 369.958445] CPU: 0 PID: 19885 Comm: syz-executor.4 Not tainted 5.0.0-rc4+ #39 [ 369.965765] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 369.975119] Call Trace: [ 369.977730] dump_stack+0x172/0x1f0 [ 369.981379] should_fail.cold+0xa/0x1b [ 369.985295] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 369.990446] ? lock_downgrade+0x810/0x810 [ 369.994629] ? ___might_sleep+0x163/0x280 [ 369.998803] __should_failslab+0x121/0x190 [ 370.003066] should_failslab+0x9/0x14 12:38:16 executing program 5: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x7, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) [ 370.006877] kmem_cache_alloc_node_trace+0x270/0x720 [ 370.012005] ? __alloc_skb+0xd5/0x5e0 [ 370.015820] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 370.021288] __kmalloc_node_track_caller+0x3d/0x70 [ 370.026240] __kmalloc_reserve.isra.0+0x40/0xf0 [ 370.030921] __alloc_skb+0x10b/0x5e0 [ 370.034650] ? skb_scrub_packet+0x440/0x440 [ 370.038985] ? __ip6_append_data.isra.0+0xb9a/0x3600 [ 370.039010] __ip6_append_data.isra.0+0x29ed/0x3600 [ 370.039034] ? rawv6_mh_filter_unregister+0x20/0x20 [ 370.039059] ? dst_output+0x180/0x180 12:38:16 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x144f, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) [ 370.049174] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 370.049207] ip6_append_data+0x1e5/0x320 [ 370.049231] ? rawv6_mh_filter_unregister+0x20/0x20 [ 370.071912] ? rawv6_mh_filter_unregister+0x20/0x20 [ 370.076945] rawv6_sendmsg+0x146b/0x35f0 [ 370.081039] ? __audit_ptrace+0x1f1/0x590 [ 370.082511] net_ratelimit: 12 callbacks suppressed [ 370.082519] protocol 88fb is buggy, dev hsr_slave_0 [ 370.085206] ? compat_rawv6_getsockopt+0x150/0x150 [ 370.090167] protocol 88fb is buggy, dev hsr_slave_1 [ 370.095128] ? aa_profile_af_perm+0x320/0x320 [ 370.095147] ? __sanitizer_cov_trace_pc+0x3b/0x50 [ 370.095162] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 370.100191] protocol 88fb is buggy, dev hsr_slave_0 [ 370.105107] ? rw_copy_check_uvector+0x2a6/0x330 [ 370.105147] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 370.105164] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 370.109681] protocol 88fb is buggy, dev hsr_slave_1 [ 370.114479] ? lockdep_hardirqs_on+0x415/0x5d0 [ 370.114498] ? retint_kernel+0x2d/0x2d [ 370.114533] ? trace_hardirqs_on_caller+0x6a/0x220 [ 370.157175] ? retint_kernel+0x2d/0x2d [ 370.161088] inet_sendmsg+0x147/0x5d0 [ 370.164907] ? compat_rawv6_getsockopt+0x150/0x150 [ 370.169854] ? inet_sendmsg+0x147/0x5d0 [ 370.173837] ? ipip_gro_receive+0x100/0x100 [ 370.178181] sock_sendmsg+0xdd/0x130 [ 370.181909] ___sys_sendmsg+0x806/0x930 [ 370.185898] ? copy_msghdr_from_user+0x430/0x430 [ 370.190671] ? lock_downgrade+0x810/0x810 [ 370.194839] ? kasan_check_read+0x11/0x20 [ 370.199016] ? __fget+0x367/0x540 [ 370.202501] ? __fget_light+0x1a9/0x230 [ 370.206497] ? __fdget+0x1b/0x20 [ 370.209891] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 370.215460] __sys_sendmsg+0x105/0x1d0 [ 370.219375] ? __ia32_sys_shutdown+0x80/0x80 [ 370.223793] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 370.228597] __x64_sys_sendmsg+0x78/0xb0 [ 370.232689] do_syscall_64+0x103/0x610 [ 370.236621] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 370.241820] RIP: 0033:0x457e29 [ 370.245029] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 370.263935] RSP: 002b:00007fd0bf1a9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 370.271652] RAX: ffffffffffffffda RBX: 00007fd0bf1a9c90 RCX: 0000000000457e29 [ 370.278921] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000004 [ 370.286191] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 370.293467] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd0bf1aa6d4 [ 370.300742] R13: 00000000004c53f7 R14: 00000000004d9208 R15: 0000000000000005 12:38:17 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="c3dd810000000000"], 0x8) 12:38:17 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x1684, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) 12:38:17 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x43f, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:17 executing program 5: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x8, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:17 executing program 4 (fault-call:3 fault-nth:6): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:17 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x43f, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) [ 370.549771] FAULT_INJECTION: forcing a failure. [ 370.549771] name failslab, interval 1, probability 0, space 0, times 0 [ 370.562509] protocol 88fb is buggy, dev hsr_slave_0 [ 370.567612] protocol 88fb is buggy, dev hsr_slave_1 [ 370.567733] CPU: 0 PID: 19926 Comm: syz-executor.4 Not tainted 5.0.0-rc4+ #39 [ 370.579913] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 370.589276] Call Trace: [ 370.591873] dump_stack+0x172/0x1f0 [ 370.595518] should_fail.cold+0xa/0x1b [ 370.599447] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 370.604581] ? lock_downgrade+0x810/0x810 [ 370.608737] ? ___might_sleep+0x163/0x280 [ 370.608757] __should_failslab+0x121/0x190 [ 370.608776] should_failslab+0x9/0x14 [ 370.620936] kmem_cache_alloc_node+0x265/0x710 [ 370.625529] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 370.630302] __alloc_skb+0xd5/0x5e0 [ 370.633940] ? skb_scrub_packet+0x440/0x440 [ 370.638273] __ip6_append_data.isra.0+0x29ed/0x3600 [ 370.643300] ? rawv6_mh_filter_unregister+0x20/0x20 [ 370.648333] ? dst_output+0x180/0x180 [ 370.652140] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 370.656992] ip6_append_data+0x1e5/0x320 [ 370.661053] ? rawv6_mh_filter_unregister+0x20/0x20 [ 370.666080] ? rawv6_mh_filter_unregister+0x20/0x20 [ 370.671101] rawv6_sendmsg+0x146b/0x35f0 [ 370.675172] ? __audit_ptrace+0x1f1/0x590 [ 370.679329] ? compat_rawv6_getsockopt+0x150/0x150 [ 370.684266] ? aa_profile_af_perm+0x320/0x320 [ 370.688759] ? lockdep_hardirqs_on+0x415/0x5d0 [ 370.693352] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 370.698130] ? ___might_sleep+0x163/0x280 [ 370.702296] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 370.707148] inet_sendmsg+0x147/0x5d0 [ 370.710948] ? compat_rawv6_getsockopt+0x150/0x150 [ 370.715874] ? inet_sendmsg+0x147/0x5d0 [ 370.719862] ? ipip_gro_receive+0x100/0x100 [ 370.724206] sock_sendmsg+0xdd/0x130 [ 370.727924] ___sys_sendmsg+0x806/0x930 [ 370.731902] ? copy_msghdr_from_user+0x430/0x430 [ 370.736664] ? lock_downgrade+0x810/0x810 [ 370.740816] ? kasan_check_read+0x11/0x20 [ 370.744976] ? __fget+0x367/0x540 [ 370.748450] ? __fget_light+0x1a9/0x230 [ 370.752422] ? __fdget+0x1b/0x20 [ 370.755791] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 370.761341] __sys_sendmsg+0x105/0x1d0 [ 370.765231] ? __ia32_sys_shutdown+0x80/0x80 [ 370.769657] ? __sys_sendmsg+0x1d0/0x1d0 [ 370.773727] __x64_sys_sendmsg+0x78/0xb0 [ 370.777792] do_syscall_64+0x103/0x610 [ 370.781694] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 370.786881] RIP: 0033:0x457e29 [ 370.790073] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 370.808974] RSP: 002b:00007fd0bf1a9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 370.816706] RAX: ffffffffffffffda RBX: 00007fd0bf1a9c90 RCX: 0000000000457e29 [ 370.823990] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000004 [ 370.831253] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 370.838524] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd0bf1aa6d4 12:38:17 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x16a0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) [ 370.845787] R13: 00000000004c53f7 R14: 00000000004d9208 R15: 0000000000000005 12:38:17 executing program 5: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x9, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) [ 370.885944] device nr0 entered promiscuous mode 12:38:17 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x4d8, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:17 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x4d8, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:17 executing program 4 (fault-call:3 fault-nth:7): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:17 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x1882, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) [ 371.043449] FAULT_INJECTION: forcing a failure. [ 371.043449] name failslab, interval 1, probability 0, space 0, times 0 [ 371.099909] CPU: 1 PID: 19946 Comm: syz-executor.4 Not tainted 5.0.0-rc4+ #39 [ 371.107231] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 371.116593] Call Trace: [ 371.119195] dump_stack+0x172/0x1f0 [ 371.122834] should_fail.cold+0xa/0x1b [ 371.126735] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 371.131848] ? lock_downgrade+0x810/0x810 [ 371.136006] ? ___might_sleep+0x163/0x280 [ 371.140171] __should_failslab+0x121/0x190 [ 371.144418] should_failslab+0x9/0x14 [ 371.148230] kmem_cache_alloc_node_trace+0x270/0x720 [ 371.153345] ? __alloc_skb+0xd5/0x5e0 [ 371.157162] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 371.162623] __kmalloc_node_track_caller+0x3d/0x70 [ 371.167572] __kmalloc_reserve.isra.0+0x40/0xf0 [ 371.172253] __alloc_skb+0x10b/0x5e0 [ 371.175978] ? skb_scrub_packet+0x440/0x440 [ 371.180307] ? raw6_getfrag+0x164/0x230 [ 371.184285] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 371.189316] __ip6_append_data.isra.0+0x29ed/0x3600 [ 371.194347] ? rawv6_mh_filter_unregister+0x20/0x20 [ 371.199382] ? dst_output+0x180/0x180 [ 371.203195] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 371.208052] ip6_append_data+0x1e5/0x320 [ 371.212124] ? rawv6_mh_filter_unregister+0x20/0x20 [ 371.217152] ? rawv6_mh_filter_unregister+0x20/0x20 [ 371.222180] rawv6_sendmsg+0x146b/0x35f0 [ 371.226256] ? __audit_ptrace+0x1f1/0x590 [ 371.230412] ? compat_rawv6_getsockopt+0x150/0x150 [ 371.235352] ? aa_profile_af_perm+0x320/0x320 [ 371.239858] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 371.244884] ? rw_copy_check_uvector+0x2a6/0x330 [ 371.249659] ? ___might_sleep+0x163/0x280 [ 371.253833] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 371.258686] inet_sendmsg+0x147/0x5d0 [ 371.262491] ? compat_rawv6_getsockopt+0x150/0x150 [ 371.267427] ? inet_sendmsg+0x147/0x5d0 [ 371.271407] ? ipip_gro_receive+0x100/0x100 [ 371.275735] sock_sendmsg+0xdd/0x130 [ 371.279460] ___sys_sendmsg+0x806/0x930 [ 371.283442] ? copy_msghdr_from_user+0x430/0x430 [ 371.288210] ? lock_downgrade+0x810/0x810 [ 371.292368] ? kasan_check_read+0x11/0x20 [ 371.296523] ? __fget+0x367/0x540 [ 371.300001] ? __fget_light+0x1a9/0x230 [ 371.303981] ? __fdget+0x1b/0x20 [ 371.307349] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 371.312900] __sys_sendmsg+0x105/0x1d0 [ 371.316799] ? __ia32_sys_shutdown+0x80/0x80 [ 371.321212] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 371.326753] ? fput+0x128/0x1a0 [ 371.330046] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 371.334815] ? do_syscall_64+0x26/0x610 [ 371.338796] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 371.344165] ? do_syscall_64+0x26/0x610 [ 371.348151] __x64_sys_sendmsg+0x78/0xb0 [ 371.352220] do_syscall_64+0x103/0x610 [ 371.356220] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 371.356233] RIP: 0033:0x457e29 [ 371.356249] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 371.364608] RSP: 002b:00007fd0bf1a9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 371.364623] RAX: ffffffffffffffda RBX: 00007fd0bf1a9c90 RCX: 0000000000457e29 [ 371.364631] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000004 [ 371.364640] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 371.364648] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd0bf1aa6d4 [ 371.364657] R13: 00000000004c53f7 R14: 00000000004d9208 R15: 0000000000000005 12:38:18 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="c3dd810000000000"], 0x8) 12:38:18 executing program 5: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0xa, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:18 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x4ee, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:18 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x4ee, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:18 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x1c2c, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) 12:38:18 executing program 4 (fault-call:3 fault-nth:8): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) [ 371.580404] FAULT_INJECTION: forcing a failure. [ 371.580404] name failslab, interval 1, probability 0, space 0, times 0 [ 371.614338] device nr0 entered promiscuous mode [ 371.619720] CPU: 1 PID: 19972 Comm: syz-executor.4 Not tainted 5.0.0-rc4+ #39 [ 371.627011] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 371.636363] Call Trace: [ 371.636389] dump_stack+0x172/0x1f0 [ 371.636414] should_fail.cold+0xa/0x1b [ 371.636434] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 371.636453] ? lock_downgrade+0x810/0x810 [ 371.636474] ? ___might_sleep+0x163/0x280 [ 371.642685] __should_failslab+0x121/0x190 [ 371.642705] should_failslab+0x9/0x14 [ 371.642722] kmem_cache_alloc_node_trace+0x270/0x720 [ 371.642740] ? __alloc_skb+0xd5/0x5e0 [ 371.642758] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 371.642778] __kmalloc_node_track_caller+0x3d/0x70 [ 371.687273] __kmalloc_reserve.isra.0+0x40/0xf0 [ 371.691956] __alloc_skb+0x10b/0x5e0 [ 371.695681] ? skb_scrub_packet+0x440/0x440 [ 371.700012] ? raw6_getfrag+0x164/0x230 [ 371.700028] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 371.700052] __ip6_append_data.isra.0+0x29ed/0x3600 [ 371.700080] ? rawv6_mh_filter_unregister+0x20/0x20 [ 371.709055] ? dst_output+0x180/0x180 [ 371.709081] ? ip6_autoflowlabel.part.0+0x70/0x70 12:38:18 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x1c3e, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) 12:38:18 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x500, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) [ 371.709103] ip6_append_data+0x1e5/0x320 [ 371.731806] ? rawv6_mh_filter_unregister+0x20/0x20 [ 371.736839] ? rawv6_mh_filter_unregister+0x20/0x20 [ 371.741871] rawv6_sendmsg+0x146b/0x35f0 [ 371.745953] ? __audit_ptrace+0x1f1/0x590 [ 371.750124] ? compat_rawv6_getsockopt+0x150/0x150 [ 371.755070] ? aa_profile_af_perm+0x320/0x320 [ 371.759600] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 371.764626] ? rw_copy_check_uvector+0x2a6/0x330 [ 371.769449] ? ___might_sleep+0x163/0x280 [ 371.773644] ? aa_sock_msg_perm.isra.0+0xba/0x170 12:38:18 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x1c48, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) [ 371.778504] inet_sendmsg+0x147/0x5d0 [ 371.782317] ? compat_rawv6_getsockopt+0x150/0x150 [ 371.787256] ? inet_sendmsg+0x147/0x5d0 [ 371.791235] ? ipip_gro_receive+0x100/0x100 [ 371.795574] sock_sendmsg+0xdd/0x130 [ 371.799301] ___sys_sendmsg+0x806/0x930 [ 371.803286] ? copy_msghdr_from_user+0x430/0x430 [ 371.808058] ? lock_downgrade+0x810/0x810 [ 371.812225] ? kasan_check_read+0x11/0x20 [ 371.816388] ? __fget+0x367/0x540 [ 371.819865] ? __fget_light+0x1a9/0x230 [ 371.823850] ? __fdget+0x1b/0x20 12:38:18 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x1cf3, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) [ 371.827234] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 371.832813] __sys_sendmsg+0x105/0x1d0 [ 371.836709] ? __ia32_sys_shutdown+0x80/0x80 [ 371.841128] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 371.846675] ? fput+0x128/0x1a0 [ 371.849976] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 371.854746] ? do_syscall_64+0x26/0x610 [ 371.858731] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 371.864110] ? do_syscall_64+0x26/0x610 [ 371.868112] __x64_sys_sendmsg+0x78/0xb0 [ 371.872199] do_syscall_64+0x103/0x610 [ 371.876110] entry_SYSCALL_64_after_hwframe+0x49/0xbe 12:38:18 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x2071, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) [ 371.881302] RIP: 0033:0x457e29 [ 371.884500] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 371.903407] RSP: 002b:00007fd0bf1a9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 371.911121] RAX: ffffffffffffffda RBX: 00007fd0bf1a9c90 RCX: 0000000000457e29 [ 371.918390] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000004 12:38:18 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x21d4, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) [ 371.918399] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 371.918407] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd0bf1aa6d4 [ 371.918415] R13: 00000000004c53f7 R14: 00000000004d9208 R15: 0000000000000005 12:38:18 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="c3dd8100000000000000f7ff"], 0xc) 12:38:18 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x500, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:18 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x578, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:18 executing program 5: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0xe, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:18 executing program 4 (fault-call:3 fault-nth:9): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:18 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x21f0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) 12:38:18 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x242d, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) [ 372.443361] FAULT_INJECTION: forcing a failure. [ 372.443361] name failslab, interval 1, probability 0, space 0, times 0 [ 372.467442] device nr0 entered promiscuous mode [ 372.490966] CPU: 0 PID: 20015 Comm: syz-executor.4 Not tainted 5.0.0-rc4+ #39 [ 372.498270] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 372.507622] Call Trace: [ 372.510221] dump_stack+0x172/0x1f0 [ 372.513871] should_fail.cold+0xa/0x1b [ 372.517775] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 372.522894] ? lock_downgrade+0x810/0x810 [ 372.527056] ? ___might_sleep+0x163/0x280 [ 372.531215] __should_failslab+0x121/0x190 [ 372.535465] should_failslab+0x9/0x14 [ 372.539275] kmem_cache_alloc_node_trace+0x270/0x720 [ 372.544384] ? __alloc_skb+0xd5/0x5e0 [ 372.548199] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 372.553665] __kmalloc_node_track_caller+0x3d/0x70 [ 372.558691] __kmalloc_reserve.isra.0+0x40/0xf0 [ 372.563372] __alloc_skb+0x10b/0x5e0 [ 372.567099] ? skb_scrub_packet+0x440/0x440 [ 372.571620] ? raw6_getfrag+0x164/0x230 [ 372.575614] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 372.580674] __ip6_append_data.isra.0+0x29ed/0x3600 [ 372.585711] ? rawv6_mh_filter_unregister+0x20/0x20 [ 372.590751] ? dst_output+0x180/0x180 [ 372.594581] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 372.599440] ip6_append_data+0x1e5/0x320 [ 372.603505] ? rawv6_mh_filter_unregister+0x20/0x20 [ 372.608542] ? rawv6_mh_filter_unregister+0x20/0x20 [ 372.613599] rawv6_sendmsg+0x146b/0x35f0 [ 372.617682] ? __audit_ptrace+0x1f1/0x590 [ 372.621843] ? compat_rawv6_getsockopt+0x150/0x150 [ 372.626787] ? aa_profile_af_perm+0x320/0x320 [ 372.631298] ? rw_copy_check_uvector+0x2a1/0x330 [ 372.636061] ? rw_copy_check_uvector+0x2a6/0x330 [ 372.640827] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 372.645676] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 372.650447] ? lockdep_hardirqs_on+0x415/0x5d0 [ 372.655045] ? retint_kernel+0x2d/0x2d [ 372.658940] ? trace_hardirqs_on_caller+0x6a/0x220 [ 372.663887] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 372.668665] ? compat_rawv6_getsockopt+0x150/0x150 [ 372.673619] inet_sendmsg+0x147/0x5d0 [ 372.677425] ? compat_rawv6_getsockopt+0x150/0x150 [ 372.682356] ? inet_sendmsg+0x147/0x5d0 [ 372.686342] ? ipip_gro_receive+0x100/0x100 [ 372.690670] sock_sendmsg+0xdd/0x130 [ 372.694400] ___sys_sendmsg+0x806/0x930 [ 372.698401] ? copy_msghdr_from_user+0x430/0x430 [ 372.703168] ? lock_downgrade+0x810/0x810 [ 372.707333] ? kasan_check_read+0x11/0x20 [ 372.711492] ? __fget+0x367/0x540 [ 372.714967] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 372.719815] ? __fget_light+0x1a9/0x230 [ 372.723799] ? __fdget+0x1b/0x20 [ 372.727181] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 372.732737] __sys_sendmsg+0x105/0x1d0 [ 372.736636] ? __ia32_sys_shutdown+0x80/0x80 12:38:19 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x24e2, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) [ 372.741057] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 372.745846] __x64_sys_sendmsg+0x78/0xb0 [ 372.749917] ? do_syscall_64+0x5b/0x610 [ 372.753911] do_syscall_64+0x103/0x610 [ 372.757823] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 372.763041] RIP: 0033:0x457e29 [ 372.766244] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 372.785186] RSP: 002b:00007fd0bf1a9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 12:38:19 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x578, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:19 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x277c, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) [ 372.792909] RAX: ffffffffffffffda RBX: 00007fd0bf1a9c90 RCX: 0000000000457e29 [ 372.800211] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000004 [ 372.807483] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 372.814768] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd0bf1aa6d4 [ 372.822052] R13: 00000000004c53f7 R14: 00000000004d9208 R15: 0000000000000005 [ 372.832673] protocol 88fb is buggy, dev hsr_slave_0 [ 372.837800] protocol 88fb is buggy, dev hsr_slave_1 12:38:19 executing program 5: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x10, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:19 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x5ac, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) [ 372.842971] protocol 88fb is buggy, dev hsr_slave_0 [ 372.848042] protocol 88fb is buggy, dev hsr_slave_1 12:38:19 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="c3dd8100000000000000f7ff"], 0xc) 12:38:19 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x5ac, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:19 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x2798, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) 12:38:19 executing program 4 (fault-call:3 fault-nth:10): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:19 executing program 5: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x11, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:19 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x600, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) [ 373.060290] FAULT_INJECTION: forcing a failure. [ 373.060290] name failslab, interval 1, probability 0, space 0, times 0 [ 373.080257] device nr0 entered promiscuous mode [ 373.114327] CPU: 1 PID: 20055 Comm: syz-executor.4 Not tainted 5.0.0-rc4+ #39 [ 373.121651] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 373.131013] Call Trace: [ 373.133622] dump_stack+0x172/0x1f0 [ 373.137279] should_fail.cold+0xa/0x1b [ 373.141186] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 373.146323] ? lock_downgrade+0x810/0x810 [ 373.150486] ? ___might_sleep+0x163/0x280 [ 373.154653] __should_failslab+0x121/0x190 [ 373.158908] should_failslab+0x9/0x14 [ 373.162715] kmem_cache_alloc_node_trace+0x270/0x720 [ 373.167823] ? __alloc_skb+0xd5/0x5e0 [ 373.171630] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 373.177092] __kmalloc_node_track_caller+0x3d/0x70 [ 373.182026] __kmalloc_reserve.isra.0+0x40/0xf0 [ 373.186700] __alloc_skb+0x10b/0x5e0 [ 373.190417] ? skb_scrub_packet+0x440/0x440 [ 373.194742] ? raw6_getfrag+0x164/0x230 [ 373.198716] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 373.203742] __ip6_append_data.isra.0+0x29ed/0x3600 [ 373.208768] ? rawv6_mh_filter_unregister+0x20/0x20 [ 373.213799] ? dst_output+0x180/0x180 [ 373.217610] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 373.222463] ip6_append_data+0x1e5/0x320 [ 373.226524] ? rawv6_mh_filter_unregister+0x20/0x20 [ 373.231549] ? rawv6_mh_filter_unregister+0x20/0x20 [ 373.236587] rawv6_sendmsg+0x146b/0x35f0 [ 373.240659] ? __audit_ptrace+0x1f1/0x590 [ 373.244810] ? compat_rawv6_getsockopt+0x150/0x150 [ 373.249747] ? aa_profile_af_perm+0x320/0x320 [ 373.254251] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 373.259273] ? rw_copy_check_uvector+0x2a6/0x330 [ 373.264043] ? ___might_sleep+0x163/0x280 [ 373.268217] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 373.273071] inet_sendmsg+0x147/0x5d0 [ 373.276889] ? compat_rawv6_getsockopt+0x150/0x150 [ 373.281820] ? inet_sendmsg+0x147/0x5d0 [ 373.285798] ? ipip_gro_receive+0x100/0x100 [ 373.290126] sock_sendmsg+0xdd/0x130 [ 373.293843] ___sys_sendmsg+0x806/0x930 [ 373.297823] ? copy_msghdr_from_user+0x430/0x430 [ 373.302591] ? lock_downgrade+0x810/0x810 [ 373.306747] ? kasan_check_read+0x11/0x20 [ 373.310897] ? __fget+0x367/0x540 [ 373.314365] ? __fget_light+0x1a9/0x230 [ 373.318338] ? __fdget+0x1b/0x20 [ 373.321710] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 373.327258] __sys_sendmsg+0x105/0x1d0 [ 373.331149] ? __ia32_sys_shutdown+0x80/0x80 [ 373.335557] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 373.341113] ? fput+0x128/0x1a0 [ 373.344406] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 373.349165] ? do_syscall_64+0x26/0x610 [ 373.353174] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 373.358541] ? do_syscall_64+0x26/0x610 [ 373.362534] __x64_sys_sendmsg+0x78/0xb0 [ 373.366607] do_syscall_64+0x103/0x610 [ 373.370503] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 373.375695] RIP: 0033:0x457e29 [ 373.378889] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 373.397789] RSP: 002b:00007fd0bf1a9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 373.405498] RAX: ffffffffffffffda RBX: 00007fd0bf1a9c90 RCX: 0000000000457e29 12:38:19 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x2860, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) [ 373.412764] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000004 [ 373.420029] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 373.427297] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd0bf1aa6d4 [ 373.434573] R13: 00000000004c53f7 R14: 00000000004d9208 R15: 0000000000000005 12:38:20 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x600, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:20 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x700, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:20 executing program 4 (fault-call:3 fault-nth:11): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:20 executing program 5: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x13, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:20 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x2c1c, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) [ 373.666321] FAULT_INJECTION: forcing a failure. [ 373.666321] name failslab, interval 1, probability 0, space 0, times 0 [ 373.724196] CPU: 0 PID: 20083 Comm: syz-executor.4 Not tainted 5.0.0-rc4+ #39 [ 373.731522] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 373.740881] Call Trace: [ 373.743486] dump_stack+0x172/0x1f0 [ 373.747146] should_fail.cold+0xa/0x1b [ 373.751039] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 373.756151] ? lock_downgrade+0x810/0x810 [ 373.760306] ? ___might_sleep+0x163/0x280 [ 373.764462] __should_failslab+0x121/0x190 [ 373.768705] should_failslab+0x9/0x14 [ 373.772538] kmem_cache_alloc_node+0x265/0x710 [ 373.777137] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 373.782682] ? ip_generic_getfrag+0x120/0x230 [ 373.787204] __alloc_skb+0xd5/0x5e0 [ 373.790851] ? skb_scrub_packet+0x440/0x440 [ 373.795181] ? raw6_getfrag+0x164/0x230 [ 373.799165] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 373.804190] __ip6_append_data.isra.0+0x29ed/0x3600 [ 373.809220] ? rawv6_mh_filter_unregister+0x20/0x20 [ 373.814253] ? dst_output+0x180/0x180 [ 373.818055] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 373.822908] ip6_append_data+0x1e5/0x320 [ 373.826971] ? rawv6_mh_filter_unregister+0x20/0x20 [ 373.831999] ? rawv6_mh_filter_unregister+0x20/0x20 [ 373.837020] rawv6_sendmsg+0x146b/0x35f0 [ 373.841097] ? __audit_ptrace+0x1f1/0x590 [ 373.845255] ? compat_rawv6_getsockopt+0x150/0x150 [ 373.850192] ? aa_profile_af_perm+0x320/0x320 [ 373.854697] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 373.859716] ? rw_copy_check_uvector+0x2a6/0x330 [ 373.864493] ? ___might_sleep+0x163/0x280 [ 373.868661] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 373.873522] inet_sendmsg+0x147/0x5d0 [ 373.877339] ? compat_rawv6_getsockopt+0x150/0x150 [ 373.882269] ? inet_sendmsg+0x147/0x5d0 [ 373.886243] ? ipip_gro_receive+0x100/0x100 [ 373.890581] sock_sendmsg+0xdd/0x130 [ 373.894302] ___sys_sendmsg+0x806/0x930 [ 373.898288] ? copy_msghdr_from_user+0x430/0x430 [ 373.903052] ? lock_downgrade+0x810/0x810 [ 373.907216] ? kasan_check_read+0x11/0x20 [ 373.911370] ? __fget+0x367/0x540 [ 373.914843] ? __fget_light+0x1a9/0x230 [ 373.918833] ? __fdget+0x1b/0x20 [ 373.922200] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 373.927745] __sys_sendmsg+0x105/0x1d0 [ 373.931646] ? __ia32_sys_shutdown+0x80/0x80 [ 373.936054] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 373.941600] ? fput+0x128/0x1a0 [ 373.944907] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 373.949664] ? do_syscall_64+0x26/0x610 [ 373.953643] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 373.959012] ? do_syscall_64+0x26/0x610 [ 373.962998] __x64_sys_sendmsg+0x78/0xb0 [ 373.967066] do_syscall_64+0x103/0x610 [ 373.970965] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 373.976189] RIP: 0033:0x457e29 [ 373.979380] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 373.998277] RSP: 002b:00007fd0bf1a9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 374.005984] RAX: ffffffffffffffda RBX: 00007fd0bf1a9c90 RCX: 0000000000457e29 [ 374.013255] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000004 [ 374.020518] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 374.027784] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd0bf1aa6d4 [ 374.035048] R13: 00000000004c53f7 R14: 00000000004d9208 R15: 0000000000000005 12:38:20 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="c3dd8100000000000000f7ff"], 0xc) 12:38:20 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x700, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:20 executing program 5: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x60, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:20 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x2cd1, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) 12:38:20 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x852, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:20 executing program 4 (fault-call:3 fault-nth:12): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:20 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x2d24, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) 12:38:20 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x852, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) [ 374.380945] device nr0 entered promiscuous mode 12:38:20 executing program 5: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0xaf, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:20 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x854, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:21 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x2d40, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) 12:38:21 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x854, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) [ 374.647678] FAULT_INJECTION: forcing a failure. [ 374.647678] name failslab, interval 1, probability 0, space 0, times 0 [ 374.704678] CPU: 1 PID: 20131 Comm: syz-executor.4 Not tainted 5.0.0-rc4+ #39 [ 374.711989] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 374.721346] Call Trace: [ 374.723951] dump_stack+0x172/0x1f0 [ 374.727633] should_fail.cold+0xa/0x1b [ 374.731532] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 374.736649] ? lock_downgrade+0x810/0x810 [ 374.740806] ? ___might_sleep+0x163/0x280 [ 374.744962] __should_failslab+0x121/0x190 [ 374.744982] should_failslab+0x9/0x14 [ 374.744997] kmem_cache_alloc_node_trace+0x270/0x720 [ 374.745015] ? __alloc_skb+0xd5/0x5e0 [ 374.745036] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 374.767413] __kmalloc_node_track_caller+0x3d/0x70 [ 374.772353] __kmalloc_reserve.isra.0+0x40/0xf0 [ 374.777033] __alloc_skb+0x10b/0x5e0 [ 374.780752] ? skb_scrub_packet+0x440/0x440 [ 374.785087] ? raw6_getfrag+0x164/0x230 [ 374.789067] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 374.794106] __ip6_append_data.isra.0+0x29ed/0x3600 [ 374.799139] ? rawv6_mh_filter_unregister+0x20/0x20 [ 374.804183] ? dst_output+0x180/0x180 [ 374.807990] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 374.812847] ip6_append_data+0x1e5/0x320 [ 374.816910] ? rawv6_mh_filter_unregister+0x20/0x20 [ 374.821932] ? rawv6_mh_filter_unregister+0x20/0x20 [ 374.826960] rawv6_sendmsg+0x146b/0x35f0 [ 374.831031] ? __audit_ptrace+0x1f1/0x590 [ 374.835190] ? compat_rawv6_getsockopt+0x150/0x150 [ 374.840125] ? aa_profile_af_perm+0x320/0x320 [ 374.844632] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 374.849654] ? rw_copy_check_uvector+0x2a6/0x330 [ 374.854427] ? ___might_sleep+0x163/0x280 [ 374.858603] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 374.863462] inet_sendmsg+0x147/0x5d0 [ 374.867267] ? compat_rawv6_getsockopt+0x150/0x150 [ 374.872199] ? inet_sendmsg+0x147/0x5d0 [ 374.876179] ? ipip_gro_receive+0x100/0x100 [ 374.880506] sock_sendmsg+0xdd/0x130 [ 374.884233] ___sys_sendmsg+0x806/0x930 [ 374.888215] ? copy_msghdr_from_user+0x430/0x430 [ 374.892979] ? lock_downgrade+0x810/0x810 [ 374.897139] ? kasan_check_read+0x11/0x20 [ 374.901294] ? __fget+0x367/0x540 [ 374.904772] ? __fget_light+0x1a9/0x230 [ 374.908752] ? __fdget+0x1b/0x20 [ 374.912131] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 374.917680] __sys_sendmsg+0x105/0x1d0 [ 374.921586] ? __ia32_sys_shutdown+0x80/0x80 [ 374.926006] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 374.931547] ? fput+0x128/0x1a0 [ 374.934849] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 374.939616] ? do_syscall_64+0x26/0x610 [ 374.943601] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 374.943616] ? do_syscall_64+0x26/0x610 [ 374.943639] __x64_sys_sendmsg+0x78/0xb0 [ 374.943657] do_syscall_64+0x103/0x610 [ 374.943677] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 374.943689] RIP: 0033:0x457e29 [ 374.943707] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 374.988215] RSP: 002b:00007fd0bf1a9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 374.995943] RAX: ffffffffffffffda RBX: 00007fd0bf1a9c90 RCX: 0000000000457e29 [ 375.003224] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000004 [ 375.010500] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 375.017778] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd0bf1aa6d4 [ 375.025058] R13: 00000000004c53f7 R14: 00000000004d9208 R15: 0000000000000005 12:38:21 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="c3dd8100000000000000f7ff0000"], 0xe) 12:38:21 executing program 5: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0xfc, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:21 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x900, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:21 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x304f, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) 12:38:21 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x900, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:21 executing program 4 (fault-call:3 fault-nth:13): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) [ 375.122538] net_ratelimit: 4 callbacks suppressed [ 375.122546] protocol 88fb is buggy, dev hsr_slave_0 [ 375.132558] protocol 88fb is buggy, dev hsr_slave_1 [ 375.137696] protocol 88fb is buggy, dev hsr_slave_0 [ 375.142819] protocol 88fb is buggy, dev hsr_slave_1 12:38:21 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x32cc, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) [ 375.166059] device nr0 entered promiscuous mode 12:38:21 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0xa00, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:21 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0xa00, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:21 executing program 5: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x103, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) [ 375.261895] FAULT_INJECTION: forcing a failure. [ 375.261895] name failslab, interval 1, probability 0, space 0, times 0 [ 375.327314] CPU: 0 PID: 20162 Comm: syz-executor.4 Not tainted 5.0.0-rc4+ #39 [ 375.334642] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 375.344015] Call Trace: [ 375.346630] dump_stack+0x172/0x1f0 [ 375.350312] should_fail.cold+0xa/0x1b [ 375.354511] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 375.359629] ? lock_downgrade+0x810/0x810 [ 375.363797] ? ___might_sleep+0x163/0x280 [ 375.367966] __should_failslab+0x121/0x190 [ 375.372221] should_failslab+0x9/0x14 [ 375.376033] kmem_cache_alloc_node_trace+0x270/0x720 [ 375.381191] ? __alloc_skb+0xd5/0x5e0 [ 375.385005] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 375.390533] __kmalloc_node_track_caller+0x3d/0x70 [ 375.395498] __kmalloc_reserve.isra.0+0x40/0xf0 [ 375.400213] __alloc_skb+0x10b/0x5e0 [ 375.403951] ? skb_scrub_packet+0x440/0x440 [ 375.408284] ? raw6_getfrag+0x164/0x230 [ 375.412267] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 375.417309] __ip6_append_data.isra.0+0x29ed/0x3600 [ 375.422351] ? rawv6_mh_filter_unregister+0x20/0x20 [ 375.427393] ? dst_output+0x180/0x180 [ 375.431211] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 375.436082] ip6_append_data+0x1e5/0x320 [ 375.440156] ? rawv6_mh_filter_unregister+0x20/0x20 [ 375.445188] ? rawv6_mh_filter_unregister+0x20/0x20 [ 375.450222] rawv6_sendmsg+0x146b/0x35f0 [ 375.454304] ? __audit_ptrace+0x1f1/0x590 [ 375.458469] ? compat_rawv6_getsockopt+0x150/0x150 [ 375.463412] ? aa_profile_af_perm+0x320/0x320 [ 375.467929] ? __sanitizer_cov_trace_pc+0x3b/0x50 [ 375.472783] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 375.477815] ? rw_copy_check_uvector+0x2a6/0x330 [ 375.482613] ? ___might_sleep+0x163/0x280 [ 375.486794] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 375.491651] inet_sendmsg+0x147/0x5d0 [ 375.495476] ? compat_rawv6_getsockopt+0x150/0x150 [ 375.500424] ? inet_sendmsg+0x147/0x5d0 [ 375.504413] ? ipip_gro_receive+0x100/0x100 [ 375.508745] sock_sendmsg+0xdd/0x130 [ 375.512470] ___sys_sendmsg+0x806/0x930 [ 375.516463] ? copy_msghdr_from_user+0x430/0x430 [ 375.521256] ? lock_downgrade+0x810/0x810 [ 375.525839] ? rcu_read_unlock_special+0xf3/0x210 [ 375.530721] ? __fget+0x367/0x540 [ 375.534205] ? __fget_light+0x1a9/0x230 [ 375.538198] ? __fdget+0x1b/0x20 [ 375.541591] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 375.547162] __sys_sendmsg+0x105/0x1d0 [ 375.551068] ? __ia32_sys_shutdown+0x80/0x80 [ 375.555498] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 375.560290] __x64_sys_sendmsg+0x78/0xb0 [ 375.564373] ? do_syscall_64+0x5b/0x610 [ 375.568377] do_syscall_64+0x103/0x610 [ 375.572593] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 375.577794] RIP: 0033:0x457e29 [ 375.581013] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 375.599947] RSP: 002b:00007fd0bf1a9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 375.607675] RAX: ffffffffffffffda RBX: 00007fd0bf1a9c90 RCX: 0000000000457e29 [ 375.614957] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000004 12:38:22 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x32e8, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) 12:38:22 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0xaf0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) [ 375.622243] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 375.629534] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd0bf1aa6d4 [ 375.636833] R13: 00000000004c53f7 R14: 00000000004d9208 R15: 0000000000000005 12:38:22 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0xaf0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:22 executing program 4 (fault-call:3 fault-nth:14): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:22 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="c3dd8100000000000000f7ff00"], 0xd) 12:38:22 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x340b, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) 12:38:22 executing program 5: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x2dc, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) [ 375.868897] device nr0 entered promiscuous mode 12:38:22 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0xc91, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:22 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0xc91, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) [ 375.964679] FAULT_INJECTION: forcing a failure. [ 375.964679] name failslab, interval 1, probability 0, space 0, times 0 [ 376.003305] CPU: 0 PID: 20197 Comm: syz-executor.4 Not tainted 5.0.0-rc4+ #39 [ 376.010712] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 376.020072] Call Trace: [ 376.022676] dump_stack+0x172/0x1f0 [ 376.026320] should_fail.cold+0xa/0x1b [ 376.030234] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 376.035352] ? ___might_sleep+0xce/0x280 [ 376.039426] __should_failslab+0x121/0x190 [ 376.043671] should_failslab+0x9/0x14 [ 376.047476] kmem_cache_alloc_node_trace+0x270/0x720 [ 376.052601] ? __alloc_skb+0xd5/0x5e0 [ 376.056415] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 376.061882] __kmalloc_node_track_caller+0x3d/0x70 [ 376.066825] __kmalloc_reserve.isra.0+0x40/0xf0 [ 376.071516] __alloc_skb+0x10b/0x5e0 [ 376.075245] ? skb_scrub_packet+0x440/0x440 [ 376.079602] __ip6_append_data.isra.0+0x29ed/0x3600 [ 376.084637] ? rawv6_mh_filter_unregister+0x20/0x20 [ 376.089675] ? dst_output+0x180/0x180 [ 376.093486] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 376.098353] ip6_append_data+0x1e5/0x320 [ 376.102419] ? rawv6_mh_filter_unregister+0x20/0x20 [ 376.107452] ? rawv6_mh_filter_unregister+0x20/0x20 [ 376.112481] rawv6_sendmsg+0x146b/0x35f0 [ 376.116555] ? __audit_ptrace+0x1f1/0x590 [ 376.120729] ? compat_rawv6_getsockopt+0x150/0x150 [ 376.125678] ? aa_profile_af_perm+0x320/0x320 [ 376.130192] ? rw_copy_check_uvector+0x178/0x330 [ 376.134954] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 376.139977] ? rw_copy_check_uvector+0x2a6/0x330 [ 376.144752] ? ___might_sleep+0x163/0x280 [ 376.148929] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 376.153797] inet_sendmsg+0x147/0x5d0 [ 376.157610] ? compat_rawv6_getsockopt+0x150/0x150 [ 376.162553] ? inet_sendmsg+0x147/0x5d0 [ 376.166553] ? ipip_gro_receive+0x100/0x100 [ 376.170906] sock_sendmsg+0xdd/0x130 [ 376.174630] ___sys_sendmsg+0x806/0x930 [ 376.178649] ? copy_msghdr_from_user+0x430/0x430 [ 376.183418] ? lock_downgrade+0x810/0x810 [ 376.187589] ? kasan_check_read+0x11/0x20 [ 376.191748] ? __fget+0x367/0x540 [ 376.195227] ? __fget_light+0x1a9/0x230 [ 376.199213] ? __fdget+0x1b/0x20 [ 376.202600] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 376.208151] __sys_sendmsg+0x105/0x1d0 [ 376.212048] ? __ia32_sys_shutdown+0x80/0x80 [ 376.216462] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 376.221247] __x64_sys_sendmsg+0x78/0xb0 [ 376.225316] do_syscall_64+0x103/0x610 [ 376.229218] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 376.234407] RIP: 0033:0x457e29 [ 376.237606] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 376.256521] RSP: 002b:00007fd0bf1a9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 12:38:22 executing program 5: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x300, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) [ 376.264235] RAX: ffffffffffffffda RBX: 00007fd0bf1a9c90 RCX: 0000000000457e29 [ 376.271508] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000004 [ 376.278779] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 376.286050] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd0bf1aa6d4 [ 376.293318] R13: 00000000004c53f7 R14: 00000000004d9208 R15: 0000000000000005 12:38:22 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x34c0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) [ 376.322513] protocol 88fb is buggy, dev hsr_slave_0 [ 376.327675] protocol 88fb is buggy, dev hsr_slave_1 [ 376.332846] protocol 88fb is buggy, dev hsr_slave_0 [ 376.337919] protocol 88fb is buggy, dev hsr_slave_1 12:38:22 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0xdcc, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:22 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0xdcc, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:22 executing program 4 (fault-call:3 fault-nth:15): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:22 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x383e, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) 12:38:22 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="c3dd8100000000000000f7ff00"], 0xd) 12:38:23 executing program 5: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x301, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:23 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0xe00, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) [ 376.511262] FAULT_INJECTION: forcing a failure. [ 376.511262] name failslab, interval 1, probability 0, space 0, times 0 [ 376.599026] CPU: 1 PID: 20234 Comm: syz-executor.4 Not tainted 5.0.0-rc4+ #39 [ 376.606356] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 376.615715] Call Trace: [ 376.618335] dump_stack+0x172/0x1f0 [ 376.621987] should_fail.cold+0xa/0x1b [ 376.625893] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 376.631038] ? lock_downgrade+0x810/0x810 [ 376.635204] ? ___might_sleep+0x163/0x280 [ 376.639368] __should_failslab+0x121/0x190 [ 376.643627] should_failslab+0x9/0x14 [ 376.647435] kmem_cache_alloc_node+0x265/0x710 [ 376.652022] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 376.657560] ? ip_generic_getfrag+0x120/0x230 [ 376.657592] __alloc_skb+0xd5/0x5e0 [ 376.657608] ? skb_scrub_packet+0x440/0x440 [ 376.657625] ? raw6_getfrag+0x164/0x230 [ 376.657637] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 376.657660] __ip6_append_data.isra.0+0x29ed/0x3600 [ 376.657683] ? rawv6_mh_filter_unregister+0x20/0x20 [ 376.657707] ? dst_output+0x180/0x180 [ 376.670115] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 376.670137] ip6_append_data+0x1e5/0x320 [ 376.670153] ? rawv6_mh_filter_unregister+0x20/0x20 [ 376.670172] ? rawv6_mh_filter_unregister+0x20/0x20 [ 376.679132] rawv6_sendmsg+0x146b/0x35f0 [ 376.679156] ? __audit_ptrace+0x1f1/0x590 [ 376.679175] ? compat_rawv6_getsockopt+0x150/0x150 [ 376.692960] ? aa_profile_af_perm+0x320/0x320 [ 376.692983] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 376.693001] ? rw_copy_check_uvector+0x2a6/0x330 [ 376.693029] ? ___might_sleep+0x163/0x280 [ 376.693059] ? aa_sock_msg_perm.isra.0+0xba/0x170 12:38:23 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0xe00, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) [ 376.701937] inet_sendmsg+0x147/0x5d0 [ 376.701954] ? compat_rawv6_getsockopt+0x150/0x150 [ 376.701969] ? inet_sendmsg+0x147/0x5d0 [ 376.701986] ? ipip_gro_receive+0x100/0x100 [ 376.716037] sock_sendmsg+0xdd/0x130 [ 376.716056] ___sys_sendmsg+0x806/0x930 [ 376.716085] ? copy_msghdr_from_user+0x430/0x430 [ 376.716109] ? lock_downgrade+0x810/0x810 [ 376.725160] ? kasan_check_read+0x11/0x20 [ 376.725181] ? __fget+0x367/0x540 [ 376.725212] ? __fget_light+0x1a9/0x230 [ 376.725227] ? __fdget+0x1b/0x20 [ 376.725240] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 376.725262] __sys_sendmsg+0x105/0x1d0 [ 376.725280] ? __ia32_sys_shutdown+0x80/0x80 [ 376.725296] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 376.725311] ? fput+0x128/0x1a0 [ 376.725336] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 376.743688] ? do_syscall_64+0x26/0x610 [ 376.743707] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 376.743722] ? do_syscall_64+0x26/0x610 [ 376.743743] __x64_sys_sendmsg+0x78/0xb0 [ 376.743762] do_syscall_64+0x103/0x610 12:38:23 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x3874, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) [ 376.743781] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 376.752395] RIP: 0033:0x457e29 [ 376.752410] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 376.752419] RSP: 002b:00007fd0bf1a9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 376.752434] RAX: ffffffffffffffda RBX: 00007fd0bf1a9c90 RCX: 0000000000457e29 [ 376.752443] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000004 12:38:23 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x3890, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) 12:38:23 executing program 5: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x43f, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) [ 376.752451] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 376.752460] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd0bf1aa6d4 [ 376.752468] R13: 00000000004c53f7 R14: 00000000004d9208 R15: 0000000000000005 12:38:23 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x1068, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:23 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x1068, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:23 executing program 4 (fault-call:3 fault-nth:16): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:23 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="c3dd8100000000000000f7ff00"], 0xd) 12:38:23 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x38f3, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) [ 377.128187] device nr0 entered promiscuous mode [ 377.136301] FAULT_INJECTION: forcing a failure. [ 377.136301] name failslab, interval 1, probability 0, space 0, times 0 [ 377.182374] CPU: 0 PID: 20275 Comm: syz-executor.4 Not tainted 5.0.0-rc4+ #39 [ 377.189669] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 377.199019] Call Trace: [ 377.201627] dump_stack+0x172/0x1f0 [ 377.205272] should_fail.cold+0xa/0x1b [ 377.209166] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 377.214269] ? lock_downgrade+0x810/0x810 [ 377.218418] ? ___might_sleep+0x163/0x280 [ 377.222580] __should_failslab+0x121/0x190 [ 377.226805] should_failslab+0x9/0x14 [ 377.230601] kmem_cache_alloc_node+0x265/0x710 [ 377.235167] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 377.240694] ? ip_generic_getfrag+0x120/0x230 [ 377.245176] __alloc_skb+0xd5/0x5e0 [ 377.248797] ? skb_scrub_packet+0x440/0x440 [ 377.253111] ? raw6_getfrag+0x164/0x230 [ 377.257066] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 377.262091] __ip6_append_data.isra.0+0x29ed/0x3600 [ 377.267112] ? rawv6_mh_filter_unregister+0x20/0x20 [ 377.272134] ? dst_output+0x180/0x180 [ 377.275921] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 377.280768] ip6_append_data+0x1e5/0x320 [ 377.284816] ? rawv6_mh_filter_unregister+0x20/0x20 [ 377.289823] ? rawv6_mh_filter_unregister+0x20/0x20 [ 377.294829] rawv6_sendmsg+0x146b/0x35f0 [ 377.298882] ? __audit_ptrace+0x1f1/0x590 [ 377.303019] ? compat_rawv6_getsockopt+0x150/0x150 [ 377.307936] ? aa_profile_af_perm+0x320/0x320 [ 377.312430] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 377.317436] ? rw_copy_check_uvector+0x2a6/0x330 [ 377.322195] ? ___might_sleep+0x163/0x280 [ 377.326337] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 377.331170] inet_sendmsg+0x147/0x5d0 [ 377.334953] ? compat_rawv6_getsockopt+0x150/0x150 [ 377.339865] ? inet_sendmsg+0x147/0x5d0 [ 377.343824] ? ipip_gro_receive+0x100/0x100 [ 377.348137] sock_sendmsg+0xdd/0x130 [ 377.351838] ___sys_sendmsg+0x806/0x930 [ 377.355801] ? copy_msghdr_from_user+0x430/0x430 [ 377.360542] ? lock_downgrade+0x810/0x810 [ 377.364690] ? kasan_check_read+0x11/0x20 [ 377.368827] ? __fget+0x367/0x540 [ 377.372273] ? __fget_light+0x1a9/0x230 [ 377.376234] ? __fdget+0x1b/0x20 [ 377.379595] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 377.385122] __sys_sendmsg+0x105/0x1d0 [ 377.388994] ? __ia32_sys_shutdown+0x80/0x80 [ 377.393389] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 377.398921] ? fput+0x128/0x1a0 [ 377.402213] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 377.406965] ? do_syscall_64+0x26/0x610 [ 377.410927] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 377.416273] ? do_syscall_64+0x26/0x610 [ 377.420246] __x64_sys_sendmsg+0x78/0xb0 [ 377.424294] do_syscall_64+0x103/0x610 [ 377.428171] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 377.433345] RIP: 0033:0x457e29 [ 377.436520] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 377.455403] RSP: 002b:00007fd0bf1a9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 377.463094] RAX: ffffffffffffffda RBX: 00007fd0bf1a9c90 RCX: 0000000000457e29 [ 377.470345] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000004 12:38:24 executing program 5: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x4d8, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:24 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x3caf, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) 12:38:24 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x10a4, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:24 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x10a4, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) [ 377.477601] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 377.484852] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd0bf1aa6d4 [ 377.492105] R13: 00000000004c53f7 R14: 00000000004d9208 R15: 0000000000000005 [ 377.500528] protocol 88fb is buggy, dev hsr_slave_0 [ 377.506299] protocol 88fb is buggy, dev hsr_slave_1 12:38:24 executing program 4 (fault-call:3 fault-nth:17): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:24 executing program 5: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x4ee, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:24 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x1100, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:24 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x1100, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:24 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x3e1c, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) [ 377.800053] FAULT_INJECTION: forcing a failure. [ 377.800053] name failslab, interval 1, probability 0, space 0, times 0 [ 377.823087] CPU: 1 PID: 20313 Comm: syz-executor.4 Not tainted 5.0.0-rc4+ #39 [ 377.830396] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 377.839747] Call Trace: [ 377.842351] dump_stack+0x172/0x1f0 [ 377.846002] should_fail.cold+0xa/0x1b [ 377.849908] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 377.855022] ? lock_downgrade+0x810/0x810 [ 377.859178] ? ___might_sleep+0x163/0x280 [ 377.863331] __should_failslab+0x121/0x190 [ 377.867577] should_failslab+0x9/0x14 [ 377.871394] kmem_cache_alloc_node+0x265/0x710 [ 377.875993] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 377.881529] ? ip_generic_getfrag+0x120/0x230 [ 377.886035] __alloc_skb+0xd5/0x5e0 [ 377.889673] ? skb_scrub_packet+0x440/0x440 [ 377.894001] ? raw6_getfrag+0x164/0x230 [ 377.897971] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 377.903022] __ip6_append_data.isra.0+0x29ed/0x3600 [ 377.908044] ? rawv6_mh_filter_unregister+0x20/0x20 [ 377.913083] ? dst_output+0x180/0x180 [ 377.916890] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 377.921741] ip6_append_data+0x1e5/0x320 [ 377.925803] ? rawv6_mh_filter_unregister+0x20/0x20 [ 377.930824] ? rawv6_mh_filter_unregister+0x20/0x20 [ 377.935848] rawv6_sendmsg+0x146b/0x35f0 [ 377.939915] ? __audit_ptrace+0x1f1/0x590 [ 377.944067] ? compat_rawv6_getsockopt+0x150/0x150 [ 377.949007] ? aa_profile_af_perm+0x320/0x320 [ 377.953561] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 377.958426] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 377.963445] ? rw_copy_check_uvector+0x2a6/0x330 [ 377.968215] ? ___might_sleep+0x163/0x280 [ 377.972380] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 377.977230] inet_sendmsg+0x147/0x5d0 [ 377.981032] ? compat_rawv6_getsockopt+0x150/0x150 [ 377.985960] ? inet_sendmsg+0x147/0x5d0 [ 377.989938] ? ipip_gro_receive+0x100/0x100 [ 377.994267] sock_sendmsg+0xdd/0x130 [ 377.997982] ___sys_sendmsg+0x806/0x930 [ 378.001963] ? copy_msghdr_from_user+0x430/0x430 [ 378.006722] ? lock_downgrade+0x810/0x810 [ 378.010871] ? __fget+0x340/0x540 [ 378.014324] ? lock_release+0x1d/0xa00 [ 378.018218] ? __fget+0x367/0x540 [ 378.021690] ? __fget_light+0x1a9/0x230 [ 378.025673] ? __fdget+0x1b/0x20 [ 378.029037] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 378.034583] __sys_sendmsg+0x105/0x1d0 [ 378.038498] ? __ia32_sys_shutdown+0x80/0x80 [ 378.042906] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 378.047669] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 378.052423] ? do_syscall_64+0x26/0x610 [ 378.056402] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 378.061762] ? do_syscall_64+0x26/0x610 [ 378.065743] __x64_sys_sendmsg+0x78/0xb0 [ 378.069808] do_syscall_64+0x103/0x610 [ 378.073735] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 378.078920] RIP: 0033:0x457e29 [ 378.082112] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 12:38:24 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x1344, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) [ 378.101012] RSP: 002b:00007fd0bf1a9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 378.108718] RAX: ffffffffffffffda RBX: 00007fd0bf1a9c90 RCX: 0000000000457e29 [ 378.115987] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000004 [ 378.123251] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 378.131034] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd0bf1aa6d4 [ 378.138296] R13: 00000000004c53f7 R14: 00000000004d9208 R15: 0000000000000005 12:38:25 executing program 4 (fault-call:3 fault-nth:18): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:25 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x3e38, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) 12:38:25 executing program 5: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x500, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:25 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x1344, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:25 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x1434, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:25 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x3caf, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) 12:38:25 executing program 1 (fault-call:4 fault-nth:0): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="c3dd8100000000000000f7ff0000"], 0xe) [ 378.580268] FAULT_INJECTION: forcing a failure. [ 378.580268] name failslab, interval 1, probability 0, space 0, times 0 [ 378.595111] CPU: 0 PID: 20342 Comm: syz-executor.4 Not tainted 5.0.0-rc4+ #39 [ 378.602393] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 378.611750] Call Trace: [ 378.614352] dump_stack+0x172/0x1f0 [ 378.617996] should_fail.cold+0xa/0x1b [ 378.621899] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 378.627010] ? lock_downgrade+0x810/0x810 [ 378.631168] ? ___might_sleep+0x163/0x280 [ 378.631188] __should_failslab+0x121/0x190 [ 378.631211] should_failslab+0x9/0x14 [ 378.643385] kmem_cache_alloc_node+0x265/0x710 [ 378.643407] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 378.643429] __alloc_skb+0xd5/0x5e0 [ 378.643448] ? skb_scrub_packet+0x440/0x440 [ 378.643475] __ip6_append_data.isra.0+0x29ed/0x3600 [ 378.652791] ? rawv6_mh_filter_unregister+0x20/0x20 [ 378.652821] ? dst_output+0x180/0x180 [ 378.652842] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 378.660770] ip6_append_data+0x1e5/0x320 [ 378.660786] ? rawv6_mh_filter_unregister+0x20/0x20 [ 378.660806] ? rawv6_mh_filter_unregister+0x20/0x20 [ 378.670820] rawv6_sendmsg+0x146b/0x35f0 [ 378.670845] ? __audit_ptrace+0x1f1/0x590 [ 378.670864] ? compat_rawv6_getsockopt+0x150/0x150 [ 378.679488] ? aa_profile_af_perm+0x320/0x320 [ 378.679508] ? __sanitizer_cov_trace_pc+0x44/0x50 [ 378.679525] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 378.679542] ? rw_copy_check_uvector+0x2a6/0x330 [ 378.688631] ? ___might_sleep+0x163/0x280 [ 378.688663] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 378.697723] inet_sendmsg+0x147/0x5d0 [ 378.697739] ? compat_rawv6_getsockopt+0x150/0x150 [ 378.697754] ? inet_sendmsg+0x147/0x5d0 [ 378.697772] ? ipip_gro_receive+0x100/0x100 [ 378.706826] sock_sendmsg+0xdd/0x130 [ 378.706845] ___sys_sendmsg+0x806/0x930 [ 378.706866] ? copy_msghdr_from_user+0x430/0x430 [ 378.706886] ? lock_downgrade+0x810/0x810 [ 378.706904] ? kasan_check_read+0x11/0x20 [ 378.716223] ? __fget+0x367/0x540 [ 378.716256] ? __fget_light+0x1a9/0x230 [ 378.716271] ? __fdget+0x1b/0x20 [ 378.726015] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 378.726038] __sys_sendmsg+0x105/0x1d0 [ 378.726057] ? __ia32_sys_shutdown+0x80/0x80 [ 378.726073] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 378.726107] __x64_sys_sendmsg+0x78/0xb0 [ 378.735067] do_syscall_64+0x103/0x610 [ 378.735091] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 378.735103] RIP: 0033:0x457e29 12:38:25 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x3f00, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) [ 378.735119] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 378.735127] RSP: 002b:00007fd0bf1a9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 378.735141] RAX: ffffffffffffffda RBX: 00007fd0bf1a9c90 RCX: 0000000000457e29 [ 378.735153] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000004 [ 378.859272] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 378.866540] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd0bf1aa6d4 [ 378.873801] R13: 00000000004c53f7 R14: 00000000004d9208 R15: 0000000000000005 12:38:25 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x4000, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) 12:38:25 executing program 5: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x578, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:25 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x14e3, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) [ 378.935027] device nr0 entered promiscuous mode 12:38:25 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x1434, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:25 executing program 4 (fault-call:3 fault-nth:19): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:25 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x15e0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:25 executing program 5: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x5ac, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:25 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x402d, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) [ 379.138803] FAULT_INJECTION: forcing a failure. [ 379.138803] name failslab, interval 1, probability 0, space 0, times 0 [ 379.223089] CPU: 0 PID: 20378 Comm: syz-executor.4 Not tainted 5.0.0-rc4+ #39 [ 379.230393] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 379.239744] Call Trace: [ 379.242344] dump_stack+0x172/0x1f0 [ 379.245994] should_fail.cold+0xa/0x1b [ 379.249896] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 379.255005] ? lock_downgrade+0x810/0x810 [ 379.259160] ? ___might_sleep+0x163/0x280 [ 379.263321] __should_failslab+0x121/0x190 [ 379.267580] should_failslab+0x9/0x14 [ 379.271388] kmem_cache_alloc_node+0x265/0x710 [ 379.275976] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 379.281519] ? ip_generic_getfrag+0x120/0x230 [ 379.286025] __alloc_skb+0xd5/0x5e0 [ 379.289661] ? skb_scrub_packet+0x440/0x440 [ 379.293990] ? raw6_getfrag+0x164/0x230 [ 379.297970] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 379.302996] __ip6_append_data.isra.0+0x29ed/0x3600 [ 379.308025] ? rawv6_mh_filter_unregister+0x20/0x20 [ 379.313057] ? dst_output+0x180/0x180 [ 379.316866] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 379.321725] ip6_append_data+0x1e5/0x320 [ 379.325793] ? rawv6_mh_filter_unregister+0x20/0x20 [ 379.330820] ? rawv6_mh_filter_unregister+0x20/0x20 [ 379.335846] rawv6_sendmsg+0x146b/0x35f0 [ 379.339921] ? __audit_ptrace+0x1f1/0x590 [ 379.344076] ? compat_rawv6_getsockopt+0x150/0x150 [ 379.349014] ? aa_profile_af_perm+0x320/0x320 [ 379.353518] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 379.358537] ? rw_copy_check_uvector+0x2a6/0x330 [ 379.363325] ? ___might_sleep+0x163/0x280 [ 379.367492] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 379.372348] inet_sendmsg+0x147/0x5d0 [ 379.376150] ? compat_rawv6_getsockopt+0x150/0x150 [ 379.381079] ? inet_sendmsg+0x147/0x5d0 [ 379.385058] ? ipip_gro_receive+0x100/0x100 [ 379.389386] sock_sendmsg+0xdd/0x130 [ 379.393107] ___sys_sendmsg+0x806/0x930 [ 379.397092] ? copy_msghdr_from_user+0x430/0x430 [ 379.401859] ? lock_downgrade+0x810/0x810 [ 379.406018] ? kasan_check_read+0x11/0x20 [ 379.410174] ? __fget+0x367/0x540 [ 379.413651] ? __fget_light+0x1a9/0x230 [ 379.417628] ? __fdget+0x1b/0x20 12:38:25 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x14e3, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) [ 379.420997] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 379.426542] __sys_sendmsg+0x105/0x1d0 [ 379.430448] ? __ia32_sys_shutdown+0x80/0x80 [ 379.434849] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 379.434865] ? fput+0x128/0x1a0 [ 379.434888] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 379.443677] ? do_syscall_64+0x26/0x610 [ 379.443696] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 379.443710] ? do_syscall_64+0x26/0x610 [ 379.443732] __x64_sys_sendmsg+0x78/0xb0 [ 379.465787] do_syscall_64+0x103/0x610 [ 379.469689] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 379.474882] RIP: 0033:0x457e29 [ 379.478079] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 379.496986] RSP: 002b:00007fd0bf1a9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 379.504715] RAX: ffffffffffffffda RBX: 00007fd0bf1a9c90 RCX: 0000000000457e29 [ 379.511986] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000004 12:38:26 executing program 5: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x600, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) [ 379.519253] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 379.526507] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd0bf1aa6d4 [ 379.533761] R13: 00000000004c53f7 R14: 00000000004d9208 R15: 0000000000000005 12:38:26 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="c3dd8100000000000000f7ff0000"], 0xe) 12:38:26 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x40e2, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) 12:38:26 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x1847, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:26 executing program 5: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x700, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:26 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x15e0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:26 executing program 4 (fault-call:3 fault-nth:20): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:26 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x43c4, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) [ 379.725234] FAULT_INJECTION: forcing a failure. [ 379.725234] name failslab, interval 1, probability 0, space 0, times 0 [ 379.755075] CPU: 0 PID: 20413 Comm: syz-executor.4 Not tainted 5.0.0-rc4+ #39 [ 379.762364] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 379.771713] Call Trace: [ 379.771740] dump_stack+0x172/0x1f0 [ 379.771770] should_fail.cold+0xa/0x1b [ 379.781857] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 379.786965] ? lock_downgrade+0x810/0x810 [ 379.791117] ? ___might_sleep+0x163/0x280 [ 379.795273] __should_failslab+0x121/0x190 [ 379.799510] should_failslab+0x9/0x14 [ 379.803313] kmem_cache_alloc_node_trace+0x270/0x720 [ 379.808418] ? __alloc_skb+0xd5/0x5e0 [ 379.812223] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 379.817682] __kmalloc_node_track_caller+0x3d/0x70 [ 379.822615] __kmalloc_reserve.isra.0+0x40/0xf0 [ 379.827290] __alloc_skb+0x10b/0x5e0 [ 379.831008] ? skb_scrub_packet+0x440/0x440 [ 379.835333] ? raw6_getfrag+0x164/0x230 [ 379.839310] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 379.844335] __ip6_append_data.isra.0+0x29ed/0x3600 [ 379.849356] ? rawv6_mh_filter_unregister+0x20/0x20 [ 379.854384] ? dst_output+0x180/0x180 [ 379.858186] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 379.863034] ip6_append_data+0x1e5/0x320 [ 379.867095] ? rawv6_mh_filter_unregister+0x20/0x20 [ 379.872115] ? rawv6_mh_filter_unregister+0x20/0x20 [ 379.877137] rawv6_sendmsg+0x146b/0x35f0 [ 379.881205] ? __audit_ptrace+0x1f1/0x590 [ 379.885361] ? compat_rawv6_getsockopt+0x150/0x150 [ 379.890296] ? aa_profile_af_perm+0x320/0x320 [ 379.894795] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 379.899815] ? rw_copy_check_uvector+0x2a6/0x330 [ 379.904593] ? ___might_sleep+0x163/0x280 [ 379.908759] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 379.913615] inet_sendmsg+0x147/0x5d0 [ 379.917413] ? compat_rawv6_getsockopt+0x150/0x150 [ 379.922338] ? inet_sendmsg+0x147/0x5d0 [ 379.926311] ? ipip_gro_receive+0x100/0x100 [ 379.930637] sock_sendmsg+0xdd/0x130 [ 379.934356] ___sys_sendmsg+0x806/0x930 [ 379.938333] ? copy_msghdr_from_user+0x430/0x430 [ 379.943090] ? lock_downgrade+0x810/0x810 [ 379.947240] ? kasan_check_read+0x11/0x20 [ 379.951394] ? __fget+0x367/0x540 [ 379.954864] ? __fget_light+0x1a9/0x230 [ 379.958841] ? __fdget+0x1b/0x20 [ 379.962206] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 379.967749] __sys_sendmsg+0x105/0x1d0 [ 379.971640] ? __ia32_sys_shutdown+0x80/0x80 [ 379.976050] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 379.981596] ? fput+0x128/0x1a0 [ 379.984889] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 379.989647] ? do_syscall_64+0x26/0x610 [ 379.993638] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 379.999000] ? do_syscall_64+0x26/0x610 [ 380.002979] __x64_sys_sendmsg+0x78/0xb0 [ 380.007044] do_syscall_64+0x103/0x610 [ 380.010937] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 380.016126] RIP: 0033:0x457e29 [ 380.019317] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 380.038217] RSP: 002b:00007fd0bf1a9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 380.045930] RAX: ffffffffffffffda RBX: 00007fd0bf1a9c90 RCX: 0000000000457e29 [ 380.053194] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000004 [ 380.060457] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 380.067723] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd0bf1aa6d4 [ 380.074986] R13: 00000000004c53f7 R14: 00000000004d9208 R15: 0000000000000005 12:38:26 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x1847, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:26 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x18bc, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:26 executing program 5: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x852, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:26 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x43e0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) [ 380.181728] device nr0 entered promiscuous mode 12:38:26 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x18bc, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:27 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="c3dd8100000000000000f7ff0000"], 0x2000000e) 12:38:27 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x18f6, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:27 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x449e, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) 12:38:27 executing program 5: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x854, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:27 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x18f6, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:27 executing program 4 (fault-call:3 fault-nth:21): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) [ 380.706196] FAULT_INJECTION: forcing a failure. [ 380.706196] name failslab, interval 1, probability 0, space 0, times 0 [ 380.720961] CPU: 0 PID: 20465 Comm: syz-executor.4 Not tainted 5.0.0-rc4+ #39 [ 380.728248] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 380.728255] Call Trace: [ 380.728280] dump_stack+0x172/0x1f0 [ 380.728304] should_fail.cold+0xa/0x1b [ 380.728327] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 380.728345] ? lock_downgrade+0x810/0x810 [ 380.728366] ? ___might_sleep+0x163/0x280 [ 380.728385] __should_failslab+0x121/0x190 [ 380.728405] should_failslab+0x9/0x14 [ 380.728424] kmem_cache_alloc_node+0x265/0x710 [ 380.728442] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 380.747853] ? ip_generic_getfrag+0x120/0x230 [ 380.747877] __alloc_skb+0xd5/0x5e0 [ 380.747895] ? skb_scrub_packet+0x440/0x440 [ 380.757126] ? raw6_getfrag+0x164/0x230 [ 380.757140] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 380.757164] __ip6_append_data.isra.0+0x29ed/0x3600 [ 380.769306] ? rawv6_mh_filter_unregister+0x20/0x20 [ 380.769336] ? dst_output+0x180/0x180 [ 380.769354] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 380.779454] ip6_append_data+0x1e5/0x320 [ 380.779470] ? rawv6_mh_filter_unregister+0x20/0x20 [ 380.779490] ? rawv6_mh_filter_unregister+0x20/0x20 [ 380.787601] rawv6_sendmsg+0x146b/0x35f0 [ 380.787625] ? __audit_ptrace+0x1f1/0x590 [ 380.787644] ? compat_rawv6_getsockopt+0x150/0x150 [ 380.795911] ? aa_profile_af_perm+0x320/0x320 [ 380.795927] ? rw_copy_check_uvector+0x178/0x330 [ 380.795948] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 380.795965] ? rw_copy_check_uvector+0x2a6/0x330 [ 380.805974] ? ___might_sleep+0x163/0x280 [ 380.806008] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 380.806029] inet_sendmsg+0x147/0x5d0 [ 380.814812] ? compat_rawv6_getsockopt+0x150/0x150 [ 380.814828] ? inet_sendmsg+0x147/0x5d0 [ 380.814845] ? ipip_gro_receive+0x100/0x100 [ 380.814864] sock_sendmsg+0xdd/0x130 [ 380.814881] ___sys_sendmsg+0x806/0x930 [ 380.823760] ? copy_msghdr_from_user+0x430/0x430 [ 380.823782] ? lock_downgrade+0x810/0x810 [ 380.823801] ? kasan_check_read+0x11/0x20 [ 380.823819] ? __fget+0x367/0x540 [ 380.833840] ? __fget_light+0x1a9/0x230 [ 380.833857] ? __fdget+0x1b/0x20 [ 380.833871] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 380.833892] __sys_sendmsg+0x105/0x1d0 [ 380.842069] ? __ia32_sys_shutdown+0x80/0x80 [ 380.842085] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 380.842100] ? fput+0x128/0x1a0 [ 380.842124] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 380.851516] ? do_syscall_64+0x26/0x610 [ 380.851535] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 380.851549] ? do_syscall_64+0x26/0x610 [ 380.851587] __x64_sys_sendmsg+0x78/0xb0 [ 380.860366] device nr0 entered promiscuous mode [ 380.861329] do_syscall_64+0x103/0x610 [ 380.861351] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 380.861367] RIP: 0033:0x457e29 [ 380.984942] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 12:38:27 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x481c, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) [ 381.003858] RSP: 002b:00007fd0bf1a9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 381.011572] RAX: ffffffffffffffda RBX: 00007fd0bf1a9c90 RCX: 0000000000457e29 [ 381.018847] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000004 [ 381.026115] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 381.033381] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd0bf1aa6d4 [ 381.040646] R13: 00000000004c53f7 R14: 00000000004d9208 R15: 0000000000000005 12:38:27 executing program 5: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x900, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:27 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x1b58, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:27 executing program 4 (fault-call:3 fault-nth:22): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:27 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x1b58, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:27 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x48d1, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) [ 381.198413] FAULT_INJECTION: forcing a failure. [ 381.198413] name failslab, interval 1, probability 0, space 0, times 0 [ 381.278708] CPU: 1 PID: 20493 Comm: syz-executor.4 Not tainted 5.0.0-rc4+ #39 [ 381.286007] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 381.295360] Call Trace: [ 381.297961] dump_stack+0x172/0x1f0 [ 381.301625] should_fail.cold+0xa/0x1b [ 381.305530] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 381.305550] ? lock_downgrade+0x810/0x810 [ 381.305582] ? ___might_sleep+0x163/0x280 [ 381.305606] __should_failslab+0x121/0x190 [ 381.314835] should_failslab+0x9/0x14 [ 381.314851] kmem_cache_alloc_node+0x265/0x710 [ 381.314868] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 381.314882] ? ip_generic_getfrag+0x120/0x230 [ 381.314906] __alloc_skb+0xd5/0x5e0 [ 381.345232] ? skb_scrub_packet+0x440/0x440 [ 381.349560] ? raw6_getfrag+0x164/0x230 [ 381.353550] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 381.358595] __ip6_append_data.isra.0+0x29ed/0x3600 [ 381.358620] ? rawv6_mh_filter_unregister+0x20/0x20 [ 381.358652] ? dst_output+0x180/0x180 [ 381.372459] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 381.377315] ip6_append_data+0x1e5/0x320 [ 381.377332] ? rawv6_mh_filter_unregister+0x20/0x20 [ 381.377353] ? rawv6_mh_filter_unregister+0x20/0x20 [ 381.377372] rawv6_sendmsg+0x146b/0x35f0 [ 381.395499] ? __audit_ptrace+0x1f1/0x590 [ 381.399662] ? compat_rawv6_getsockopt+0x150/0x150 [ 381.404613] ? aa_profile_af_perm+0x320/0x320 [ 381.409118] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 381.414141] ? rw_copy_check_uvector+0x2a6/0x330 [ 381.418916] ? ___might_sleep+0x163/0x280 [ 381.423094] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 381.427953] inet_sendmsg+0x147/0x5d0 [ 381.431761] ? compat_rawv6_getsockopt+0x150/0x150 [ 381.436693] ? inet_sendmsg+0x147/0x5d0 [ 381.440671] ? ipip_gro_receive+0x100/0x100 [ 381.445000] sock_sendmsg+0xdd/0x130 [ 381.448724] ___sys_sendmsg+0x806/0x930 [ 381.452709] ? copy_msghdr_from_user+0x430/0x430 [ 381.457476] ? lock_downgrade+0x810/0x810 [ 381.461635] ? kasan_check_read+0x11/0x20 [ 381.465794] ? __fget+0x367/0x540 [ 381.469267] ? __fget_light+0x1a9/0x230 [ 381.473253] ? __fdget+0x1b/0x20 [ 381.476625] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 381.482174] __sys_sendmsg+0x105/0x1d0 [ 381.486069] ? __ia32_sys_shutdown+0x80/0x80 [ 381.490489] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 381.496028] ? fput+0x128/0x1a0 [ 381.499320] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 381.504084] ? do_syscall_64+0x26/0x610 [ 381.508073] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 381.513443] ? do_syscall_64+0x26/0x610 [ 381.517430] __x64_sys_sendmsg+0x78/0xb0 [ 381.521500] do_syscall_64+0x103/0x610 [ 381.525396] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 381.530598] RIP: 0033:0x457e29 [ 381.533793] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 381.552690] RSP: 002b:00007fd0bf1a9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 381.560403] RAX: ffffffffffffffda RBX: 00007fd0bf1a9c90 RCX: 0000000000457e29 [ 381.567670] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000004 [ 381.575440] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 381.582710] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd0bf1aa6d4 [ 381.589984] R13: 00000000004c53f7 R14: 00000000004d9208 R15: 0000000000000005 [ 381.602514] net_ratelimit: 10 callbacks suppressed [ 381.602522] protocol 88fb is buggy, dev hsr_slave_0 [ 381.612602] protocol 88fb is buggy, dev hsr_slave_1 [ 381.617713] protocol 88fb is buggy, dev hsr_slave_0 [ 381.622826] protocol 88fb is buggy, dev hsr_slave_1 12:38:28 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000017c0)=ANY=[@ANYBLOB="c3dd8100000000000000f7ff00002c2ea9453b1160e49206936f3a6e83898631024cc2b14c906f65297873"], 0xe) sendmsg$kcm(r1, &(0x7f00000004c0)={&(0x7f0000000040)=@l2={0x1f, 0xffffffff, {0x3, 0x3, 0x7f, 0x8, 0xffffffffffffffe1, 0x1ac}, 0xffffffff}, 0x80, &(0x7f0000001740)=[{&(0x7f0000000140)="b45b034492e05a7ca461442db23e8ab240606d666e117971df0cf09618bd64dcd3d10d64a3de03cb02398198e29c8d7607462d192e6723adc1509ec7f1d591a6f0a8c363", 0x44}, {&(0x7f00000001c0)="5d2293d686e5cffafc4cd43b239dfb26e2b27d4306e1cdc2c9199c2aa6e00baf6fe3621165f4d99506c545db580ad02ab7c0463c62a4e9246baef27eb27c401bf73eaafcff602c5e65db7dbef2f7a4deea733106fd0be81bcfd91255137259967ca5399fe66531189f702f3a933599afaa0d2e9d750037c6c3c7e13f53103ab5263a1da80ffd5f3db713a409e7aa91f90067edfed359f93172624de4419a824a33428d22f767b4753ea2cc17966d4bf3bc15a27d8cc5ba2cdfff039d8506eaf9858cc50b5a8994a120f2", 0xca}, {&(0x7f0000000340)="a6af5e99db14e9b06f5e82fce71bfb6f603d93dac5182338476c436ded0177d4c25660ac242fb9aabb2a0003c2738d29fe9d99869a019dd050187906c09ad6d60bc4363008524abc91ca733ce0ce4b10fe4eb493e64832cb36bc0745e4d532013f437d5b3e0d19585af8cd81402a605bb3fb5c5a0479982004ba0230dc19be9eeba24e09c3051bc61f6752adcbc80a513f876b7470ec0eb94814ff199091173e24258a098f32612352f9cff08c84d650ae204ff97364c4ba98f4a748b819ee37ce90ecdcd918324ecfd9e415cb97b9372f7719a77902c17c24db7d4af0440165e69f3ecbc9b17f", 0xe7}, {&(0x7f00000000c0)="5f6114eda2a4ccdb2b82d22ffa237b2e0992dc5e2e843c11fbed8d76e8c56ce6b6104561fd6584d43a", 0x29}, {&(0x7f00000002c0)="57b0c7428a307e8f28b8beccbbd0f4ae2fa994ad001c32915cbe32", 0x1b}, {&(0x7f0000000440)="cef0e5cb2f6e0b30f9bd03d252280f647bb37000140f5c2d62c3df69b76540db924d7ffdfb1b7cb39c4e34ba2277bf94a0d7df4a899a98da16f139d5df420e8095bfa5fcf4e76fd4c86d438ec3d6a91eaba2418af69560f2d8", 0x59}, {&(0x7f00000006c0)="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", 0x1000}, {&(0x7f00000016c0)="fe71ec8cbbb46d9c1024879645508fc83cf66baf7a1d97d0f3e14f17e3ded5e2da45674b019c379509f39994f50af09bb231ac11c62471c1b21ac673b6748bac0db9af15d553eed82005b9c5903b46c3890b4e5674969d1260ac9e39df7b1fbefd2ea3d18d7101a7d37b1e73", 0x6c}], 0x8}, 0x4) 12:38:28 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x1c86, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:28 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x496c, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) 12:38:28 executing program 5: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0xa00, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:28 executing program 4 (fault-call:3 fault-nth:23): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:28 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x1c86, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:28 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x4988, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) [ 381.838398] device nr0 entered promiscuous mode [ 381.850979] FAULT_INJECTION: forcing a failure. [ 381.850979] name failslab, interval 1, probability 0, space 0, times 0 12:38:28 executing program 5: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0xaf0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) [ 381.932694] CPU: 1 PID: 20520 Comm: syz-executor.4 Not tainted 5.0.0-rc4+ #39 [ 381.939991] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 381.949338] Call Trace: [ 381.951939] dump_stack+0x172/0x1f0 [ 381.955596] should_fail.cold+0xa/0x1b [ 381.959496] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 381.964605] ? __should_failslab+0x79/0x190 [ 381.968937] __should_failslab+0x121/0x190 [ 381.973188] should_failslab+0x9/0x14 [ 381.977003] kmem_cache_alloc_node+0x265/0x710 [ 381.981603] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 381.986385] __alloc_skb+0xd5/0x5e0 [ 381.990018] ? skb_scrub_packet+0x440/0x440 [ 381.994360] __ip6_append_data.isra.0+0x29ed/0x3600 [ 381.999393] ? rawv6_mh_filter_unregister+0x20/0x20 [ 382.004426] ? dst_output+0x180/0x180 [ 382.008238] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 382.013102] ip6_append_data+0x1e5/0x320 [ 382.017178] ? rawv6_mh_filter_unregister+0x20/0x20 [ 382.022208] ? rawv6_mh_filter_unregister+0x20/0x20 [ 382.027266] rawv6_sendmsg+0x146b/0x35f0 [ 382.031342] ? __audit_ptrace+0x1f1/0x590 [ 382.035518] ? compat_rawv6_getsockopt+0x150/0x150 [ 382.040455] ? aa_profile_af_perm+0x320/0x320 [ 382.044962] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 382.049996] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 382.055017] ? rw_copy_check_uvector+0x2a6/0x330 [ 382.059789] ? ___might_sleep+0x163/0x280 [ 382.063959] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 382.068813] inet_sendmsg+0x147/0x5d0 [ 382.072623] ? compat_rawv6_getsockopt+0x150/0x150 [ 382.077563] ? inet_sendmsg+0x147/0x5d0 [ 382.081552] ? ipip_gro_receive+0x100/0x100 [ 382.085891] sock_sendmsg+0xdd/0x130 [ 382.089617] ___sys_sendmsg+0x806/0x930 [ 382.093612] ? copy_msghdr_from_user+0x430/0x430 [ 382.098378] ? lock_downgrade+0x810/0x810 [ 382.102536] ? kasan_check_read+0x11/0x20 [ 382.106700] ? __fget+0x367/0x540 [ 382.110175] ? __fget_light+0x1a9/0x230 [ 382.114159] ? __fdget+0x1b/0x20 [ 382.117535] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 382.123096] __sys_sendmsg+0x105/0x1d0 [ 382.126992] ? __ia32_sys_shutdown+0x80/0x80 [ 382.131409] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 382.136949] ? fput+0x128/0x1a0 [ 382.140246] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 382.145004] ? do_syscall_64+0x26/0x610 [ 382.148986] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 382.154359] ? do_syscall_64+0x26/0x610 [ 382.158345] __x64_sys_sendmsg+0x78/0xb0 [ 382.162413] do_syscall_64+0x103/0x610 [ 382.166316] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 382.171505] RIP: 0033:0x457e29 [ 382.174720] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 382.193629] RSP: 002b:00007fd0bf1a9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 382.201338] RAX: ffffffffffffffda RBX: 00007fd0bf1a9c90 RCX: 0000000000457e29 [ 382.208607] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000004 [ 382.215878] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 382.223149] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd0bf1aa6d4 12:38:28 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x1e34, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:28 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x1e34, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:28 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x4c8d, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) [ 382.230415] R13: 00000000004c53f7 R14: 00000000004d9208 R15: 0000000000000005 12:38:28 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x4f14, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) 12:38:28 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="c3dd8100000000000100f7ff0000"], 0xe) 12:38:28 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x4f30, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) 12:38:29 executing program 5: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0xc91, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:29 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x2099, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:29 executing program 4 (fault-call:3 fault-nth:24): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:29 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x2099, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:29 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x500b, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) [ 382.548219] FAULT_INJECTION: forcing a failure. [ 382.548219] name failslab, interval 1, probability 0, space 0, times 0 [ 382.562506] protocol 88fb is buggy, dev hsr_slave_0 [ 382.567593] protocol 88fb is buggy, dev hsr_slave_1 [ 382.572754] protocol 88fb is buggy, dev hsr_slave_0 [ 382.577826] protocol 88fb is buggy, dev hsr_slave_1 [ 382.591774] CPU: 1 PID: 20564 Comm: syz-executor.4 Not tainted 5.0.0-rc4+ #39 [ 382.599065] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 382.608426] Call Trace: [ 382.611031] dump_stack+0x172/0x1f0 [ 382.614674] should_fail.cold+0xa/0x1b [ 382.618588] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 382.623705] ? lock_downgrade+0x810/0x810 [ 382.627862] ? ___might_sleep+0x163/0x280 [ 382.632026] __should_failslab+0x121/0x190 [ 382.636271] should_failslab+0x9/0x14 [ 382.640086] kmem_cache_alloc_node+0x265/0x710 [ 382.644682] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 382.650227] ? ip_generic_getfrag+0x120/0x230 [ 382.654739] __alloc_skb+0xd5/0x5e0 [ 382.658372] ? skb_scrub_packet+0x440/0x440 [ 382.662700] ? raw6_getfrag+0x164/0x230 [ 382.666686] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 382.671719] __ip6_append_data.isra.0+0x29ed/0x3600 [ 382.671745] ? rawv6_mh_filter_unregister+0x20/0x20 [ 382.681779] ? dst_output+0x180/0x180 [ 382.685600] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 382.690455] ip6_append_data+0x1e5/0x320 12:38:29 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x50c0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) [ 382.690473] ? rawv6_mh_filter_unregister+0x20/0x20 [ 382.690492] ? rawv6_mh_filter_unregister+0x20/0x20 [ 382.704554] rawv6_sendmsg+0x146b/0x35f0 [ 382.708640] ? __audit_ptrace+0x1f1/0x590 [ 382.712805] ? compat_rawv6_getsockopt+0x150/0x150 [ 382.717760] ? aa_profile_af_perm+0x320/0x320 [ 382.722271] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 382.727301] ? rw_copy_check_uvector+0x2a6/0x330 [ 382.732087] ? ___might_sleep+0x163/0x280 [ 382.736263] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 382.741126] inet_sendmsg+0x147/0x5d0 12:38:29 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x547c, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) [ 382.744940] ? compat_rawv6_getsockopt+0x150/0x150 [ 382.749877] ? inet_sendmsg+0x147/0x5d0 [ 382.753865] ? ipip_gro_receive+0x100/0x100 [ 382.758197] sock_sendmsg+0xdd/0x130 [ 382.761917] ___sys_sendmsg+0x806/0x930 [ 382.765900] ? copy_msghdr_from_user+0x430/0x430 [ 382.770667] ? lock_downgrade+0x810/0x810 [ 382.774826] ? kasan_check_read+0x11/0x20 [ 382.778985] ? __fget+0x367/0x540 [ 382.782463] ? __fget_light+0x1a9/0x230 [ 382.782480] ? __fdget+0x1b/0x20 [ 382.782495] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 382.782515] __sys_sendmsg+0x105/0x1d0 12:38:29 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x54bc, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) [ 382.789848] ? __ia32_sys_shutdown+0x80/0x80 [ 382.803633] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 382.809180] ? fput+0x128/0x1a0 [ 382.812478] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 382.817241] ? do_syscall_64+0x26/0x610 [ 382.821226] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 382.826607] ? do_syscall_64+0x26/0x610 [ 382.830605] __x64_sys_sendmsg+0x78/0xb0 [ 382.834679] do_syscall_64+0x103/0x610 [ 382.838586] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 382.843781] RIP: 0033:0x457e29 [ 382.846977] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 382.865877] RSP: 002b:00007fd0bf1a9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 382.873598] RAX: ffffffffffffffda RBX: 00007fd0bf1a9c90 RCX: 0000000000457e29 [ 382.880872] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000004 [ 382.888158] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 12:38:29 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x54d8, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) 12:38:29 executing program 5: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0xdcc, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) [ 382.895433] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd0bf1aa6d4 [ 382.902707] R13: 00000000004c53f7 R14: 00000000004d9208 R15: 0000000000000005 [ 382.926477] device nr0 entered promiscuous mode 12:38:29 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x20d0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:29 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x20d0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:29 executing program 4 (fault-call:3 fault-nth:25): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:29 executing program 5: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0xe00, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:29 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x58af, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) 12:38:29 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) socket$kcm(0x29, 0x5, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x7fffffff, 0x7fff, 0x9, 0x9, 0x0, 0x20, 0x4, 0x8, 0x10, 0xfffffffffffffff7, 0xd625, 0x100000001, 0x800, 0x2, 0x20, 0x643, 0x9, 0xfffffffffffffffc, 0x80000000, 0x8, 0x101, 0x0, 0x7ff, 0x40, 0x7, 0x6, 0x40, 0x4, 0x2, 0x1f02, 0x401, 0x3f, 0x45, 0x0, 0xf29f, 0x8000, 0x0, 0x9, 0x6, @perf_bp={&(0x7f0000000000), 0x1}, 0x202, 0x7fffffff, 0x7fff, 0x7, 0x6, 0x6f, 0x8}, 0x0, 0x8, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='+/trustedvmnet1procuserppp1vmnet1vboxnet0\x90\x00') write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="c3dd8100000000000000f7ff0000e0ca07c18c5d1291d68581f1ad878ceb3721cf584400000000b463dcfed7a89f42b071e34d32de8a221cf195918983266486b7bc37e136b135d9f57a2fc123a500c77e85382e356227a22aee73b9d72b5c8f7b000000000000000000000000000000"], 0xe) socket$kcm(0x29, 0x0, 0x0) [ 383.350667] FAULT_INJECTION: forcing a failure. [ 383.350667] name failslab, interval 1, probability 0, space 0, times 0 12:38:29 executing program 5: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x1068, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) [ 383.413545] CPU: 0 PID: 20605 Comm: syz-executor.4 Not tainted 5.0.0-rc4+ #39 [ 383.420863] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 383.430383] Call Trace: [ 383.430410] dump_stack+0x172/0x1f0 [ 383.430434] should_fail.cold+0xa/0x1b [ 383.430457] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 383.445678] ? lock_downgrade+0x810/0x810 [ 383.449836] ? ___might_sleep+0x163/0x280 [ 383.453997] __should_failslab+0x121/0x190 [ 383.458243] should_failslab+0x9/0x14 [ 383.462055] kmem_cache_alloc_node_trace+0x270/0x720 [ 383.467180] ? __alloc_skb+0xd5/0x5e0 [ 383.470998] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 383.476467] __kmalloc_node_track_caller+0x3d/0x70 [ 383.481409] __kmalloc_reserve.isra.0+0x40/0xf0 [ 383.486090] __alloc_skb+0x10b/0x5e0 [ 383.489824] ? skb_scrub_packet+0x440/0x440 [ 383.494171] ? raw6_getfrag+0x164/0x230 [ 383.498159] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 383.498184] __ip6_append_data.isra.0+0x29ed/0x3600 [ 383.498207] ? rawv6_mh_filter_unregister+0x20/0x20 [ 383.498234] ? dst_output+0x180/0x180 [ 383.517036] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 383.521903] ip6_append_data+0x1e5/0x320 [ 383.525977] ? rawv6_mh_filter_unregister+0x20/0x20 [ 383.531017] ? rawv6_mh_filter_unregister+0x20/0x20 [ 383.536058] rawv6_sendmsg+0x146b/0x35f0 [ 383.540136] ? __audit_ptrace+0x1f1/0x590 [ 383.544313] ? compat_rawv6_getsockopt+0x150/0x150 [ 383.549257] ? aa_profile_af_perm+0x320/0x320 [ 383.553769] ? rw_copy_check_uvector+0x222/0x330 [ 383.558540] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 383.563601] ? rw_copy_check_uvector+0x2a6/0x330 [ 383.568381] ? ___might_sleep+0x163/0x280 [ 383.572677] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 383.577550] inet_sendmsg+0x147/0x5d0 [ 383.581373] ? compat_rawv6_getsockopt+0x150/0x150 [ 383.586344] ? inet_sendmsg+0x147/0x5d0 [ 383.590346] ? ipip_gro_receive+0x100/0x100 [ 383.594693] sock_sendmsg+0xdd/0x130 [ 383.598438] ___sys_sendmsg+0x806/0x930 [ 383.602437] ? copy_msghdr_from_user+0x430/0x430 [ 383.602463] ? lock_downgrade+0x810/0x810 [ 383.602481] ? kasan_check_read+0x11/0x20 [ 383.611373] ? __fget+0x367/0x540 [ 383.618954] ? __fget_light+0x1a9/0x230 [ 383.622948] ? __fdget+0x1b/0x20 [ 383.626322] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 383.631874] __sys_sendmsg+0x105/0x1d0 [ 383.635775] ? __ia32_sys_shutdown+0x80/0x80 [ 383.640192] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 383.645742] ? fput+0x128/0x1a0 [ 383.649042] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 383.653811] ? do_syscall_64+0x26/0x610 [ 383.657798] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 12:38:29 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x23ac, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:29 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x23ac, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:30 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x5a64, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) 12:38:30 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x5a80, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) [ 383.663171] ? do_syscall_64+0x26/0x610 [ 383.667161] __x64_sys_sendmsg+0x78/0xb0 [ 383.671231] do_syscall_64+0x103/0x610 [ 383.675134] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 383.680326] RIP: 0033:0x457e29 [ 383.680342] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 383.680350] RSP: 002b:00007fd0bf1a9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 12:38:30 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x5c6b, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) [ 383.702459] RAX: ffffffffffffffda RBX: 00007fd0bf1a9c90 RCX: 0000000000457e29 [ 383.702468] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000004 [ 383.702477] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 383.702486] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd0bf1aa6d4 [ 383.702495] R13: 00000000004c53f7 R14: 00000000004d9208 R15: 0000000000000005 [ 383.706343] protocol 88fb is buggy, dev hsr_slave_0 [ 383.753092] protocol 88fb is buggy, dev hsr_slave_1 12:38:30 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x2429, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:30 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x2429, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:30 executing program 4 (fault-call:3 fault-nth:26): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:30 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x8) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="c3dd8100000000000000f7ff0000"], 0xe) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x7, 0x5, 0x7fffffff, 0xd495, 0xc, 0xffffffffffffff9c, 0x5}, 0x2c) 12:38:30 executing program 5: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x10a4, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) [ 383.938359] FAULT_INJECTION: forcing a failure. [ 383.938359] name failslab, interval 1, probability 0, space 0, times 0 [ 383.968443] CPU: 0 PID: 20654 Comm: syz-executor.4 Not tainted 5.0.0-rc4+ #39 [ 383.975738] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 383.985095] Call Trace: [ 383.987694] dump_stack+0x172/0x1f0 [ 383.991332] should_fail.cold+0xa/0x1b [ 383.995228] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 384.000335] ? lock_downgrade+0x810/0x810 [ 384.004487] ? ___might_sleep+0x163/0x280 [ 384.008637] __should_failslab+0x121/0x190 [ 384.012893] should_failslab+0x9/0x14 [ 384.016694] kmem_cache_alloc_node_trace+0x270/0x720 [ 384.021805] ? __alloc_skb+0xd5/0x5e0 [ 384.025614] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 384.031071] __kmalloc_node_track_caller+0x3d/0x70 [ 384.036004] __kmalloc_reserve.isra.0+0x40/0xf0 [ 384.040682] __alloc_skb+0x10b/0x5e0 [ 384.044398] ? skb_scrub_packet+0x440/0x440 [ 384.048727] ? raw6_getfrag+0x164/0x230 [ 384.052698] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 384.057723] __ip6_append_data.isra.0+0x29ed/0x3600 [ 384.062756] ? rawv6_mh_filter_unregister+0x20/0x20 [ 384.067797] ? dst_output+0x180/0x180 [ 384.071615] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 384.076493] ip6_append_data+0x1e5/0x320 [ 384.080552] ? rawv6_mh_filter_unregister+0x20/0x20 [ 384.085597] ? rawv6_mh_filter_unregister+0x20/0x20 [ 384.090629] rawv6_sendmsg+0x146b/0x35f0 [ 384.094698] ? __audit_ptrace+0x1f1/0x590 [ 384.098851] ? compat_rawv6_getsockopt+0x150/0x150 [ 384.103786] ? aa_profile_af_perm+0x320/0x320 [ 384.108294] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 384.113314] ? rw_copy_check_uvector+0x2a6/0x330 [ 384.118079] ? ___might_sleep+0x163/0x280 [ 384.122255] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 384.127105] inet_sendmsg+0x147/0x5d0 [ 384.130906] ? compat_rawv6_getsockopt+0x150/0x150 [ 384.135838] ? inet_sendmsg+0x147/0x5d0 [ 384.139820] ? ipip_gro_receive+0x100/0x100 [ 384.144143] sock_sendmsg+0xdd/0x130 [ 384.147864] ___sys_sendmsg+0x806/0x930 [ 384.151846] ? copy_msghdr_from_user+0x430/0x430 [ 384.156619] ? lock_downgrade+0x810/0x810 [ 384.160775] ? kasan_check_read+0x11/0x20 [ 384.164925] ? __fget+0x367/0x540 [ 384.168396] ? __fget_light+0x1a9/0x230 [ 384.172370] ? __fdget+0x1b/0x20 [ 384.175752] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 384.181299] __sys_sendmsg+0x105/0x1d0 [ 384.185188] ? __ia32_sys_shutdown+0x80/0x80 [ 384.189604] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 384.195146] ? fput+0x128/0x1a0 [ 384.198432] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 384.203188] ? do_syscall_64+0x26/0x610 [ 384.207165] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 384.212524] ? do_syscall_64+0x26/0x610 [ 384.216511] __x64_sys_sendmsg+0x78/0xb0 [ 384.220587] do_syscall_64+0x103/0x610 [ 384.224483] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 384.229676] RIP: 0033:0x457e29 [ 384.232869] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 384.251803] RSP: 002b:00007fd0bf1a9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 384.259510] RAX: ffffffffffffffda RBX: 00007fd0bf1a9c90 RCX: 0000000000457e29 [ 384.266773] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000004 [ 384.274035] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 384.281299] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd0bf1aa6d4 12:38:30 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x6000, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) [ 384.288562] R13: 00000000004c53f7 R14: 00000000004d9208 R15: 0000000000000005 12:38:30 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x24d8, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:30 executing program 5: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x1100, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:30 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x600c, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) 12:38:30 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x24d8, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) [ 384.420165] device nr0 entered promiscuous mode 12:38:31 executing program 5: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x1344, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:31 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x2648, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:31 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x6028, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) 12:38:31 executing program 4 (fault-call:3 fault-nth:27): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:31 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x2648, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) [ 384.710160] FAULT_INJECTION: forcing a failure. [ 384.710160] name failslab, interval 1, probability 0, space 0, times 0 [ 384.729658] CPU: 1 PID: 20702 Comm: syz-executor.4 Not tainted 5.0.0-rc4+ #39 [ 384.736949] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 384.746303] Call Trace: [ 384.748900] dump_stack+0x172/0x1f0 [ 384.752555] should_fail.cold+0xa/0x1b [ 384.756457] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 384.761573] ? lock_downgrade+0x810/0x810 [ 384.765729] ? ___might_sleep+0x163/0x280 [ 384.769882] __should_failslab+0x121/0x190 [ 384.774144] should_failslab+0x9/0x14 [ 384.777993] kmem_cache_alloc_node+0x265/0x710 [ 384.782589] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 384.788128] ? ip_generic_getfrag+0x120/0x230 [ 384.792631] __alloc_skb+0xd5/0x5e0 [ 384.796262] ? skb_scrub_packet+0x440/0x440 [ 384.800591] ? raw6_getfrag+0x164/0x230 [ 384.804576] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 384.809605] __ip6_append_data.isra.0+0x29ed/0x3600 [ 384.814634] ? rawv6_mh_filter_unregister+0x20/0x20 [ 384.819669] ? dst_output+0x180/0x180 [ 384.823472] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 384.828322] ip6_append_data+0x1e5/0x320 [ 384.832380] ? rawv6_mh_filter_unregister+0x20/0x20 [ 384.837401] ? rawv6_mh_filter_unregister+0x20/0x20 [ 384.842424] rawv6_sendmsg+0x146b/0x35f0 [ 384.846494] ? __audit_ptrace+0x1f1/0x590 [ 384.850647] ? compat_rawv6_getsockopt+0x150/0x150 [ 384.855589] ? aa_profile_af_perm+0x320/0x320 [ 384.860100] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 384.865119] ? rw_copy_check_uvector+0x2a6/0x330 [ 384.869885] ? ___might_sleep+0x163/0x280 [ 384.874049] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 384.878903] inet_sendmsg+0x147/0x5d0 [ 384.882704] ? compat_rawv6_getsockopt+0x150/0x150 [ 384.887637] ? inet_sendmsg+0x147/0x5d0 [ 384.891616] ? ipip_gro_receive+0x100/0x100 [ 384.895941] sock_sendmsg+0xdd/0x130 [ 384.899657] ___sys_sendmsg+0x806/0x930 [ 384.903636] ? copy_msghdr_from_user+0x430/0x430 [ 384.908395] ? lock_downgrade+0x810/0x810 [ 384.912545] ? kasan_check_read+0x11/0x20 [ 384.916840] ? __fget+0x367/0x540 [ 384.920312] ? __fget_light+0x1a9/0x230 [ 384.924286] ? __fdget+0x1b/0x20 [ 384.927650] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 384.933193] __sys_sendmsg+0x105/0x1d0 [ 384.937090] ? __ia32_sys_shutdown+0x80/0x80 [ 384.941502] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 384.947041] ? fput+0x128/0x1a0 [ 384.950334] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 384.955097] ? do_syscall_64+0x26/0x610 [ 384.959075] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 384.964441] ? do_syscall_64+0x26/0x610 [ 384.968420] __x64_sys_sendmsg+0x78/0xb0 [ 384.972483] do_syscall_64+0x103/0x610 [ 384.976379] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 384.981575] RIP: 0033:0x457e29 [ 384.984770] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 385.003669] RSP: 002b:00007fd0bf1a9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 385.011374] RAX: ffffffffffffffda RBX: 00007fd0bf1a9c90 RCX: 0000000000457e29 [ 385.018642] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000004 [ 385.025905] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 385.033176] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd0bf1aa6d4 [ 385.040441] R13: 00000000004c53f7 R14: 00000000004d9208 R15: 0000000000000005 12:38:31 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="c3dd8100000000000000f7ff0000"], 0xe) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000040)=""/12) socket$kcm(0x29, 0x0, 0x0) 12:38:31 executing program 5: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x1434, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:31 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x283c, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:31 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x609e, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) 12:38:31 executing program 4 (fault-call:3 fault-nth:28): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:31 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x283c, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) [ 385.412626] FAULT_INJECTION: forcing a failure. [ 385.412626] name failslab, interval 1, probability 0, space 0, times 0 [ 385.432757] CPU: 0 PID: 20721 Comm: syz-executor.4 Not tainted 5.0.0-rc4+ #39 [ 385.440055] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 385.440062] Call Trace: [ 385.440087] dump_stack+0x172/0x1f0 [ 385.440112] should_fail.cold+0xa/0x1b [ 385.459528] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 385.464640] ? lock_downgrade+0x810/0x810 [ 385.468792] ? ___might_sleep+0x163/0x280 [ 385.472947] __should_failslab+0x121/0x190 [ 385.477186] should_failslab+0x9/0x14 [ 385.480993] kmem_cache_alloc_node+0x265/0x710 [ 385.485591] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 385.491129] ? ip_generic_getfrag+0x120/0x230 [ 385.495638] __alloc_skb+0xd5/0x5e0 [ 385.499268] ? skb_scrub_packet+0x440/0x440 [ 385.503605] ? raw6_getfrag+0x164/0x230 [ 385.507588] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 385.512676] __ip6_append_data.isra.0+0x29ed/0x3600 [ 385.517709] ? rawv6_mh_filter_unregister+0x20/0x20 [ 385.522738] ? dst_output+0x180/0x180 [ 385.526540] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 385.531398] ip6_append_data+0x1e5/0x320 [ 385.535460] ? rawv6_mh_filter_unregister+0x20/0x20 [ 385.540484] ? rawv6_mh_filter_unregister+0x20/0x20 [ 385.545504] rawv6_sendmsg+0x146b/0x35f0 [ 385.549589] ? __audit_ptrace+0x1f1/0x590 [ 385.553746] ? compat_rawv6_getsockopt+0x150/0x150 [ 385.558683] ? aa_profile_af_perm+0x320/0x320 [ 385.563182] ? rw_copy_check_uvector+0x1e8/0x330 [ 385.567940] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 385.573080] ? rw_copy_check_uvector+0x2a6/0x330 [ 385.577849] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 385.582611] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 385.587370] ? lockdep_hardirqs_on+0x415/0x5d0 [ 385.591961] ? retint_kernel+0x2d/0x2d [ 385.595850] ? trace_hardirqs_on_caller+0x6a/0x220 [ 385.600798] ? retint_kernel+0x2d/0x2d [ 385.604693] ? ipip_gro_receive+0x100/0x100 [ 385.609021] inet_sendmsg+0x147/0x5d0 [ 385.612826] ? compat_rawv6_getsockopt+0x150/0x150 [ 385.617756] ? inet_sendmsg+0x147/0x5d0 [ 385.621732] ? ipip_gro_receive+0x100/0x100 [ 385.626056] sock_sendmsg+0xdd/0x130 [ 385.629771] ___sys_sendmsg+0x806/0x930 [ 385.633752] ? copy_msghdr_from_user+0x430/0x430 [ 385.638507] ? retint_kernel+0x2d/0x2d [ 385.642399] ? lock_downgrade+0x810/0x810 [ 385.646550] ? kasan_check_read+0x11/0x20 [ 385.650714] ? __fget+0x367/0x540 [ 385.654185] ? __fget_light+0x1a9/0x230 [ 385.658158] ? __fdget+0x1b/0x20 [ 385.661524] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 385.667070] __sys_sendmsg+0x105/0x1d0 [ 385.670962] ? __ia32_sys_shutdown+0x80/0x80 [ 385.675376] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 385.680911] ? fput+0x128/0x1a0 [ 385.684204] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 385.688961] ? do_syscall_64+0x26/0x610 [ 385.692936] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 385.698299] ? do_syscall_64+0x26/0x610 [ 385.702282] __x64_sys_sendmsg+0x78/0xb0 [ 385.706346] do_syscall_64+0x103/0x610 [ 385.710238] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 385.715422] RIP: 0033:0x457e29 [ 385.718614] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 385.737508] RSP: 002b:00007fd0bf1a9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 385.745215] RAX: ffffffffffffffda RBX: 00007fd0bf1a9c90 RCX: 0000000000457e29 [ 385.752482] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000004 12:38:32 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x645a, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) [ 385.759743] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 385.767008] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd0bf1aa6d4 [ 385.774274] R13: 00000000004c53f7 R14: 00000000004d9208 R15: 0000000000000005 12:38:32 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x28eb, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:32 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x65b4, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) 12:38:32 executing program 5: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x14e3, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:32 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x28eb, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) [ 385.868665] device nr0 entered promiscuous mode 12:38:32 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x2924, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:32 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'nr0\x01\x00', 0x5020}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="c3dd8100000000000000f7ff0000"], 0xe) 12:38:32 executing program 5: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x15e0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:32 executing program 4 (fault-call:3 fault-nth:29): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:32 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x2924, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:32 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x65d0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) 12:38:32 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x2bc0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:32 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x688d, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) [ 386.451244] FAULT_INJECTION: forcing a failure. [ 386.451244] name failslab, interval 1, probability 0, space 0, times 0 [ 386.472901] CPU: 0 PID: 20768 Comm: syz-executor.4 Not tainted 5.0.0-rc4+ #39 [ 386.480192] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 386.489546] Call Trace: [ 386.492170] dump_stack+0x172/0x1f0 [ 386.495835] should_fail.cold+0xa/0x1b 12:38:33 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x6b5c, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) [ 386.499743] ? retint_kernel+0x2d/0x2d [ 386.503648] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 386.508770] ? __should_failslab+0x14/0x190 [ 386.513115] __should_failslab+0x121/0x190 [ 386.517359] should_failslab+0x9/0x14 [ 386.521170] kmem_cache_alloc_node+0x265/0x710 [ 386.525778] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 386.530560] __alloc_skb+0xd5/0x5e0 [ 386.534231] ? skb_scrub_packet+0x440/0x440 [ 386.538594] ? __ip6_append_data.isra.0+0x2789/0x3600 [ 386.543803] __ip6_append_data.isra.0+0x29ed/0x3600 12:38:33 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x6b78, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) [ 386.548846] ? rawv6_mh_filter_unregister+0x20/0x20 [ 386.553888] ? dst_output+0x180/0x180 [ 386.557707] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 386.562591] ip6_append_data+0x1e5/0x320 [ 386.566670] ? rawv6_mh_filter_unregister+0x20/0x20 [ 386.571705] ? rawv6_mh_filter_unregister+0x20/0x20 [ 386.576735] rawv6_sendmsg+0x146b/0x35f0 [ 386.580819] ? __audit_ptrace+0x1f1/0x590 [ 386.584981] ? compat_rawv6_getsockopt+0x150/0x150 [ 386.589922] ? aa_profile_af_perm+0x320/0x320 [ 386.594418] ? rw_copy_check_uvector+0x15a/0x330 12:38:33 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="c3080000000201db00000000f7ff"], 0xe) close(r1) [ 386.594441] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 386.594456] ? rw_copy_check_uvector+0x2a6/0x330 [ 386.594486] ? ___might_sleep+0x163/0x280 [ 386.594516] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 386.617964] inet_sendmsg+0x147/0x5d0 [ 386.621777] ? compat_rawv6_getsockopt+0x150/0x150 [ 386.626716] ? inet_sendmsg+0x147/0x5d0 [ 386.630702] ? ipip_gro_receive+0x100/0x100 [ 386.635041] sock_sendmsg+0xdd/0x130 [ 386.638765] ___sys_sendmsg+0x806/0x930 [ 386.642751] ? copy_msghdr_from_user+0x430/0x430 [ 386.647523] ? lock_downgrade+0x810/0x810 [ 386.651705] ? kasan_check_read+0x11/0x20 [ 386.655867] ? __fget+0x367/0x540 [ 386.659362] ? __fget_light+0x1a9/0x230 [ 386.663366] ? __fdget+0x1b/0x20 [ 386.666743] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 386.672299] __sys_sendmsg+0x105/0x1d0 [ 386.676198] ? __ia32_sys_shutdown+0x80/0x80 [ 386.680625] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 386.686172] ? fput+0x128/0x1a0 [ 386.689474] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 386.694239] ? do_syscall_64+0x26/0x610 [ 386.698223] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 386.703603] ? do_syscall_64+0x26/0x610 [ 386.707599] __x64_sys_sendmsg+0x78/0xb0 [ 386.711669] do_syscall_64+0x103/0x610 [ 386.715576] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 386.720795] RIP: 0033:0x457e29 [ 386.723989] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 386.742902] RSP: 002b:00007fd0bf1a9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 386.750606] RAX: ffffffffffffffda RBX: 00007fd0bf1a9c90 RCX: 0000000000457e29 [ 386.757871] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000004 [ 386.765136] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 386.772399] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd0bf1aa6d4 [ 386.779665] R13: 00000000004c53f7 R14: 00000000004d9208 R15: 0000000000000005 [ 386.792908] net_ratelimit: 6 callbacks suppressed [ 386.792916] protocol 88fb is buggy, dev hsr_slave_0 12:38:33 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x2c7b, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:33 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x6c49, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) [ 386.802901] protocol 88fb is buggy, dev hsr_slave_1 [ 386.808010] protocol 88fb is buggy, dev hsr_slave_0 [ 386.813115] protocol 88fb is buggy, dev hsr_slave_1 12:38:33 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x2bc0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) [ 386.865524] device nr0 entered promiscuous mode 12:38:33 executing program 5: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x1847, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:33 executing program 4 (fault-call:3 fault-nth:30): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:33 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x2e9c, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:33 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x707c, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) 12:38:33 executing program 5: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x18bc, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) [ 387.036525] FAULT_INJECTION: forcing a failure. [ 387.036525] name failslab, interval 1, probability 0, space 0, times 0 [ 387.082371] CPU: 0 PID: 20818 Comm: syz-executor.4 Not tainted 5.0.0-rc4+ #39 [ 387.089668] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 387.099025] Call Trace: [ 387.101636] dump_stack+0x172/0x1f0 [ 387.105289] should_fail.cold+0xa/0x1b [ 387.109191] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 387.114312] ? ___might_sleep+0x163/0x280 [ 387.118473] __should_failslab+0x121/0x190 [ 387.122736] should_failslab+0x9/0x14 [ 387.126553] kmem_cache_alloc_node_trace+0x270/0x720 [ 387.131691] ? __alloc_skb+0xd5/0x5e0 [ 387.135500] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 387.140965] __kmalloc_node_track_caller+0x3d/0x70 [ 387.145922] __kmalloc_reserve.isra.0+0x40/0xf0 [ 387.150618] __alloc_skb+0x10b/0x5e0 [ 387.154341] ? skb_scrub_packet+0x440/0x440 [ 387.158683] ? raw6_getfrag+0x164/0x230 [ 387.162690] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 387.167732] __ip6_append_data.isra.0+0x29ed/0x3600 [ 387.172764] ? rawv6_mh_filter_unregister+0x20/0x20 [ 387.177850] ? dst_output+0x180/0x180 [ 387.181661] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 387.186518] ip6_append_data+0x1e5/0x320 [ 387.190602] ? rawv6_mh_filter_unregister+0x20/0x20 [ 387.195636] ? rawv6_mh_filter_unregister+0x20/0x20 [ 387.200672] rawv6_sendmsg+0x146b/0x35f0 [ 387.204747] ? __audit_ptrace+0x1f1/0x590 [ 387.208911] ? compat_rawv6_getsockopt+0x150/0x150 [ 387.213850] ? aa_profile_af_perm+0x320/0x320 [ 387.218368] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 387.223237] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 387.228261] ? rw_copy_check_uvector+0x2a6/0x330 [ 387.233033] ? ___might_sleep+0x163/0x280 [ 387.237201] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 387.242053] inet_sendmsg+0x147/0x5d0 [ 387.245861] ? compat_rawv6_getsockopt+0x150/0x150 [ 387.250795] ? inet_sendmsg+0x147/0x5d0 [ 387.254775] ? ipip_gro_receive+0x100/0x100 [ 387.259105] sock_sendmsg+0xdd/0x130 [ 387.262833] ___sys_sendmsg+0x806/0x930 [ 387.266814] ? copy_msghdr_from_user+0x430/0x430 [ 387.271599] ? lock_downgrade+0x810/0x810 [ 387.275762] ? kasan_check_read+0x11/0x20 [ 387.279921] ? __fget+0x367/0x540 [ 387.283398] ? __fget_light+0x1a9/0x230 [ 387.287391] ? __fdget+0x1b/0x20 [ 387.290764] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 387.296311] __sys_sendmsg+0x105/0x1d0 [ 387.300210] ? __ia32_sys_shutdown+0x80/0x80 [ 387.304634] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 387.310176] ? fput+0x128/0x1a0 [ 387.313472] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 387.318258] ? do_syscall_64+0x26/0x610 [ 387.322266] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 387.327634] ? do_syscall_64+0x26/0x610 12:38:33 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x7104, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) [ 387.331627] __x64_sys_sendmsg+0x78/0xb0 [ 387.335697] do_syscall_64+0x103/0x610 [ 387.339608] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 387.344803] RIP: 0033:0x457e29 [ 387.348001] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 387.366915] RSP: 002b:00007fd0bf1a9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 387.374627] RAX: ffffffffffffffda RBX: 00007fd0bf1a9c90 RCX: 0000000000457e29 12:38:33 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x7120, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) 12:38:33 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x2c7b, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) [ 387.381900] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000004 [ 387.389172] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 387.396447] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd0bf1aa6d4 [ 387.403724] R13: 00000000004c53f7 R14: 00000000004d9208 R15: 0000000000000005 [ 387.442591] protocol 88fb is buggy, dev hsr_slave_0 [ 387.447726] protocol 88fb is buggy, dev hsr_slave_1 [ 387.452899] protocol 88fb is buggy, dev hsr_slave_0 [ 387.458005] protocol 88fb is buggy, dev hsr_slave_1 12:38:34 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f0000000080)) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="c3dd8100000000000000f7ff0000"], 0xe) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000cc0)='\x00') r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0xed38, 0x8}, 0xc) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000000c0)={r2, &(0x7f0000000080), &(0x7f0000000140)=""/234}, 0x18) sendmsg$kcm(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000240)="00a3f8", 0x3}, {&(0x7f0000000340)="9bd850977cc83a0e92e0307a0a1412678c077272bee7a271045828331a175d6c5ec488d7822cfbc81ede04bcfa02f92f7e5ab47e267f1fc02b6cb053cfadd0d78d696772de22e163bfb4cb8f38f3be5350d79ba91154e9276fdbd88a1fd781727475b882a95e5d6510bdea59b7688824e7575f586383ee184b33b3d1e24a386d9c00a403ffef91f37c6fbbf83a0f5ac15aff0407e90dc83edd5ed2807f9c54b5b469f1cf595c2a89321712441b888f097e540f58b1e6f8f39da9bcc7383fd506b4b6ca0e5e66a8a6", 0xc8}, {&(0x7f00000006c0)="59f597eab03ec502658fcd4854d493cce7ff3d74c0c5392078c39581ade51ef3c8937822f8a1e883397209bbec40732571fcfafe51c0238c767d44c8d64ed7e4c0f8eb82f553c979b03e61e4294e33849495dec541ae4c30c4097c3ab56a0ab9fe5a178306727578eae601ff86a404646159efc3f218dfe553064cc87b30b0d45ec0370a7a81562c704d28c3fd51dd2af6e3a9baea00e127eae998ea5c364bdcb3c6702ca8cf009162c7a1bb7801b480934218033a65b5b02ad7b88dcd8487ea1f9e1e9847feca1d2121067246e6a5", 0xcf}, {&(0x7f0000000280)="90cc73d04398edfdcff62040b8406ade2cdb07530e", 0x15}, {&(0x7f00000002c0)="7a1b36b3ee89a7fb019de8c64ebff0458d37398ecfcaf19127613e8d9981679ae0ad21946ff108b8", 0x28}, {&(0x7f0000001480)="17840d7cb7d2f392cd7359e42dbcc40d2f0fc9643b319e25d117eaf5c470511e380768a3aa74917c027c3870b1e89a8f61e1456a28c5cee217c243a90ccc2ab253cc3d5c349be683953badd3f9", 0x4d}, {&(0x7f00000007c0)="80db7eb708eddd062931e860e95c6ee2d3cdf843c79f06c443da5a4c7464cf789de73dfb86d1c6157f3154cde22000a653d2eda838883655dd8157350bf51146f27253e5d18b0aeeb45f7ef6cb24dd8b6d57d8148fc36ada5706707a953b4882941933d7aaf678b83934dabacc6ef526b1653dfc43026932fbb23474c2d4e41d4b6bed", 0xd5}], 0x7, &(0x7f00000010c0)=[{0xb0, 0x103, 0x6, "507c0b91e1e386df2bf49e47410f8325844025a7237334a5826c41a1ac3bc995fe3f329d80562cd42a9050682c1713be424c1c8bf6898010d1f1a0f4d9818271797621de22c165bad03de35b067d5479d072475f1a89a3672f25bf4471af86ee4f462befa4d0d06cd451e71b3840f67d68785531cd2a7cefba166122ac116e6416bca054414d8a9ac3241dfa7bd90b5410cb57076b4c828c4738684b5746"}, {0x28, 0x112, 0x10001, "ed64f14cb864165470cc832c091cb184896116ed"}, {0x110, 0x13b, 0x8, "6e5dd80e4e2a4f01e642be158e4a0edfbb67ca69592e60627a6c39237272a8690e939bf2d7e9777cddd68b2407ffbb0f26a8171e7cbee4fe7256d6412c422db1d8cc09d06e086e510e6e59829effe0e074318a5913be8b3af0507edb0002290a57613fcad41193c85d53be86c973bacfcc1e7dbce4878e85e50988c680a05089310ad2055d89c587aea6079cdc9c6ebfc68a56071b3c401e3237a5a7c1dcf6feefb0d59811c57ce8c7938a847ef2004342efd435284494ec85d2e89f1d0ebd2e70465068d57b942586049072ebb06bda0f12bfeb2b298c1733fbb1dfdefe8ec371d8fd3fe0021771e29585810e31bed7300dfd19e3166920ad"}, {0xe0, 0x11f, 0x3f, "47347d31fe1df929095e1c538ee83a07db2f39d2cc48a075f30aea87f2dabddb75bbf27e3c496a850e145a5ddc3d665bb40d2fc3b056515828624c1af78c2fcf972dadfa75c52922fd1ced7956e750eec7c6a19553a46dc7fa7553b93b5ee5112daebffac2f9065997c0f0fb6e6d0440e052a001d2fa738e4b6fbde69c69cd914c31a4ad06d11890898d7c08900d07089ada2da07c65c655abd94c444938a09cec9f2e0f05ae8547eab658a88350ab6e07e7f36a90b1787c5c68afeeff5d224ac7d3da4ff2b504a9c5f52dbced4f"}, {0x60, 0x119, 0xfffffffffffffff7, "8555470e244e08e288842e2f484361866655ede282a5f3694ef4964b8fbe527a5333b6aab6a9e2e3477ef67b1057ef5227c9e4023888a05da853898d562464768cea648cf633914d4ee5ca6e00"}, {0x20, 0x11f, 0x5, "94dad146ee09cd968f2a"}, {0x68, 0x118, 0x0, "d38daeb935a4c01465ea08dde658fcfb5b08e8388c67fb58124e1b5820f502f7ce11a7eb6ce8fc234af1810405983677a0cf927d9fc0ac0b94161b5e5c10840045514ad077b2eb987535d661bb3912fe14407113288d"}], 0x3b0}, 0x15) 12:38:34 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x7438, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) 12:38:34 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x308e, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:34 executing program 5: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x18f6, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:34 executing program 4 (fault-call:3 fault-nth:31): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:34 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x74ed, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) [ 387.666533] FAULT_INJECTION: forcing a failure. [ 387.666533] name failslab, interval 1, probability 0, space 0, times 0 [ 387.696315] CPU: 1 PID: 20858 Comm: syz-executor.4 Not tainted 5.0.0-rc4+ #39 [ 387.703607] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 387.712960] Call Trace: [ 387.715576] dump_stack+0x172/0x1f0 [ 387.719230] should_fail.cold+0xa/0x1b [ 387.723140] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 387.728260] ? lock_downgrade+0x810/0x810 [ 387.732410] ? ___might_sleep+0x163/0x280 [ 387.736562] __should_failslab+0x121/0x190 [ 387.740806] should_failslab+0x9/0x14 [ 387.744609] kmem_cache_alloc_node+0x265/0x710 [ 387.749189] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 387.754725] ? ip_generic_getfrag+0x120/0x230 [ 387.759225] __alloc_skb+0xd5/0x5e0 [ 387.762856] ? skb_scrub_packet+0x440/0x440 [ 387.767176] ? raw6_getfrag+0x164/0x230 [ 387.771148] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 387.776173] __ip6_append_data.isra.0+0x29ed/0x3600 [ 387.781197] ? rawv6_mh_filter_unregister+0x20/0x20 [ 387.786226] ? dst_output+0x180/0x180 [ 387.790036] ip6_append_data+0x1e5/0x320 [ 387.794098] ? rawv6_mh_filter_unregister+0x20/0x20 [ 387.799116] ? rawv6_mh_filter_unregister+0x20/0x20 [ 387.804133] rawv6_sendmsg+0x146b/0x35f0 [ 387.808202] ? __audit_ptrace+0x1f1/0x590 [ 387.812350] ? compat_rawv6_getsockopt+0x150/0x150 [ 387.817288] ? aa_profile_af_perm+0x320/0x320 [ 387.821787] ? __sanitizer_cov_trace_pc+0x26/0x50 [ 387.826626] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 387.831639] ? rw_copy_check_uvector+0x2a6/0x330 [ 387.836406] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 387.841159] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 387.842551] protocol 88fb is buggy, dev hsr_slave_0 [ 387.845917] ? lockdep_hardirqs_on+0x415/0x5d0 [ 387.850971] protocol 88fb is buggy, dev hsr_slave_1 [ 387.855497] ? retint_kernel+0x2d/0x2d [ 387.855512] ? trace_hardirqs_on_caller+0x6a/0x220 [ 387.855538] ? retint_kernel+0x2d/0x2d [ 387.855557] ? ipip_gro_receive+0x100/0x100 [ 387.855585] inet_sendmsg+0x147/0x5d0 [ 387.881346] ? compat_rawv6_getsockopt+0x150/0x150 [ 387.886271] ? inet_sendmsg+0x147/0x5d0 [ 387.890244] ? ipip_gro_receive+0x100/0x100 [ 387.894578] sock_sendmsg+0xdd/0x130 [ 387.898297] ___sys_sendmsg+0x806/0x930 [ 387.902269] ? copy_msghdr_from_user+0x430/0x430 [ 387.907028] ? lock_downgrade+0x810/0x810 [ 387.911177] ? kasan_check_read+0x11/0x20 [ 387.915328] ? __fget+0x367/0x540 [ 387.918794] ? __fget_light+0x1a9/0x230 [ 387.922766] ? __fdget+0x1b/0x20 [ 387.926127] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 387.931671] __sys_sendmsg+0x105/0x1d0 [ 387.935562] ? __ia32_sys_shutdown+0x80/0x80 [ 387.939978] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 387.944748] __x64_sys_sendmsg+0x78/0xb0 [ 387.948813] do_syscall_64+0x103/0x610 [ 387.952706] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 387.957890] RIP: 0033:0x457e29 [ 387.961086] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 387.979981] RSP: 002b:00007fd0bf1a9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 387.987683] RAX: ffffffffffffffda RBX: 00007fd0bf1a9c90 RCX: 0000000000457e29 [ 387.994944] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000004 [ 388.002205] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 388.009465] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd0bf1aa6d4 12:38:34 executing program 5: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x1b58, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:34 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x2e9c, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) [ 388.016731] R13: 00000000004c53f7 R14: 00000000004d9208 R15: 0000000000000005 12:38:34 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x76ac, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) 12:38:34 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x3138, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:34 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x76c8, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) 12:38:34 executing program 4 (fault-call:3 fault-nth:32): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:34 executing program 5: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x1c86, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:34 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x308e, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:34 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x6, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') recvmsg$kcm(r1, &(0x7f000000cb40)={&(0x7f000000c880)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f000000ca80)=[{&(0x7f000000c900)=""/119, 0x77}, {&(0x7f000000c980)=""/242, 0xf2}], 0x2, &(0x7f000000cac0)=""/99, 0x63}, 0x2100) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000080)=r2) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x101000, 0x0) write$cgroup_subtree(r0, &(0x7f0000002980)=ANY=[@ANYBLOB="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"], 0xe) recvmsg(r1, &(0x7f0000006740)={&(0x7f00000061c0)=@can={0x1d, 0x0}, 0x80, &(0x7f0000006640)=[{&(0x7f0000006240)=""/183, 0xb7}, {&(0x7f0000006300)=""/128, 0x80}, {&(0x7f0000006380)}, {&(0x7f00000063c0)=""/219, 0xdb}, {&(0x7f00000064c0)=""/83, 0x53}, {&(0x7f0000006540)=""/214, 0xd6}], 0x6, &(0x7f00000066c0)=""/128, 0x80}, 0x2) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000006780)=r3) r4 = perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x7f, 0x5, 0x9, 0x1, 0x0, 0x4, 0x4000, 0x2, 0x5, 0x20, 0x1, 0x200, 0x1, 0xfffffffffffff327, 0x6, 0x7f, 0x7fffffff, 0xfffffffffffffff9, 0x2, 0x9, 0x8, 0x6, 0x2, 0x196, 0x7, 0x1b5, 0x80000001, 0x0, 0x8000, 0x8, 0x9, 0x10000, 0x5, 0x80000001, 0x458f89ab, 0x4, 0x0, 0xb4b, 0x6, @perf_bp={&(0x7f0000000100), 0x7}, 0x0, 0x400, 0x7, 0xb, 0x9, 0x6, 0x3}, 0xffffffffffffff9c, 0x6, 0xffffffffffffff9c, 0x1) sendmsg$kcm(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000027c0)=[{&(0x7f00000001c0)="ceed0b1355245800fdea31637babb362e362d21e3812b5c24730ca7976a44000869f03b1bbd482b735f53b78acf21beabb5f0fa60cb0f0d91777", 0x3a}, {&(0x7f0000000200)="0da53c0b2c15240dce3e5d8884879c7aefd7844a417dcfcf6f0e511777f223b93b90d139dbeafc91c627c5c9c15e997e6f4fe00e7260b6e959a610764bc0e40f43f883cecf9bfb52e1820690e6e56eba17c7929208a135d369358f615b2f01360f6b0bef9f79324113e8aaaca04ca1800f5feeb172f750d05de2460b7bdd709d6c46ed54e9becb62153147bd292695075340ea86bc52d20d648d8dde55357696eb3abcc48f96", 0xa6}, {&(0x7f00000006c0)="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", 0x1000}, {&(0x7f0000000340)="1efad8dde5cc95606a3b94675f46dc9791d93431c53850f142f6674cccc7c2ad45486ceb5951b0013e51af19d0876a2f13ca6bd2fa66992c186fac14758bc1949a849a882b36e53a2d2da7b8f0759559e2ba774222b01b1bc820f2d17f31fe1d6097f1f74d2d8404f3d3c30f33ad374223c732010e3eefd4ec62ff6fde06aec4be8c1d9986", 0x85}, {&(0x7f0000000400)="1f79b9a39753b098132221b2c29897f91245fe82da088e18e9cc60c0453c04a6e0e7f9a628b16e49a6d59d779271d8f1bcca263ef9380dea73b62265c831b004785e205b46e50046772714", 0x4b}, {&(0x7f0000000480)="e51e156c43b834ae59580ef71c60658ea6e6fcd6ef9824fa74ce474424078f18f49a648342f239a1a523a67410f6284c5917062b449a1862e97f5dd51ee5d20a2371eb893e5693cf596ff47dfce758dd668ec3d41915580026c8c9f6ee11c9aa5d319d3a675353d4641b9525c7ed6c8ce8328a", 0x73}, {&(0x7f00000016c0)="ba19667d53a4d9696e1096fc36196d6e1981441c2995525ce19a50d770a11bccaa6571166f818745b97d88a7030f95f8221b462dc61a2afd55ad5c9c173b3a207685bc4f6cca2c85bc62bbd225cf3d72253a0adbbf86b576e0bf84c74c2ee76ff432cea76081d6420d43ef1958e3fb0b3be4f501903c74a88a2e", 0x7a}, {&(0x7f0000001740)="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", 0x1000}, {&(0x7f0000002740)="ac1abe6fa57f7e6a324a72f4f1b6c6ad69a35fbb1b1e8c448d0aa4a785145e7c4d5423be5932759b7afcd7b23ec5219ed374816a15cebf57d5525ed284da664cb36687354fabdca4", 0x48}], 0x9}, 0x200040d0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x1f) 12:38:34 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x786b, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) [ 388.360201] FAULT_INJECTION: forcing a failure. [ 388.360201] name failslab, interval 1, probability 0, space 0, times 0 12:38:34 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x3414, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) [ 388.492855] CPU: 0 PID: 20896 Comm: syz-executor.4 Not tainted 5.0.0-rc4+ #39 [ 388.500176] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 388.509525] Call Trace: [ 388.512125] dump_stack+0x172/0x1f0 [ 388.515786] should_fail.cold+0xa/0x1b [ 388.519688] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 388.524814] __should_failslab+0x121/0x190 [ 388.529055] should_failslab+0x9/0x14 [ 388.532865] kmem_cache_alloc_node_trace+0x270/0x720 [ 388.532885] ? __alloc_skb+0xd5/0x5e0 [ 388.532908] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 388.541796] __kmalloc_node_track_caller+0x3d/0x70 [ 388.541816] __kmalloc_reserve.isra.0+0x40/0xf0 [ 388.541834] __alloc_skb+0x10b/0x5e0 [ 388.560564] ? skb_scrub_packet+0x440/0x440 [ 388.564921] ? raw6_getfrag+0x164/0x230 [ 388.568903] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 388.573934] __ip6_append_data.isra.0+0x29ed/0x3600 [ 388.578967] ? rawv6_mh_filter_unregister+0x20/0x20 [ 388.583998] ? dst_output+0x180/0x180 [ 388.587810] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 388.592668] ip6_append_data+0x1e5/0x320 [ 388.596736] ? rawv6_mh_filter_unregister+0x20/0x20 [ 388.601766] ? rawv6_mh_filter_unregister+0x20/0x20 [ 388.606789] rawv6_sendmsg+0x146b/0x35f0 [ 388.610858] ? __audit_ptrace+0x1f1/0x590 [ 388.615018] ? compat_rawv6_getsockopt+0x150/0x150 [ 388.619953] ? aa_profile_af_perm+0x320/0x320 [ 388.624454] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 388.629300] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 388.634320] ? rw_copy_check_uvector+0x2a6/0x330 [ 388.639093] ? ___might_sleep+0x163/0x280 [ 388.643259] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 388.648108] inet_sendmsg+0x147/0x5d0 [ 388.651923] ? compat_rawv6_getsockopt+0x150/0x150 [ 388.656869] ? inet_sendmsg+0x147/0x5d0 [ 388.660869] ? ipip_gro_receive+0x100/0x100 [ 388.665247] sock_sendmsg+0xdd/0x130 [ 388.668985] ___sys_sendmsg+0x806/0x930 [ 388.672989] ? copy_msghdr_from_user+0x430/0x430 [ 388.677767] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 388.682539] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 388.687350] ? lockdep_hardirqs_on+0x415/0x5d0 [ 388.691941] ? retint_kernel+0x2d/0x2d [ 388.695834] ? trace_hardirqs_on_caller+0x6a/0x220 [ 388.700773] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 388.705559] ? sockfd_lookup_light+0xcb/0x180 [ 388.710078] ? __sanitizer_cov_trace_pc+0x20/0x50 [ 388.714933] __sys_sendmsg+0x105/0x1d0 [ 388.718828] ? __ia32_sys_shutdown+0x80/0x80 [ 388.723243] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 388.728022] __x64_sys_sendmsg+0x78/0xb0 [ 388.732092] ? do_syscall_64+0x5b/0x610 [ 388.736075] do_syscall_64+0x103/0x610 [ 388.739980] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 388.745174] RIP: 0033:0x457e29 [ 388.748380] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 388.767289] RSP: 002b:00007fd0bf1a9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 388.775019] RAX: ffffffffffffffda RBX: 00007fd0bf1a9c90 RCX: 0000000000457e29 [ 388.782291] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000004 12:38:35 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x3138, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:35 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x7c27, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) 12:38:35 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x7c54, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) 12:38:35 executing program 5: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x1e34, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:35 executing program 1: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000002c0)={0xffffffffffffff9c}) recvmsg(r0, &(0x7f00000004c0)={&(0x7f0000000340)=@nfc_llcp, 0x80, &(0x7f0000000480)=[{&(0x7f00000003c0)=""/151, 0x97}, {&(0x7f00000006c0)=""/201, 0xc9}], 0x2, &(0x7f00000007c0)=""/114, 0x72}, 0x10000) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="c3dd8100000000000000f7ff0000"], 0xe) [ 388.789588] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 388.796863] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd0bf1aa6d4 [ 388.804139] R13: 00000000004c53f7 R14: 00000000004d9208 R15: 0000000000000005 12:38:35 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x7c70, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) [ 388.898240] device nr0 entered promiscuous mode 12:38:35 executing program 4 (fault-call:3 fault-nth:33): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:35 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x341e, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:35 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x3414, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:35 executing program 5: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x2099, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:35 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x7cdc, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) 12:38:35 executing program 5: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x20d0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:35 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x805a, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) [ 389.199340] FAULT_INJECTION: forcing a failure. [ 389.199340] name failslab, interval 1, probability 0, space 0, times 0 [ 389.251396] CPU: 1 PID: 20956 Comm: syz-executor.4 Not tainted 5.0.0-rc4+ #39 [ 389.258713] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 389.268068] Call Trace: [ 389.270689] dump_stack+0x172/0x1f0 [ 389.274337] should_fail.cold+0xa/0x1b [ 389.278244] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 389.283359] ? lock_downgrade+0x810/0x810 [ 389.287517] ? ___might_sleep+0x163/0x280 [ 389.291672] __should_failslab+0x121/0x190 [ 389.295918] should_failslab+0x9/0x14 [ 389.299725] kmem_cache_alloc_node+0x265/0x710 [ 389.304314] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 389.309860] ? ip_generic_getfrag+0x120/0x230 [ 389.314369] __alloc_skb+0xd5/0x5e0 [ 389.318011] ? skb_scrub_packet+0x440/0x440 [ 389.322348] ? raw6_getfrag+0x164/0x230 [ 389.326328] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 389.331388] __ip6_append_data.isra.0+0x29ed/0x3600 [ 389.336426] ? rawv6_mh_filter_unregister+0x20/0x20 [ 389.341458] ? dst_output+0x180/0x180 [ 389.345293] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 389.350152] ip6_append_data+0x1e5/0x320 [ 389.354223] ? rawv6_mh_filter_unregister+0x20/0x20 [ 389.359250] ? rawv6_mh_filter_unregister+0x20/0x20 [ 389.364275] rawv6_sendmsg+0x146b/0x35f0 [ 389.368354] ? __audit_ptrace+0x1f1/0x590 [ 389.372515] ? compat_rawv6_getsockopt+0x150/0x150 [ 389.377459] ? aa_profile_af_perm+0x320/0x320 [ 389.381968] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 389.386994] ? rw_copy_check_uvector+0x2a6/0x330 [ 389.391767] ? ___might_sleep+0x163/0x280 [ 389.395941] ? aa_sock_msg_perm.isra.0+0xba/0x170 12:38:35 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x80fe, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) [ 389.400799] inet_sendmsg+0x147/0x5d0 [ 389.404615] ? compat_rawv6_getsockopt+0x150/0x150 [ 389.409553] ? inet_sendmsg+0x147/0x5d0 [ 389.413548] ? ipip_gro_receive+0x100/0x100 [ 389.417895] sock_sendmsg+0xdd/0x130 [ 389.421980] ___sys_sendmsg+0x806/0x930 [ 389.425971] ? copy_msghdr_from_user+0x430/0x430 [ 389.430740] ? lock_downgrade+0x810/0x810 [ 389.434897] ? kasan_check_read+0x11/0x20 [ 389.439060] ? __fget+0x367/0x540 [ 389.442547] ? __fget_light+0x1a9/0x230 [ 389.446542] ? __fdget+0x1b/0x20 12:38:36 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x81fc, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) [ 389.449923] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 389.455478] __sys_sendmsg+0x105/0x1d0 [ 389.459374] ? __ia32_sys_shutdown+0x80/0x80 [ 389.463792] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 389.469337] ? fput+0x128/0x1a0 [ 389.472634] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 389.477395] ? do_syscall_64+0x26/0x610 [ 389.481380] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 389.486749] ? do_syscall_64+0x26/0x610 [ 389.490748] __x64_sys_sendmsg+0x78/0xb0 [ 389.494824] do_syscall_64+0x103/0x610 [ 389.494850] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 389.494862] RIP: 0033:0x457e29 [ 389.494878] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 389.494886] RSP: 002b:00007fd0bf1a9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 389.503967] RAX: ffffffffffffffda RBX: 00007fd0bf1a9c90 RCX: 0000000000457e29 [ 389.503977] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000004 [ 389.503985] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 389.503993] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd0bf1aa6d4 [ 389.504002] R13: 00000000004c53f7 R14: 00000000004d9208 R15: 0000000000000005 12:38:36 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x34cd, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:36 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'batadv0\x00', 0x4000}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="c3dd8100000000000000f7ff0000"], 0xe) 12:38:36 executing program 5: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x23ac, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:36 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x341e, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:36 executing program 4 (fault-call:3 fault-nth:34): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:36 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="c30000002f000000f7ff00000000"], 0xe) [ 389.856732] FAULT_INJECTION: forcing a failure. [ 389.856732] name failslab, interval 1, probability 0, space 0, times 0 12:38:36 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x36b0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) [ 389.902877] CPU: 1 PID: 20985 Comm: syz-executor.4 Not tainted 5.0.0-rc4+ #39 [ 389.910198] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 389.919554] Call Trace: [ 389.922187] dump_stack+0x172/0x1f0 [ 389.925828] should_fail.cold+0xa/0x1b [ 389.929729] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 389.934851] ? lock_downgrade+0x810/0x810 [ 389.939018] ? ___might_sleep+0x163/0x280 [ 389.943206] __should_failslab+0x121/0x190 [ 389.947456] should_failslab+0x9/0x14 12:38:36 executing program 5: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x2429, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) [ 389.951266] kmem_cache_alloc_node_trace+0x270/0x720 [ 389.956380] ? __alloc_skb+0xd5/0x5e0 [ 389.958885] device nr0 entered promiscuous mode [ 389.960197] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 389.960220] __kmalloc_node_track_caller+0x3d/0x70 [ 389.960240] __kmalloc_reserve.isra.0+0x40/0xf0 [ 389.980022] __alloc_skb+0x10b/0x5e0 [ 389.983758] ? skb_scrub_packet+0x440/0x440 [ 389.988105] ? __ip6_append_data.isra.0+0xc40/0x3600 [ 389.993228] __ip6_append_data.isra.0+0x29ed/0x3600 [ 389.993252] ? rawv6_mh_filter_unregister+0x20/0x20 [ 389.993278] ? dst_output+0x180/0x180 [ 390.003330] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 390.003348] ip6_append_data+0x1e5/0x320 [ 390.003364] ? rawv6_mh_filter_unregister+0x20/0x20 [ 390.003381] ? rawv6_mh_filter_unregister+0x20/0x20 [ 390.003398] rawv6_sendmsg+0x146b/0x35f0 [ 390.003421] ? __audit_ptrace+0x1f1/0x590 [ 390.003439] ? compat_rawv6_getsockopt+0x150/0x150 [ 390.003460] ? aa_profile_af_perm+0x320/0x320 [ 390.003476] ? __sanitizer_cov_trace_pc+0x3b/0x50 [ 390.048643] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 390.053687] ? rw_copy_check_uvector+0x2a6/0x330 [ 390.058650] ? ___might_sleep+0x163/0x280 [ 390.062835] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 390.067695] inet_sendmsg+0x147/0x5d0 [ 390.071511] ? compat_rawv6_getsockopt+0x150/0x150 [ 390.076457] ? inet_sendmsg+0x147/0x5d0 [ 390.080444] ? ipip_gro_receive+0x100/0x100 [ 390.084787] sock_sendmsg+0xdd/0x130 [ 390.088511] ___sys_sendmsg+0x806/0x930 [ 390.092500] ? copy_msghdr_from_user+0x430/0x430 [ 390.097266] ? retint_kernel+0x2d/0x2d [ 390.101167] ? lock_downgrade+0x810/0x810 [ 390.105336] ? kasan_check_read+0x11/0x20 [ 390.109505] ? __fget+0x367/0x540 [ 390.112989] ? __fget_light+0x1a9/0x230 [ 390.116979] ? __fdget+0x1b/0x20 [ 390.120357] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 390.125923] __sys_sendmsg+0x105/0x1d0 [ 390.129831] ? __ia32_sys_shutdown+0x80/0x80 [ 390.134262] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 390.139051] ? do_syscall_64+0xb5/0x610 [ 390.143225] __x64_sys_sendmsg+0x78/0xb0 [ 390.147306] do_syscall_64+0x103/0x610 [ 390.151238] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 390.156891] RIP: 0033:0x457e29 [ 390.160076] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 390.178997] RSP: 002b:00007fd0bf1a9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 390.186754] RAX: ffffffffffffffda RBX: 00007fd0bf1a9c90 RCX: 0000000000457e29 [ 390.194042] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000004 12:38:36 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x8218, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) [ 390.201323] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 390.208607] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd0bf1aa6d4 [ 390.216565] R13: 00000000004c53f7 R14: 00000000004d9208 R15: 0000000000000005 12:38:36 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x34cd, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:36 executing program 5: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x24d8, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:36 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x3831, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:36 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x8416, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) 12:38:36 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x36b0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:37 executing program 5: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x2648, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:37 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x38e0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:37 executing program 4 (fault-call:3 fault-nth:35): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) [ 390.669645] FAULT_INJECTION: forcing a failure. [ 390.669645] name failslab, interval 1, probability 0, space 0, times 0 [ 390.701045] CPU: 0 PID: 21042 Comm: syz-executor.4 Not tainted 5.0.0-rc4+ #39 [ 390.708359] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 390.717714] Call Trace: [ 390.720326] dump_stack+0x172/0x1f0 [ 390.723967] should_fail.cold+0xa/0x1b [ 390.727864] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 390.732973] ? lock_downgrade+0x810/0x810 [ 390.737128] ? ___might_sleep+0x163/0x280 [ 390.741296] __should_failslab+0x121/0x190 [ 390.745540] should_failslab+0x9/0x14 [ 390.749365] kmem_cache_alloc_node+0x265/0x710 [ 390.753969] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 390.758749] __alloc_skb+0xd5/0x5e0 [ 390.762382] ? skb_scrub_packet+0x440/0x440 [ 390.766712] ? __ip6_append_data.isra.0+0x1eda/0x3600 [ 390.771912] __ip6_append_data.isra.0+0x29ed/0x3600 [ 390.776953] ? rawv6_mh_filter_unregister+0x20/0x20 [ 390.781990] ? dst_output+0x180/0x180 [ 390.785806] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 390.790655] ip6_append_data+0x1e5/0x320 [ 390.794727] ? rawv6_mh_filter_unregister+0x20/0x20 [ 390.799749] ? rawv6_mh_filter_unregister+0x20/0x20 [ 390.804771] rawv6_sendmsg+0x146b/0x35f0 [ 390.808852] ? __audit_ptrace+0x1f1/0x590 [ 390.812990] ? compat_rawv6_getsockopt+0x150/0x150 [ 390.817906] ? aa_profile_af_perm+0x320/0x320 [ 390.822392] ? __sanitizer_cov_trace_pc+0x4b/0x50 [ 390.827230] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 390.832238] ? rw_copy_check_uvector+0x2a6/0x330 [ 390.836989] ? ___might_sleep+0x163/0x280 [ 390.841133] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 390.845966] inet_sendmsg+0x147/0x5d0 [ 390.849754] ? compat_rawv6_getsockopt+0x150/0x150 [ 390.854669] ? inet_sendmsg+0x147/0x5d0 [ 390.858628] ? ipip_gro_receive+0x100/0x100 [ 390.862939] sock_sendmsg+0xdd/0x130 [ 390.866658] ___sys_sendmsg+0x806/0x930 [ 390.870634] ? copy_msghdr_from_user+0x430/0x430 [ 390.875380] ? lock_downgrade+0x810/0x810 [ 390.879529] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 390.884279] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 390.889042] ? lockdep_hardirqs_on+0x415/0x5d0 [ 390.893614] ? retint_kernel+0x2d/0x2d [ 390.897486] ? trace_hardirqs_on_caller+0x6a/0x220 [ 390.902429] ? __fget_light+0x1a9/0x230 [ 390.906397] ? sockfd_lookup_light+0x26/0x180 [ 390.910900] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 390.916436] __sys_sendmsg+0x105/0x1d0 [ 390.920315] ? __ia32_sys_shutdown+0x80/0x80 [ 390.924709] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 390.930232] ? fput+0x128/0x1a0 [ 390.933507] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 390.938250] ? do_syscall_64+0x26/0x610 [ 390.942212] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 390.947558] ? do_syscall_64+0x26/0x610 [ 390.951534] __x64_sys_sendmsg+0x78/0xb0 [ 390.955600] do_syscall_64+0x103/0x610 [ 390.959493] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 390.964679] RIP: 0033:0x457e29 [ 390.967860] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 390.986743] RSP: 002b:00007fd0bf1a9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 390.994432] RAX: ffffffffffffffda RBX: 00007fd0bf1a9c90 RCX: 0000000000457e29 [ 391.001684] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000004 [ 391.008936] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 391.016190] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd0bf1aa6d4 [ 391.023446] R13: 00000000004c53f7 R14: 00000000004d9208 R15: 0000000000000005 12:38:37 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000240)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0x0, 0xffffffffffffff9c, 0x0, 0x17, &(0x7f0000000380)='cgroup.subtree_control\x00'}, 0x30) perf_event_open$cgroup(&(0x7f00000002c0)={0x7, 0x70, 0x1, 0x9, 0x4, 0x7, 0x0, 0x2, 0x40050, 0x1, 0x2, 0x46d, 0x10000, 0x3f, 0x9, 0x0, 0xd3, 0x9, 0x2, 0x8001, 0x80000000, 0x200, 0x9, 0x4, 0x81, 0x1, 0x7, 0x0, 0x27, 0x7fff, 0x5, 0xfffffffffffffffe, 0x4, 0x75e9455c, 0x20, 0x5, 0x8, 0x401, 0x0, 0x1, 0x1, @perf_bp={&(0x7f0000000280), 0x1}, 0x40, 0x7, 0x3, 0x2, 0xc16, 0x4, 0x5}, r2, 0xd, r3, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0xfff, 0x10000, 0x8001, 0x1, 0xffffffffffffff9c}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r4, &(0x7f0000000080)="0339882a36dc3c123c24ff7f1e37700c076ad0d641385c71c8cd53bb0b7b2fbf7c5576f819d8faaa173a70e2e4f81df236bbe697b4bf0886a2670572c34b80d2518de4d4d24c3355001b078ccc7ff1877e7a50761c2df7a65469d0496ad0cc479e14ea"}, 0x10) sendmsg$kcm(r2, &(0x7f0000000b80)={&(0x7f0000000400)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(camellia)\x00'}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000480)="6e18b3c249da7e97f5748ad1a5cb367ec710e78815544e9729f8bd6b1674e16c5e2a286f6f8b4ddf28d70a1d9b8c2dae590ed9a5ae8b5b4a6096fc958f55591ae710d25e576029ae4d45e429360b65", 0x4f}, {&(0x7f00000006c0)="aeb2a0b41e845ac9d8755a66853f01a11c87bd434dc5b00fc8788943a1efdb8ef9652f4e07980bdd2ecbbaf0de84ad3add3e0c9f76d5d7f4572b33e37aee0392643e2166caecab7603118aaeb3a68b4c08d6e42da50527f14474e7e7d4e30783556cf67e4fde71aa4b562bb5eb8b86c4d438b360a73c4a3bff6db2193904319621727ff80dd5333d0926c965ff772a7e5a93b30243b90e3a5af1b02ed0c2148fb0ada72403432ef1ee6eaf1843cf0ac685", 0xb1}, {&(0x7f0000000780)="baf18b643718f0a1315c2d5dd035c35a4f06972af5a8e923ad4a848908fc88da3baa04f923904140225197963a0c024d32c96e59c7b113ae07b16c88c7fb2ac651625de6312ac0008cb3f7f00d33c3010e3f3d8a5f26c560", 0x58}, {&(0x7f0000000800)="05625832f9bc33ed5f68202ae72d75002f5be62ec6e84b2880c26a888622b9147aa95e97af52dac0333348be0d5f58dafc8fd942d0e5e66935103407d2ac1800522fe0d37b8bb7890e9545974a911d510601e053d39c7b722eb2bac21ab7e6adae374efd97705511924e00c5cd7e2d4ad19ab8c9f183dd8cefcd7be22e5980e89d66fa5897d037a5efc79cd2e324cc8d79e50de7410c0605ddcdd7f44bca834b3ae81a12ed6554b82cc94ecfd04ec1f98050fb850a1e1a", 0xb7}, {&(0x7f00000008c0)="da0320c9b261de7ecc1498c6191503d365ab2dd03834dbf6239839698e1768fb7a30ecd613cb3939ad8b4f731620ec979ad302fe342d8a2a2acfd09f18e8f330215dc450faccabb2570e419803b4c85c05f2fcdff46e9e8e78ac8191e62babcb7e940c538c9f299f", 0x68}, {&(0x7f0000000940)="a61023339d5ef6b6347cc8ed1f58eaf3fab270bdc9c29d17274769ad5ae63a6b7e322b4e5e463f6de274c9af05cf95f100e5806284efac1d8a93bf6e8ebe24a1984d8b3aa73bfd630a9375a714669c052f7c323f5e08f1a3522b672810a6573fc75bd2e31a015e5d1d5d124ddc876123847caea801514b8689b01896", 0x7c}, {&(0x7f00000009c0)="8c4734f84951b4bec82fd207a1a7de9962cbd6fe0383f403bb5bd586cdb9035c2d476855b1a21bf43d25fa498351fec4216efa571e2a9dcbaaa4", 0x3a}, {&(0x7f0000000a00)="6fa925dbf277c97159aca801afeba37ce6e0d18f93a1080f5b47b217d208fbb2b9538389c22b7d1f0c21c38e217d589ce076b15d482f2ea9714528a046637d779b1752e82c96df4f3b0cbeb65deb22da35a118a345146aebe4b00dfe67a1048fe94a1f3b555898a2e889c329cb1f3776e01de748abbcbd8a7424a66ccb9a7a2b0838c95225ee45e882afd7d9928ac2", 0x8f}], 0x8, &(0x7f0000000b40)=[{0x30, 0x105, 0x5, "1e0d1e06ab16eee0f0b066881c1650fb2c27f60153773d253191e21722"}], 0x30}, 0xc000) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r2, &(0x7f0000000280)=ANY=[], 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000200)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', r4}, 0x10) 12:38:37 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x3831, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:37 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x84cb, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) 12:38:37 executing program 5: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x283c, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:37 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x398c, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:37 executing program 4 (fault-call:3 fault-nth:36): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:37 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x87a4, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) [ 391.232027] device nr0 entered promiscuous mode [ 391.238557] FAULT_INJECTION: forcing a failure. [ 391.238557] name failslab, interval 1, probability 0, space 0, times 0 [ 391.270409] CPU: 0 PID: 21063 Comm: syz-executor.4 Not tainted 5.0.0-rc4+ #39 12:38:37 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x87c0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) [ 391.277736] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 391.287095] Call Trace: [ 391.289696] dump_stack+0x172/0x1f0 [ 391.293347] should_fail.cold+0xa/0x1b [ 391.297261] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 391.302401] ? lock_downgrade+0x810/0x810 [ 391.306586] ? ___might_sleep+0x163/0x280 [ 391.310849] __should_failslab+0x121/0x190 [ 391.315107] should_failslab+0x9/0x14 [ 391.318934] kmem_cache_alloc_node_trace+0x270/0x720 [ 391.324061] ? __alloc_skb+0xd5/0x5e0 12:38:37 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x8849, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) 12:38:37 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x8c05, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) [ 391.327872] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 391.333335] __kmalloc_node_track_caller+0x3d/0x70 [ 391.338278] __kmalloc_reserve.isra.0+0x40/0xf0 [ 391.342957] __alloc_skb+0x10b/0x5e0 [ 391.346681] ? skb_scrub_packet+0x440/0x440 [ 391.351014] ? raw6_getfrag+0x164/0x230 [ 391.355003] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 391.360052] __ip6_append_data.isra.0+0x29ed/0x3600 [ 391.365090] ? rawv6_mh_filter_unregister+0x20/0x20 [ 391.370129] ? dst_output+0x180/0x180 [ 391.373940] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 391.378799] ip6_append_data+0x1e5/0x320 [ 391.382873] ? rawv6_mh_filter_unregister+0x20/0x20 [ 391.387925] ? rawv6_mh_filter_unregister+0x20/0x20 [ 391.387951] rawv6_sendmsg+0x146b/0x35f0 [ 391.387978] ? __audit_ptrace+0x1f1/0x590 [ 391.397041] ? compat_rawv6_getsockopt+0x150/0x150 [ 391.406116] ? aa_profile_af_perm+0x320/0x320 [ 391.410727] ? retint_kernel+0x2d/0x2d [ 391.414654] ? ___might_sleep+0x163/0x280 [ 391.418838] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 391.423697] inet_sendmsg+0x147/0x5d0 [ 391.427522] ? compat_rawv6_getsockopt+0x150/0x150 12:38:37 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x8cba, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) [ 391.432464] ? inet_sendmsg+0x147/0x5d0 [ 391.436449] ? ipip_gro_receive+0x100/0x100 [ 391.440821] sock_sendmsg+0xdd/0x130 [ 391.444549] ___sys_sendmsg+0x806/0x930 [ 391.448552] ? copy_msghdr_from_user+0x430/0x430 [ 391.453334] ? retint_kernel+0x2d/0x2d [ 391.457251] ? lock_downgrade+0x810/0x810 [ 391.461429] ? kasan_check_read+0x11/0x20 [ 391.465610] ? __fget+0x367/0x540 [ 391.469091] ? __fget_light+0x1a9/0x230 [ 391.473088] ? __fdget+0x1b/0x20 [ 391.476459] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 12:38:38 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x8d4c, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) [ 391.482018] __sys_sendmsg+0x105/0x1d0 [ 391.485909] ? __ia32_sys_shutdown+0x80/0x80 [ 391.490326] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 391.495124] __x64_sys_sendmsg+0x78/0xb0 [ 391.499203] ? do_syscall_64+0x5b/0x610 [ 391.503197] do_syscall_64+0x103/0x610 [ 391.507100] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 391.512311] RIP: 0033:0x457e29 [ 391.515681] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 391.535982] RSP: 002b:00007fd0bf1a9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 391.543707] RAX: ffffffffffffffda RBX: 00007fd0bf1a9c90 RCX: 0000000000457e29 [ 391.550993] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000004 [ 391.551003] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 391.551012] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd0bf1aa6d4 [ 391.551021] R13: 00000000004c53f7 R14: 00000000004d9208 R15: 0000000000000005 12:38:38 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="c3dd8100000000000000f7ff0000"], 0xe) 12:38:38 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x8d68, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) 12:38:38 executing program 5: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x28eb, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:38 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x38e0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:38 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x3c28, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:38 executing program 4 (fault-call:3 fault-nth:37): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) [ 391.959007] FAULT_INJECTION: forcing a failure. [ 391.959007] name failslab, interval 1, probability 0, space 0, times 0 [ 391.979285] CPU: 0 PID: 21105 Comm: syz-executor.4 Not tainted 5.0.0-rc4+ #39 [ 391.986599] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 391.995954] Call Trace: [ 391.998549] dump_stack+0x172/0x1f0 [ 392.002203] should_fail.cold+0xa/0x1b [ 392.006099] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 392.011202] ? lock_downgrade+0x810/0x810 [ 392.015356] ? ___might_sleep+0x163/0x280 [ 392.019520] __should_failslab+0x121/0x190 [ 392.023764] should_failslab+0x9/0x14 [ 392.027563] kmem_cache_alloc_node+0x265/0x710 [ 392.032190] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 392.036954] __alloc_skb+0xd5/0x5e0 [ 392.040600] ? skb_scrub_packet+0x440/0x440 [ 392.044929] ? __ip6_append_data.isra.0+0xc24/0x3600 [ 392.050042] __ip6_append_data.isra.0+0x29ed/0x3600 [ 392.055065] ? rawv6_mh_filter_unregister+0x20/0x20 [ 392.060103] ? dst_output+0x180/0x180 [ 392.063915] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 392.068767] ip6_append_data+0x1e5/0x320 [ 392.072832] ? rawv6_mh_filter_unregister+0x20/0x20 [ 392.077856] ? rawv6_mh_filter_unregister+0x20/0x20 [ 392.082878] rawv6_sendmsg+0x146b/0x35f0 [ 392.086961] ? __audit_ptrace+0x1f1/0x590 [ 392.091115] ? compat_rawv6_getsockopt+0x150/0x150 [ 392.096052] ? aa_profile_af_perm+0x320/0x320 [ 392.100556] ? lockdep_hardirqs_on+0x415/0x5d0 [ 392.105176] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 392.109941] ? retint_kernel+0x2d/0x2d [ 392.113856] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 392.118707] inet_sendmsg+0x147/0x5d0 [ 392.122512] ? compat_rawv6_getsockopt+0x150/0x150 [ 392.127449] ? inet_sendmsg+0x147/0x5d0 [ 392.131435] ? ipip_gro_receive+0x100/0x100 [ 392.135766] sock_sendmsg+0xdd/0x130 [ 392.139482] ___sys_sendmsg+0x806/0x930 [ 392.143462] ? copy_msghdr_from_user+0x430/0x430 [ 392.148485] ? lock_downgrade+0x810/0x810 [ 392.152642] ? kasan_check_read+0x11/0x20 [ 392.156795] ? __fget+0x367/0x540 [ 392.160266] ? __fget_light+0x1a9/0x230 [ 392.164242] ? __fdget+0x1b/0x20 [ 392.167617] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 392.173163] __sys_sendmsg+0x105/0x1d0 [ 392.177055] ? __ia32_sys_shutdown+0x80/0x80 [ 392.181460] ? __sanitizer_cov_trace_pc+0x2b/0x50 [ 392.186326] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 392.191080] ? do_syscall_64+0x26/0x610 [ 392.195058] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 392.200425] ? do_syscall_64+0x26/0x610 [ 392.204414] __x64_sys_sendmsg+0x78/0xb0 [ 392.208483] do_syscall_64+0x103/0x610 [ 392.212380] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 392.217575] RIP: 0033:0x457e29 [ 392.220775] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 392.239675] RSP: 002b:00007fd0bf1a9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 392.247388] RAX: ffffffffffffffda RBX: 00007fd0bf1a9c90 RCX: 0000000000457e29 12:38:38 executing program 5: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x2924, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:38 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x9038, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) [ 392.254660] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000004 [ 392.261926] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 392.269219] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd0bf1aa6d4 [ 392.276489] R13: 00000000004c53f7 R14: 00000000004d9208 R15: 0000000000000005 [ 392.285269] net_ratelimit: 22 callbacks suppressed [ 392.285337] protocol 88fb is buggy, dev hsr_slave_0 12:38:38 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x3c70, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:38 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x398c, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:38 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f0000000080)='cpuacct.usage_percpu\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f00000000c0)='io.stat\x00', 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="c37db900000000000000f7ff0000"], 0xe) 12:38:38 executing program 4 (fault-call:3 fault-nth:38): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:39 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x90ed, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) [ 392.515490] FAULT_INJECTION: forcing a failure. [ 392.515490] name failslab, interval 1, probability 0, space 0, times 0 [ 392.528279] CPU: 0 PID: 21135 Comm: syz-executor.4 Not tainted 5.0.0-rc4+ #39 [ 392.535585] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 392.544937] Call Trace: [ 392.547536] dump_stack+0x172/0x1f0 [ 392.551189] should_fail.cold+0xa/0x1b [ 392.555094] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 392.560230] ? ___might_sleep+0x163/0x280 [ 392.564394] __should_failslab+0x121/0x190 [ 392.568638] should_failslab+0x9/0x14 [ 392.572441] kmem_cache_alloc_node_trace+0x270/0x720 [ 392.577550] ? __alloc_skb+0xd5/0x5e0 [ 392.581368] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 392.586830] __kmalloc_node_track_caller+0x3d/0x70 [ 392.591766] __kmalloc_reserve.isra.0+0x40/0xf0 [ 392.596439] __alloc_skb+0x10b/0x5e0 [ 392.600169] ? skb_scrub_packet+0x440/0x440 [ 392.604497] ? raw6_getfrag+0x164/0x230 [ 392.608471] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 392.613494] __ip6_append_data.isra.0+0x29ed/0x3600 [ 392.618516] ? rawv6_mh_filter_unregister+0x20/0x20 [ 392.623543] ? dst_output+0x180/0x180 [ 392.627361] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 392.632209] ip6_append_data+0x1e5/0x320 [ 392.636271] ? rawv6_mh_filter_unregister+0x20/0x20 [ 392.641297] ? rawv6_mh_filter_unregister+0x20/0x20 [ 392.646317] rawv6_sendmsg+0x146b/0x35f0 [ 392.650390] ? __audit_ptrace+0x1f1/0x590 [ 392.654548] ? compat_rawv6_getsockopt+0x150/0x150 [ 392.659500] ? aa_profile_af_perm+0x320/0x320 [ 392.663998] ? rw_copy_check_uvector+0x265/0x330 [ 392.668763] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 392.673797] ? rw_copy_check_uvector+0x2a6/0x330 [ 392.678588] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 392.683350] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 392.688110] ? lockdep_hardirqs_on+0x415/0x5d0 [ 392.692696] ? retint_kernel+0x2d/0x2d [ 392.696605] ? trace_hardirqs_on_caller+0x6a/0x220 [ 392.701559] ? retint_kernel+0x2d/0x2d [ 392.705472] ? ipip_gro_receive+0x100/0x100 [ 392.709800] inet_sendmsg+0x147/0x5d0 [ 392.713611] ? compat_rawv6_getsockopt+0x150/0x150 [ 392.718543] ? inet_sendmsg+0x147/0x5d0 [ 392.722530] ? ipip_gro_receive+0x100/0x100 [ 392.726867] sock_sendmsg+0xdd/0x130 [ 392.730597] ___sys_sendmsg+0x806/0x930 [ 392.734589] ? copy_msghdr_from_user+0x430/0x430 [ 392.739358] ? lock_downgrade+0x810/0x810 [ 392.743532] ? kasan_check_read+0x11/0x20 [ 392.747690] ? __fget+0x367/0x540 [ 392.751161] ? __fget_light+0x1a9/0x230 [ 392.755139] ? __fdget+0x1b/0x20 [ 392.758507] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 392.764060] __sys_sendmsg+0x105/0x1d0 [ 392.767949] ? __ia32_sys_shutdown+0x80/0x80 [ 392.772364] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 392.777936] ? fput+0x128/0x1a0 [ 392.781225] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 392.785983] ? do_syscall_64+0x26/0x610 [ 392.789974] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 392.795342] ? do_syscall_64+0x26/0x610 [ 392.799339] __x64_sys_sendmsg+0x78/0xb0 [ 392.803407] do_syscall_64+0x103/0x610 [ 392.807304] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 392.812512] RIP: 0033:0x457e29 [ 392.815705] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 392.835735] RSP: 002b:00007fd0bf1a9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 392.843445] RAX: ffffffffffffffda RBX: 00007fd0bf1a9c90 RCX: 0000000000457e29 [ 392.850711] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000004 [ 392.857974] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 12:38:39 executing program 5: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x2bc0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:39 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x3f00, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:39 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x3c28, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) [ 392.865240] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd0bf1aa6d4 [ 392.872504] R13: 00000000004c53f7 R14: 00000000004d9208 R15: 0000000000000005 12:38:39 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x92f4, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) 12:38:39 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="c3eddf03000000eb060077c31000775d33020f1c73f9d87b3f749a3450bb7643fedbc96cf995ca29245c88c1f18bba66010185b7b30b33952b2eb9b91abf533d4bc9c4454e132497cae9cdee5f804c6085198f672086603a3908a3b4b95a385199106717bb2a6532b362e5c5392b1d10f36bab9ce5f69ce50c2d76f09e11a150ad792926343d9765d981dd3cbef56f517ff028568fb67f3fcdb511c4a103d25b70"], 0xe) 12:38:39 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x3c70, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:39 executing program 5: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x2c7b, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:39 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x3f04, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:39 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x9310, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) [ 393.133291] device nr0 entered promiscuous mode 12:38:39 executing program 4 (fault-call:3 fault-nth:39): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:39 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x4000, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:39 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x3f00, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:39 executing program 5: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x2e9c, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) [ 393.268664] FAULT_INJECTION: forcing a failure. [ 393.268664] name failslab, interval 1, probability 0, space 0, times 0 12:38:39 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x3f04, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) 12:38:39 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x94a9, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f00000011c0)='syzkaller\x00'}, 0x48) [ 393.402158] CPU: 1 PID: 21179 Comm: syz-executor.4 Not tainted 5.0.0-rc4+ #39 [ 393.409481] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 393.418835] Call Trace: [ 393.421434] dump_stack+0x172/0x1f0 [ 393.425088] should_fail.cold+0xa/0x1b [ 393.428992] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 393.434110] ? lock_downgrade+0x810/0x810 [ 393.438265] ? ___might_sleep+0x163/0x280 [ 393.442424] __should_failslab+0x121/0x190 [ 393.442444] should_failslab+0x9/0x14 [ 393.442459] kmem_cache_alloc_node+0x265/0x710 [ 393.442475] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 393.442489] ? ip_generic_getfrag+0x120/0x230 [ 393.442511] __alloc_skb+0xd5/0x5e0 [ 393.442530] ? skb_scrub_packet+0x440/0x440 [ 393.442548] ? raw6_getfrag+0x164/0x230 [ 393.442563] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 393.482552] __ip6_append_data.isra.0+0x29ed/0x3600 [ 393.487613] ? rawv6_mh_filter_unregister+0x20/0x20 [ 393.492657] ? dst_output+0x180/0x180 [ 393.496468] ? ip6_autoflowlabel.part.0+0x70/0x70 [ 393.501319] ip6_append_data+0x1e5/0x320 [ 393.505857] ? rawv6_mh_filter_unregister+0x20/0x20 [ 393.510890] ? rawv6_mh_filter_unregister+0x20/0x20 [ 393.515919] rawv6_sendmsg+0x146b/0x35f0 [ 393.520008] ? __audit_ptrace+0x1f1/0x590 [ 393.524167] ? compat_rawv6_getsockopt+0x150/0x150 [ 393.529117] ? aa_profile_af_perm+0x320/0x320 [ 393.533632] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 393.538662] ? rw_copy_check_uvector+0x2a6/0x330 [ 393.543443] ? ___might_sleep+0x163/0x280 [ 393.547625] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 393.552476] inet_sendmsg+0x147/0x5d0 [ 393.556284] ? compat_rawv6_getsockopt+0x150/0x150 [ 393.561223] ? inet_sendmsg+0x147/0x5d0 [ 393.565204] ? ipip_gro_receive+0x100/0x100 [ 393.569535] sock_sendmsg+0xdd/0x130 [ 393.573732] ___sys_sendmsg+0x806/0x930 [ 393.577722] ? copy_msghdr_from_user+0x430/0x430 [ 393.582494] ? lock_downgrade+0x810/0x810 [ 393.586657] ? kasan_check_read+0x11/0x20 [ 393.590816] ? __fget+0x367/0x540 [ 393.594295] ? __fget_light+0x1a9/0x230 [ 393.598282] ? __fdget+0x1b/0x20 12:38:39 executing program 5: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x308e, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0x1a, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000a010000000000000000000095000300000000003de8ac3940032a7aad557b1f373fa60cd7084611dbb430327dcbe2b96943b16e92bb4a5f7d00378fbdd90d8c18a040cab844ce18a7f0227bf75eb1a937151b82b961bbda918859140076e61a3c97b998483a5e89e62581fcfa9271c116394c97df91c049ec6a5c436c1ef45374b8bb0f327905d3a67d5e2c82343cbf7848a87d57ec1e091f2ae3b80c3de3a232042723fcd30fed52f8d56c7176458d9697c41120639fe7599d54945893bc50bf1451df91b06bd8421657bf31071f"], 0x0, 0x5c0, 0x1000, &(0x7f0000002800)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000440)=r2, 0x4) [ 393.601661] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 393.607213] __sys_sendmsg+0x105/0x1d0 [ 393.611115] ? __ia32_sys_shutdown+0x80/0x80 [ 393.615536] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 393.621097] ? fput+0x128/0x1a0 [ 393.624398] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 393.629174] ? do_syscall_64+0x26/0x610 [ 393.633159] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 393.638532] ? do_syscall_64+0x26/0x610 [ 393.642538] __x64_sys_sendmsg+0x78/0xb0 [ 393.646623] do_syscall_64+0x103/0x610 [ 393.650529] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 393.655724] RIP: 0033:0x457e29 [ 393.658922] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 393.677972] RSP: 002b:00007fd0bf1a9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 393.685689] RAX: ffffffffffffffda RBX: 00007fd0bf1a9c90 RCX: 0000000000457e29 [ 393.692959] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000004 [ 393.700227] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 393.707498] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd0bf1aa6d4 [ 393.714766] R13: 00000000004c53f7 R14: 00000000004d9208 R15: 0000000000000005 [ 393.724944] protocol 88fb is buggy, dev hsr_slave_0 [ 393.730145] protocol 88fb is buggy, dev hsr_slave_1 [ 393.735332] protocol 88fb is buggy, dev hsr_slave_0 [ 393.740409] protocol 88fb is buggy, dev hsr_slave_1 [ 546.482589] INFO: task kworker/1:1:22 blocked for more than 140 seconds. [ 546.489459] Not tainted 5.0.0-rc4+ #39 [ 546.496805] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 546.504803] kworker/1:1 D26128 22 2 0x80000000 [ 546.510437] Workqueue: events switchdev_deferred_process_work [ 546.519170] Call Trace: [ 546.521781] __schedule+0x817/0x1cc0 [ 546.525614] ? __mutex_lock+0x721/0x1310 [ 546.529714] ? pci_mmcfg_check_reserved+0x170/0x170 [ 546.537785] schedule+0x92/0x180 [ 546.541258] schedule_preempt_disabled+0x13/0x20 [ 546.546052] __mutex_lock+0x726/0x1310 [ 546.550007] ? rtnl_lock+0x17/0x20 [ 546.556382] ? mutex_trylock+0x1e0/0x1e0 [ 546.560471] ? process_one_work+0x890/0x1760 [ 546.564931] ? find_held_lock+0x35/0x130 [ 546.568985] ? process_one_work+0x890/0x1760 [ 546.576195] ? __lock_is_held+0xb6/0x140 [ 546.580338] ? check_preemption_disabled+0x48/0x290 [ 546.585386] mutex_lock_nested+0x16/0x20 [ 546.589435] ? mutex_lock_nested+0x16/0x20 [ 546.596364] rtnl_lock+0x17/0x20 [ 546.599727] switchdev_deferred_process_work+0xe/0x20 [ 546.604943] process_one_work+0x98e/0x1760 [ 546.609240] ? pwq_dec_nr_in_flight+0x320/0x320 [ 546.616850] ? lock_acquire+0x16f/0x3f0 [ 546.620825] worker_thread+0x98/0xe40 [ 546.624676] ? trace_hardirqs_on+0x67/0x230 [ 546.629003] kthread+0x357/0x430 [ 546.632368] ? process_one_work+0x1760/0x1760 [ 546.639658] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 546.645248] ret_from_fork+0x3a/0x50 [ 546.649043] INFO: task kworker/1:5:9784 blocked for more than 140 seconds. [ 546.658834] Not tainted 5.0.0-rc4+ #39 [ 546.663440] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 546.671389] kworker/1:5 D27712 9784 2 0x80000000 [ 546.680871] Workqueue: events linkwatch_event [ 546.685544] Call Trace: [ 546.688142] __schedule+0x817/0x1cc0 [ 546.691849] ? __mutex_lock+0x721/0x1310 [ 546.698924] ? pci_mmcfg_check_reserved+0x170/0x170 [ 546.704010] schedule+0x92/0x180 [ 546.707505] schedule_preempt_disabled+0x13/0x20 [ 546.712286] __mutex_lock+0x726/0x1310 [ 546.719092] ? rtnl_lock+0x17/0x20 [ 546.722680] ? mutex_trylock+0x1e0/0x1e0 [ 546.726735] ? process_one_work+0x890/0x1760 [ 546.731126] ? find_held_lock+0x35/0x130 [ 546.737921] ? process_one_work+0x890/0x1760 [ 546.742323] ? __lock_is_held+0xb6/0x140 [ 546.746410] ? check_preemption_disabled+0x48/0x290 [ 546.751416] mutex_lock_nested+0x16/0x20 [ 546.758405] ? mutex_lock_nested+0x16/0x20 [ 546.762694] rtnl_lock+0x17/0x20 [ 546.766058] linkwatch_event+0xf/0x70 [ 546.769843] process_one_work+0x98e/0x1760 [ 546.776990] ? pwq_dec_nr_in_flight+0x320/0x320 [ 546.781662] ? lock_acquire+0x16f/0x3f0 [ 546.785674] worker_thread+0x98/0xe40 [ 546.789460] ? trace_hardirqs_on+0x67/0x230 [ 546.796670] kthread+0x357/0x430 [ 546.800030] ? process_one_work+0x1760/0x1760 [ 546.807526] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 546.815873] ret_from_fork+0x3a/0x50 [ 546.819673] INFO: task syz-executor.1:21156 blocked for more than 140 seconds. [ 546.827061] Not tainted 5.0.0-rc4+ #39 [ 546.831462] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 546.842170] syz-executor.1 D27152 21156 7821 0x00000004 [ 546.847826] Call Trace: [ 546.850402] __schedule+0x817/0x1cc0 [ 546.856887] ? pci_mmcfg_check_reserved+0x170/0x170 [ 546.861941] ? wait_woken+0x250/0x250 [ 546.865792] schedule+0x92/0x180 [ 546.869180] _synchronize_rcu_expedited.constprop.0+0x4d4/0x530 [ 546.877966] ? wait_rcu_exp_gp+0x70/0x70 [ 546.882143] ? kasan_check_read+0x11/0x20 [ 546.886363] ? finish_wait+0x260/0x260 [ 546.890239] ? _raw_spin_unlock_irq+0x5e/0x90 [ 546.897410] ? __flush_work+0x48c/0x840 [ 546.901377] ? insert_work+0x3a0/0x3a0 [ 546.905348] ? __lock_is_held+0xb6/0x140 [ 546.909398] ? __lock_is_held+0xb6/0x140 [ 546.916121] synchronize_rcu_expedited+0x27/0xa0 [ 546.920872] synchronize_net+0x3b/0x60 [ 546.924789] rollback_registered_many+0x67b/0xfd0 [ 546.929625] ? skb_dequeue+0x12e/0x180 [ 546.936240] ? generic_xdp_install+0x3d0/0x3d0 [ 546.940815] ? mark_held_locks+0xb1/0x100 [ 546.944993] ? queue_delayed_work_on+0xe6/0x200 [ 546.949649] ? linkwatch_schedule_work+0x13c/0x170 [ 546.957309] ? queue_delayed_work_on+0xe6/0x200 [ 546.961964] ? lockdep_hardirqs_on+0x415/0x5d0 [ 546.966573] rollback_registered+0x109/0x1d0 [ 546.970966] ? rollback_registered_many+0xfd0/0xfd0 [ 546.978889] unregister_netdevice_queue+0x1ee/0x2c0 [ 546.983984] __tun_detach+0xd5b/0x1000 [ 546.987871] ? __tun_detach+0x1000/0x1000 [ 546.991999] tun_chr_close+0xe0/0x180 [ 546.998554] __fput+0x2df/0x8d0 [ 547.001829] ____fput+0x16/0x20 [ 547.005134] task_work_run+0x14a/0x1c0 [ 547.009010] exit_to_usermode_loop+0x273/0x2c0 [ 547.016286] do_syscall_64+0x52d/0x610 [ 547.020173] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 547.025403] RIP: 0033:0x411d31 [ 547.028581] Code: eb be 4c 8b 44 24 40 48 8b 54 24 48 e9 65 ff ff ff 48 8b 4c 24 58 e9 78 ff ff ff 48 8b 44 24 38 48 8b 4c 24 58 e9 69 ff ff ff 1a 82 04 00 e9 c5 fe ff ff cc cc cc cc cc 48 83 ec 20 48 89 6c [ 547.050347] RSP: 002b:00007fffee152e30 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 547.058109] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 0000000000411d31 [ 547.065460] RDX: 0000000000000001 RSI: 0000000000740558 RDI: 0000000000000003 [ 547.072770] RBP: 0000000000000000 R08: 000000000005ff67 R09: 000000000005ff67 [ 547.080023] R10: 00007fffee152d60 R11: 0000000000000293 R12: 0000000000000000 [ 547.087312] R13: 0000000000000001 R14: 00000000000001dc R15: 0000000000000001 [ 547.094633] INFO: task syz-executor.3:21195 blocked for more than 140 seconds. [ 547.101970] Not tainted 5.0.0-rc4+ #39 [ 547.106408] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 547.114378] syz-executor.3 D28224 21195 7826 0x00000004 [ 547.119989] Call Trace: [ 547.122613] __schedule+0x817/0x1cc0 [ 547.126515] ? pci_mmcfg_check_reserved+0x170/0x170 [ 547.131562] ? wait_woken+0x250/0x250 [ 547.135406] schedule+0x92/0x180 [ 547.138795] _synchronize_rcu_expedited.constprop.0+0x4d4/0x530 [ 547.145019] ? wait_rcu_exp_gp+0x70/0x70 [ 547.149070] ? finish_wait+0x260/0x260 [ 547.152991] ? lock_downgrade+0x810/0x810 [ 547.157139] ? find_held_lock+0x35/0x130 [ 547.161184] ? __lock_is_held+0xb6/0x140 [ 547.165273] ? __lock_is_held+0xb6/0x140 [ 547.169324] synchronize_rcu_expedited+0x27/0xa0 [ 547.174102] synchronize_net+0x3b/0x60 [ 547.178030] packet_release+0x806/0xbf0 [ 547.181999] ? packet_set_ring+0x1b70/0x1b70 [ 547.186436] ? __sock_release+0x89/0x250 [ 547.190487] __sock_release+0xd3/0x250 [ 547.194398] ? __sock_release+0x250/0x250 [ 547.198531] sock_close+0x1b/0x30 [ 547.201983] __fput+0x2df/0x8d0 [ 547.205296] ____fput+0x16/0x20 [ 547.208572] task_work_run+0x14a/0x1c0 [ 547.212483] exit_to_usermode_loop+0x273/0x2c0 [ 547.217053] do_syscall_64+0x52d/0x610 [ 547.220922] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 547.226130] RIP: 0033:0x411d31 [ 547.229313] Code: eb be 4c 8b 44 24 40 48 8b 54 24 48 e9 65 ff ff ff 48 8b 4c 24 58 e9 78 ff ff ff 48 8b 44 24 38 48 8b 4c 24 58 e9 69 ff ff ff 1a 82 04 00 e9 c5 fe ff ff cc cc cc cc cc 48 83 ec 20 48 89 6c [ 547.248246] RSP: 002b:00007ffc692f28d0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 547.255962] RAX: 0000000000000000 RBX: 0000000000000009 RCX: 0000000000411d31 [ 547.263247] RDX: 0000000000000000 RSI: 00000000007412f8 RDI: 0000000000000008 [ 547.270515] RBP: 0000000000000000 R08: 00000000000600c0 R09: 00000000000600c0 [ 547.277803] R10: 00007ffc692f2800 R11: 0000000000000293 R12: 0000000000000000 [ 547.285079] R13: 0000000000000001 R14: 0000000000000283 R15: 0000000000000003 [ 547.292356] [ 547.292356] Showing all locks held in the system: [ 547.298731] 3 locks held by kworker/1:0/17: [ 547.303053] #0: 00000000b8d42ea1 ((wq_completion)"%s"("ipv6_addrconf")){+.+.}, at: process_one_work+0x87e/0x1760 [ 547.313485] #1: 000000005c700002 ((addr_chk_work).work){+.+.}, at: process_one_work+0x8b4/0x1760 [ 547.322538] #2: 00000000d22afae0 (rtnl_mutex){+.+.}, at: rtnl_lock+0x17/0x20 [ 547.329808] 3 locks held by kworker/1:1/22: [ 547.334167] #0: 0000000026ba125f ((wq_completion)"events"){+.+.}, at: process_one_work+0x87e/0x1760 [ 547.343544] #1: 00000000b4ed6348 (deferred_process_work){+.+.}, at: process_one_work+0x8b4/0x1760 [ 547.352691] #2: 00000000d22afae0 (rtnl_mutex){+.+.}, at: rtnl_lock+0x17/0x20 [ 547.359975] 1 lock held by khungtaskd/1039: [ 547.364311] #0: 00000000f4971a76 (rcu_read_lock){....}, at: debug_show_all_locks+0x5f/0x27e [ 547.372968] 1 lock held by rsyslogd/7691: [ 547.377092] #0: 00000000ceacacc9 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0xee/0x110 [ 547.385004] 2 locks held by getty/7782: [ 547.388959] #0: 00000000b76db023 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 547.397218] #1: 000000004cb405d0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 547.406148] 2 locks held by getty/7783: [ 547.410102] #0: 000000007538f809 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 547.418447] #1: 00000000ad34874c (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 547.427315] 2 locks held by getty/7784: [ 547.431272] #0: 00000000635ab9d2 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 547.439557] #1: 00000000146fad06 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 547.449014] 2 locks held by getty/7785: [ 547.453037] #0: 00000000975d5a5b (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 547.461422] #1: 00000000533a045e (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 547.470340] 2 locks held by getty/7786: [ 547.474329] #0: 00000000443b2662 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 547.482594] #1: 00000000e292e7b3 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 547.491435] 2 locks held by getty/7787: [ 547.495431] #0: 00000000eff70bfa (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 547.503693] #1: 0000000052c850dd (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 547.512565] 2 locks held by getty/7788: [ 547.516523] #0: 000000005a6cc8b0 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 547.524910] #1: 00000000f82687c4 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 547.533799] 3 locks held by kworker/1:5/9784: [ 547.538273] #0: 0000000026ba125f ((wq_completion)"events"){+.+.}, at: process_one_work+0x87e/0x1760 [ 547.547681] #1: 00000000a36199d0 ((linkwatch_work).work){+.+.}, at: process_one_work+0x8b4/0x1760 [ 547.556856] #2: 00000000d22afae0 (rtnl_mutex){+.+.}, at: rtnl_lock+0x17/0x20 [ 547.564184] 3 locks held by kworker/u4:6/10216: [ 547.568845] #0: 00000000739c5246 (&rq->lock){-.-.}, at: pick_next_task_fair+0x10f3/0x1860 [ 547.577280] #1: 00000000f4971a76 (rcu_read_lock){....}, at: __update_idle_core+0x45/0x3f0 [ 547.585706] #2: 000000004a32c8d8 (&base->lock){-.-.}, at: lock_timer_base+0x56/0x1b0 [ 547.593796] 1 lock held by syz-executor.1/21156: [ 547.598533] #0: 00000000d22afae0 (rtnl_mutex){+.+.}, at: rtnl_lock+0x17/0x20 [ 547.605842] 1 lock held by syz-executor.3/21195: [ 547.610578] #0: 00000000864743f2 (&sb->s_type->i_mutex_key#11){+.+.}, at: __sock_release+0x89/0x250 [ 547.619891] [ 547.621505] ============================================= [ 547.621505] [ 547.628545] NMI backtrace for cpu 0 [ 547.632163] CPU: 0 PID: 1039 Comm: khungtaskd Not tainted 5.0.0-rc4+ #39 [ 547.638981] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 547.648324] Call Trace: [ 547.650908] dump_stack+0x172/0x1f0 [ 547.654531] nmi_cpu_backtrace.cold+0x63/0xa4 [ 547.659053] ? lapic_can_unplug_cpu.cold+0x38/0x38 [ 547.664062] nmi_trigger_cpumask_backtrace+0x1be/0x236 [ 547.669326] arch_trigger_cpumask_backtrace+0x14/0x20 [ 547.674495] watchdog+0x9df/0xee0 [ 547.677940] kthread+0x357/0x430 [ 547.681298] ? reset_hung_task_detector+0x30/0x30 [ 547.686148] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 547.691675] ret_from_fork+0x3a/0x50 [ 547.695436] Sending NMI from CPU 0 to CPUs 1: [ 547.700008] NMI backtrace for cpu 1 skipped: idling at native_safe_halt+0x2/0x10 [ 547.700928] Kernel panic - not syncing: hung_task: blocked tasks [ 547.713717] CPU: 0 PID: 1039 Comm: khungtaskd Not tainted 5.0.0-rc4+ #39 [ 547.720606] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 547.729951] Call Trace: [ 547.732517] dump_stack+0x172/0x1f0 [ 547.736166] panic+0x2cb/0x65c [ 547.739344] ? __warn_printk+0xf3/0xf3 [ 547.743213] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 547.748225] ? printk_safe_flush+0xf2/0x140 [ 547.752529] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 547.758048] ? lapic_can_unplug_cpu.cold+0x38/0x38 [ 547.762956] ? nmi_trigger_cpumask_backtrace+0x1a7/0x236 [ 547.768386] ? nmi_trigger_cpumask_backtrace+0x19e/0x236 [ 547.773817] watchdog+0x9f0/0xee0 [ 547.777259] kthread+0x357/0x430 [ 547.780605] ? reset_hung_task_detector+0x30/0x30 [ 547.785432] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 547.790947] ret_from_fork+0x3a/0x50 [ 547.795736] Kernel Offset: disabled [ 547.799361] Rebooting in 86400 seconds..