, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:49:14 executing program 4: r0 = getpid() socketpair(0x2, 0xa, 0x80, &(0x7f00000000c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x800, 0x7, 0x6, 0x200, 0x0, 0x10000000, 0x20, 0xb, 0x9f, 0x81, 0x80000001, 0x8ed, 0x9ba, 0x7, 0x5, 0x3, 0x3, 0x40, 0x80000000, 0x12000, 0x2, 0xffffffffffffff43, 0x3, 0x0, 0x5, 0x46, 0x4000000000, 0xa955, 0x100, 0x4eb, 0x9, 0x3f, 0x0, 0x39, 0x6, 0x4, 0x0, 0x5, 0x1, @perf_config_ext={0x5, 0x9}, 0x400, 0x7fff, 0x7, 0x7, 0x1000, 0xfffffffffffffffe, 0x53a}, r0, 0x6, r1, 0x1) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:14 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:14 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:14 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdfbc1a00]}, 0x48) 13:49:14 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:14 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='}vboxnet1\x00') 13:49:14 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x1, 0x0) 13:49:14 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:14 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:14 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:14 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x48) 13:49:14 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000340)="72185d10e8fdc1703ddd06720cf47f77b137a527b2e102b3249c201e6279879cae6bcbf0abaa6bd7c71f68ec585679918902c16da47d768fa8e40fae61ccb241bb03c7f69a1c30b131d4e4be598f460429bea22027bf670ab5ee1f33d012b4207868ad5cb24e02e0e6b21ac8155caef9eff28c034825c2f3f913d13062c4242812c7d71b82af371ae42b1aa6b6045f86eac96331d5280fad47fcfff6e0745615fbd7bbff8ff534a1cfc183623d7cd26740678bd8be641624eafaedbc720bc84ab456c139e3a8ff4ea3323bbf31a7d142bb2f72bee006a14127a5d2708e"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='/group.stat\x00') r1 = getpid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0xe4, 0xd72, 0x6, 0x0, 0x0, 0x5a, 0x0, 0x8, 0x3, 0x0, 0x7, 0x80000000, 0x1, 0x4, 0xd59, 0x40, 0x401, 0x3, 0x5, 0x200, 0x1, 0x5, 0x6, 0x0, 0x4, 0x6, 0x9, 0x10000, 0x7fffffff, 0x100, 0x5, 0xff, 0x651, 0xffff, 0xe4f, 0xaf6, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000140), 0x2}, 0x1122, 0x3, 0x100000000, 0x1, 0x4, 0x80000000, 0x10001}, r1, 0xd, r0, 0x8) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000100)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={r0, 0xfffffffffffffced, &(0x7f0000000300)}, 0xffffffc3) 13:49:14 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:14 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x1, 0x0) 13:49:14 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:14 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaf9f190000000000]}, 0x48) 13:49:14 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:14 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x5, 0x80000001, 0x101, 0x4, 0x0, 0x82, 0x8020, 0x1, 0x4, 0x0, 0xfff, 0x624, 0x3f, 0x3, 0x2, 0x1000, 0x2, 0x4, 0x5, 0x9, 0x100, 0x1, 0x10000, 0x200, 0x1000, 0x20, 0xffff, 0x5, 0xcb, 0x9, 0x7, 0x285, 0x6, 0x9, 0x9, 0x200, 0x0, 0x9, 0x2, @perf_config_ext={0x2}, 0x100, 0x0, 0x0, 0x7, 0xfffffffffffffffd, 0x3, 0x64}, r1, 0xf, r0, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='wlan1@}ppp0eth0security!vmnet1/\x00') getpid() socketpair(0xa, 0x4, 0xfe6, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x1) 13:49:14 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:14 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) socket$kcm(0x2, 0x1, 0x0) 13:49:14 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000]}, 0x48) 13:49:14 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup(r0, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:14 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:14 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:14 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:14 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='wlan1@}ppp0eth0security!vmnet1/\x00') 13:49:14 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:14 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5802000000000000]}, 0x48) 13:49:14 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) socket$kcm(0x2, 0x1, 0x0) 13:49:15 executing program 4: r0 = getpid() socketpair(0xb, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x2, 0x8, 0x3, 0x6, 0x0, 0x100, 0x400, 0x4, 0x8, 0x1, 0xe55, 0x70d2, 0x0, 0x9eb, 0x8, 0x6, 0x4, 0x7, 0x4, 0x1, 0xafa2, 0x1, 0xfff, 0x101, 0x4, 0x80000000, 0x9, 0x9b2, 0x3ff, 0x8, 0x56, 0x400, 0x2, 0x5, 0x72, 0x0, 0x0, 0x8, 0x7, @perf_config_ext={0xa75, 0x8}, 0x8, 0xb9f, 0x2, 0x7, 0xffffffffffffffc0, 0x3ff, 0x8}, r0, 0x3, r1, 0x2) mkdirat$cgroup(r2, &(0x7f0000000100)='syz0\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) 13:49:15 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5a00000000000000]}, 0x48) 13:49:15 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:15 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x2) close(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)="776c616e31407d78707030a4cc755b7c055c6529506574683073656375726974") ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000000c0)='wlan1@}ppp0eth0security!vmnet1/\x00') 13:49:15 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:15 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:15 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:15 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}, 0x48) 13:49:15 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) socket$kcm(0x2, 0x1, 0x0) 13:49:15 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:15 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:15 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x100, 0x1, 0x800, 0x4, 0x0, 0x3, 0xc00, 0x2, 0x400, 0x10000, 0x7ff, 0x4, 0x8, 0x0, 0x3, 0x3f, 0x0, 0x5, 0x4e, 0x6, 0x1, 0x1, 0x80000001, 0xffffffff, 0xbfbb, 0x2, 0x9, 0x80, 0x254, 0xffffffff7fffffff, 0xa7, 0x3000000, 0x1ff, 0x6, 0x401, 0x82a5, 0x0, 0x3ff, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x802, 0x400, 0x7d, 0x0, 0x400, 0x3, 0xbc38}, r1, 0xa, r0, 0x8) 13:49:15 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x3e4, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe01, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='wlan1@}ppp0eth0security!vmnet1/\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='wlan1@}ppp0eth0security!vmnet1/\x00') 13:49:15 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x48) 13:49:15 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:15 executing program 5: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socket$kcm(0x2, 0x1, 0x0) 13:49:15 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:15 executing program 3: ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='wlan1@}ppp0eth0security!vmnet1/\x00') socketpair(0xa, 0x4, 0x100000001, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000008cc0)={&(0x7f00000086c0)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000008b40)=[{&(0x7f0000008740)=""/109, 0x6d}, {&(0x7f00000087c0)=""/179, 0xb3}, {&(0x7f0000008880)=""/220, 0xdc}, {&(0x7f0000008980)=""/227, 0xe3}, {&(0x7f0000008a80)=""/168, 0xa8}], 0x5, &(0x7f0000008bc0)=""/222, 0xde, 0x79b}, 0x0) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000008d00)=r1) 13:49:15 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:15 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:15 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce000000]}, 0x48) 13:49:15 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x37) 13:49:15 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:15 executing program 5: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socket$kcm(0x2, 0x1, 0x0) 13:49:15 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:15 executing program 3: r0 = getpid() r1 = perf_event_open(&(0x7f0000000100)={0x7, 0x70, 0x3, 0x1000, 0x81, 0x63b7, 0x0, 0x4d, 0x300, 0x1, 0x9, 0x400, 0x1f, 0xd1f0, 0xfffffffffffffff8, 0x1, 0x7ff, 0x2, 0x986, 0x3ff, 0x1, 0x352c, 0x0, 0x40, 0x8, 0x0, 0x9, 0x1, 0x101, 0x2, 0xffff, 0x81, 0x5, 0x4, 0x4, 0x0, 0x1f, 0x33f1, 0x0, 0x3ff, 0x5, @perf_bp={&(0x7f00000000c0), 0x1}, 0x1000, 0x8, 0x309, 0x5, 0x8, 0xbd44, 0x4}, 0x0, 0xa, 0xffffffffffffff9c, 0x2) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0xc9, 0x2, 0xff, 0x4, 0x0, 0x7, 0x20000, 0x4, 0x0, 0x80, 0x80000000, 0x4, 0x7683, 0x80000001, 0x200, 0xb0, 0x4, 0x3, 0x6, 0x4e6a, 0x8, 0x3, 0x4, 0x9, 0x4567a026, 0x4, 0xca09, 0x3, 0xfffffffffffffff7, 0x1, 0x7, 0xfff, 0x3, 0x8, 0x0, 0x9, 0x0, 0x69033821, 0x1, @perf_config_ext={0x81, 0xfff}, 0x2, 0xff, 0x3, 0x3, 0x81, 0x2, 0x4f2f}, r0, 0x1, r1, 0x0) socketpair(0x1f, 0x80000, 0x9, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000380)={r2, &(0x7f0000000280)="7ddac91dbae40609d7195c48a274a7413d9dfaf4ce55", &(0x7f00000002c0)=""/149}, 0x18) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000080)="80887dd3bbe965b461f0dcbc79e8bbed7b976916650e2776626f") getpid() socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)) 13:49:15 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000]}, 0x48) 13:49:15 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11f]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:15 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa0008000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:15 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:15 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaf9f1900]}, 0x48) 13:49:15 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:15 executing program 5: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socket$kcm(0x2, 0x1, 0x0) 13:49:15 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) socketpair$inet(0x1e, 0x2000000000000004, 0x0, &(0x7f0000000200)={0x0, 0x0}) sendmsg(r1, &(0x7f0000000040)={&(0x7f0000000080)=@llc={0x1e, 0x2, 0x0, 0x0, 0x0, 0x0, @link_local={0x1, 0x80, 0xc2}}, 0x80, &(0x7f0000000640), 0x0, &(0x7f0000000240)}, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='-\'-:\x00') 13:49:15 executing program 3: r0 = perf_event_open$cgroup(&(0x7f00000000c0)={0x7, 0x70, 0x9, 0x2b93, 0x0, 0x8, 0x0, 0x6, 0x10000, 0x0, 0xfffffffffffffffd, 0x7, 0x80000001, 0x8001, 0x6, 0xffffffff, 0x4, 0x18a, 0x0, 0x2800000000, 0x81, 0x80000001, 0x5, 0x7fffffff, 0xff, 0x81, 0x800000, 0x4, 0x64b, 0x88, 0x8, 0x7d, 0x2, 0x0, 0x4, 0x6bd0ee0e, 0x8, 0x1, 0x0, 0xee, 0x4, @perf_bp={&(0x7f0000000000), 0x2}, 0x9, 0x100, 0xffff, 0x7, 0x0, 0x200, 0xc6}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000200)={0x0, 0x70, 0x5, 0x0, 0x3f, 0xd7a, 0x0, 0xffffffffffffff81, 0x8100, 0x8, 0x5, 0x2, 0x6, 0x4, 0x7, 0x0, 0x3, 0x3, 0x8, 0x800000000000, 0xfffffffffffffffc, 0x6, 0x6, 0x3, 0x5, 0x3, 0x1, 0x20, 0x51c6, 0xffffffff, 0x5, 0xffff, 0xf564, 0x4, 0x5, 0x1000, 0x5, 0x6, 0x0, 0x8fe, 0x0, @perf_config_ext={0x1f, 0x6}, 0x88, 0x2, 0x7f, 0x0, 0x7, 0x3, 0x6}) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='wlan1@}ppp0eth0security!vmnet1/\x00') 13:49:15 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:15 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}, 0x48) 13:49:15 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:15 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:15 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:15 executing program 5: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socket$kcm(0x2, 0x1, 0x0) 13:49:15 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='wlan1@}ppp0eth0security!vmnet1/\x00') 13:49:15 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}, 0x48) 13:49:15 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:15 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) openat$cgroup_ro(r0, &(0x7f0000000080)='memory.events\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='rdma.current\x00', 0x0, 0x0) 13:49:15 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:15 executing program 5: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socket$kcm(0x2, 0x1, 0x0) 13:49:15 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x199faf]}, 0x48) 13:49:15 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:15 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:15 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffff9c, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={r0, 0x33a8, 0x18}, 0xc) 13:49:15 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:16 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff8000]}, 0x48) 13:49:16 executing program 5: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socket$kcm(0x2, 0x1, 0x0) 13:49:16 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:16 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:16 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:16 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:16 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000000)) 13:49:16 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}, 0x48) 13:49:16 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x3, 0x70, 0x400000008000, 0xc5a, 0x4, 0x8, 0x0, 0x81, 0x19022, 0xc, 0x7, 0x5, 0x4c62d8ca, 0x5, 0x20, 0x6, 0x1, 0x6cc8, 0x23, 0x101, 0x8, 0x1, 0x2, 0xff, 0x8, 0x2, 0x4, 0x401, 0x6, 0xfff, 0x7, 0x6, 0xff, 0x1c0000000000, 0x593f, 0xfffffffffffffff8, 0x8, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x23, 0x4}, 0xc0, 0x6, 0x2, 0x0, 0x1, 0x0, 0x1000}, r0, 0xa, r0, 0x8) openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.memory_migrate\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:16 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socket$kcm(0x2, 0x1, 0x0) 13:49:16 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:16 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:16 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}, 0x48) 13:49:16 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:16 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socket$kcm(0x2, 0x1, 0x0) 13:49:16 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='wlan1@}ppp0eth0security!vmnet1/\x00') r1 = openat$cgroup(r0, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000040)="7374043000", 0x200002, 0x0) 13:49:16 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:16 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:16 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}, 0x48) 13:49:16 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socket$kcm(0x2, 0x1, 0x0) 13:49:16 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:16 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:16 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_sys\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuset.effective_cpus\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000080)) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000100)={r1}) 13:49:16 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:16 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c00000000000000]}, 0x48) 13:49:16 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socket$kcm(0x2, 0x1, 0x0) 13:49:16 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:16 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='wlan1@}ppp0eth0security!vmnet1/\x00') 13:49:16 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000040)=0x5, 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={r0, 0x2, 0x1, 0x4, &(0x7f0000000080)=[0x0, 0x0], 0x2}, 0x20) 13:49:16 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:16 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800000000000000]}, 0x48) 13:49:16 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:16 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f00000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:16 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socket$kcm(0x2, 0x1, 0x0) 13:49:16 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:16 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='wlan1@}ppp0eth0security!vmnet1/\x00') 13:49:16 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) 13:49:16 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:16 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00]}, 0x48) 13:49:16 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x80000000, 0x1, 0x1337f88b, 0x8, 0x0, 0x4, 0x4, 0x2, 0x7f, 0x4, 0x0, 0x7fff, 0x116, 0xe9, 0x8, 0x80, 0x6, 0x1, 0xc0f6, 0x3, 0x8, 0x7f, 0x100000000, 0xf4, 0x9, 0x1ec0, 0x187, 0x8, 0x4, 0x4571, 0xe2, 0x0, 0x1, 0x8b, 0xe9, 0xfffffffffffff82b, 0x0, 0xffffffffffffff00, 0x6, @perf_config_ext={0x5, 0x4}, 0x10000, 0x44, 0x0, 0x7, 0x3, 0x5, 0x6}, r1, 0x1, r0, 0xa) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000080)='wlan1@}ppp0eth0security!vmnet1/\x00') 13:49:16 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000a0}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:16 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socket$kcm(0x2, 0x1, 0x0) 13:49:16 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:16 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:16 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:16 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00]}, 0x48) 13:49:16 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='wlan1@}ppp0eth0security!vmnet1/\x00') 13:49:16 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:16 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:17 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socket$kcm(0x2, 0x1, 0x0) 13:49:17 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1400000000000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:17 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48]}, 0x48) 13:49:17 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:17 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:17 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='wlan1@}ppp0eth0security!vmnet1/\x00') r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000240)="0000004000fffffffffffffff9000000"}, 0x10) ioctl$TUNSETVNETBE(r1, 0x400454de, &(0x7f0000000000)) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000000c0)) 13:49:17 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socket$kcm(0x2, 0x1, 0x0) 13:49:17 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x5, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001100)={r0, &(0x7f0000000080)='Q', &(0x7f0000000100)}, 0x20) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_type(r1, &(0x7f0000000400)='cgroup.type\x00', 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f00000003c0)='cgroup.stat\x00', 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x16, 0x4, &(0x7f0000000080)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0xfffffffffffffffa}, @alu={0x4, 0x3ff, 0xf, 0x4, 0x5, 0xd4a05019914af86f, 0xffffffffffffffff}], &(0x7f00000000c0)='GPL\x00', 0x400, 0xe7, &(0x7f0000000200)=""/231, 0x41100, 0x1, [], 0x0, 0xf}, 0x48) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000340)={0x0, r2, 0xc, 0x2}, 0x14) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000040)='vmnet0\x00', r2}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) 13:49:17 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:17 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c]}, 0x48) 13:49:17 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:17 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socket$kcm(0x2, 0x1, 0x0) 13:49:17 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}, 0x48) 13:49:17 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:17 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f000000b640)={&(0x7f000000b480)=@xdp={0x0, 0x0, 0x0}, 0x80, &(0x7f000000b540)=[{&(0x7f000000b500)=""/13, 0xd}], 0x1, &(0x7f000000b580)=""/169, 0xa9, 0x2}, 0x100) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001880)={&(0x7f0000001840)='cgroupem0\x00'}, 0x10) sendmsg$kcm(r2, &(0x7f0000002d80)={0x0, 0x0, &(0x7f0000001b40)=[{&(0x7f00000018c0)="b43278ef73b2af243f2f10bbc84e7718dafbe20ce8ae8dba52269f555eb7ad024a702f024371bd2b6e90b2b5e8f15b264fc8f37fb9c074c778a61538ca0ffb5e9532b30883b4f9d250d3f667940ae5bff05d1417edb8cb192ddeee0992dd169657f623671d636cbad324dc6a6d8a48619f6b123f869a974082ac49416a603975882a73deba6e0fa3a136cc47a4eb60fa998c60a9aa2871034fcc6b690fe76cb2b63a6e5f2c93d53d20aa71b36a7c733789b99dabf3fdcd30ef91c682ad1451f857a5942690048717fe332d9481edcc72ca0ac6f3c8b9074fe78b4477365809cad544b85c60f51c0b9fa767ecdc3ccd0d", 0xf0}, {&(0x7f00000019c0)="6f384792f8f78f65f3df47759848c13bb6fdd72b261c1d6de1f4c2a3b1407ff69763a37614627789677516aae6b5ca5e0144c7aefe57118c", 0x38}, {&(0x7f0000001a00)="15ae98684440cd47912cd6e6977168c3e52e2bb8ee5d8a464944945f1cfef88b307ba2a1a2d4a6e107c1a0ef60736c3f8f6c925c606deef775689c", 0x3b}, {&(0x7f0000001a40)="2bd6a576e3946136a44f706ca3414e1e761d56be842258ad225e192950e0c4ee2296670e80667e5109dbfd6a1a5a035a1644ae0e212a4c5230c05a94f484d00d545fc84f715e4feb796ef26d60b664dce1a963d7b2ba7fb8aabf9efd4d7258468d8d977afddaffd26c57463e91c37c31043b616a0a563264f15a2542f8ee99b91925ef66be463ea9be5238bc0ac05e82d4710d86d3dc7ad5777fc3ae0d1fd7db4e76b0fa1a4fad8bc6ea20a911a7bac59ff9ae21878b7507a3ba6f2b93d3cc7abf6e64f50c56d9f454c1c679da7c09413ca1548966645edc6fa081ee8ea769a855e83da3a407e8a458ad59fa1839224c5785af79246b56d41a", 0xf9}], 0x4, &(0x7f0000001b80)=[{0xa0, 0x108, 0x0, "06856d57437ad7a60223efdc9880355c23e5dfd165a793e129cfafded12c05481aaa7121a1a218da9d17586b035b607709dffbb004125eb163ecaad6517dd9b9f3e01baa6648ae13600db2affb5ef2a56607b6460fe08b55da1b8989b84b16ee201459ebcaea4639958ef40490cef7f8b372622a464b12b54e3464b2fd4bdf4dcb04efbfc49a054eb3fb3e6525"}, {0x30, 0x0, 0x8, "7ecc9147e108f387db8af90b6533732373c07b3e0f69a2d123c54c13a7"}, {0x100, 0x102, 0x2, "f2337a9ceefa5680cd96832833e3bb57be36a5bdffd72b1eadb021bb96e51bb1a8297d9056745c974ca7e714e68637cf9b342fb33cedc8245b558584203457902d4b47532a64ea4d6b7e6790a7195d6a86e645df74bc4fcc59874186a55a357c2ad395e4f58c2a1f9ead38c0b80f67204794123474d398cface8eb5d6ffc3457638f8bdb1aab82d056e51a1f52524c1e43900d464c504189995ebd17af1607dd86a1d4d53ac83e5a96804d2f97283900a60f0a9b1078c27c4ae4139619597c179af7dd775e31c46c0543b52c0f518e7af7ac5a01771757207f1f2ff9d2840992c4edd2a736225d76e80a8bde82f6"}, {0x1010, 0x109, 0x5, "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"}], 0x11e0, 0x4000}, 0x40004) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1b, 0xfffffffffffffe98, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x3a}], &(0x7f0000000040)='GPL\x00', 0x20, 0x1000, &(0x7f0000000200)=""/4096, 0x41f00, 0x1, [], r1, 0x3}, 0x48) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='wlan1@}ppp0eth0security!vmnet1/\x00') getpid() bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r2, 0x28, &(0x7f00000000c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={r3, 0x5, 0x10}, 0xc) 13:49:17 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:17 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f01000000000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:17 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:17 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='/group.stat\x00', 0xffffffffffffff9c}, 0x10) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000280)="637075616363742e75736167655f70659187b8168196699348", 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup(r1, &(0x7f0000000040)='syz0\x00', 0x1ff) openat$cgroup_type(r0, &(0x7f0000000080)='cgroup.type\x00', 0x2, 0x0) 13:49:17 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x48) 13:49:17 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socket$kcm(0x2, 0x1, 0x0) 13:49:17 executing program 4: socketpair(0x0, 0x3, 0x100000001, &(0x7f0000000040)={0xffffffffffffffff}) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mem_exclusive\x00', 0x2, 0x0) recvmsg$kcm(r0, &(0x7f0000004a40)={&(0x7f0000004840)=@hci={0x0, 0x0}, 0x80, &(0x7f0000004a00)=[{&(0x7f00000048c0)=""/185, 0xb9}, {&(0x7f0000004980)=""/117, 0x75}], 0x2, 0x0, 0x0, 0x80}, 0x2003) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000004a80)=r1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000100)={'yam0\x00', 0x200}) 13:49:17 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:17 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:17 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='wlan1@}ppp0eth0security!vmnet1/\x00') 13:49:17 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:17 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:17 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000]}, 0x48) 13:49:17 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socket$kcm(0x2, 0x1, 0x0) 13:49:17 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:17 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:17 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.swap.current\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000080)='io.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:17 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='wlan1@}ppp0eth0security!vmnet1/\x00') 13:49:17 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:17 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000]}, 0x48) 13:49:17 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socket$kcm(0x2, 0x1, 0x0) 13:49:17 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:17 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:17 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r1, &(0x7f0000000080)="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", &(0x7f0000000200)=""/88}, 0x18) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffffb, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:17 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:17 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='wlan1@}ppp0eth0security!vmnet1/\x00') 13:49:17 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000]}, 0x48) 13:49:17 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socket$kcm(0x2, 0x1, 0x0) 13:49:17 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:17 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:17 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18020000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:18 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:18 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000]}, 0x48) 13:49:18 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='wlan1@}ppp0eth0security!vmnet1/\x00') perf_event_open$cgroup(&(0x7f00000000c0)={0x5, 0x70, 0x7, 0x8, 0x100000001, 0x5, 0x0, 0x1000, 0x4, 0xc, 0xffffffffffffff00, 0x7, 0x8, 0x6, 0xfffffffffffffffa, 0x80000001, 0x6, 0x8, 0x1, 0x5, 0x6, 0x8f, 0x1000, 0x7, 0x100, 0x4, 0x800, 0x40, 0x0, 0x5, 0x4, 0x9, 0x3, 0x7, 0x9f0d, 0x2, 0x3, 0x6, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000000), 0x2}, 0x22, 0x8, 0x4, 0x4, 0x8, 0x3, 0x1f}, r0, 0x6, r0, 0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x28, &(0x7f0000000040)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={r1, 0x9, 0x18}, 0xc) 13:49:18 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socket$kcm(0x2, 0x1, 0x0) 13:49:18 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) close(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000000c0)='*trustedtrusted^system*\'trusted\x00') socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000100)=0xc0f4, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000080)={r1}) recvmsg$kcm(r0, &(0x7f000000b2c0)={&(0x7f000000b0c0)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f000000b1c0)=[{&(0x7f000000b140)=""/127, 0x7f}], 0x1, &(0x7f000000b200)=""/179, 0xb3, 0x101}, 0x20) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000200)) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f000000b300)=r2) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000140)) 13:49:18 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:18 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:18 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000]}, 0x48) 13:49:18 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:18 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socket$kcm(0x2, 0x1, 0x0) 13:49:18 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:18 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83d, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x8001, 0x40, 0x80, 0x101, 0x0, 0x80000001, 0x80000, 0x8, 0xff, 0x0, 0x5, 0xffffffffffff4b0c, 0x7f, 0x8001, 0xfffffffffffffc01, 0x3, 0x40000000, 0x640, 0x8, 0x5b, 0x3f, 0x1, 0x2, 0x0, 0x2, 0x5, 0x3ff, 0xffffffffffff70fc, 0xffffffffffffff1e, 0x0, 0x9, 0xcde, 0x1, 0x9, 0x5, 0x1, 0x0, 0x10000, 0x1, @perf_bp={&(0x7f0000000000), 0x2}, 0x1, 0x3, 0x0, 0x5, 0x5, 0x7d}, r1, 0x5, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='wlan1@}ppp0eth0security!vmnet1/\x00') 13:49:18 executing program 4: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='/group.stat\x00'}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r1) perf_event_open$cgroup(&(0x7f0000000040)={0x7, 0x70, 0xe7, 0x9, 0x7, 0xfff, 0x0, 0x0, 0x880, 0x1, 0x2, 0x400000000000000, 0x3, 0x80000000, 0x5, 0x10001, 0x8000000000000000, 0xab, 0xfffffffffffff800, 0x6, 0x3, 0x7, 0x4, 0x2, 0x2, 0xff, 0x5, 0x7, 0x4, 0x1f, 0x3f, 0x3, 0x7fffffff, 0x8, 0x9, 0x2, 0x7, 0x79, 0x0, 0x8, 0x6, @perf_config_ext={0x10001, 0x5}, 0x0, 0x1, 0x1, 0x7, 0x3, 0x5aa800000, 0x62b7}, r0, 0x8, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:18 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000]}, 0x48) 13:49:18 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:18 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:18 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='wlan1@}ppp0eth0security!vmnet1/\x00') 13:49:18 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socket$kcm(0x2, 0x1, 0x0) 13:49:18 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:18 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:18 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:18 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c00]}, 0x48) 13:49:18 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:18 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.swap.current\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:18 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x0, &(0x7f0000346fc8)=ANY=[@ANYBLOB], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socket$kcm(0x2, 0x1, 0x0) 13:49:18 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:18 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='wlan1@}ppp0eth0security!vmnet1/\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='wlan1@}ppp0eth0security!vmnet1/\x00') 13:49:18 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a00]}, 0x48) 13:49:18 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000003980)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008004000bf130000000000008500000040000000b7000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x9}, 0x48) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:18 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:18 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:18 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:18 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x0, &(0x7f0000346fc8)=ANY=[@ANYBLOB], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socket$kcm(0x2, 0x1, 0x0) 13:49:18 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x4, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='wlan1@}ppp0eth0security!vmnet1/\x00') 13:49:18 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5a]}, 0x48) 13:49:18 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:18 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:18 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:18 executing program 4: r0 = getpid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x3ff, 0x9, 0x7f, 0x1, 0x0, 0x0, 0x50, 0xb, 0xba7, 0xff, 0x101, 0x2, 0x80000000, 0x9d6, 0x8000, 0x4, 0x5ebabfda, 0x9, 0x1f, 0x7, 0x80000001, 0x9, 0x3, 0x1dd3b2ce, 0x7, 0x0, 0xd8, 0x7, 0x8000, 0x0, 0x3, 0x2, 0x7ff, 0x6, 0x30000000000, 0x7a6, 0x0, 0x2, 0x2, @perf_config_ext={0x7, 0x5}, 0x20000, 0x71a, 0x10000, 0x7, 0xffffffffffffff51, 0x9, 0xffffffffffffffa8}, r0, 0x5, r1, 0x1) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:18 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x0, &(0x7f0000346fc8)=ANY=[@ANYBLOB], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socket$kcm(0x2, 0x1, 0x0) 13:49:18 executing program 3: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2=0xe0000002}}}, 0x80, &(0x7f0000002bc0), 0x0, &(0x7f0000000640)}, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000040)=[{0x18, 0x0, 0x7, '\a\a'}], 0x18}, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000140)='wlan1@}ppp0eth0security!vmnet1/\x00'}, 0x10) openat$cgroup_ro(r2, &(0x7f00000002c0)='cpuacct.usage_all\x00', 0x0, 0x0) r3 = getpid() perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x1, 0x3, 0x9bac, 0x3, 0x0, 0x83a6f8b, 0x4, 0x4, 0x7, 0x3, 0x100000000, 0x7, 0x4, 0x1, 0x1, 0x6, 0x1, 0x0, 0x20, 0x1, 0x2, 0x0, 0x4, 0x0, 0x1, 0xffffffff7fffffff, 0x8000000100000, 0x0, 0x7, 0xfffffffffffffffc, 0x400, 0xfffffffffffffffe, 0xfffffffffffffffd, 0x1f, 0x8, 0x694, 0x0, 0xfffffffffffffffd, 0x7, @perf_bp={&(0x7f0000000000), 0x1}, 0x400, 0x40, 0x3f, 0x5, 0x4, 0x4, 0x4}, r3, 0x10, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='wlan1@}ppp0eth0security!vmnet1/\x00') 13:49:18 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a]}, 0x48) 13:49:18 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:18 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:18 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:18 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:18 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:18 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x1, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socket$kcm(0x2, 0x1, 0x0) 13:49:18 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}, 0x48) 13:49:18 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='wlan1@}ppp0eth0security!vmnet1/\x00') r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000140)='\\\x00'}, 0x10) ioctl$TUNGETSNDBUF(r1, 0x800454d3, &(0x7f00000000c0)) openat$cgroup(r1, &(0x7f0000000000)="000100", 0x200002, 0x0) 13:49:19 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:19 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}, 0x48) 13:49:19 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:19 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:19 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x1, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socket$kcm(0x2, 0x1, 0x0) 13:49:19 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:19 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x200000047) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='wlan1@}ppp0eth0security!vmnet1/\x00') socketpair(0x16, 0x6, 0x3, &(0x7f0000000000)={0xffffffffffffffff}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000040)="5071b5448d4cbea1d98acdca11ab2a8db3bdc2360f4522224ceecd725f941d550ba5a16e3ede82e66805c5891449efb1f867", &(0x7f00000000c0)=""/69}, 0x18) 13:49:19 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}, 0x48) 13:49:19 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x6, 0x4d, 0x2e4, 0x20, 0x0, 0x8, 0x2, 0x2, 0x3ff, 0xffff, 0x4, 0x10000000000, 0x3, 0x1, 0x9, 0xff, 0xcd3, 0x7, 0x0, 0xff01, 0x7fff, 0x7f, 0x2d, 0xbf, 0x2, 0x5, 0x8, 0x8, 0x9, 0x9, 0xad, 0xfffffffffffffffc, 0x8, 0x9, 0x9, 0x8, 0x0, 0xfffffffffffffbff, 0x2, @perf_config_ext={0x800, 0x3}, 0x2000, 0x8, 0x162f, 0x0, 0x101, 0x9, 0x5}, r1, 0x3, r0, 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:19 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:19 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x1, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socket$kcm(0x2, 0x1, 0x0) 13:49:19 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:19 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:19 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce00000000000000]}, 0x48) 13:49:19 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:19 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x2, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socket$kcm(0x2, 0x1, 0x0) 13:49:19 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:19 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x1, 0x5, 0x5, 0xffff, 0x0, 0x3, 0x10, 0x1, 0x4, 0x25a1, 0xa9, 0x4, 0x3, 0x5, 0x100000000, 0xffffffffffff8001, 0x400, 0xb1, 0x4, 0x59, 0x81, 0x1c, 0x9, 0xd34, 0x8, 0x0, 0x6, 0x3, 0x2, 0x2, 0x7, 0x8, 0x0, 0xc0f, 0x3, 0x9, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x20, 0x2, 0x8, 0x7, 0x8000, 0x8, 0x4}, r1, 0x6, r0, 0x1) getpid() r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f0000000240)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) socketpair(0x9, 0x7, 0xb73, &(0x7f0000000040)={0xffffffffffffffff}) write$cgroup_pid(r3, &(0x7f0000000140)=r1, 0x12) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='wlan1@}ppp0eth0security!vmnet1/\x00') 13:49:19 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:19 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe4ffffff]}, 0x48) 13:49:19 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:19 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0xfffffffffffffffe, 0x0, 0x8, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x209, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4110, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x0, 0xfffffffffffffffc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)={r0}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x81) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)="2e0010677209002e5f73797a0100", 0x200002, 0x0) perf_event_open$cgroup(&(0x7f00000000c0)={0x7, 0x70, 0x3, 0x80000000, 0x10000, 0x80000001, 0x0, 0x2, 0x400, 0x0, 0x1ff, 0x10000, 0x8, 0x3, 0x65, 0x0, 0x3ff, 0x2, 0x8000, 0x10000, 0xfff, 0xff, 0x7, 0x4, 0x0, 0x1, 0xffff, 0x16, 0x0, 0x6, 0x3f, 0xfffffffffffffffd, 0x6, 0xfffffffffffff800, 0x8, 0x3, 0x1f, 0x5, 0x0, 0x7, 0x4, @perf_config_ext={0x401, 0x8001}, 0x8600, 0x3f, 0x6, 0x7, 0x23, 0x8, 0x6a}, r0, 0xb, r0, 0x8) 13:49:19 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff8000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:19 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x58020000]}, 0x48) 13:49:19 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x2, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socket$kcm(0x2, 0x1, 0x0) 13:49:19 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000080)) openat$cgroup_ro(r0, &(0x7f0000000040)="656eb580", 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:19 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:19 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:19 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0xa86, 0x8001, 0x9, 0x74, 0x0, 0x0, 0x1800, 0xd, 0x0, 0x66, 0x200, 0x80000000, 0x6, 0xcd8000, 0xffffffffffff0001, 0x80, 0xe5f, 0x7, 0xfffffffffffffff9, 0x0, 0x800, 0x9, 0x13, 0x1000, 0x8, 0x6, 0x7f, 0xdc, 0x101, 0x200, 0xb6, 0x4, 0x1, 0xfffffffffffffffa, 0xffffffffffff0001, 0x2, 0x0, 0x81, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x121, 0x8, 0xf4d3, 0x5, 0x7f, 0x222f}, r1, 0xa, r0, 0x1) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='wlan1@}ppp0eth0security!vmnet1/\x00') socketpair(0x14, 0x3, 0xc8, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f0000000040)) 13:49:19 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:19 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300]}, 0x48) 13:49:19 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:19 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x2, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socket$kcm(0x2, 0x1, 0x0) 13:49:19 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:19 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf]}, 0x48) 13:49:19 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x1) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x1) 13:49:19 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:19 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:19 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x7, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9c7, 0x0, 0x0, 0x0, 0x31800000}, [@call={0x85, 0x0, 0x0, 0x15}, @alu={0x0, 0x2, 0x0, 0x5, 0xa, 0x54, 0x1}], {0x95}}, &(0x7f0000000100)='syzkaller\x00', 0x5, 0x29, &(0x7f0000000140)=""/41, 0x41100, 0x1}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='))bdev*\x00', r0}, 0x10) socketpair(0x0, 0x80000, 0x800, &(0x7f00000002c0)) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x5e, 0x3e4, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='wlan1@}ppp0eth0security!vmnet1/\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000000)='))bdev*\x00') 13:49:19 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x2, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socket$kcm(0x2, 0x1, 0x0) 13:49:19 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1abcdf]}, 0x48) 13:49:19 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:19 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:19 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:19 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdfbc1a0000000000]}, 0x48) 13:49:19 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuset.effective_mems\x00', 0x2761, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x14000000000) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0xc000000000000000, 0x0, 0x3, 0xffffffffffffffe0}, {0x6, 0x4d, 0xfff, 0xffffffff}, {0x400, 0x6, 0x4, 0x7fff}]}) 13:49:19 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:19 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x2, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socket$kcm(0x2, 0x1, 0x0) 13:49:20 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='\'\\em0keyring\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='wlan1@}ppp0eth0security!vmnet1/\x00') r1 = getpid() perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x8, 0xe42, 0x40, 0x10000, 0x0, 0x2, 0x8, 0x8, 0x800, 0x8, 0xffffffffffffff60, 0x7fffffff, 0x7, 0x6, 0x2, 0x7fff, 0x7fff, 0x8, 0x1, 0xff, 0x80000001, 0x8, 0x2, 0x101, 0x2, 0xfff, 0x4, 0x0, 0x3, 0x6, 0x1, 0x100000001, 0x4, 0x9, 0x3, 0x0, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x12, 0x9, 0x5, 0x0, 0x81, 0x2, 0x3}, r1, 0x2, r0, 0xb) 13:49:20 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:20 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0008000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:20 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x258]}, 0x48) 13:49:20 executing program 4: perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xf, 0xffffffff, 0x3, 0x4ea, 0x0, 0xffffffffffffffff, 0x8}, 0x2c) 13:49:20 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:20 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:20 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x2, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socket$kcm(0x2, 0x1, 0x0) 13:49:20 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100000000000}, 0x0, 0x1, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='wlan1@}ppp0eth0security!vmnet1/\x00') 13:49:20 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:20 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x48) 13:49:20 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:20 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)="637e75616363742e736167655fe16c6c0000", 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:20 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4002000000000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:20 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x2, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea0000000000000000000095000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socket$kcm(0x2, 0x1, 0x0) 13:49:20 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:20 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000]}, 0x48) 13:49:20 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x401) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='wlan1@}ppp0eth0security!vmnet1/\x00') 13:49:20 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:20 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff00000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:20 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0xfffffffffffffdf6, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:49:20 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)="2f67726f75702e737461740035768736b0fd26e80ee94d332e572710b9dbdd8f56eabb4b7991287465f47943ef7d83d290233829240bd93c96584022007a9949bd9f097bd0ecc1576ad8b0cb1e9ea00330e2", 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:20 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:20 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x2, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea0000000000000000000095000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socket$kcm(0x2, 0x1, 0x0) 13:49:20 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000]}, 0x48) 13:49:20 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:20 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:20 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce00]}, 0x48) 13:49:20 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000000c0)="776c81aa467bc7126b5d39918664cabc9532c445057c3496f2845b9de4552250a083525c63b00cbdc3de810f39668e729bbaadd7cd983eb5a0f6951961768a258d6b21902108ffecc7892653c7c1db610f4b7888b69ba679c3a7a91c9a842b530825a2516f4245fa12b32968af3747f895a1fe3bcc3a61758dc65bb64fae99ebcd60e3833be3") 13:49:20 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1802]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:20 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:20 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_user\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x200002, 0x0) socketpair(0x3, 0x2, 0x8, &(0x7f0000000100)={0xffffffffffffffff}) openat$cgroup_ro(r0, &(0x7f0000000200)="2f03000000000000006174006940cca7abd7b369b4e4078aaa6b2785ff6876977fb646a70f4649ae4bb4d4dffe170763b534991fe887f1e71e7eadeadbe02cbab92f9734948b5ba4fb72614b51f622b72179d108e88db2d03ae1e7a54326c0e4215721513e445512c1217f44d9c3cc6e4dc22a57dbfdc90bde24c68d79020d53752825de1d026c18f35f811ecd2f63bf", 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:20 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x2, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea0000000000000000000095000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socket$kcm(0x2, 0x1, 0x0) 13:49:20 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:20 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:20 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3, 0xfffffffffffffe00, 0x9, 0x3, 0x0, 0x6, 0x19, 0x7, 0x2d, 0x6, 0x80000000, 0x3, 0x7, 0x5, 0x0, 0x7, 0x100, 0x0, 0xf0, 0x2, 0x10000, 0xfffffffffffffffc, 0x5, 0x7f, 0x80000000, 0x7dd, 0x6, 0x2, 0x100, 0x9, 0x7, 0xfff, 0x17, 0x1ff, 0x9, 0x6, 0x0, 0xf6e, 0x4, @perf_config_ext={0x8, 0x2}, 0x800, 0xfffffffffffffffb, 0x1, 0x5, 0x1, 0x3, 0x3}, r1, 0x10, r0, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='.]\x00') r2 = getpid() ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='selinuxselinuxlo\x00') perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x1f, 0x1, 0xc94, 0x0, 0x0, 0x100000001, 0x200, 0x4, 0x52b5, 0x5048, 0x7724, 0x3, 0x8, 0x7, 0x0, 0x1, 0x4, 0xffffffffffffffaa, 0x6, 0x7ff, 0x6, 0x3, 0x10001, 0x1f, 0x5, 0x8, 0x10000, 0x7f, 0x40, 0x9, 0x0, 0x0, 0x3, 0x7, 0x0, 0x8, 0x0, 0x7d, 0x1, @perf_bp={&(0x7f0000000000), 0xa}, 0x2000, 0x7, 0xff, 0x0, 0x3, 0x9, 0x4}, r2, 0x0, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='wlan1@}ppp0eth0security!vmnet1/\x00') 13:49:20 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socket$kcm(0x2, 0x1, 0x0) 13:49:20 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68]}, 0x48) 13:49:20 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:20 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:20 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:20 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:20 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:20 executing program 3: socketpair(0x1, 0x6, 0xf8d8, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000000c0)=""/117, 0x75}, {&(0x7f0000000200)=""/230, 0xe6}, {&(0x7f0000000300)=""/199, 0xc7}, {&(0x7f0000000040)=""/54, 0x36}, {&(0x7f0000000140)=""/64, 0x40}, {&(0x7f0000000400)=""/9, 0x9}, {&(0x7f0000000440)=""/103, 0x67}], 0x7, &(0x7f0000000540)=""/168, 0xa8, 0x80}, 0x1) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='wlan1@}ppp0eth0security!vmnet1/\x00') 13:49:20 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socket$kcm(0x2, 0x1, 0x0) 13:49:20 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffe4]}, 0x48) 13:49:20 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:20 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:20 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:20 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:21 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socket$kcm(0x2, 0x1, 0x0) 13:49:21 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.swap.current\x00', 0x2761, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r0, &(0x7f00000000c0)="f64b783512fa2003f857593b5e9171c6d44fb18a70b4b3bfde6b24844a7234a97af2718d798da60f155dd7f1512d41e32d9e28dcad5084c4b5deaa87a38e2f2819dffa2e1f4c68603beac2a03d2fe6cf960ffd21db64989fedb492557251e5032c178ce446b89633c00a2f5f38fc598aa14b380732b2f1eef7b59bccbe395257181d6fc9a26772e47c8542941f67c92d34f04fe5"}, 0x10) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:21 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffff00000000]}, 0x48) 13:49:21 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='wlan1@}ppp0eth0security!vmnet1/\x00') r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = gettid() perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x9, 0x9, 0x7, 0xd81, 0x0, 0x3, 0x1016, 0x1, 0x10000, 0x40, 0xff, 0x28c5, 0x1, 0x9, 0xfffffffffffffff8, 0x4, 0x10001, 0xffffffffffffff00, 0xfffffffffffffff8, 0x6, 0x100000000, 0x83b, 0x565a, 0x7f, 0x6, 0x1f, 0x731c, 0x3, 0x9, 0x3, 0x9, 0x3ff, 0x81, 0x0, 0x771542c8, 0x5, 0x0, 0x3f, 0x2, @perf_config_ext={0x0, 0x10000}, 0x0, 0xfc, 0x1, 0x7, 0x6, 0x3, 0x7fff}, r2, 0x2, 0xffffffffffffffff, 0x2) 13:49:21 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:21 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:21 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40020000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:21 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:21 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) socket$kcm(0x2, 0x1, 0x0) 13:49:21 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}, 0x48) 13:49:21 executing program 4: r0 = gettid() socketpair(0x11, 0x80000, 0xff, &(0x7f00000000c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x7e, 0x100000001, 0x2, 0x8, 0x0, 0x868d, 0x80000, 0x4, 0x7bbbda33, 0x2, 0x859, 0x5, 0x401, 0xea67, 0xad, 0x81, 0x7, 0xfffffffffffffffb, 0x6, 0x5, 0x7, 0x3f, 0x8000, 0x1000, 0x1, 0x7, 0xf4e, 0x6f40, 0x1, 0x2, 0x7f, 0x1f, 0x2, 0x1, 0x1, 0x101, 0x0, 0x0, 0x2, @perf_config_ext={0x4, 0x100000001}, 0x100, 0x0, 0xb38, 0x7, 0x10001, 0x6, 0x2}, r0, 0x2, r1, 0x3) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:21 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='bdev.}*\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='wlan1@}ppp0eth0security!vmnet1/\x00') 13:49:21 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:21 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffff]}, 0x48) 13:49:21 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:21 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) socket$kcm(0x2, 0x1, 0x0) 13:49:21 executing program 4: socketpair(0xa, 0x0, 0x3, &(0x7f0000004580)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='/group.stat\x00', 0x2761, 0x0) recvmsg(r1, &(0x7f0000004540)={&(0x7f0000000200)=@sco, 0x80, &(0x7f0000004480)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/248, 0xf8}, {&(0x7f0000000140)=""/36, 0x24}, {&(0x7f0000001380)=""/4096, 0x1000}, {&(0x7f0000002380)=""/4096, 0x1000}, {&(0x7f0000003380)=""/253, 0xfd}, {&(0x7f0000003480)=""/4096, 0x1000}], 0x7, &(0x7f0000004500)=""/62, 0x3e, 0x18838288}, 0x20) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r2) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) 13:49:21 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:21 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='wlan1@}ppp0eth0security!vmnet1/\x00') r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f00000000c0)={0x7, 0x70, 0x7, 0x7, 0x200, 0x2, 0x0, 0x1000, 0x8000, 0xa, 0x155, 0x4, 0x9, 0x62, 0x8, 0x4, 0x5, 0x7, 0x4, 0x4, 0xffff, 0x4, 0x2, 0x1f, 0x1, 0xffffffff, 0xffffffff80000001, 0x1, 0xd5, 0x1, 0x6, 0x885, 0x7fff, 0x1ff, 0x80, 0x4, 0x1, 0xad, 0x0, 0x800, 0x4, @perf_bp, 0x40, 0x7b6f, 0x2, 0x7, 0x4, 0xff, 0xffffffffffffffff}, r1, 0xc, r0, 0x8) 13:49:21 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:21 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000]}, 0x48) 13:49:21 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:21 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:21 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:21 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) socket$kcm(0x2, 0x1, 0x0) 13:49:21 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:21 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='wlan1@}ppp0eth0security!vmnet1/\x00') 13:49:21 executing program 4: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='cpusetvmnet1GPLem0,\x00'}, 0x10) r1 = openat$cgroup_ro(r0, &(0x7f0000000140)='cgroup.controllers\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000000c0)="24ea766d6e657430252f5b7472757374656400") bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000100)='systembdeve!+vmnet0]lo!\\trusted\x00', r0}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.current\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f00000002c0)="2f67726f75702e73746174008e2468bb48e37aacabc7c44c1bc4945b2e669ece3dad29d3019d13091d4f934b37e3fc2bb304ccf43ff15f447d419bed075ddf659eedc02e04fa1fc82d94980c9301d5c46435143383b95ec240c39920d81e99b4295825fe6891f755d6d93fb5f74f3ea4a7fdffef4a0d5ccf7f5241be30b16d6040bb4aa50bbc", 0x2761, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='pids.current\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:21 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x48) 13:49:21 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:21 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x1, 0x0) 13:49:21 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a00000000000000]}, 0x48) 13:49:21 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe80000000000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:21 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:21 executing program 3: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='wlan1@}ppp0eth0security!vmnet1/\x00'}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.stat\x00', 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000100)=r1) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000080)='wlan1@}ppp0eth0security!vmnet1/\x00') 13:49:21 executing program 4: r0 = getpid() r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='/group.stat\x00'}, 0x10) ioctl$TUNSETSNDBUF(r1, 0x400454d4, &(0x7f0000000200)=0x3) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x7, 0x6, 0xfff, 0xfffffffffffffff8, 0x0, 0x5, 0x501, 0x8, 0x9, 0x8, 0xfffffffffffffffd, 0x8, 0x6, 0x1f, 0x5, 0x1, 0x7f, 0x5, 0xfffffffffffffffb, 0x6, 0x80000000, 0x2, 0x4, 0x8, 0x5, 0x9, 0x5, 0x20, 0x100000001, 0x0, 0x2, 0x6, 0x40, 0x8000, 0x200, 0x8, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000040), 0x8}, 0x40, 0x8, 0x1, 0x3, 0x5, 0x1000, 0x4}, r0, 0x5, r1, 0x30961f3af3b69955) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:21 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:21 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:21 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x1, 0x0) 13:49:21 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000]}, 0x48) 13:49:21 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa0008000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:21 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:21 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x1, 0x7, 0x0, 0x1000, 0x0, 0x100000001, 0x880, 0x5, 0x9, 0x0, 0x7f, 0x9, 0x8, 0x4, 0x6, 0x6806, 0x10001, 0x9, 0x8, 0xe5, 0xfff, 0x2, 0x9, 0x20, 0x100000001, 0x5, 0xdd, 0x5, 0x0, 0x100000000, 0x10001, 0x9, 0x7ce887dc, 0x2, 0x4, 0x8, 0x0, 0x6, 0x4, @perf_bp={&(0x7f00000000c0), 0x3}, 0x1000, 0xffffffffffffff00, 0x1, 0x2, 0x20, 0x600, 0x94}, r1, 0xf, r0, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)="776c616e31407d7070703085746844736563757269747921766d6e6574312f00") perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x8, 0x6, 0x9, 0x6, 0x0, 0xc6, 0x800, 0x6, 0x2, 0x7fffffff, 0x7, 0x8, 0x1, 0x0, 0x3, 0x9, 0x6, 0x5, 0x3, 0x400, 0x4, 0x75, 0xffffffff, 0x10000, 0x2, 0x7, 0x51, 0x4, 0x9, 0x1dd2, 0x1218, 0x528, 0x8, 0x4, 0x1ff, 0xfc00000000000000, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000240), 0x8}, 0x10800, 0xf00, 0x2, 0x4, 0x8001, 0x8000, 0x7}, r1, 0x2, r0, 0x3) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) write$cgroup_subtree(r3, &(0x7f0000000340)={[{0x2b, 'pids', 0x20}]}, 0x6) r4 = gettid() ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000200)="776c616e31407d7070703085746844736563757269747921766d6e6574312f00") ioctl$TUNSETSNDBUF(r3, 0x400454d4, &(0x7f0000000380)=0x1) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x410, 0x8, 0xfffffffffffffffe, 0x2, 0x0, 0x8, 0x10880, 0x3, 0x1ff, 0x4, 0x1f, 0x8, 0xaf7, 0x6, 0x3, 0x6, 0xf3, 0xfffffffffffffff9, 0x33, 0x3ff, 0x80000001, 0x7, 0x5, 0x100000001, 0x100000000, 0xff, 0x4, 0x8, 0x8, 0xfe, 0x3ff, 0x8, 0x800, 0x8, 0x1, 0xffffffffffffffc0, 0x0, 0x6, 0x1, @perf_config_ext={0x1, 0x7}, 0x420, 0x200, 0xd80, 0x2, 0x6, 0x5, 0x7ff}, r4, 0xb, r0, 0x0) 13:49:21 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) socket$kcm(0x2, 0x1, 0x0) 13:49:21 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:21 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800000000000000]}, 0x48) 13:49:21 executing program 4: socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f00000000c0)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:21 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:22 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c000000]}, 0x48) 13:49:22 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:22 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:22 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socket$kcm(0x2, 0x0, 0x0) 13:49:22 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:22 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:22 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='wlan1@}ppp0eth0security!vmnet1/\x00') r1 = getpid() perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x2, 0x8, 0x26f5, 0x3f, 0x0, 0x6, 0x90000, 0x2, 0xf77, 0x7, 0x200, 0x80000001, 0x10001, 0x6, 0xdadc, 0x100000000, 0x5098, 0x0, 0x6, 0x6, 0x19a, 0x3, 0x1880000000000000, 0x74, 0x401, 0x2, 0x4, 0x6, 0x2, 0xffffffffffff8001, 0x8, 0x9, 0x3, 0x7fffffff, 0x4, 0x5, 0x0, 0x4, 0x1, @perf_config_ext={0x80000001, 0x1}, 0x10000, 0x81, 0x2, 0x4, 0x3, 0x4, 0x2}, r1, 0x4, r0, 0xa) 13:49:22 executing program 4: socketpair(0x10, 0x4, 0x7, &(0x7f0000000080)) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:22 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000]}, 0x48) 13:49:22 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000a0}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:22 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='ð1keyring\x00'}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2000, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ip_vti0\x00', 0x800}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='wlan1@}ppp0eth0security!vmnet1/\x00') 13:49:22 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00]}, 0x48) 13:49:22 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:22 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:22 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:22 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff0f000000000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:22 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x1, 0x7, 0x0, 0x1000, 0x0, 0x100000001, 0x880, 0x5, 0x9, 0x0, 0x7f, 0x9, 0x8, 0x4, 0x6, 0x6806, 0x10001, 0x9, 0x8, 0xe5, 0xfff, 0x2, 0x9, 0x20, 0x100000001, 0x5, 0xdd, 0x5, 0x0, 0x100000000, 0x10001, 0x9, 0x7ce887dc, 0x2, 0x4, 0x8, 0x0, 0x6, 0x4, @perf_bp={&(0x7f00000000c0), 0x3}, 0x1000, 0xffffffffffffff00, 0x1, 0x2, 0x20, 0x600, 0x94}, r1, 0xf, r0, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)="776c616e31407d7070703085746844736563757269747921766d6e6574312f00") perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x8, 0x6, 0x9, 0x6, 0x0, 0xc6, 0x800, 0x6, 0x2, 0x7fffffff, 0x7, 0x8, 0x1, 0x0, 0x3, 0x9, 0x6, 0x5, 0x3, 0x400, 0x4, 0x75, 0xffffffff, 0x10000, 0x2, 0x7, 0x51, 0x4, 0x9, 0x1dd2, 0x1218, 0x528, 0x8, 0x4, 0x1ff, 0xfc00000000000000, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000240), 0x8}, 0x10800, 0xf00, 0x2, 0x4, 0x8001, 0x8000, 0x7}, r1, 0x2, r0, 0x3) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) write$cgroup_subtree(r3, &(0x7f0000000340)={[{0x2b, 'pids', 0x20}]}, 0x6) r4 = gettid() ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000200)="776c616e31407d7070703085746844736563757269747921766d6e6574312f00") ioctl$TUNSETSNDBUF(r3, 0x400454d4, &(0x7f0000000380)=0x1) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x410, 0x8, 0xfffffffffffffffe, 0x2, 0x0, 0x8, 0x10880, 0x3, 0x1ff, 0x4, 0x1f, 0x8, 0xaf7, 0x6, 0x3, 0x6, 0xf3, 0xfffffffffffffff9, 0x33, 0x3ff, 0x80000001, 0x7, 0x5, 0x100000001, 0x100000000, 0xff, 0x4, 0x8, 0x8, 0xfe, 0x3ff, 0x8, 0x800, 0x8, 0x1, 0xffffffffffffffc0, 0x0, 0x6, 0x1, @perf_config_ext={0x1, 0x7}, 0x420, 0x200, 0xd80, 0x2, 0x6, 0x5, 0x7ff}, r4, 0xb, r0, 0x0) 13:49:22 executing program 3: r0 = gettid() perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x6, 0xffffffffffffffc1, 0x5, 0xddaf, 0x0, 0x8, 0x20000, 0x3, 0x7, 0x8000, 0x101, 0x101, 0xffffffff, 0x1, 0x4, 0x1, 0x5, 0x3, 0x1f, 0x1, 0x7fff, 0x6, 0x1, 0xffff0000, 0x4, 0x4, 0x9, 0x0, 0x3ff, 0x1fb2265d, 0xff, 0x3, 0x80, 0x9, 0x9, 0x7, 0x0, 0x5, 0x0, @perf_config_ext={0x80000000, 0x10000}, 0x400, 0x3, 0x0, 0x7, 0x6, 0x6, 0x9}, r0, 0x9, 0xffffffffffffffff, 0x1) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='wlan1@}ppp0eth0security!vmnet1/\x00') 13:49:22 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0x48) 13:49:22 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:22 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c00000000000000]}, 0x48) 13:49:22 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:22 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:22 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:22 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x1, 0x7, 0x0, 0x1000, 0x0, 0x100000001, 0x880, 0x5, 0x9, 0x0, 0x7f, 0x9, 0x8, 0x4, 0x6, 0x6806, 0x10001, 0x9, 0x8, 0xe5, 0xfff, 0x2, 0x9, 0x20, 0x100000001, 0x5, 0xdd, 0x5, 0x0, 0x100000000, 0x10001, 0x9, 0x7ce887dc, 0x2, 0x4, 0x8, 0x0, 0x6, 0x4, @perf_bp={&(0x7f00000000c0), 0x3}, 0x1000, 0xffffffffffffff00, 0x1, 0x2, 0x20, 0x600, 0x94}, r1, 0xf, r0, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)="776c616e31407d7070703085746844736563757269747921766d6e6574312f00") perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x8, 0x6, 0x9, 0x6, 0x0, 0xc6, 0x800, 0x6, 0x2, 0x7fffffff, 0x7, 0x8, 0x1, 0x0, 0x3, 0x9, 0x6, 0x5, 0x3, 0x400, 0x4, 0x75, 0xffffffff, 0x10000, 0x2, 0x7, 0x51, 0x4, 0x9, 0x1dd2, 0x1218, 0x528, 0x8, 0x4, 0x1ff, 0xfc00000000000000, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000240), 0x8}, 0x10800, 0xf00, 0x2, 0x4, 0x8001, 0x8000, 0x7}, r1, 0x2, r0, 0x3) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) write$cgroup_subtree(r3, &(0x7f0000000340)={[{0x2b, 'pids', 0x20}]}, 0x6) r4 = gettid() ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000200)="776c616e31407d7070703085746844736563757269747921766d6e6574312f00") ioctl$TUNSETSNDBUF(r3, 0x400454d4, &(0x7f0000000380)=0x1) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x410, 0x8, 0xfffffffffffffffe, 0x2, 0x0, 0x8, 0x10880, 0x3, 0x1ff, 0x4, 0x1f, 0x8, 0xaf7, 0x6, 0x3, 0x6, 0xf3, 0xfffffffffffffff9, 0x33, 0x3ff, 0x80000001, 0x7, 0x5, 0x100000001, 0x100000000, 0xff, 0x4, 0x8, 0x8, 0xfe, 0x3ff, 0x8, 0x800, 0x8, 0x1, 0xffffffffffffffc0, 0x0, 0x6, 0x1, @perf_config_ext={0x1, 0x7}, 0x420, 0x200, 0xd80, 0x2, 0x6, 0x5, 0x7ff}, r4, 0xb, r0, 0x0) 13:49:22 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f00000000c0)={r1}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:22 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:49:22 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:22 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x48) 13:49:22 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:22 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:22 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x1, 0x7, 0x0, 0x1000, 0x0, 0x100000001, 0x880, 0x5, 0x9, 0x0, 0x7f, 0x9, 0x8, 0x4, 0x6, 0x6806, 0x10001, 0x9, 0x8, 0xe5, 0xfff, 0x2, 0x9, 0x20, 0x100000001, 0x5, 0xdd, 0x5, 0x0, 0x100000000, 0x10001, 0x9, 0x7ce887dc, 0x2, 0x4, 0x8, 0x0, 0x6, 0x4, @perf_bp={&(0x7f00000000c0), 0x3}, 0x1000, 0xffffffffffffff00, 0x1, 0x2, 0x20, 0x600, 0x94}, r1, 0xf, r0, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)="776c616e31407d7070703085746844736563757269747921766d6e6574312f00") perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x8, 0x6, 0x9, 0x6, 0x0, 0xc6, 0x800, 0x6, 0x2, 0x7fffffff, 0x7, 0x8, 0x1, 0x0, 0x3, 0x9, 0x6, 0x5, 0x3, 0x400, 0x4, 0x75, 0xffffffff, 0x10000, 0x2, 0x7, 0x51, 0x4, 0x9, 0x1dd2, 0x1218, 0x528, 0x8, 0x4, 0x1ff, 0xfc00000000000000, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000240), 0x8}, 0x10800, 0xf00, 0x2, 0x4, 0x8001, 0x8000, 0x7}, r1, 0x2, r0, 0x3) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) write$cgroup_subtree(r3, &(0x7f0000000340)={[{0x2b, 'pids', 0x20}]}, 0x6) r4 = gettid() ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000200)="776c616e31407d7070703085746844736563757269747921766d6e6574312f00") ioctl$TUNSETSNDBUF(r3, 0x400454d4, &(0x7f0000000380)=0x1) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x410, 0x8, 0xfffffffffffffffe, 0x2, 0x0, 0x8, 0x10880, 0x3, 0x1ff, 0x4, 0x1f, 0x8, 0xaf7, 0x6, 0x3, 0x6, 0xf3, 0xfffffffffffffff9, 0x33, 0x3ff, 0x80000001, 0x7, 0x5, 0x100000001, 0x100000000, 0xff, 0x4, 0x8, 0x8, 0xfe, 0x3ff, 0x8, 0x800, 0x8, 0x1, 0xffffffffffffffc0, 0x0, 0x6, 0x1, @perf_config_ext={0x1, 0x7}, 0x420, 0x200, 0xd80, 0x2, 0x6, 0x5, 0x7ff}, r4, 0xb, r0, 0x0) 13:49:22 executing program 3: r0 = gettid() r1 = perf_event_open$cgroup(&(0x7f00000000c0)={0x3, 0x70, 0xdac4, 0x6, 0x4, 0xc8, 0x0, 0x80000000, 0x20000, 0xd, 0x80000000, 0x7, 0x100, 0x914b, 0x9, 0x101, 0x2, 0x2, 0x0, 0x20, 0x539, 0x8, 0x2, 0x1, 0x3, 0x1a41, 0x5b87, 0x3, 0x3, 0x8, 0x101, 0x8f19, 0x400, 0x7, 0x800, 0x7, 0x3, 0x0, 0x0, 0x57f, 0x4, @perf_config_ext={0x3f, 0x8}, 0x10000, 0x5, 0x7, 0x0, 0x80, 0x2, 0x3d}, 0xffffffffffffffff, 0x2, 0xffffffffffffff9c, 0x2) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0xa7e, 0x7f, 0x2b1, 0x6, 0x0, 0x7fff, 0x20000, 0xc, 0x10000, 0x7fff, 0x200, 0x7, 0xc5, 0x2, 0x3, 0x7, 0x2, 0x48f1, 0x6, 0x8, 0x9, 0x4, 0x80, 0x4e, 0x3f, 0x9, 0x5ec00000000, 0x80, 0x8, 0x2, 0x81, 0x2, 0x0, 0xc6, 0xfffffffffffffb3b, 0x8000, 0x0, 0xcd1, 0x0, @perf_config_ext={0x67da, 0x100}, 0x30020, 0x6, 0x3e1, 0x5, 0x7ff, 0x0, 0x1}, r0, 0xf, r1, 0x1) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000080)='wlan1@}ppp0eth0security!vmnet1/\x00') 13:49:22 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:22 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:22 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, 0x48) 13:49:22 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0xd9, 0x1, 0x0, 0x7f, 0x0, 0x0, 0x40004, 0xc, 0x6, 0xc4, 0x9, 0x2, 0x9, 0x1, 0x8, 0x78, 0x1, 0x4, 0x4, 0x2, 0x6, 0x5, 0x6, 0x10000, 0x83, 0x1, 0x3, 0x6, 0xffffffff, 0xfa5f, 0x0, 0xfffffffffffffffb, 0x17c40000, 0x0, 0x7, 0x8, 0x0, 0x80000000, 0x2, @perf_bp={&(0x7f0000000040), 0x2}, 0x0, 0x20, 0x2b7, 0x1, 0x81, 0x0, 0xaf73}, r1, 0xd, r0, 0x2) 13:49:22 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x1, 0x7, 0x0, 0x1000, 0x0, 0x100000001, 0x880, 0x5, 0x9, 0x0, 0x7f, 0x9, 0x8, 0x4, 0x6, 0x6806, 0x10001, 0x9, 0x8, 0xe5, 0xfff, 0x2, 0x9, 0x20, 0x100000001, 0x5, 0xdd, 0x5, 0x0, 0x100000000, 0x10001, 0x9, 0x7ce887dc, 0x2, 0x4, 0x8, 0x0, 0x6, 0x4, @perf_bp={&(0x7f00000000c0), 0x3}, 0x1000, 0xffffffffffffff00, 0x1, 0x2, 0x20, 0x600, 0x94}, r1, 0xf, r0, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)="776c616e31407d7070703085746844736563757269747921766d6e6574312f00") perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x8, 0x6, 0x9, 0x6, 0x0, 0xc6, 0x800, 0x6, 0x2, 0x7fffffff, 0x7, 0x8, 0x1, 0x0, 0x3, 0x9, 0x6, 0x5, 0x3, 0x400, 0x4, 0x75, 0xffffffff, 0x10000, 0x2, 0x7, 0x51, 0x4, 0x9, 0x1dd2, 0x1218, 0x528, 0x8, 0x4, 0x1ff, 0xfc00000000000000, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000240), 0x8}, 0x10800, 0xf00, 0x2, 0x4, 0x8001, 0x8000, 0x7}, r1, 0x2, r0, 0x3) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) write$cgroup_subtree(r3, &(0x7f0000000340)={[{0x2b, 'pids', 0x20}]}, 0x6) gettid() ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000200)="776c616e31407d7070703085746844736563757269747921766d6e6574312f00") ioctl$TUNSETSNDBUF(r3, 0x400454d4, &(0x7f0000000380)=0x1) 13:49:22 executing program 3: socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x3, 0x6, 0xdb, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000100)={&(0x7f0000000040)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='wlan1@}ppp0eth0security!vmnet1/\x00') 13:49:22 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:22 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:22 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:22 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:22 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7400]}, 0x48) 13:49:22 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='io.stat\x00', 0x0, 0x0) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000080)={0x1, 0x4, [@empty, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x1d}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}]}) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'veth1_to_bridge\x00', 0x830}) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:22 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x1, 0x7, 0x0, 0x1000, 0x0, 0x100000001, 0x880, 0x5, 0x9, 0x0, 0x7f, 0x9, 0x8, 0x4, 0x6, 0x6806, 0x10001, 0x9, 0x8, 0xe5, 0xfff, 0x2, 0x9, 0x20, 0x100000001, 0x5, 0xdd, 0x5, 0x0, 0x100000000, 0x10001, 0x9, 0x7ce887dc, 0x2, 0x4, 0x8, 0x0, 0x6, 0x4, @perf_bp={&(0x7f00000000c0), 0x3}, 0x1000, 0xffffffffffffff00, 0x1, 0x2, 0x20, 0x600, 0x94}, r1, 0xf, r0, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)="776c616e31407d7070703085746844736563757269747921766d6e6574312f00") perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x8, 0x6, 0x9, 0x6, 0x0, 0xc6, 0x800, 0x6, 0x2, 0x7fffffff, 0x7, 0x8, 0x1, 0x0, 0x3, 0x9, 0x6, 0x5, 0x3, 0x400, 0x4, 0x75, 0xffffffff, 0x10000, 0x2, 0x7, 0x51, 0x4, 0x9, 0x1dd2, 0x1218, 0x528, 0x8, 0x4, 0x1ff, 0xfc00000000000000, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000240), 0x8}, 0x10800, 0xf00, 0x2, 0x4, 0x8001, 0x8000, 0x7}, r1, 0x2, r0, 0x3) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) write$cgroup_subtree(r3, &(0x7f0000000340)={[{0x2b, 'pids', 0x20}]}, 0x6) gettid() ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000200)="776c616e31407d7070703085746844736563757269747921766d6e6574312f00") 13:49:22 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:22 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:23 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800]}, 0x48) 13:49:23 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:23 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x218]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:23 executing program 3: r0 = perf_event_open$cgroup(&(0x7f00000000c0)={0x4, 0x70, 0x54b0, 0x7, 0x5, 0x10001, 0x0, 0x80, 0x20000, 0x7, 0x0, 0x1df19248, 0x3b, 0x4000, 0x5, 0x0, 0x200, 0x0, 0x1, 0x2, 0x1, 0x2, 0x3, 0x8, 0x4, 0x2, 0xed, 0x7, 0xfffffffffffeffff, 0x61, 0xd1e, 0x2, 0xee92, 0x9, 0x4, 0x7f, 0x5, 0x3, 0x0, 0x401, 0x2, @perf_bp={&(0x7f0000000000), 0xb}, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x4, 0x9}, 0xffffffffffffff9c, 0x1, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='md5sum&em1ppp0%\x00') 13:49:23 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x1, 0x7, 0x0, 0x1000, 0x0, 0x100000001, 0x880, 0x5, 0x9, 0x0, 0x7f, 0x9, 0x8, 0x4, 0x6, 0x6806, 0x10001, 0x9, 0x8, 0xe5, 0xfff, 0x2, 0x9, 0x20, 0x100000001, 0x5, 0xdd, 0x5, 0x0, 0x100000000, 0x10001, 0x9, 0x7ce887dc, 0x2, 0x4, 0x8, 0x0, 0x6, 0x4, @perf_bp={&(0x7f00000000c0), 0x3}, 0x1000, 0xffffffffffffff00, 0x1, 0x2, 0x20, 0x600, 0x94}, r1, 0xf, r0, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)="776c616e31407d7070703085746844736563757269747921766d6e6574312f00") perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x8, 0x6, 0x9, 0x6, 0x0, 0xc6, 0x800, 0x6, 0x2, 0x7fffffff, 0x7, 0x8, 0x1, 0x0, 0x3, 0x9, 0x6, 0x5, 0x3, 0x400, 0x4, 0x75, 0xffffffff, 0x10000, 0x2, 0x7, 0x51, 0x4, 0x9, 0x1dd2, 0x1218, 0x528, 0x8, 0x4, 0x1ff, 0xfc00000000000000, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000240), 0x8}, 0x10800, 0xf00, 0x2, 0x4, 0x8001, 0x8000, 0x7}, r1, 0x2, r0, 0x3) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) write$cgroup_subtree(r2, &(0x7f0000000340)={[{0x2b, 'pids', 0x20}]}, 0x6) gettid() 13:49:23 executing program 4: socketpair(0xb, 0xe, 0x5, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_int(r1, &(0x7f0000000080)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:23 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700]}, 0x48) 13:49:23 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:23 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:23 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='wlan1@}ppp0eth0security!vmnet1/\x00') r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='wlan1@}ppp0eth0security!vmnet1/\x00', 0xffffffffffffff9c}, 0x10) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f00000000c0)={'gretap0\x00', @random="ca88df512942"}) 13:49:23 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:23 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x1, 0x7, 0x0, 0x1000, 0x0, 0x100000001, 0x880, 0x5, 0x9, 0x0, 0x7f, 0x9, 0x8, 0x4, 0x6, 0x6806, 0x10001, 0x9, 0x8, 0xe5, 0xfff, 0x2, 0x9, 0x20, 0x100000001, 0x5, 0xdd, 0x5, 0x0, 0x100000000, 0x10001, 0x9, 0x7ce887dc, 0x2, 0x4, 0x8, 0x0, 0x6, 0x4, @perf_bp={&(0x7f00000000c0), 0x3}, 0x1000, 0xffffffffffffff00, 0x1, 0x2, 0x20, 0x600, 0x94}, r1, 0xf, r0, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)="776c616e31407d7070703085746844736563757269747921766d6e6574312f00") perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x8, 0x6, 0x9, 0x6, 0x0, 0xc6, 0x800, 0x6, 0x2, 0x7fffffff, 0x7, 0x8, 0x1, 0x0, 0x3, 0x9, 0x6, 0x5, 0x3, 0x400, 0x4, 0x75, 0xffffffff, 0x10000, 0x2, 0x7, 0x51, 0x4, 0x9, 0x1dd2, 0x1218, 0x528, 0x8, 0x4, 0x1ff, 0xfc00000000000000, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000240), 0x8}, 0x10800, 0xf00, 0x2, 0x4, 0x8001, 0x8000, 0x7}, r1, 0x2, r0, 0x3) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) write$cgroup_subtree(r2, &(0x7f0000000340)={[{0x2b, 'pids', 0x20}]}, 0x6) 13:49:23 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce]}, 0x48) 13:49:23 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:23 executing program 4: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)=0x9, 0x4) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_procs(r1, &(0x7f0000000080)='tasks\x00', 0x2, 0x0) 13:49:23 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x1, 0x7, 0x0, 0x1000, 0x0, 0x100000001, 0x880, 0x5, 0x9, 0x0, 0x7f, 0x9, 0x8, 0x4, 0x6, 0x6806, 0x10001, 0x9, 0x8, 0xe5, 0xfff, 0x2, 0x9, 0x20, 0x100000001, 0x5, 0xdd, 0x5, 0x0, 0x100000000, 0x10001, 0x9, 0x7ce887dc, 0x2, 0x4, 0x8, 0x0, 0x6, 0x4, @perf_bp={&(0x7f00000000c0), 0x3}, 0x1000, 0xffffffffffffff00, 0x1, 0x2, 0x20, 0x600, 0x94}, r1, 0xf, r0, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)="776c616e31407d7070703085746844736563757269747921766d6e6574312f00") perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x8, 0x6, 0x9, 0x6, 0x0, 0xc6, 0x800, 0x6, 0x2, 0x7fffffff, 0x7, 0x8, 0x1, 0x0, 0x3, 0x9, 0x6, 0x5, 0x3, 0x400, 0x4, 0x75, 0xffffffff, 0x10000, 0x2, 0x7, 0x51, 0x4, 0x9, 0x1dd2, 0x1218, 0x528, 0x8, 0x4, 0x1ff, 0xfc00000000000000, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000240), 0x8}, 0x10800, 0xf00, 0x2, 0x4, 0x8001, 0x8000, 0x7}, r1, 0x2, r0, 0x3) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuset.effective_mems\x00', 0x0, 0x0) 13:49:23 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, 0x48) 13:49:23 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:23 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:23 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000]}, 0x48) 13:49:23 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='wlan1@}ppp0eth0security!vmnet1/\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='\x00') 13:49:23 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:23 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:23 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x1, 0x7, 0x0, 0x1000, 0x0, 0x100000001, 0x880, 0x5, 0x9, 0x0, 0x7f, 0x9, 0x8, 0x4, 0x6, 0x6806, 0x10001, 0x9, 0x8, 0xe5, 0xfff, 0x2, 0x9, 0x20, 0x100000001, 0x5, 0xdd, 0x5, 0x0, 0x100000000, 0x10001, 0x9, 0x7ce887dc, 0x2, 0x4, 0x8, 0x0, 0x6, 0x4, @perf_bp={&(0x7f00000000c0), 0x3}, 0x1000, 0xffffffffffffff00, 0x1, 0x2, 0x20, 0x600, 0x94}, r1, 0xf, r0, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)="776c616e31407d7070703085746844736563757269747921766d6e6574312f00") perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x8, 0x6, 0x9, 0x6, 0x0, 0xc6, 0x800, 0x6, 0x2, 0x7fffffff, 0x7, 0x8, 0x1, 0x0, 0x3, 0x9, 0x6, 0x5, 0x3, 0x400, 0x4, 0x75, 0xffffffff, 0x10000, 0x2, 0x7, 0x51, 0x4, 0x9, 0x1dd2, 0x1218, 0x528, 0x8, 0x4, 0x1ff, 0xfc00000000000000, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000240), 0x8}, 0x10800, 0xf00, 0x2, 0x4, 0x8001, 0x8000, 0x7}, r1, 0x2, r0, 0x3) 13:49:23 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:23 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='pids.current\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000040)={0x7, 0x70, 0x1, 0x8, 0x8, 0x4, 0x0, 0x7fff, 0x82282, 0xf, 0x2, 0x1, 0x20, 0xadf9, 0x80000000, 0x7, 0x9, 0x8, 0x380000000000, 0x1, 0x7fff, 0x0, 0x93, 0x8, 0xff, 0x2, 0x4, 0x8001, 0x6, 0x1, 0x3, 0x0, 0x5, 0x5, 0x1c0, 0xfff, 0xffffffff00000000, 0x1, 0x0, 0x0, 0x6, @perf_config_ext={0x35f3, 0xb7b}, 0x0, 0x7ff, 0x2, 0xfffffffffffffffe, 0x0, 0x1000, 0x5}) r1 = getpid() perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x101, 0x5, 0x2, 0x6, 0x0, 0x1ff, 0x81000, 0x0, 0x5, 0x8, 0x0, 0x1ff, 0x5, 0x8, 0x3, 0xfffffffffffeffff, 0x4, 0x2, 0x5, 0x5a39, 0x5, 0x0, 0xff, 0x10001, 0x80000001, 0xc2, 0xfffffffffffeffff, 0x4, 0x2, 0x1, 0x9, 0x8, 0xffffffffffffffe0, 0x65, 0x5976, 0x401, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000000200), 0xd}, 0x40, 0x1, 0x81, 0x5, 0x29f, 0x10000, 0x20}, r1, 0x1, r0, 0xb) perf_event_open$cgroup(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x6, 0xfffffffffffffc01, 0x100000001, 0x0, 0x1, 0x0, 0x2, 0xfff, 0x9, 0x2, 0x0, 0x1, 0x3, 0x8, 0x8, 0x6, 0x40, 0x7, 0x100000000, 0xfffffffffffff801, 0x10000, 0x9, 0xff, 0x9, 0x100000000, 0xffff, 0x7, 0x7f, 0x0, 0x0, 0x8, 0x0, 0x1, 0x4, 0x1, 0x0, 0x4, 0x2, @perf_bp={&(0x7f00000000c0)}, 0x20200, 0x1, 0x100, 0x0, 0x9, 0x5, 0x7}, r0, 0x8, r0, 0x2) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x6, 0x4, 0x0, 0xce, 0x0, 0x3, 0x40, 0xa, 0x0, 0x1, 0xe3, 0x400, 0x0, 0x5, 0x1f, 0x7f, 0x3, 0x1f, 0x1, 0x0, 0x4, 0x7, 0x7, 0x93cb, 0x1, 0x20, 0x0, 0x97, 0x0, 0x400, 0x8, 0x5, 0xe5d6, 0x7d0, 0x8, 0x26a, 0x0, 0xd78b, 0x5, @perf_bp={&(0x7f00000002c0), 0xe}, 0x2000, 0x953, 0xfffffffffffffff9, 0x6, 0x0, 0x100, 0x2}, r1, 0x3, r0, 0x9) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:23 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}, 0x48) 13:49:23 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:23 executing program 3: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000000)) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='wlan1@}ppp0eth0security!vmnet1/\x00') 13:49:23 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:23 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:23 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x1, 0x7, 0x0, 0x1000, 0x0, 0x100000001, 0x880, 0x5, 0x9, 0x0, 0x7f, 0x9, 0x8, 0x4, 0x6, 0x6806, 0x10001, 0x9, 0x8, 0xe5, 0xfff, 0x2, 0x9, 0x20, 0x100000001, 0x5, 0xdd, 0x5, 0x0, 0x100000000, 0x10001, 0x9, 0x7ce887dc, 0x2, 0x4, 0x8, 0x0, 0x6, 0x4, @perf_bp={&(0x7f00000000c0), 0x3}, 0x1000, 0xffffffffffffff00, 0x1, 0x2, 0x20, 0x600, 0x94}, r1, 0xf, r0, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)="776c616e31407d7070703085746844736563757269747921766d6e6574312f00") 13:49:23 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000]}, 0x48) 13:49:23 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:23 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() perf_event_open(&(0x7f0000000240)={0x7, 0x70, 0x100, 0x1f, 0x1, 0x2, 0x0, 0x100000000, 0x80000, 0x8, 0x1000, 0x2, 0x7ff, 0x10001, 0x5, 0x7fff, 0x0, 0xffffffffffffffff, 0x7, 0xffffffffd8e44093, 0x5, 0xffff, 0x8001, 0x1, 0x80000000, 0x40, 0x9, 0xfffffffffffffeff, 0xffffffff, 0x1, 0x0, 0x10000, 0x1, 0x20, 0x4e, 0x27, 0x5, 0x7, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000200), 0x3}, 0x2000, 0xfe8, 0xffffffffffff8001, 0x5, 0x4, 0x2, 0x3b4fa12b}, r1, 0x9, r0, 0x8) r2 = getpid() perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x9, 0x6, 0x3, 0x9, 0x0, 0x9, 0x40000, 0xb, 0x1, 0x6, 0x2, 0x4, 0x4400, 0x0, 0x100000000, 0x200000000000000, 0x7522, 0x3, 0xa5e0, 0x1, 0x6, 0x5, 0x8, 0x3, 0x1ff, 0x4, 0x5, 0xfff, 0x2, 0x2, 0x8, 0xffffffff, 0x435, 0x2, 0xe04, 0x1000000000000000, 0x0, 0x3, 0x1, @perf_config_ext={0x26fb000000000000, 0x7}, 0x202, 0x1a4d4bd4, 0x11, 0x7, 0x5, 0x0, 0x1}, r2, 0x9, r0, 0xb) r3 = getpid() perf_event_open(&(0x7f0000000080)={0x7, 0x70, 0x3, 0x5, 0x2, 0x80000000, 0x0, 0x1, 0x908, 0xf, 0x9, 0x0, 0x3f, 0x6, 0x9, 0x9, 0x6, 0x100, 0x400, 0x7fffffff, 0x200, 0x10001, 0x1, 0x1b602367, 0x8, 0x40, 0xc199, 0x3f, 0x6, 0x1, 0x9, 0x2, 0xd4, 0x2, 0x6, 0x6240, 0x10001, 0x8, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000040), 0x1}, 0x10000, 0x4, 0x1, 0x7, 0x1f, 0x29, 0x5}, r3, 0x9, 0xffffffffffffffff, 0x3) 13:49:23 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff5]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:23 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:23 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5a00]}, 0x48) 13:49:23 executing program 3: r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='wlan1@}ppp0eth0security!vmnet1/\x00') 13:49:23 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x1, 0x7, 0x0, 0x1000, 0x0, 0x100000001, 0x880, 0x5, 0x9, 0x0, 0x7f, 0x9, 0x8, 0x4, 0x6, 0x6806, 0x10001, 0x9, 0x8, 0xe5, 0xfff, 0x2, 0x9, 0x20, 0x100000001, 0x5, 0xdd, 0x5, 0x0, 0x100000000, 0x10001, 0x9, 0x7ce887dc, 0x2, 0x4, 0x8, 0x0, 0x6, 0x4, @perf_bp={&(0x7f00000000c0), 0x3}, 0x1000, 0xffffffffffffff00, 0x1, 0x2, 0x20, 0x600, 0x94}, r1, 0xf, r0, 0x3) 13:49:23 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:23 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74]}, 0x48) 13:49:23 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:23 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:23 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() 13:49:23 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\x00') socketpair(0xf, 0x80a, 0x8adb, &(0x7f0000000000)={0xffffffffffffffff}) r2 = gettid() write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000000c0)='\x00') 13:49:23 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00000000000000]}, 0x48) 13:49:23 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:24 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x7fff, 0x7, 0xfffffffffffffeff, 0x2632bee6, 0x0, 0x4, 0x0, 0x1, 0xfff, 0x6, 0x2, 0x0, 0xa6ab, 0x2, 0x100000001, 0x0, 0x5, 0x8f5, 0x2, 0x6, 0x1, 0xfffffffffffffffd, 0x401, 0x100000002984d860, 0x10001, 0x200000000000000, 0x80000001, 0x7, 0x8cc1, 0xfffffffffffff000, 0x100, 0x80000001, 0x0, 0x4, 0x0, 0x9, 0x0, 0x42, 0x1, @perf_bp={&(0x7f00000000c0), 0x1}, 0x8002, 0x7fffffff, 0x4, 0x0, 0x0, 0x3, 0x1000000000000100}, r1, 0x40000000008, r0, 0x8) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:24 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:24 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:24 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:49:24 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:24 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000]}, 0x48) 13:49:24 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:24 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000200)="776c616e31407d7070703065746830736563757269747921766d6e6574312f0002df76db72fe07115571ee42e8f32eed0d2f11b61845c9fd5d72f19e94bcefe6b0d9878824fc1a0e194367510c4b75700db8f3261ad207f4c564144417e832cca17e9cdc79c1d578d309ca10f5a1d7f0ab82c74c751169ac29f8630ba330791c2dd515ecdfae16a3f812bcd900005ab21135c90000d6780fc909ff634e7d39365fccb7e9937c1bfe4da9b3ce7810e1bb26f412bfc8501a51438cac23af0b15d4c7a2995339fa41694ba9534bbbeac992da9737b91d07175bdb7dcf773c338bc5e4a9eebda8d6dffa1973ff2e0435331db3824034e358ea685a58d60000000000000000000000a7056bce177a128ddf2f98f7060b80a1020187f48d92d572dadbd9c211ed2841f7649a28c4149679dcfbf3f7f2896789bd7d2ea82eb966329768540b18091683cae22a3d54e3dd759a6183078377434ab5c9fc4bbc9cfff5d6b15ea63d4ed8e2") ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x2) 13:49:24 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x1b8b, 0x0, 0x200, 0xd26b, 0x0, 0x275e, 0x8008, 0xd, 0x40, 0x80000000, 0x7fffffff, 0x200, 0x100000001, 0x7, 0x0, 0x7, 0x6, 0x401, 0xfffffffffffffff8, 0x7, 0x8000, 0x8000, 0x400, 0x200, 0x6, 0xffffffffffffffff, 0x7c, 0xfffffffffffffffe, 0x2, 0xffffffffffffff7f, 0x3a, 0xbe, 0x20, 0x0, 0xfffffffffffffffe, 0x2, 0x0, 0x57b1, 0x1, @perf_bp={&(0x7f0000000040), 0x1}, 0x100, 0x0, 0x3, 0x7, 0x0, 0x0, 0x1}, r1, 0x3, r0, 0xa) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:24 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe4ffffff00000000]}, 0x48) 13:49:24 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:24 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:24 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:24 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='wlan1@}ppp0eth0security!vmnet1/\x00') 13:49:24 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:24 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:24 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:24 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000]}, 0x48) 13:49:24 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) 13:49:24 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:24 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:24 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='wlan1@}ppp0eth0security!vmnet1/\x00') socketpair(0x9, 0x20000000006, 0x6, &(0x7f0000000000)) 13:49:24 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:24 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:24 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700f3ffffecd2987]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:24 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800]}, 0x48) 13:49:24 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0x9) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000040)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00'}, 0x10) 13:49:24 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:24 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x0, &(0x7f0000001000)=ANY=[], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:24 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00]}, 0x48) 13:49:24 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:24 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:24 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:24 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x0, &(0x7f0000001000)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:24 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x48) 13:49:24 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000080)={0x6, &(0x7f0000000040)=[{0xfffffffffffffff8, 0xff, 0x0, 0x7}, {0x2, 0x1, 0x0, 0xfffffffffffffffb}, {0x0, 0x8, 0x6, 0x4}, {0x80000000, 0x100, 0x1, 0x7fffffff}, {0x100000000, 0x3f, 0x400, 0x1}, {0x6, 0x0, 0xa008, 0x3}]}) 13:49:24 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:24 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x979, 0x400, 0x7d9, 0x6, 0x0, 0x2, 0x8, 0x8, 0xfffffffffffffff8, 0x0, 0x9, 0x929, 0x5, 0xfff, 0x5, 0x93, 0x9, 0x401, 0x8, 0x4000000, 0x7fffffff, 0x401, 0xffffffffffffffff, 0x8, 0x4, 0x7, 0xff, 0x8, 0x700f998a, 0x800, 0x1, 0x8, 0x400, 0x7fff, 0x4, 0xfffffffffffffffe, 0x0, 0xecb, 0x3, @perf_config_ext={0x7, 0x8}, 0x2000, 0x7, 0xfffffffffffffff7, 0x3, 0x0, 0x5, 0x40}, r1, 0x10, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='wlan1@}ppp0eth0security!vmnet1/\x00') close(r0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x4) 13:49:24 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:24 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:24 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:24 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:24 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, 0x48) 13:49:24 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x7, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000bf01000000000000950000000000000015010000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:24 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:24 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:24 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:24 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000001c0)='syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000200)='/group.stat\x00', 0x2761, 0x0) openat$cgroup_ro(r1, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000080)) perf_event_open(&(0x7f00000000c0)={0x6, 0x70}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 13:49:24 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000]}, 0x48) 13:49:24 executing program 3: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='wlan1@}ppp0eth0security!vmnet1/\x00', 0xffffffffffffff9c}, 0x10) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x14) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x2}, 0x0, 0x7fffffff, 0x0, 0x0, 0x8000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f00000000c0)={r0}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='wlan1@}ppp0eth0security!vmnet1/\x00') 13:49:24 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:24 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b70000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:25 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:25 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48000000]}, 0x48) 13:49:25 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x9, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b700000000000000950000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:25 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x1) openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:25 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:25 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='wlan1@}ppp0eth0security!vmnet1/\x00') r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(r1, 0x800454d3, &(0x7f0000000040)) 13:49:25 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80fe]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:25 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:25 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x9, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b700000000000000950000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:25 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a000000]}, 0x48) 13:49:25 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:25 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x0, &(0x7f0000000140)='\x00', &(0x7f0000000280)='bpf\x00', 0x60000, &(0x7f00000002c0)={[{@mode={'mode', 0x3d, 0x6}, 0x2c}]}) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000003c0)='.\x00', &(0x7f0000000340)='bpf\x00', 0x0, &(0x7f0000000300)=ANY=[]) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000200)={0x0, 0x70, 0x3, 0x1, 0x4, 0x2, 0x0, 0x0, 0x2000, 0xc, 0x81b, 0x3, 0xffffffff, 0x1, 0x0, 0x5, 0x1, 0x10000, 0x7, 0x7, 0x8000, 0x1, 0x9, 0x2, 0x100000001, 0x8, 0x9, 0x0, 0x800, 0x8, 0xffff, 0x7, 0x1, 0x7, 0x0, 0xfffffffffffffff9, 0x1, 0x8, 0x0, 0xffff, 0x0, @perf_bp={&(0x7f0000000040), 0x8}, 0x100, 0x100, 0x0, 0x1, 0x4, 0xffffffffffffffe0, 0x4}) mkdir(&(0x7f0000000100)='./file0/../file0\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r0) 13:49:25 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x9, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b70000000000000095000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:25 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:25 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.current\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='wlan1@}ppp0eth0security!vmnet1/\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x5) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='wlan1@}ppp0eth0security!vmnet1/\x00') ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r1) 13:49:25 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000]}, 0x48) 13:49:25 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:25 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:25 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:25 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5802]}, 0x48) 13:49:25 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) 13:49:25 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) 13:49:25 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:25 executing program 3: socketpair(0x9, 0x3, 0xff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000000140)={&(0x7f00000000c0)=@ethernet={0x0, @link_local}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000200)=""/67, 0x43}, {&(0x7f0000000280)=""/134, 0x86}, {&(0x7f0000000340)=""/4096, 0x1000}], 0x3, &(0x7f0000001340)=""/168, 0xa8}, 0x12041) unlink(&(0x7f0000001440)='./file0\x00') r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000001400)=r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='wlan1@}ppp0eth0security!vmnet1/\x00') 13:49:25 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdffffff00000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:25 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:25 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:25 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7400000000000000]}, 0x48) 13:49:25 executing program 5 (fault-call:0 fault-nth:0): bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:25 executing program 4: openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000000c0)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61a8efd5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = gettid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0xffffffffffff8001, 0xedf0, 0x20200000000000, 0x0, 0x0, 0x2800, 0x0, 0x1, 0x401, 0xffff, 0x1, 0x1, 0xb11, 0x1, 0x12, 0x5, 0x100000000, 0x51d, 0x7fffffff, 0x1, 0x9, 0x6, 0x1, 0x4, 0x8001, 0xe0, 0x0, 0x3f03, 0x100000001, 0x9, 0x80, 0x80, 0x3f, 0x7, 0x200, 0x0, 0x5, 0x7b2d794d4e849fa3, @perf_config_ext={0x3, 0x5}, 0x100, 0x400, 0x3, 0x0, 0x401, 0x10001, 0x5}, r2, 0x9, r1, 0x1) [ 972.673606] FAULT_INJECTION: forcing a failure. [ 972.673606] name failslab, interval 1, probability 0, space 0, times 0 [ 972.684927] CPU: 0 PID: 310 Comm: syz-executor5 Not tainted 4.18.0-rc3+ #58 [ 972.692033] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 972.701391] Call Trace: [ 972.703990] dump_stack+0x1c9/0x2b4 [ 972.707631] ? dump_stack_print_info.cold.2+0x52/0x52 [ 972.712841] should_fail.cold.4+0xa/0x1a [ 972.717033] ? fault_create_debugfs_attr+0x1f0/0x1f0 13:49:25 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:25 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00000000000000]}, 0x48) 13:49:25 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1802000000000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:25 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r0, 0x50, &(0x7f0000000040)}, 0x10) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 972.722257] ? perf_trace_lock+0xde/0x920 [ 972.726410] ? lock_release+0xa30/0xa30 [ 972.730402] ? dput.part.26+0x248/0x7a0 [ 972.734407] ? trace_hardirqs_on+0x10/0x10 [ 972.738660] ? kasan_check_read+0x11/0x20 [ 972.742828] ? zap_class+0x740/0x740 [ 972.746549] ? lock_acquire+0x1e4/0x540 [ 972.750535] ? fs_reclaim_acquire+0x20/0x20 [ 972.754872] ? lock_downgrade+0x8f0/0x8f0 [ 972.759038] ? check_same_owner+0x340/0x340 [ 972.763385] ? zap_class+0x740/0x740 [ 972.767117] ? rcu_note_context_switch+0x730/0x730 [ 972.772058] __should_failslab+0x124/0x180 [ 972.776287] should_failslab+0x9/0x14 [ 972.780081] kmem_cache_alloc_node_trace+0x26f/0x770 [ 972.785186] ? trace_hardirqs_on+0x10/0x10 [ 972.789418] __get_vm_area_node+0x12d/0x390 [ 972.793746] __vmalloc_node_range+0xc4/0x760 [ 972.798155] ? bpf_prog_alloc+0xe3/0x3e0 [ 972.802216] ? usercopy_warn+0x120/0x120 [ 972.806266] ? perf_trace_lock+0xde/0x920 [ 972.810421] __vmalloc+0x45/0x50 [ 972.813798] ? bpf_prog_alloc+0xe3/0x3e0 [ 972.817855] bpf_prog_alloc+0xe3/0x3e0 [ 972.821734] ? bpf_prog_kallsyms_find+0x4c0/0x4c0 [ 972.826742] ? mpi_free.cold.1+0x19/0x19 [ 972.830814] ? proc_fail_nth_write+0x9e/0x210 [ 972.835302] bpf_prog_load+0x435/0x1c90 [ 972.839286] ? bpf_prog_new_fd+0x60/0x60 [ 972.843349] ? lock_acquire+0x1e4/0x540 [ 972.847332] ? __might_fault+0x12b/0x1e0 [ 972.851382] ? lock_downgrade+0x8f0/0x8f0 [ 972.855512] ? lock_release+0xa30/0xa30 [ 972.859485] ? lock_release+0xa30/0xa30 [ 972.863442] ? check_same_owner+0x340/0x340 [ 972.867749] ? __check_object_size+0x9d/0x5f2 [ 972.872248] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 972.877953] __x64_sys_bpf+0x36c/0x510 [ 972.881828] ? bpf_prog_get+0x20/0x20 [ 972.885620] do_syscall_64+0x1b9/0x820 [ 972.889493] ? finish_task_switch+0x1d3/0x890 [ 972.893985] ? syscall_return_slowpath+0x5e0/0x5e0 [ 972.898912] ? syscall_return_slowpath+0x31d/0x5e0 [ 972.903832] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 972.908845] ? prepare_exit_to_usermode+0x291/0x3b0 [ 972.913853] ? perf_trace_sys_enter+0xb10/0xb10 [ 972.918533] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 972.923372] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 972.928549] RIP: 0033:0x455ab9 [ 972.931726] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 972.951070] RSP: 002b:00007f8952c98c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 972.958772] RAX: ffffffffffffffda RBX: 00007f8952c996d4 RCX: 0000000000455ab9 [ 972.966030] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000005 [ 972.973557] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 972.980811] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 972.988064] R13: 00000000004bb7f3 R14: 00000000004c8c08 R15: 0000000000000000 [ 972.995517] syz-executor5: vmalloc: allocation failure: 4096 bytes, mode:0x6280c0(GFP_USER|__GFP_ZERO), nodemask=(null) [ 973.006486] syz-executor5 cpuset=syz5 mems_allowed=0 [ 973.011625] CPU: 0 PID: 310 Comm: syz-executor5 Not tainted 4.18.0-rc3+ #58 [ 973.018732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 973.028088] Call Trace: [ 973.030664] dump_stack+0x1c9/0x2b4 [ 973.034289] ? dump_stack_print_info.cold.2+0x52/0x52 [ 973.039533] warn_alloc.cold.118+0xb7/0x1bd [ 973.043852] ? zone_watermark_ok_safe+0x3d0/0x3d0 [ 973.048684] ? kmem_cache_alloc_node_trace+0x302/0x770 [ 973.053958] ? trace_hardirqs_on+0x10/0x10 [ 973.058182] ? __get_vm_area_node+0x2da/0x390 [ 973.062671] __vmalloc_node_range+0x472/0x760 [ 973.067152] ? usercopy_warn+0x120/0x120 [ 973.071208] ? perf_trace_lock+0xde/0x920 [ 973.075350] __vmalloc+0x45/0x50 [ 973.078713] ? bpf_prog_alloc+0xe3/0x3e0 [ 973.082773] bpf_prog_alloc+0xe3/0x3e0 [ 973.086652] ? bpf_prog_kallsyms_find+0x4c0/0x4c0 [ 973.091490] ? mpi_free.cold.1+0x19/0x19 [ 973.095535] ? proc_fail_nth_write+0x9e/0x210 [ 973.100023] bpf_prog_load+0x435/0x1c90 [ 973.104004] ? bpf_prog_new_fd+0x60/0x60 [ 973.108075] ? lock_acquire+0x1e4/0x540 [ 973.112123] ? __might_fault+0x12b/0x1e0 [ 973.116167] ? lock_downgrade+0x8f0/0x8f0 [ 973.120295] ? lock_release+0xa30/0xa30 [ 973.124271] ? lock_release+0xa30/0xa30 [ 973.128235] ? check_same_owner+0x340/0x340 [ 973.132538] ? __check_object_size+0x9d/0x5f2 [ 973.137043] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 973.142569] __x64_sys_bpf+0x36c/0x510 [ 973.146442] ? bpf_prog_get+0x20/0x20 [ 973.150259] do_syscall_64+0x1b9/0x820 [ 973.154138] ? finish_task_switch+0x1d3/0x890 [ 973.158725] ? syscall_return_slowpath+0x5e0/0x5e0 [ 973.163658] ? syscall_return_slowpath+0x31d/0x5e0 [ 973.168572] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 973.173576] ? prepare_exit_to_usermode+0x291/0x3b0 [ 973.178577] ? perf_trace_sys_enter+0xb10/0xb10 [ 973.183236] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 973.188067] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 973.193257] RIP: 0033:0x455ab9 [ 973.196422] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 973.215574] RSP: 002b:00007f8952c98c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 973.223273] RAX: ffffffffffffffda RBX: 00007f8952c996d4 RCX: 0000000000455ab9 [ 973.230534] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000005 [ 973.237797] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 973.245056] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 973.252324] R13: 00000000004bb7f3 R14: 00000000004c8c08 R15: 0000000000000000 [ 973.259629] Mem-Info: [ 973.262091] active_anon:18948 inactive_anon:3900 isolated_anon:0 [ 973.262091] active_file:5679 inactive_file:14911 isolated_file:0 [ 973.262091] unevictable:0 dirty:91 writeback:20 unstable:0 [ 973.262091] slab_reclaimable:13367 slab_unreclaimable:101264 [ 973.262091] mapped:75523 shmem:4441 pagetables:913 bounce:0 [ 973.262091] free:1373811 free_pcp:438 free_cma:0 [ 973.296008] Node 0 active_anon:75792kB inactive_anon:15600kB active_file:22716kB inactive_file:59644kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:302092kB dirty:364kB writeback:80kB shmem:17764kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 38912kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 973.324428] Node 0 DMA free:15908kB min:164kB low:204kB high:244kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 973.350577] lowmem_reserve[]: 0 2827 6331 6331 [ 973.355225] Node 0 DMA32 free:2898208kB min:30100kB low:37624kB high:45148kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129292kB managed:2898892kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:684kB local_pcp:684kB free_cma:0kB [ 973.382937] lowmem_reserve[]: 0 0 3504 3504 [ 973.387317] Node 0 Normal free:2581128kB min:37316kB low:46644kB high:55972kB active_anon:75792kB inactive_anon:15600kB active_file:22716kB inactive_file:59644kB unevictable:0kB writepending:296kB present:4718592kB managed:3589008kB mlocked:0kB kernel_stack:5664kB pagetables:3652kB bounce:0kB free_pcp:1060kB local_pcp:464kB free_cma:0kB [ 973.417423] lowmem_reserve[]: 0 0 0 0 [ 973.421259] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 973.434874] Node 0 DMA32: 2*4kB (M) 5*8kB (M) 1*16kB (M) 5*32kB (M) 1*64kB (M) 2*128kB (M) 1*256kB (M) 3*512kB (M) 4*1024kB (M) 2*2048kB (M) 705*4096kB (M) = 2898208kB [ 973.450104] Node 0 Normal: 240*4kB (UME) 220*8kB (UME) 40*16kB (UME) 81*32kB (UME) 61*64kB (UME) 16*128kB (UME) 70*256kB (UME) 81*512kB (UM) 59*1024kB (UM) 4*2048kB (UME) 596*4096kB (UM) = 2581120kB [ 973.468041] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 973.476632] 25031 total pagecache pages [ 973.480615] 0 pages in swap cache [ 973.484079] Swap cache stats: add 0, delete 0, find 0/0 [ 973.489445] Free swap = 0kB [ 973.492474] Total swap = 0kB [ 973.495512] 1965969 pages RAM [ 973.498626] 0 pages HighMem/MovableOnly [ 973.502609] 340017 pages reserved 13:49:26 executing program 5 (fault-call:0 fault-nth:1): bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:26 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000]}, 0x48) 13:49:26 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:26 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:26 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='wlan1@}ppp0eth0security!vmnet1/\x00') 13:49:26 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:26 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 973.621135] FAULT_INJECTION: forcing a failure. [ 973.621135] name failslab, interval 1, probability 0, space 0, times 0 [ 973.632429] CPU: 0 PID: 339 Comm: syz-executor5 Not tainted 4.18.0-rc3+ #58 [ 973.639537] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 973.648893] Call Trace: [ 973.651494] dump_stack+0x1c9/0x2b4 [ 973.655134] ? dump_stack_print_info.cold.2+0x52/0x52 [ 973.660340] ? kasan_check_read+0x11/0x20 [ 973.664489] ? rcu_is_watching+0x8c/0x150 [ 973.668753] should_fail.cold.4+0xa/0x1a [ 973.672804] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 973.677905] ? __kernel_text_address+0xd/0x40 [ 973.682390] ? unwind_get_return_address+0x61/0xa0 [ 973.687317] ? __save_stack_trace+0x8d/0xf0 [ 973.691645] ? lock_acquire+0x1e4/0x540 [ 973.695604] ? fs_reclaim_acquire+0x20/0x20 [ 973.699913] ? lock_downgrade+0x8f0/0x8f0 [ 973.704056] ? bpf_prog_load+0x435/0x1c90 [ 973.708206] ? kasan_check_read+0x11/0x20 [ 973.712341] ? check_same_owner+0x340/0x340 [ 973.716650] ? rcu_note_context_switch+0x730/0x730 [ 973.721572] ? mntput_no_expire+0x18e/0xbc0 [ 973.725879] __should_failslab+0x124/0x180 [ 973.730100] should_failslab+0x9/0x14 [ 973.733891] kmem_cache_alloc_node_trace+0x26f/0x770 [ 973.738974] ? rcu_note_context_switch+0x730/0x730 [ 973.743890] alloc_vmap_area+0x14a/0xa70 [ 973.747933] ? kasan_unpoison_shadow+0x35/0x50 [ 973.752507] ? kasan_kmalloc+0xc4/0xe0 [ 973.756380] ? purge_vmap_area_lazy+0x40/0x40 [ 973.760890] ? trace_hardirqs_on+0x10/0x10 [ 973.765122] __get_vm_area_node+0x17e/0x390 [ 973.769439] __vmalloc_node_range+0xc4/0x760 [ 973.773830] ? bpf_prog_alloc+0xe3/0x3e0 [ 973.777879] ? usercopy_warn+0x120/0x120 [ 973.781928] __vmalloc+0x45/0x50 [ 973.785281] ? bpf_prog_alloc+0xe3/0x3e0 [ 973.789325] bpf_prog_alloc+0xe3/0x3e0 [ 973.793214] ? bpf_prog_kallsyms_find+0x4c0/0x4c0 [ 973.798040] ? mpi_free.cold.1+0x19/0x19 [ 973.802094] ? proc_fail_nth_write+0x9e/0x210 [ 973.806573] ? proc_cwd_link+0x1d0/0x1d0 [ 973.810626] bpf_prog_load+0x435/0x1c90 [ 973.814583] ? bpf_prog_new_fd+0x60/0x60 [ 973.818637] ? lock_acquire+0x1e4/0x540 [ 973.822592] ? __might_fault+0x12b/0x1e0 [ 973.826635] ? lock_downgrade+0x8f0/0x8f0 [ 973.830765] ? lock_release+0xa30/0xa30 [ 973.834722] ? lock_release+0xa30/0xa30 [ 973.838693] ? check_same_owner+0x340/0x340 [ 973.842999] ? __check_object_size+0x9d/0x5f2 [ 973.847489] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 973.853012] __x64_sys_bpf+0x36c/0x510 [ 973.856882] ? bpf_prog_get+0x20/0x20 [ 973.860674] do_syscall_64+0x1b9/0x820 [ 973.864546] ? finish_task_switch+0x1d3/0x890 [ 973.869028] ? syscall_return_slowpath+0x5e0/0x5e0 [ 973.873941] ? syscall_return_slowpath+0x31d/0x5e0 [ 973.878855] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 973.883853] ? prepare_exit_to_usermode+0x291/0x3b0 [ 973.888867] ? perf_trace_sys_enter+0xb10/0xb10 [ 973.893519] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 973.898347] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 973.903527] RIP: 0033:0x455ab9 [ 973.906693] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 973.926126] RSP: 002b:00007f8952c98c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 973.933824] RAX: ffffffffffffffda RBX: 00007f8952c996d4 RCX: 0000000000455ab9 [ 973.941075] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000005 [ 973.948323] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 973.955574] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 973.962826] R13: 00000000004bb7f3 R14: 00000000004c8c08 R15: 0000000000000001 [ 973.970424] syz-executor5: vmalloc: allocation failure: 4096 bytes, mode:0x6280c0(GFP_USER|__GFP_ZERO), nodemask=(null) [ 973.981362] syz-executor5 cpuset=syz5 mems_allowed=0 [ 973.986492] CPU: 0 PID: 339 Comm: syz-executor5 Not tainted 4.18.0-rc3+ #58 [ 973.993581] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 974.002924] Call Trace: [ 974.005497] dump_stack+0x1c9/0x2b4 [ 974.009107] ? dump_stack_print_info.cold.2+0x52/0x52 [ 974.014279] ? trace_hardirqs_off+0xd/0x10 [ 974.018495] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 974.023592] warn_alloc.cold.118+0xb7/0x1bd [ 974.027898] ? zone_watermark_ok_safe+0x3d0/0x3d0 [ 974.032723] ? quarantine_put+0x10d/0x1b0 [ 974.036853] ? __kasan_slab_free+0x131/0x170 [ 974.041246] ? __get_vm_area_node+0x2da/0x390 [ 974.045862] __vmalloc_node_range+0x472/0x760 [ 974.050349] ? usercopy_warn+0x120/0x120 [ 974.054397] __vmalloc+0x45/0x50 [ 974.057756] ? bpf_prog_alloc+0xe3/0x3e0 [ 974.061811] bpf_prog_alloc+0xe3/0x3e0 [ 974.065700] ? bpf_prog_kallsyms_find+0x4c0/0x4c0 [ 974.070527] ? mpi_free.cold.1+0x19/0x19 [ 974.074578] ? proc_fail_nth_write+0x9e/0x210 [ 974.079059] ? proc_cwd_link+0x1d0/0x1d0 [ 974.083107] bpf_prog_load+0x435/0x1c90 [ 974.087066] ? bpf_prog_new_fd+0x60/0x60 [ 974.091119] ? lock_acquire+0x1e4/0x540 [ 974.095074] ? __might_fault+0x12b/0x1e0 [ 974.099119] ? lock_downgrade+0x8f0/0x8f0 [ 974.103246] ? lock_release+0xa30/0xa30 [ 974.107201] ? lock_release+0xa30/0xa30 [ 974.111154] ? check_same_owner+0x340/0x340 [ 974.115469] ? __check_object_size+0x9d/0x5f2 [ 974.119954] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 974.125481] __x64_sys_bpf+0x36c/0x510 [ 974.129353] ? bpf_prog_get+0x20/0x20 [ 974.133144] do_syscall_64+0x1b9/0x820 [ 974.137021] ? finish_task_switch+0x1d3/0x890 [ 974.141504] ? syscall_return_slowpath+0x5e0/0x5e0 [ 974.146428] ? syscall_return_slowpath+0x31d/0x5e0 [ 974.151341] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 974.156338] ? prepare_exit_to_usermode+0x291/0x3b0 [ 974.161354] ? perf_trace_sys_enter+0xb10/0xb10 [ 974.166014] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 974.170858] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 974.176033] RIP: 0033:0x455ab9 [ 974.179200] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 974.198412] RSP: 002b:00007f8952c98c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 974.206104] RAX: ffffffffffffffda RBX: 00007f8952c996d4 RCX: 0000000000455ab9 [ 974.213355] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000005 [ 974.220621] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 974.227879] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 974.235130] R13: 00000000004bb7f3 R14: 00000000004c8c08 R15: 0000000000000001 13:49:27 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74000000]}, 0x48) 13:49:27 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={r0, 0x0, 0x1, 0x6, &(0x7f0000000040)=[0x0, 0x0, 0x0], 0x3}, 0x20) 13:49:27 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='wlan1@}ppp0eth0security!vmnet1/\x00') ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x9) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='#\x00'}, 0x10) socketpair$inet(0x2, 0xa, 0x4bc, &(0x7f00000015c0)={0xffffffffffffffff}) unlink(&(0x7f0000000140)='./file0\x00') socketpair(0x11, 0x5, 0x6, &(0x7f0000001600)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000001640)={r2, r3}) 13:49:27 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:27 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:27 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:27 executing program 5 (fault-call:0 fault-nth:2): bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:27 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900000000000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:27 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd000000]}, 0x48) [ 974.426159] FAULT_INJECTION: forcing a failure. [ 974.426159] name failslab, interval 1, probability 0, space 0, times 0 [ 974.437577] CPU: 0 PID: 377 Comm: syz-executor5 Not tainted 4.18.0-rc3+ #58 [ 974.444686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 974.454046] Call Trace: [ 974.456646] dump_stack+0x1c9/0x2b4 [ 974.460269] ? dump_stack_print_info.cold.2+0x52/0x52 [ 974.465453] should_fail.cold.4+0xa/0x1a [ 974.469528] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 974.474641] ? fs_reclaim_acquire+0x20/0x20 [ 974.478949] ? lock_downgrade+0x8f0/0x8f0 [ 974.483080] ? bpf_prog_load+0x435/0x1c90 [ 974.487226] ? lock_acquire+0x1e4/0x540 [ 974.491185] ? alloc_vmap_area+0x6c1/0xa70 [ 974.495496] ? lock_downgrade+0x8f0/0x8f0 [ 974.499642] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 974.505829] ? __insert_vmap_area+0x339/0x550 [ 974.510315] ? lock_acquire+0x1e4/0x540 [ 974.514280] ? fs_reclaim_acquire+0x20/0x20 [ 974.518586] ? lock_downgrade+0x8f0/0x8f0 [ 974.522719] ? lock_acquire+0x1e4/0x540 [ 974.526686] ? check_same_owner+0x340/0x340 [ 974.530993] ? rcu_note_context_switch+0x730/0x730 [ 974.535908] __should_failslab+0x124/0x180 [ 974.540131] should_failslab+0x9/0x14 [ 974.543914] kmem_cache_alloc_node_trace+0x26f/0x770 [ 974.549011] ? do_raw_spin_lock+0xc1/0x200 [ 974.553234] __kmalloc_node+0x33/0x70 [ 974.557031] __vmalloc_node_range+0x1ed/0x760 [ 974.561521] __vmalloc+0x45/0x50 [ 974.564871] ? bpf_prog_alloc+0xe3/0x3e0 [ 974.568914] bpf_prog_alloc+0xe3/0x3e0 [ 974.572785] ? bpf_prog_kallsyms_find+0x4c0/0x4c0 [ 974.577612] ? mpi_free.cold.1+0x19/0x19 [ 974.581659] ? proc_fail_nth_write+0x9e/0x210 [ 974.586145] ? proc_cwd_link+0x1d0/0x1d0 [ 974.590189] bpf_prog_load+0x435/0x1c90 [ 974.594146] ? bpf_prog_new_fd+0x60/0x60 [ 974.598189] ? lock_acquire+0x1e4/0x540 [ 974.602153] ? __might_fault+0x12b/0x1e0 [ 974.606194] ? lock_downgrade+0x8f0/0x8f0 [ 974.610331] ? lock_release+0xa30/0xa30 [ 974.614286] ? lock_release+0xa30/0xa30 [ 974.618242] ? check_same_owner+0x340/0x340 [ 974.622548] ? __check_object_size+0x9d/0x5f2 [ 974.627035] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 974.632559] __x64_sys_bpf+0x36c/0x510 [ 974.636436] ? bpf_prog_get+0x20/0x20 [ 974.640228] do_syscall_64+0x1b9/0x820 [ 974.644104] ? finish_task_switch+0x1d3/0x890 [ 974.648582] ? syscall_return_slowpath+0x5e0/0x5e0 [ 974.653510] ? syscall_return_slowpath+0x31d/0x5e0 [ 974.658423] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 974.663421] ? prepare_exit_to_usermode+0x291/0x3b0 [ 974.668434] ? perf_trace_sys_enter+0xb10/0xb10 [ 974.673086] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 974.677917] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 974.683090] RIP: 0033:0x455ab9 [ 974.686259] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 974.705430] RSP: 002b:00007f8952c98c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 974.713297] RAX: ffffffffffffffda RBX: 00007f8952c996d4 RCX: 0000000000455ab9 [ 974.720546] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000005 [ 974.727887] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 974.735146] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 974.742397] R13: 00000000004bb7f3 R14: 00000000004c8c08 R15: 0000000000000002 13:49:27 executing program 5 (fault-call:0 fault-nth:3): bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:27 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5a000000]}, 0x48) 13:49:27 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:27 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:27 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:27 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:27 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='wlan1@}ppp0eth0security!vmnet1/\x00') 13:49:27 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c000000]}, 0x48) [ 974.849630] FAULT_INJECTION: forcing a failure. [ 974.849630] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 974.861615] CPU: 0 PID: 396 Comm: syz-executor5 Not tainted 4.18.0-rc3+ #58 [ 974.868723] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 974.878080] Call Trace: [ 974.880675] dump_stack+0x1c9/0x2b4 [ 974.884317] ? dump_stack_print_info.cold.2+0x52/0x52 [ 974.889529] should_fail.cold.4+0xa/0x1a [ 974.893610] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 974.898730] ? kasan_check_read+0x11/0x20 [ 974.902889] ? rcu_is_watching+0x8c/0x150 [ 974.907059] ? is_bpf_text_address+0xd7/0x170 [ 974.911578] ? lock_acquire+0x1e4/0x540 [ 974.915570] ? fs_reclaim_acquire+0x20/0x20 [ 974.919936] ? lock_downgrade+0x8f0/0x8f0 [ 974.924124] ? check_same_owner+0x340/0x340 [ 974.928463] ? rcu_note_context_switch+0x730/0x730 [ 974.933410] ? save_stack+0xa9/0xd0 [ 974.937059] __alloc_pages_nodemask+0x36e/0xdb0 [ 974.941746] ? __alloc_pages_slowpath+0x2d90/0x2d90 [ 974.946771] ? lock_release+0xa30/0xa30 [ 974.950742] ? lock_acquire+0x1e4/0x540 [ 974.954708] ? check_same_owner+0x340/0x340 [ 974.959026] ? kasan_unpoison_shadow+0x35/0x50 [ 974.963609] ? kasan_kmalloc+0xc4/0xe0 [ 974.967485] ? kmem_cache_alloc_node_trace+0x302/0x770 [ 974.972748] ? do_raw_spin_lock+0xc1/0x200 [ 974.976965] ? kasan_unpoison_shadow+0x35/0x50 [ 974.981534] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 974.987053] alloc_pages_current+0x10c/0x210 [ 974.991536] __vmalloc_node_range+0x498/0x760 [ 974.996021] __vmalloc+0x45/0x50 [ 974.999395] ? bpf_prog_alloc+0xe3/0x3e0 [ 975.003441] bpf_prog_alloc+0xe3/0x3e0 [ 975.007323] ? bpf_prog_kallsyms_find+0x4c0/0x4c0 [ 975.012149] ? mpi_free.cold.1+0x19/0x19 [ 975.016194] ? proc_fail_nth_write+0x9e/0x210 [ 975.020671] ? proc_cwd_link+0x1d0/0x1d0 [ 975.024721] bpf_prog_load+0x435/0x1c90 [ 975.028678] ? bpf_prog_new_fd+0x60/0x60 [ 975.032722] ? lock_acquire+0x1e4/0x540 [ 975.036677] ? __might_fault+0x12b/0x1e0 [ 975.040729] ? lock_downgrade+0x8f0/0x8f0 [ 975.044858] ? lock_release+0xa30/0xa30 [ 975.048814] ? lock_release+0xa30/0xa30 [ 975.052772] ? check_same_owner+0x340/0x340 [ 975.057077] ? __check_object_size+0x9d/0x5f2 [ 975.061569] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 975.067101] __x64_sys_bpf+0x36c/0x510 [ 975.070970] ? bpf_prog_get+0x20/0x20 [ 975.074759] do_syscall_64+0x1b9/0x820 [ 975.078628] ? finish_task_switch+0x1d3/0x890 [ 975.083104] ? syscall_return_slowpath+0x5e0/0x5e0 [ 975.088017] ? syscall_return_slowpath+0x31d/0x5e0 [ 975.092936] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 975.097935] ? prepare_exit_to_usermode+0x291/0x3b0 [ 975.102949] ? perf_trace_sys_enter+0xb10/0xb10 [ 975.107604] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 975.112435] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 975.117607] RIP: 0033:0x455ab9 [ 975.120775] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 975.139941] RSP: 002b:00007f8952c98c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 975.147719] RAX: ffffffffffffffda RBX: 00007f8952c996d4 RCX: 0000000000455ab9 [ 975.154979] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000005 [ 975.162231] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 975.169481] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 975.176735] R13: 00000000004bb7f3 R14: 00000000004c8c08 R15: 0000000000000003 [ 975.184080] syz-executor5: vmalloc: allocation failure, allocated 0 of 8192 bytes, mode:0x6280c0(GFP_USER|__GFP_ZERO), nodemask=(null) [ 975.196335] syz-executor5 cpuset=syz5 mems_allowed=0 [ 975.201488] CPU: 0 PID: 396 Comm: syz-executor5 Not tainted 4.18.0-rc3+ #58 [ 975.208581] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 975.217926] Call Trace: [ 975.220510] dump_stack+0x1c9/0x2b4 [ 975.224126] ? dump_stack_print_info.cold.2+0x52/0x52 [ 975.229322] ? lock_acquire+0x1e4/0x540 [ 975.233292] warn_alloc.cold.118+0xb7/0x1bd [ 975.237597] ? zone_watermark_ok_safe+0x3d0/0x3d0 [ 975.242432] ? kasan_kmalloc+0xc4/0xe0 [ 975.246325] ? kmem_cache_alloc_node_trace+0x302/0x770 [ 975.251592] ? do_raw_spin_lock+0xc1/0x200 [ 975.255821] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 975.261352] __vmalloc_node_range+0x527/0x760 [ 975.265833] __vmalloc+0x45/0x50 [ 975.269186] ? bpf_prog_alloc+0xe3/0x3e0 [ 975.273230] bpf_prog_alloc+0xe3/0x3e0 [ 975.277101] ? bpf_prog_kallsyms_find+0x4c0/0x4c0 [ 975.281926] ? mpi_free.cold.1+0x19/0x19 [ 975.285969] ? proc_fail_nth_write+0x9e/0x210 [ 975.290455] ? proc_cwd_link+0x1d0/0x1d0 [ 975.294502] bpf_prog_load+0x435/0x1c90 [ 975.298547] ? bpf_prog_new_fd+0x60/0x60 [ 975.302611] ? lock_acquire+0x1e4/0x540 [ 975.306570] ? __might_fault+0x12b/0x1e0 [ 975.310615] ? lock_downgrade+0x8f0/0x8f0 [ 975.314742] ? lock_release+0xa30/0xa30 [ 975.318701] ? lock_release+0xa30/0xa30 [ 975.322664] ? check_same_owner+0x340/0x340 [ 975.326970] ? __check_object_size+0x9d/0x5f2 [ 975.331457] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 975.336975] __x64_sys_bpf+0x36c/0x510 [ 975.340858] ? bpf_prog_get+0x20/0x20 [ 975.344647] do_syscall_64+0x1b9/0x820 [ 975.348517] ? finish_task_switch+0x1d3/0x890 [ 975.353006] ? syscall_return_slowpath+0x5e0/0x5e0 [ 975.357919] ? syscall_return_slowpath+0x31d/0x5e0 [ 975.362832] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 975.367830] ? prepare_exit_to_usermode+0x291/0x3b0 [ 975.372830] ? perf_trace_sys_enter+0xb10/0xb10 [ 975.377482] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 975.382311] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 975.387490] RIP: 0033:0x455ab9 [ 975.390673] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 975.409839] RSP: 002b:00007f8952c98c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 975.417538] RAX: ffffffffffffffda RBX: 00007f8952c996d4 RCX: 0000000000455ab9 [ 975.424792] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000005 [ 975.432041] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 975.439292] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 975.446544] R13: 00000000004bb7f3 R14: 00000000004c8c08 R15: 0000000000000003 [ 975.453851] warn_alloc_show_mem: 1 callbacks suppressed [ 975.453854] Mem-Info: [ 975.461690] active_anon:20061 inactive_anon:3906 isolated_anon:0 [ 975.461690] active_file:5691 inactive_file:14917 isolated_file:0 [ 975.461690] unevictable:0 dirty:118 writeback:0 unstable:0 [ 975.461690] slab_reclaimable:13346 slab_unreclaimable:101393 [ 975.461690] mapped:75540 shmem:4441 pagetables:1024 bounce:0 [ 975.461690] free:1372533 free_pcp:335 free_cma:0 [ 975.495781] Node 0 active_anon:78088kB inactive_anon:15624kB active_file:22764kB inactive_file:59668kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:302160kB dirty:472kB writeback:0kB shmem:17764kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 59392kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 975.524116] Node 0 DMA free:15908kB min:164kB low:204kB high:244kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 975.550284] lowmem_reserve[]: 0 2827 6331 6331 [ 975.554914] Node 0 DMA32 free:2898208kB min:30100kB low:37624kB high:45148kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129292kB managed:2898892kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:684kB local_pcp:684kB free_cma:0kB [ 975.582670] lowmem_reserve[]: 0 0 3504 3504 [ 975.587042] Node 0 Normal free:2580636kB min:37316kB low:46644kB high:55972kB active_anon:75892kB inactive_anon:15624kB active_file:22764kB inactive_file:59668kB unevictable:0kB writepending:472kB present:4718592kB managed:3589008kB mlocked:0kB kernel_stack:5504kB pagetables:3800kB bounce:0kB free_pcp:1004kB local_pcp:380kB free_cma:0kB [ 975.617043] lowmem_reserve[]: 0 0 0 0 [ 975.620882] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 975.634483] Node 0 DMA32: 2*4kB (M) 5*8kB (M) 1*16kB (M) 5*32kB (M) 1*64kB (M) 2*128kB (M) 1*256kB (M) 3*512kB (M) 4*1024kB (M) 2*2048kB (M) 705*4096kB (M) = 2898208kB [ 975.649700] Node 0 Normal: 185*4kB (UME) 158*8kB (UME) 34*16kB (UME) 90*32kB (UME) 62*64kB (UME) 16*128kB (UME) 70*256kB (UME) 81*512kB (UM) 59*1024kB (UM) 2*2048kB (UE) 597*4096kB (UM) = 2580660kB [ 975.667545] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 975.676145] 25052 total pagecache pages [ 975.680148] 0 pages in swap cache [ 975.683614] Swap cache stats: add 0, delete 0, find 0/0 [ 975.688981] Free swap = 0kB [ 975.692019] Total swap = 0kB [ 975.695085] 1965969 pages RAM [ 975.698193] 0 pages HighMem/MovableOnly 13:49:28 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:28 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c00]}, 0x48) [ 975.702178] 340017 pages reserved 13:49:28 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000640), 0x0, &(0x7f0000000180)=[{0x20, 0x84, 0x2, "00050002000000001c"}], 0x20}, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = getpid() perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x100, 0xfff, 0x80000000, 0x0, 0x1f, 0x10400, 0x8, 0x7ff, 0x5, 0x7, 0x0, 0x4, 0x17a, 0xd3e, 0x20, 0x20, 0x6, 0x9, 0x4, 0xfffffffffffffff9, 0xff, 0x5000, 0x2, 0xa78c, 0x1ff, 0x7, 0x200, 0x80000000, 0x8000, 0x1ff, 0x5, 0x3, 0x8, 0x9, 0x5, 0x0, 0x40, 0x2, @perf_bp={&(0x7f0000000200), 0xc}, 0x600, 0x7, 0x7d29b40a, 0x6, 0x100, 0x80, 0x40}, r3, 0x9, r2, 0x2) r4 = getpid() ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000100)=[{0xff, 0x80000000, 0xffffffff, 0x10001}, {0x9, 0xfffffffffffff001, 0x7, 0x8}, {0x6, 0x9fe, 0x9}, {0x7, 0x10000, 0xff, 0x8001}, {0x8, 0x7, 0x1f, 0x6}, {0x3, 0x5, 0x7, 0x2}, {0x9, 0x0, 0x3, 0x1}, {0x9072, 0xfffffffffffffffb, 0x2, 0x8}]}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x5, 0x4, 0x7f, 0x2, 0x0, 0x401, 0x44, 0x6, 0x0, 0x0, 0x0, 0x3, 0xfffffffffffffffb, 0x4, 0x100, 0x1000, 0x382, 0x3f2e, 0x9, 0x1b2, 0x8001, 0x3, 0xa2, 0x717, 0x9, 0x2, 0x1f, 0x4003, 0x934, 0x0, 0x1f, 0x10000, 0x9, 0x2, 0x1, 0x8, 0x0, 0x401, 0x3, @perf_bp={&(0x7f0000000040)}, 0x402, 0x6, 0x8ae9, 0x0, 0x5, 0x5}, r4, 0xe, r2, 0x8) 13:49:28 executing program 5 (fault-call:0 fault-nth:4): bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:28 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:28 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:28 executing program 3: gettid() socketpair(0x5, 0x800, 0xe7, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x8) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='wlan1@}ppp0eth0security!vmnet1/\x00') r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='\x00', 0xffffffffffffff9c}, 0x10) openat$cgroup_int(r2, &(0x7f00000000c0)='cpu.weight.nice\x00', 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={r2, 0x50, &(0x7f0000000280)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000240)=r3, 0x4) [ 975.794750] FAULT_INJECTION: forcing a failure. [ 975.794750] name failslab, interval 1, probability 0, space 0, times 0 [ 975.806076] CPU: 0 PID: 426 Comm: syz-executor5 Not tainted 4.18.0-rc3+ #58 [ 975.813185] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 975.822543] Call Trace: [ 975.825148] dump_stack+0x1c9/0x2b4 [ 975.828798] ? dump_stack_print_info.cold.2+0x52/0x52 [ 975.834016] should_fail.cold.4+0xa/0x1a [ 975.838094] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 975.843213] ? lock_release+0xa30/0xa30 [ 975.847198] ? lock_acquire+0x1e4/0x540 [ 975.851184] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 975.856299] ? vmap_page_range_noflush+0x754/0xa40 [ 975.861247] ? lock_acquire+0x1e4/0x540 [ 975.865234] ? fs_reclaim_acquire+0x20/0x20 [ 975.869568] ? lock_downgrade+0x8f0/0x8f0 [ 975.873733] ? check_same_owner+0x340/0x340 [ 975.878070] ? rcu_note_context_switch+0x730/0x730 [ 975.883020] ? map_vm_area+0xb2/0xf0 [ 975.886774] __should_failslab+0x124/0x180 [ 975.891025] should_failslab+0x9/0x14 13:49:28 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:28 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c00000000000000]}, 0x48) [ 975.894843] kmem_cache_alloc_trace+0x2cb/0x780 [ 975.899545] ? __vmalloc+0x45/0x50 [ 975.903106] bpf_prog_alloc+0x328/0x3e0 [ 975.907093] ? bpf_prog_kallsyms_find+0x4c0/0x4c0 [ 975.911940] ? mpi_free.cold.1+0x19/0x19 [ 975.916005] ? proc_fail_nth_write+0x9e/0x210 [ 975.920517] ? proc_cwd_link+0x1d0/0x1d0 [ 975.924603] bpf_prog_load+0x435/0x1c90 [ 975.928597] ? bpf_prog_new_fd+0x60/0x60 [ 975.932656] ? lock_acquire+0x1e4/0x540 [ 975.936621] ? __might_fault+0x12b/0x1e0 [ 975.940676] ? lock_downgrade+0x8f0/0x8f0 [ 975.944807] ? lock_release+0xa30/0xa30 [ 975.948777] ? lock_release+0xa30/0xa30 [ 975.952743] ? check_same_owner+0x340/0x340 [ 975.957052] ? __check_object_size+0x9d/0x5f2 [ 975.961546] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 975.967067] __x64_sys_bpf+0x36c/0x510 [ 975.970937] ? bpf_prog_get+0x20/0x20 [ 975.974729] do_syscall_64+0x1b9/0x820 [ 975.978608] ? finish_task_switch+0x1d3/0x890 [ 975.983108] ? syscall_return_slowpath+0x5e0/0x5e0 [ 975.988023] ? syscall_return_slowpath+0x31d/0x5e0 [ 975.992942] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 975.997940] ? prepare_exit_to_usermode+0x291/0x3b0 [ 976.002940] ? perf_trace_sys_enter+0xb10/0xb10 [ 976.007590] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 976.012422] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 976.017593] RIP: 0033:0x455ab9 [ 976.020760] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 13:49:29 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 976.039933] RSP: 002b:00007f8952c98c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 976.047624] RAX: ffffffffffffffda RBX: 00007f8952c996d4 RCX: 0000000000455ab9 [ 976.054875] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000005 [ 976.062126] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 976.069375] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 976.076625] R13: 00000000004bb7f3 R14: 00000000004c8c08 R15: 0000000000000004 13:49:29 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:29 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe80]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:29 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = getpid() ioctl$TUNSETLINK(r0, 0x400454cd, 0x338) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x3f, 0x6, 0x7, 0x9, 0x0, 0x3, 0x80, 0x2, 0x1f, 0x401, 0x2, 0x1, 0x0, 0x1f, 0x1, 0x1, 0x8, 0x9, 0x100, 0x7, 0x401, 0x5, 0x2f3, 0x7fff, 0x6, 0x4, 0x8, 0x1, 0x401, 0x1, 0x80000000, 0xffff, 0x10000, 0x4, 0x3f, 0xffffffffffffff01, 0x0, 0x1e79, 0x2, @perf_config_ext={0x8001, 0xb0}, 0x21208, 0x80000000, 0x8, 0x1, 0x9, 0x57e6, 0x5}, r2, 0x6, r1, 0x8) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x68e8, 0x10000, 0x800, 0x2, 0x0, 0x3, 0x2000, 0x1, 0x0, 0x7f, 0x1f, 0x4, 0x7fff, 0x3ff, 0x4, 0x40, 0x8000, 0xbe61, 0xb4, 0x800, 0x6, 0xfffffffffffffffc, 0x27, 0x0, 0x2, 0x2, 0x4, 0x2, 0x9, 0x4, 0x6, 0x8, 0xfff, 0x1, 0x9, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x6, 0x4}, 0x2020, 0x3, 0x9, 0x7, 0x401, 0x1f, 0x20}, r2, 0x2, 0xffffffffffffff9c, 0x1) 13:49:29 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:29 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000a0ffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:29 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce000000]}, 0x48) 13:49:29 executing program 5 (fault-call:0 fault-nth:5): bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:29 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='wlan1@}ppp0eth0security!vmnet1/\x00') socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000040)="82cd81411dbcda372a4f79e0406a6e946c3f215767c2a372486ada70c75adc9a5567b835208d9fccaf47fc8833cc48b459c5f05139ee2f862217", 0x3a}, {&(0x7f00000000c0)="0bd1", 0x2}, {&(0x7f0000000200)="7aeef2627e5cfc5414074d6b2621ffc6e8a4d5f92f730fb02314c573f23373f50e494cbb48a98bc5c4506e2bf58904e5837c82d6f3a14f198b338e5beeb49cf2f0ab593a4f6a863750dd07f1086b3665717f6d8d6f9087e272c56edf974e8cae25e2d2c25a43284a6f590c26a5f8579c58cc16f1f1befa65a0cb8b111d1b1bbf726441f3f8133fc7dd248f5b02f516f3ca2232b833da8680ab83e8602c48fb5958e57a4f26f7b1350b412a555d5bd6073e348afeb002cc0c381c26a593aa20b40c3c85f0f1b7", 0xc6}, {&(0x7f0000000100)="3547b214f282fbcfa0a5adbaa1c9db72084ea114bbc3e1d258", 0x19}, {&(0x7f0000000140)}, {&(0x7f0000000300)="ef8fee90c9bd1efb4d7e8af67f0f2c22fc8ee2af34915a47cf80bedc70864a8be8966e1905", 0x25}], 0x6, &(0x7f0000000540)=ANY=[@ANYBLOB="500000000000000010010000ff0700006fcc7a4849f96c3600d23b81390f1f3a1c1eb8b5a2de803714881595dab80378581eec351dbd90bd6da4a79d581be744e8b71599dc130af4ad87e98801b8fbc6c8000000000000000c010000000000006f1830a64b470877c523eb7865b5da35722275eacdef24b654a9e2a872e6e0d44e168686d389845df263fb89a35f6bc01daf4eb9bbbd55414d24150dba0d1317ba37c57d6433a3ccdc3471d96a63605ffff3f1cc5b0c569e7950084982f65d18c9e44aa5ce36402b0e585be7d0a62117a66506cdd1fadb6affadbc5fda4dc21470c2d6bf8d1a9942e8e9a36c2a6fa6d2b89cf8eedfabb690e8793714664be961bc6a7f6700a23ff493e9dab291f75fbd7d27825245594bed41eef12b86c512380000"], 0x118, 0x4000000}, 0x20004001) [ 976.253363] FAULT_INJECTION: forcing a failure. [ 976.253363] name failslab, interval 1, probability 0, space 0, times 0 [ 976.264749] CPU: 0 PID: 475 Comm: syz-executor5 Not tainted 4.18.0-rc3+ #58 [ 976.271868] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 976.281485] Call Trace: [ 976.284079] dump_stack+0x1c9/0x2b4 [ 976.287717] ? dump_stack_print_info.cold.2+0x52/0x52 [ 976.292899] should_fail.cold.4+0xa/0x1a [ 976.296952] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 976.302040] ? __kernel_text_address+0xd/0x40 [ 976.306519] ? unwind_get_return_address+0x61/0xa0 [ 976.311441] ? trace_hardirqs_on+0x10/0x10 [ 976.315686] ? lock_acquire+0x1e4/0x540 [ 976.319646] ? fs_reclaim_acquire+0x20/0x20 [ 976.323952] ? lock_downgrade+0x8f0/0x8f0 [ 976.328085] ? zap_class+0x740/0x740 [ 976.331783] ? check_same_owner+0x340/0x340 [ 976.336106] ? rcu_note_context_switch+0x730/0x730 [ 976.341031] __should_failslab+0x124/0x180 [ 976.345264] should_failslab+0x9/0x14 [ 976.349050] kmem_cache_alloc_trace+0x2cb/0x780 [ 976.353703] ? bpf_prog_load+0x106d/0x1c90 [ 976.357923] ? lock_downgrade+0x8f0/0x8f0 [ 976.362059] bpf_check+0xc7/0x5e60 [ 976.365586] ? pvclock_read_flags+0x160/0x160 [ 976.370076] ? __might_fault+0x12b/0x1e0 [ 976.374123] ? kvm_clock_read+0x25/0x30 [ 976.378080] ? fixup_bpf_calls+0x1fb0/0x1fb0 [ 976.382475] ? ktime_get_with_offset+0x32e/0x4b0 [ 976.387229] ? ktime_get+0x440/0x440 [ 976.390940] ? memset+0x31/0x40 [ 976.394204] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 976.399827] ? bpf_obj_name_cpy+0x17c/0x1c0 [ 976.404135] bpf_prog_load+0x1141/0x1c90 [ 976.408182] ? bpf_prog_new_fd+0x60/0x60 [ 976.412229] ? lock_acquire+0x1e4/0x540 [ 976.416186] ? __might_fault+0x12b/0x1e0 [ 976.420242] ? lock_downgrade+0x8f0/0x8f0 [ 976.424378] ? lock_release+0xa30/0xa30 [ 976.428339] ? check_same_owner+0x340/0x340 [ 976.432645] ? __check_object_size+0x9d/0x5f2 [ 976.437139] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 976.442663] __x64_sys_bpf+0x36c/0x510 [ 976.446536] ? bpf_prog_get+0x20/0x20 [ 976.450340] do_syscall_64+0x1b9/0x820 [ 976.454211] ? finish_task_switch+0x1d3/0x890 [ 976.458691] ? syscall_return_slowpath+0x5e0/0x5e0 [ 976.463606] ? syscall_return_slowpath+0x31d/0x5e0 [ 976.468519] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 976.473524] ? prepare_exit_to_usermode+0x291/0x3b0 [ 976.478532] ? perf_trace_sys_enter+0xb10/0xb10 [ 976.483186] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 976.488018] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 976.493188] RIP: 0033:0x455ab9 [ 976.496356] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 976.516236] RSP: 002b:00007f8952c98c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 976.523932] RAX: ffffffffffffffda RBX: 00007f8952c996d4 RCX: 0000000000455ab9 [ 976.531191] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000005 [ 976.538451] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 976.545715] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 13:49:29 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:29 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x3, 0x11) close(r1) socket$kcm(0xa, 0x6, 0x0) setsockopt$sock_attach_bpf(r1, 0x29, 0x23, &(0x7f0000000280), 0xcc) close(r1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a8e3ae6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.usage_percpu\x00', 0x0, 0x0) [ 976.552977] R13: 00000000004bb7f3 R14: 00000000004c8c08 R15: 0000000000000005 13:49:29 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:29 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4002]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:29 executing program 5 (fault-call:0 fault-nth:6): bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:29 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='wlan1@}ppp0eth0security!vmnet1/\x00') 13:49:29 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:29 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x6, 0x70, 0x1, 0xfffffffffffffffa, 0x57b, 0xffffffff80000000, 0x0, 0x4, 0x0, 0x4c3a610d2137e86b, 0x80000001, 0x5, 0x1, 0x9, 0x2, 0x7, 0x3, 0xff, 0x8, 0x95cc, 0x7, 0x4ac, 0x9, 0x8, 0x100, 0xffffffffffffffe0, 0x0, 0x10000, 0x0, 0x7fffffff, 0x6, 0x1, 0x200, 0x1, 0x4, 0x898, 0xffffffffffffffa5, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000040), 0xe}, 0x100, 0x2, 0x4, 0x5, 0x1, 0x0, 0x3}, r0, 0x3, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:29 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000]}, 0x48) [ 976.721540] FAULT_INJECTION: forcing a failure. [ 976.721540] name failslab, interval 1, probability 0, space 0, times 0 [ 976.732881] CPU: 0 PID: 504 Comm: syz-executor5 Not tainted 4.18.0-rc3+ #58 [ 976.739990] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 976.749347] Call Trace: [ 976.751949] dump_stack+0x1c9/0x2b4 [ 976.755678] ? dump_stack_print_info.cold.2+0x52/0x52 [ 976.760894] should_fail.cold.4+0xa/0x1a [ 976.764974] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 976.770269] ? is_bpf_text_address+0xd7/0x170 [ 976.774797] ? kernel_text_address+0x79/0xf0 [ 976.779226] ? __kernel_text_address+0xd/0x40 [ 976.783736] ? unwind_get_return_address+0x61/0xa0 [ 976.788674] ? __save_stack_trace+0x8d/0xf0 [ 976.793001] ? lock_acquire+0x1e4/0x540 [ 976.796972] ? fs_reclaim_acquire+0x20/0x20 [ 976.801292] ? lock_downgrade+0x8f0/0x8f0 [ 976.805470] ? kmem_cache_alloc_trace+0x152/0x780 [ 976.810305] ? check_same_owner+0x340/0x340 [ 976.814612] ? rcu_note_context_switch+0x730/0x730 [ 976.819527] __should_failslab+0x124/0x180 [ 976.823747] should_failslab+0x9/0x14 [ 976.827530] kmem_cache_alloc_node_trace+0x26f/0x770 [ 976.832616] ? lock_downgrade+0x8f0/0x8f0 [ 976.836839] __get_vm_area_node+0x12d/0x390 [ 976.841144] __vmalloc_node_range+0xc4/0x760 [ 976.845535] ? bpf_check+0x13e/0x5e60 [ 976.849336] ? kmem_cache_alloc_trace+0x318/0x780 [ 976.854162] ? bpf_check+0x13e/0x5e60 [ 976.857961] vzalloc+0x6f/0x80 [ 976.861138] ? bpf_check+0x13e/0x5e60 [ 976.864951] bpf_check+0x13e/0x5e60 [ 976.868566] ? pvclock_read_flags+0x160/0x160 [ 976.873056] ? __might_fault+0x12b/0x1e0 [ 976.877118] ? kvm_clock_read+0x25/0x30 [ 976.881094] ? fixup_bpf_calls+0x1fb0/0x1fb0 [ 976.885488] ? ktime_get_with_offset+0x32e/0x4b0 [ 976.890238] ? ktime_get+0x440/0x440 [ 976.893947] ? memset+0x31/0x40 [ 976.897212] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 976.902730] ? bpf_obj_name_cpy+0x17c/0x1c0 [ 976.907037] bpf_prog_load+0x1141/0x1c90 [ 976.911087] ? bpf_prog_new_fd+0x60/0x60 [ 976.915134] ? lock_acquire+0x1e4/0x540 [ 976.919094] ? __might_fault+0x12b/0x1e0 [ 976.923139] ? lock_downgrade+0x8f0/0x8f0 [ 976.927270] ? lock_release+0xa30/0xa30 [ 976.931230] ? check_same_owner+0x340/0x340 [ 976.935536] ? __check_object_size+0x9d/0x5f2 [ 976.940027] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 976.945551] __x64_sys_bpf+0x36c/0x510 [ 976.949435] ? bpf_prog_get+0x20/0x20 [ 976.953237] do_syscall_64+0x1b9/0x820 [ 976.957107] ? finish_task_switch+0x1d3/0x890 [ 976.961594] ? syscall_return_slowpath+0x5e0/0x5e0 [ 976.966514] ? syscall_return_slowpath+0x31d/0x5e0 [ 976.971441] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 976.976446] ? prepare_exit_to_usermode+0x291/0x3b0 [ 976.981455] ? perf_trace_sys_enter+0xb10/0xb10 [ 976.986109] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 976.990940] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 976.996120] RIP: 0033:0x455ab9 [ 976.999289] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 13:49:30 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 977.018500] RSP: 002b:00007f8952c98c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 977.026190] RAX: ffffffffffffffda RBX: 00007f8952c996d4 RCX: 0000000000455ab9 [ 977.033545] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000005 [ 977.040799] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 977.048144] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 977.055403] R13: 00000000004bb7f3 R14: 00000000004c8c08 R15: 0000000000000006 [ 977.062905] syz-executor5: vmalloc: allocation failure: 240 bytes, mode:0x6080c0(GFP_KERNEL|__GFP_ZERO), nodemask=(null) [ 977.073953] syz-executor5 cpuset=syz5 mems_allowed=0 [ 977.079135] CPU: 0 PID: 504 Comm: syz-executor5 Not tainted 4.18.0-rc3+ #58 [ 977.086243] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 977.095601] Call Trace: [ 977.098207] dump_stack+0x1c9/0x2b4 [ 977.101843] ? dump_stack_print_info.cold.2+0x52/0x52 [ 977.107051] warn_alloc.cold.118+0xb7/0x1bd [ 977.111391] ? zone_watermark_ok_safe+0x3d0/0x3d0 [ 977.116245] ? kmem_cache_alloc_node_trace+0x302/0x770 [ 977.121517] ? __get_vm_area_node+0x2da/0x390 [ 977.125998] __vmalloc_node_range+0x472/0x760 [ 977.130485] ? kmem_cache_alloc_trace+0x318/0x780 [ 977.135312] ? bpf_check+0x13e/0x5e60 [ 977.139116] vzalloc+0x6f/0x80 [ 977.142292] ? bpf_check+0x13e/0x5e60 [ 977.146074] bpf_check+0x13e/0x5e60 [ 977.149685] ? pvclock_read_flags+0x160/0x160 [ 977.154168] ? __might_fault+0x12b/0x1e0 [ 977.158216] ? kvm_clock_read+0x25/0x30 [ 977.162173] ? fixup_bpf_calls+0x1fb0/0x1fb0 [ 977.166563] ? ktime_get_with_offset+0x32e/0x4b0 [ 977.171312] ? ktime_get+0x440/0x440 [ 977.175014] ? memset+0x31/0x40 [ 977.178279] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 977.183797] ? bpf_obj_name_cpy+0x17c/0x1c0 [ 977.188104] bpf_prog_load+0x1141/0x1c90 [ 977.192153] ? bpf_prog_new_fd+0x60/0x60 [ 977.196198] ? lock_acquire+0x1e4/0x540 [ 977.200156] ? __might_fault+0x12b/0x1e0 [ 977.204203] ? lock_downgrade+0x8f0/0x8f0 [ 977.208334] ? lock_release+0xa30/0xa30 [ 977.212293] ? check_same_owner+0x340/0x340 [ 977.216607] ? __check_object_size+0x9d/0x5f2 [ 977.221093] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 977.226624] __x64_sys_bpf+0x36c/0x510 [ 977.230493] ? bpf_prog_get+0x20/0x20 [ 977.234295] do_syscall_64+0x1b9/0x820 [ 977.238164] ? finish_task_switch+0x1d3/0x890 [ 977.242659] ? syscall_return_slowpath+0x5e0/0x5e0 [ 977.247572] ? syscall_return_slowpath+0x31d/0x5e0 [ 977.252492] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 977.257490] ? prepare_exit_to_usermode+0x291/0x3b0 [ 977.262490] ? perf_trace_sys_enter+0xb10/0xb10 [ 977.267146] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 977.271977] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 977.277147] RIP: 0033:0x455ab9 [ 977.280315] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 977.299514] RSP: 002b:00007f8952c98c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 977.307204] RAX: ffffffffffffffda RBX: 00007f8952c996d4 RCX: 0000000000455ab9 [ 977.314454] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000005 [ 977.321708] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 977.328962] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 977.336213] R13: 00000000004bb7f3 R14: 00000000004c8c08 R15: 0000000000000006 [ 977.343537] Mem-Info: [ 977.346005] active_anon:21083 inactive_anon:3906 isolated_anon:0 [ 977.346005] active_file:5691 inactive_file:14939 isolated_file:0 [ 977.346005] unevictable:0 dirty:23 writeback:13 unstable:0 [ 977.346005] slab_reclaimable:13355 slab_unreclaimable:101280 [ 977.346005] mapped:75554 shmem:4441 pagetables:1037 bounce:0 [ 977.346005] free:1371585 free_pcp:397 free_cma:0 [ 977.380053] Node 0 active_anon:84332kB inactive_anon:15624kB active_file:22764kB inactive_file:59756kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:302216kB dirty:92kB writeback:52kB shmem:17764kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 57344kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 977.408471] Node 0 DMA free:15908kB min:164kB low:204kB high:244kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 977.434651] lowmem_reserve[]: 0 2827 6331 6331 [ 977.439301] Node 0 DMA32 free:2898208kB min:30100kB low:37624kB high:45148kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129292kB managed:2898892kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:684kB local_pcp:684kB free_cma:0kB [ 977.467048] lowmem_reserve[]: 0 0 3504 3504 [ 977.471700] Node 0 Normal free:2571832kB min:37316kB low:46644kB high:55972kB active_anon:82244kB inactive_anon:15624kB active_file:22764kB inactive_file:59756kB unevictable:0kB writepending:0kB present:4718592kB managed:3589008kB mlocked:0kB kernel_stack:5728kB pagetables:4148kB bounce:0kB free_pcp:780kB local_pcp:408kB free_cma:0kB [ 977.501525] lowmem_reserve[]: 0 0 0 0 [ 977.505396] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 977.519078] Node 0 DMA32: 2*4kB (M) 5*8kB (M) 1*16kB (M) 5*32kB (M) 1*64kB (M) 2*128kB (M) 1*256kB (M) 3*512kB (M) 4*1024kB (M) 2*2048kB (M) 705*4096kB (M) = 2898208kB [ 977.534342] Node 0 Normal: 80*4kB (ME) 80*8kB (UME) 41*16kB (UME) 86*32kB (UME) 61*64kB (UME) 16*128kB (UME) 70*256kB (UME) 81*512kB (UM) 59*1024kB (UM) 4*2048kB (UME) 595*4096kB (UM) = 2575440kB [ 977.552052] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 977.560673] 25070 total pagecache pages [ 977.564691] 0 pages in swap cache [ 977.568194] Swap cache stats: add 0, delete 0, find 0/0 13:49:30 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x240]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:30 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8729cdfeff3f0f70]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:30 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700]}, 0x48) 13:49:30 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:30 executing program 5 (fault-call:0 fault-nth:7): bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:30 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1500000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 977.573585] Free swap = 0kB [ 977.576635] Total swap = 0kB [ 977.579689] 1965969 pages RAM [ 977.582820] 0 pages HighMem/MovableOnly [ 977.586808] 340017 pages reserved 13:49:30 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:30 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74]}, 0x48) 13:49:30 executing program 3: r0 = getpid() r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='#eth1-trustedppp0\'lo#wlan1.\x00'}, 0x10) ioctl$TUNSETVNETBE(r1, 0x400454de, &(0x7f0000000140)=0x1) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x6, 0x2, 0x754d, 0x8, 0x0, 0x6402, 0x205, 0xb, 0x8, 0x6, 0x40, 0x400, 0x7, 0x6a, 0x8, 0x1, 0x8001, 0x1, 0xfffffffffffffffe, 0x200, 0x8, 0x7, 0x9, 0x80, 0x4b, 0x5, 0x1, 0x1f, 0x982f, 0x0, 0x2f, 0xf6, 0x3, 0x16079506, 0x4, 0x100000000, 0x0, 0x200000000000000, 0x2, @perf_config_ext={0xfffffffffffffffb}, 0x10000, 0x4, 0x4, 0x5, 0xffffffffffffffc1, 0x667, 0x3}, r0, 0xc, r1, 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000100)={r1}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x128, 0x3ff, 0x401, 0x9, 0x0, 0x4, 0x20000, 0x1, 0x2, 0x1, 0x9, 0x4, 0xdf5, 0x2, 0x1, 0x5, 0xffff, 0x5, 0x8001, 0x1e800, 0x8, 0x7fff, 0xff, 0x9b86, 0x2, 0x8, 0x42d6af4b, 0x6, 0x45e, 0x3, 0x8001, 0x10000, 0x3f, 0x100000001, 0x0, 0x600000000, 0x0, 0x3a, 0x3, @perf_bp={&(0x7f0000000200), 0x2}, 0x128, 0xfffffffffffffeff, 0x5, 0x3, 0x400, 0x800, 0x1f}, r0, 0x6, r1, 0xb) 13:49:30 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:30 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f010000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 977.643101] FAULT_INJECTION: forcing a failure. [ 977.643101] name failslab, interval 1, probability 0, space 0, times 0 [ 977.654464] CPU: 0 PID: 533 Comm: syz-executor5 Not tainted 4.18.0-rc3+ #58 [ 977.661658] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 977.671113] Call Trace: [ 977.673712] dump_stack+0x1c9/0x2b4 [ 977.677351] ? dump_stack_print_info.cold.2+0x52/0x52 [ 977.682560] should_fail.cold.4+0xa/0x1a [ 977.686985] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 977.692103] ? is_bpf_text_address+0xd7/0x170 [ 977.696613] ? kernel_text_address+0x79/0xf0 [ 977.701037] ? __kernel_text_address+0xd/0x40 [ 977.705542] ? unwind_get_return_address+0x61/0xa0 [ 977.710662] ? __save_stack_trace+0x8d/0xf0 [ 977.715008] ? lock_acquire+0x1e4/0x540 [ 977.718996] ? fs_reclaim_acquire+0x20/0x20 [ 977.723382] ? lock_downgrade+0x8f0/0x8f0 [ 977.727546] ? kmem_cache_alloc_trace+0x152/0x780 [ 977.732413] ? __alloc_pages_slowpath+0x2d90/0x2d90 [ 977.737442] ? check_same_owner+0x340/0x340 [ 977.741777] ? rcu_note_context_switch+0x730/0x730 [ 977.746720] __should_failslab+0x124/0x180 [ 977.750967] should_failslab+0x9/0x14 [ 977.754776] kmem_cache_alloc_node_trace+0x26f/0x770 [ 977.759893] ? kasan_check_read+0x11/0x20 [ 977.764053] ? do_raw_spin_unlock+0xa7/0x2f0 [ 977.768484] __get_vm_area_node+0x12d/0x390 [ 977.772819] ? do_raw_spin_lock+0xc1/0x200 [ 977.777089] __vmalloc_node_range+0xc4/0x760 [ 977.781529] ? bpf_check+0x13e/0x5e60 [ 977.785392] ? kmem_cache_alloc_trace+0x318/0x780 13:49:30 executing program 4: socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000040)='cgroup.clone_children\x00', 0x2, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xf, 0x0, 0x6, 0x40, 0x2, 0x1, 0x4}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r2, &(0x7f0000000240)="7c08cb6c631f4c79b0c00663981d0016ec90e25ff0ca575663fae8ca1cd96527a4cdb100efbb167a32b7bec5f347192280f86b83e92a965c6c4b6f04a8e167752192803170af90ed771724a47b3050fb103ef1a00da8f007b233ab86503a61847d19f725c933e3893b9e8930c2d1fb5827af21eb137c6fa6ae74829b", &(0x7f00000002c0)=""/37}, 0x18) r3 = openat$cgroup_subtree(r1, &(0x7f00000003c0)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x80000000, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000100)={0x7, 0x70, 0x3, 0x200, 0x8001, 0x35, 0x0, 0x10000, 0x400, 0xc, 0x8, 0x1, 0x7, 0x81, 0x2, 0x1, 0x0, 0x1f, 0xffff, 0x9, 0xffffffffffffff81, 0x100, 0x2, 0xfffffffffffffffc, 0x4, 0x1000, 0xffffffffffffffff, 0x8, 0xe12, 0x8, 0x2, 0x4, 0x5, 0x4, 0x4, 0x7fffffff, 0xef24, 0x1ff, 0x0, 0x3, 0x0, @perf_config_ext={0x9, 0x5}, 0x4090, 0x0, 0x8, 0x5, 0x1, 0x1, 0x988}) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f00000000c0)=0x7ffffffb) 13:49:30 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f01]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 977.790252] ? bpf_check+0x13e/0x5e60 [ 977.794063] vzalloc+0x6f/0x80 [ 977.797304] ? bpf_check+0x13e/0x5e60 [ 977.801114] bpf_check+0x13e/0x5e60 [ 977.804753] ? pvclock_read_flags+0x160/0x160 [ 977.809261] ? __might_fault+0x12b/0x1e0 [ 977.813336] ? kvm_clock_read+0x25/0x30 [ 977.817326] ? fixup_bpf_calls+0x1fb0/0x1fb0 [ 977.821746] ? ktime_get_with_offset+0x32e/0x4b0 [ 977.826510] ? ktime_get+0x440/0x440 [ 977.830232] ? memset+0x31/0x40 [ 977.833515] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 977.839056] ? bpf_obj_name_cpy+0x17c/0x1c0 [ 977.843392] bpf_prog_load+0x1141/0x1c90 [ 977.847463] ? bpf_prog_new_fd+0x60/0x60 [ 977.851526] ? lock_acquire+0x1e4/0x540 [ 977.855488] ? __might_fault+0x12b/0x1e0 [ 977.859540] ? lock_downgrade+0x8f0/0x8f0 [ 977.863676] ? lock_release+0xa30/0xa30 [ 977.867642] ? check_same_owner+0x340/0x340 [ 977.871963] ? __check_object_size+0x9d/0x5f2 [ 977.876457] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 977.881992] __x64_sys_bpf+0x36c/0x510 [ 977.885869] ? bpf_prog_get+0x20/0x20 [ 977.889662] do_syscall_64+0x1b9/0x820 [ 977.893530] ? finish_task_switch+0x1d3/0x890 [ 977.898097] ? syscall_return_slowpath+0x5e0/0x5e0 [ 977.903017] ? syscall_return_slowpath+0x31d/0x5e0 [ 977.907943] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 977.912944] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 977.918466] ? prepare_exit_to_usermode+0x291/0x3b0 [ 977.923463] ? perf_trace_sys_enter+0xb10/0xb10 [ 977.928126] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 977.932956] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 977.938137] RIP: 0033:0x455ab9 [ 977.941304] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 977.960572] RSP: 002b:00007f8952c98c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 977.968264] RAX: ffffffffffffffda RBX: 00007f8952c996d4 RCX: 0000000000455ab9 [ 977.975516] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000005 [ 977.982789] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 977.990040] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 977.997299] R13: 00000000004bb7f3 R14: 00000000004c8c08 R15: 0000000000000007 [ 978.004718] syz-executor5: vmalloc: allocation failure: 240 bytes, mode:0x6080c0(GFP_KERNEL|__GFP_ZERO), nodemask=(null) [ 978.015794] syz-executor5 cpuset=syz5 mems_allowed=0 [ 978.020949] CPU: 0 PID: 533 Comm: syz-executor5 Not tainted 4.18.0-rc3+ #58 [ 978.028044] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 978.037390] Call Trace: [ 978.039973] dump_stack+0x1c9/0x2b4 [ 978.043597] ? dump_stack_print_info.cold.2+0x52/0x52 [ 978.048786] warn_alloc.cold.118+0xb7/0x1bd [ 978.053103] ? zone_watermark_ok_safe+0x3d0/0x3d0 [ 978.057942] ? kmem_cache_alloc_node_trace+0x302/0x770 [ 978.063211] ? kasan_check_read+0x11/0x20 [ 978.067353] ? do_raw_spin_unlock+0xa7/0x2f0 [ 978.071746] ? __get_vm_area_node+0x2da/0x390 [ 978.076224] ? do_raw_spin_lock+0xc1/0x200 [ 978.080443] __vmalloc_node_range+0x472/0x760 [ 978.084926] ? kmem_cache_alloc_trace+0x318/0x780 [ 978.089750] ? bpf_check+0x13e/0x5e60 [ 978.093542] vzalloc+0x6f/0x80 [ 978.096719] ? bpf_check+0x13e/0x5e60 [ 978.100502] bpf_check+0x13e/0x5e60 [ 978.104112] ? pvclock_read_flags+0x160/0x160 [ 978.108612] ? __might_fault+0x12b/0x1e0 [ 978.112656] ? kvm_clock_read+0x25/0x30 [ 978.116613] ? fixup_bpf_calls+0x1fb0/0x1fb0 [ 978.121007] ? ktime_get_with_offset+0x32e/0x4b0 [ 978.125750] ? ktime_get+0x440/0x440 [ 978.129454] ? memset+0x31/0x40 [ 978.132719] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 978.138245] ? bpf_obj_name_cpy+0x17c/0x1c0 [ 978.142561] bpf_prog_load+0x1141/0x1c90 [ 978.146613] ? bpf_prog_new_fd+0x60/0x60 [ 978.150659] ? lock_acquire+0x1e4/0x540 [ 978.154622] ? __might_fault+0x12b/0x1e0 [ 978.158668] ? lock_downgrade+0x8f0/0x8f0 [ 978.162795] ? lock_release+0xa30/0xa30 [ 978.166753] ? check_same_owner+0x340/0x340 [ 978.171059] ? __check_object_size+0x9d/0x5f2 [ 978.175550] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 978.181072] __x64_sys_bpf+0x36c/0x510 [ 978.184939] ? bpf_prog_get+0x20/0x20 [ 978.188731] do_syscall_64+0x1b9/0x820 [ 978.192606] ? finish_task_switch+0x1d3/0x890 [ 978.197083] ? syscall_return_slowpath+0x5e0/0x5e0 [ 978.201996] ? syscall_return_slowpath+0x31d/0x5e0 [ 978.206917] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 978.211918] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 978.217441] ? prepare_exit_to_usermode+0x291/0x3b0 [ 978.222443] ? perf_trace_sys_enter+0xb10/0xb10 [ 978.227105] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 978.231942] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 978.237121] RIP: 0033:0x455ab9 [ 978.240291] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 978.259462] RSP: 002b:00007f8952c98c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 978.267934] RAX: ffffffffffffffda RBX: 00007f8952c996d4 RCX: 0000000000455ab9 [ 978.275195] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000005 [ 978.282453] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 13:49:31 executing program 5 (fault-call:0 fault-nth:8): bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 978.289704] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 978.296958] R13: 00000000004bb7f3 R14: 00000000004c8c08 R15: 0000000000000007 13:49:31 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:31 executing program 3: socketpair(0x9, 0x80000, 0x7fffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNGETSNDBUF(r1, 0x800454d3, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x2, 0x357, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x0) 13:49:31 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:31 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:31 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff0f]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 978.403829] FAULT_INJECTION: forcing a failure. [ 978.403829] name failslab, interval 1, probability 0, space 0, times 0 [ 978.415232] CPU: 0 PID: 572 Comm: syz-executor5 Not tainted 4.18.0-rc3+ #58 [ 978.422433] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 978.431798] Call Trace: [ 978.434408] dump_stack+0x1c9/0x2b4 [ 978.438057] ? dump_stack_print_info.cold.2+0x52/0x52 [ 978.443268] should_fail.cold.4+0xa/0x1a [ 978.447374] ? fault_create_debugfs_attr+0x1f0/0x1f0 13:49:31 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, 0x48) [ 978.452494] ? fs_reclaim_acquire+0x20/0x20 [ 978.456831] ? lock_downgrade+0x8f0/0x8f0 [ 978.461000] ? lock_release+0xa30/0xa30 [ 978.464994] ? lock_acquire+0x1e4/0x540 [ 978.468984] ? alloc_vmap_area+0x6c1/0xa70 [ 978.473234] ? lock_downgrade+0x8f0/0x8f0 [ 978.477397] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 978.482946] ? __insert_vmap_area+0x339/0x550 [ 978.487462] ? lock_acquire+0x1e4/0x540 [ 978.491453] ? fs_reclaim_acquire+0x20/0x20 [ 978.495816] ? lock_downgrade+0x8f0/0x8f0 [ 978.499983] ? lock_acquire+0x1e4/0x540 [ 978.505158] ? check_same_owner+0x340/0x340 [ 978.509499] ? rcu_note_context_switch+0x730/0x730 [ 978.514449] __should_failslab+0x124/0x180 [ 978.518719] should_failslab+0x9/0x14 [ 978.522547] kmem_cache_alloc_node_trace+0x26f/0x770 [ 978.527655] ? do_raw_spin_lock+0xc1/0x200 [ 978.531896] __kmalloc_node+0x33/0x70 [ 978.535689] __vmalloc_node_range+0x1ed/0x760 [ 978.540178] ? kmem_cache_alloc_trace+0x318/0x780 [ 978.545012] ? bpf_check+0x13e/0x5e60 [ 978.548807] vzalloc+0x6f/0x80 [ 978.551989] ? bpf_check+0x13e/0x5e60 [ 978.555778] bpf_check+0x13e/0x5e60 [ 978.559393] ? pvclock_read_flags+0x160/0x160 [ 978.563873] ? __might_fault+0x12b/0x1e0 [ 978.567933] ? kvm_clock_read+0x25/0x30 [ 978.571990] ? fixup_bpf_calls+0x1fb0/0x1fb0 [ 978.576392] ? ktime_get_with_offset+0x32e/0x4b0 [ 978.581144] ? ktime_get+0x440/0x440 [ 978.584845] ? memset+0x31/0x40 [ 978.588109] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 978.593628] ? bpf_obj_name_cpy+0x17c/0x1c0 [ 978.597944] bpf_prog_load+0x1141/0x1c90 [ 978.601993] ? bpf_prog_new_fd+0x60/0x60 [ 978.606047] ? lock_acquire+0x1e4/0x540 [ 978.610007] ? __might_fault+0x12b/0x1e0 [ 978.614054] ? lock_downgrade+0x8f0/0x8f0 [ 978.618183] ? lock_release+0xa30/0xa30 [ 978.622143] ? check_same_owner+0x340/0x340 [ 978.626452] ? __check_object_size+0x9d/0x5f2 [ 978.630947] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 978.636470] __x64_sys_bpf+0x36c/0x510 [ 978.640341] ? bpf_prog_get+0x20/0x20 [ 978.644129] do_syscall_64+0x1b9/0x820 [ 978.648009] ? finish_task_switch+0x1d3/0x890 [ 978.652496] ? syscall_return_slowpath+0x5e0/0x5e0 [ 978.657410] ? syscall_return_slowpath+0x31d/0x5e0 [ 978.662411] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 978.667415] ? prepare_exit_to_usermode+0x291/0x3b0 [ 978.672513] ? perf_trace_sys_enter+0xb10/0xb10 [ 978.677166] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 978.681997] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 978.687170] RIP: 0033:0x455ab9 13:49:31 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 978.690336] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 978.709589] RSP: 002b:00007f8952c98c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 978.717290] RAX: ffffffffffffffda RBX: 00007f8952c996d4 RCX: 0000000000455ab9 [ 978.724541] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000005 [ 978.731797] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 978.739062] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 978.746322] R13: 00000000004bb7f3 R14: 00000000004c8c08 R15: 0000000000000008 13:49:31 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:31 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:31 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:31 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='wlan1@}ppp0eth0security!vmnet1/\x00') socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) 13:49:31 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000080)={0x3, 0x70, 0x1, 0x8, 0x0, 0x70c7eac, 0x0, 0x0, 0x40, 0x8, 0x6c8, 0x238d, 0x0, 0x401, 0x8, 0x100000000, 0x7, 0x3f, 0x7f, 0x8000, 0x7, 0x3e, 0x100, 0x2, 0x9, 0x5c, 0x17f95270, 0x0, 0xffffffffffff7b46, 0x7940, 0x6, 0x8000000000000000, 0x2, 0x6, 0xa8, 0x1, 0x400, 0x7, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000040), 0x1}, 0x300, 0x3, 0x8, 0x2, 0x1, 0x5, 0xfffffffffffffffc}) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:31 executing program 5 (fault-call:0 fault-nth:9): bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 978.900084] FAULT_INJECTION: forcing a failure. [ 978.900084] name failslab, interval 1, probability 0, space 0, times 0 [ 978.911453] CPU: 0 PID: 612 Comm: syz-executor5 Not tainted 4.18.0-rc3+ #58 [ 978.918909] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 978.928275] Call Trace: [ 978.930883] dump_stack+0x1c9/0x2b4 [ 978.934519] ? dump_stack_print_info.cold.2+0x52/0x52 [ 978.939701] should_fail.cold.4+0xa/0x1a [ 978.943751] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 978.948935] ? lock_downgrade+0x8f0/0x8f0 [ 978.953067] ? bpf_prog_load+0x1141/0x1c90 [ 978.957298] ? lock_acquire+0x1e4/0x540 [ 978.961262] ? alloc_vmap_area+0x6c1/0xa70 [ 978.965481] ? lock_downgrade+0x8f0/0x8f0 [ 978.969615] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 978.975143] ? __insert_vmap_area+0x339/0x550 [ 978.979625] ? lock_acquire+0x1e4/0x540 [ 978.983592] ? fs_reclaim_acquire+0x20/0x20 [ 978.987898] ? lock_downgrade+0x8f0/0x8f0 [ 978.992037] ? lock_acquire+0x1e4/0x540 [ 978.995995] ? check_same_owner+0x340/0x340 [ 979.000308] ? rcu_note_context_switch+0x730/0x730 [ 979.005230] __should_failslab+0x124/0x180 [ 979.009489] should_failslab+0x9/0x14 [ 979.013288] kmem_cache_alloc_node_trace+0x26f/0x770 [ 979.018381] ? do_raw_spin_lock+0xc1/0x200 [ 979.022866] __kmalloc_node+0x33/0x70 [ 979.026663] __vmalloc_node_range+0x1ed/0x760 [ 979.031148] ? kmem_cache_alloc_trace+0x318/0x780 [ 979.035976] ? bpf_check+0x13e/0x5e60 [ 979.039763] vzalloc+0x6f/0x80 [ 979.042949] ? bpf_check+0x13e/0x5e60 [ 979.046742] bpf_check+0x13e/0x5e60 [ 979.050356] ? pvclock_read_flags+0x160/0x160 [ 979.054838] ? __might_fault+0x12b/0x1e0 [ 979.058887] ? kvm_clock_read+0x25/0x30 [ 979.062845] ? fixup_bpf_calls+0x1fb0/0x1fb0 [ 979.067245] ? ktime_get_with_offset+0x32e/0x4b0 [ 979.072004] ? ktime_get+0x440/0x440 [ 979.075709] ? memset+0x31/0x40 [ 979.078982] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 979.084505] ? bpf_obj_name_cpy+0x17c/0x1c0 [ 979.088820] bpf_prog_load+0x1141/0x1c90 [ 979.092876] ? bpf_prog_new_fd+0x60/0x60 [ 979.096923] ? lock_acquire+0x1e4/0x540 [ 979.101920] ? __might_fault+0x12b/0x1e0 [ 979.105973] ? lock_downgrade+0x8f0/0x8f0 [ 979.110105] ? lock_release+0xa30/0xa30 [ 979.114066] ? check_same_owner+0x340/0x340 [ 979.118372] ? __check_object_size+0x9d/0x5f2 [ 979.122859] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 979.128477] __x64_sys_bpf+0x36c/0x510 [ 979.132352] ? bpf_prog_get+0x20/0x20 [ 979.136317] do_syscall_64+0x1b9/0x820 [ 979.140184] ? finish_task_switch+0x1d3/0x890 [ 979.144664] ? syscall_return_slowpath+0x5e0/0x5e0 [ 979.149632] ? syscall_return_slowpath+0x31d/0x5e0 [ 979.154552] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 979.159552] ? prepare_exit_to_usermode+0x291/0x3b0 [ 979.164552] ? perf_trace_sys_enter+0xb10/0xb10 [ 979.169214] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 979.174058] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 979.179232] RIP: 0033:0x455ab9 13:49:32 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 979.182423] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 979.201716] RSP: 002b:00007f8952c98c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 979.209412] RAX: ffffffffffffffda RBX: 00007f8952c996d4 RCX: 0000000000455ab9 [ 979.216675] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000005 [ 979.223928] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 979.231182] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 979.238438] R13: 00000000004bb7f3 R14: 00000000004c8c08 R15: 0000000000000009 13:49:32 executing program 5 (fault-call:0 fault-nth:10): bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:32 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:32 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:32 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 979.336449] FAULT_INJECTION: forcing a failure. [ 979.336449] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 979.348401] CPU: 0 PID: 627 Comm: syz-executor5 Not tainted 4.18.0-rc3+ #58 [ 979.355619] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 979.364979] Call Trace: [ 979.367584] dump_stack+0x1c9/0x2b4 [ 979.371237] ? dump_stack_print_info.cold.2+0x52/0x52 [ 979.376467] should_fail.cold.4+0xa/0x1a [ 979.380553] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 979.385708] ? kasan_check_read+0x11/0x20 [ 979.389867] ? rcu_is_watching+0x8c/0x150 [ 979.394051] ? is_bpf_text_address+0xd7/0x170 [ 979.398568] ? kernel_text_address+0x79/0xf0 [ 979.403082] ? lock_acquire+0x1e4/0x540 [ 979.407072] ? fs_reclaim_acquire+0x20/0x20 [ 979.411414] ? lock_downgrade+0x8f0/0x8f0 [ 979.415598] ? check_same_owner+0x340/0x340 [ 979.419950] ? rcu_note_context_switch+0x730/0x730 [ 979.424891] ? save_stack+0xa9/0xd0 [ 979.428531] __alloc_pages_nodemask+0x36e/0xdb0 [ 979.433200] ? __alloc_pages_slowpath+0x2d90/0x2d90 [ 979.438219] ? lock_release+0xa30/0xa30 [ 979.442183] ? lock_acquire+0x1e4/0x540 [ 979.446143] ? check_same_owner+0x340/0x340 [ 979.450452] ? kasan_unpoison_shadow+0x35/0x50 [ 979.455023] ? kasan_kmalloc+0xc4/0xe0 [ 979.458911] ? kmem_cache_alloc_node_trace+0x302/0x770 [ 979.464170] ? do_raw_spin_lock+0xc1/0x200 [ 979.468389] ? kasan_unpoison_shadow+0x35/0x50 [ 979.472964] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 979.478487] alloc_pages_current+0x10c/0x210 [ 979.482882] __vmalloc_node_range+0x498/0x760 [ 979.487361] ? kmem_cache_alloc_trace+0x318/0x780 [ 979.492197] ? bpf_check+0x13e/0x5e60 [ 979.495988] vzalloc+0x6f/0x80 [ 979.499167] ? bpf_check+0x13e/0x5e60 [ 979.502965] bpf_check+0x13e/0x5e60 [ 979.506576] ? pvclock_read_flags+0x160/0x160 [ 979.511055] ? __might_fault+0x12b/0x1e0 [ 979.515185] ? kvm_clock_read+0x25/0x30 [ 979.519142] ? fixup_bpf_calls+0x1fb0/0x1fb0 [ 979.523546] ? ktime_get_with_offset+0x32e/0x4b0 [ 979.528297] ? ktime_get+0x440/0x440 [ 979.531999] ? memset+0x31/0x40 [ 979.535265] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 979.540791] ? bpf_obj_name_cpy+0x17c/0x1c0 [ 979.545094] bpf_prog_load+0x1141/0x1c90 [ 979.549144] ? bpf_prog_new_fd+0x60/0x60 [ 979.553188] ? lock_acquire+0x1e4/0x540 [ 979.557146] ? __might_fault+0x12b/0x1e0 [ 979.561197] ? lock_downgrade+0x8f0/0x8f0 [ 979.565332] ? lock_release+0xa30/0xa30 [ 979.569291] ? check_same_owner+0x340/0x340 [ 979.573598] ? __check_object_size+0x9d/0x5f2 [ 979.578089] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 979.583618] __x64_sys_bpf+0x36c/0x510 [ 979.587487] ? bpf_prog_get+0x20/0x20 [ 979.591275] do_syscall_64+0x1b9/0x820 [ 979.595144] ? finish_task_switch+0x1d3/0x890 [ 979.599620] ? syscall_return_slowpath+0x5e0/0x5e0 [ 979.604535] ? syscall_return_slowpath+0x31d/0x5e0 [ 979.609447] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 979.614446] ? prepare_exit_to_usermode+0x291/0x3b0 [ 979.619444] ? perf_trace_sys_enter+0xb10/0xb10 [ 979.624096] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 979.628937] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 979.634106] RIP: 0033:0x455ab9 [ 979.637273] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 979.656453] RSP: 002b:00007f8952c98c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 979.664144] RAX: ffffffffffffffda RBX: 00007f8952c996d4 RCX: 0000000000455ab9 [ 979.671397] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000005 [ 979.678731] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 13:49:32 executing program 4: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='bdev\x00'}, 0x10) openat$cgroup_ro(r0, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:32 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00000000000000]}, 0x48) 13:49:32 executing program 3: r0 = perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x70, 0x3ff, 0x66, 0x1000, 0xffff, 0x0, 0x5, 0x100, 0x1, 0x7, 0x7ff, 0x84, 0x114, 0x8, 0x3, 0x2, 0x6, 0x81, 0x200, 0x7, 0xa3c, 0x8, 0x3, 0x9, 0x8, 0x8000, 0xd6, 0x800, 0x10000, 0xf787, 0x5f77, 0xda77, 0x1, 0xee, 0x1f, 0x3, 0x8a, 0x0, 0x20, 0x0, @perf_config_ext={0x1}, 0x0, 0x2, 0x4, 0x6, 0x3, 0x7a4, 0xffff}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000280)='&-') r1 = getpid() socketpair(0x13, 0x0, 0x7c3, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f00000000c0)={0x4, 0x70, 0x3, 0x84, 0x1, 0x6, 0x0, 0xfffffffffffffffe, 0x81000, 0x1, 0x3f, 0x8, 0x800, 0x100000001, 0x7fffffff, 0x7fffffff, 0x2, 0x8, 0xfffffffffffffffb, 0xfffffffffffffff9, 0x58, 0xfd, 0x9b, 0x3a56, 0xbfa, 0xcfc, 0x3f, 0x8000, 0x5, 0xffffffff, 0xfff, 0x8001, 0x0, 0x5d, 0x800, 0xe2, 0x400, 0x1, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000000000), 0xe}, 0x11400, 0x6, 0x3, 0x4, 0x5, 0x8, 0x100000000}, r1, 0x8, r2, 0x8) socketpair(0xe, 0xf, 0x3ef8, &(0x7f0000000140)) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000080)='\b') [ 979.685981] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 979.693231] R13: 00000000004bb7f3 R14: 00000000004c8c08 R15: 000000000000000a [ 979.700628] syz-executor5: vmalloc: allocation failure, allocated 0 of 8192 bytes, mode:0x6080c0(GFP_KERNEL|__GFP_ZERO), nodemask=(null) [ 979.713109] syz-executor5 cpuset=syz5 mems_allowed=0 [ 979.718293] CPU: 0 PID: 627 Comm: syz-executor5 Not tainted 4.18.0-rc3+ #58 [ 979.725393] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 979.734743] Call Trace: 13:49:32 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff0f0000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 979.737338] dump_stack+0x1c9/0x2b4 [ 979.740974] ? dump_stack_print_info.cold.2+0x52/0x52 [ 979.746173] ? lock_acquire+0x1e4/0x540 [ 979.750164] warn_alloc.cold.118+0xb7/0x1bd [ 979.754506] ? zone_watermark_ok_safe+0x3d0/0x3d0 [ 979.759360] ? kasan_kmalloc+0xc4/0xe0 [ 979.763259] ? kmem_cache_alloc_node_trace+0x302/0x770 [ 979.768540] ? do_raw_spin_lock+0xc1/0x200 [ 979.772780] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 979.778340] __vmalloc_node_range+0x527/0x760 [ 979.782850] ? bpf_check+0x13e/0x5e60 [ 979.786661] vzalloc+0x6f/0x80 [ 979.789862] ? bpf_check+0x13e/0x5e60 [ 979.793670] bpf_check+0x13e/0x5e60 [ 979.797294] ? pvclock_read_flags+0x160/0x160 [ 979.801779] ? __might_fault+0x12b/0x1e0 [ 979.805822] ? kvm_clock_read+0x25/0x30 [ 979.809777] ? fixup_bpf_calls+0x1fb0/0x1fb0 [ 979.814167] ? ktime_get_with_offset+0x32e/0x4b0 [ 979.818916] ? ktime_get+0x440/0x440 [ 979.822617] ? memset+0x31/0x40 [ 979.825877] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 979.831395] ? bpf_obj_name_cpy+0x17c/0x1c0 [ 979.835698] bpf_prog_load+0x1141/0x1c90 [ 979.839751] ? bpf_prog_new_fd+0x60/0x60 [ 979.843805] ? lock_acquire+0x1e4/0x540 [ 979.847768] ? __might_fault+0x12b/0x1e0 [ 979.851818] ? lock_downgrade+0x8f0/0x8f0 [ 979.855947] ? lock_release+0xa30/0xa30 [ 979.859905] ? check_same_owner+0x340/0x340 [ 979.864218] ? __check_object_size+0x9d/0x5f2 [ 979.868701] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 979.874237] __x64_sys_bpf+0x36c/0x510 [ 979.878108] ? bpf_prog_get+0x20/0x20 [ 979.881984] do_syscall_64+0x1b9/0x820 [ 979.885855] ? finish_task_switch+0x1d3/0x890 [ 979.890333] ? syscall_return_slowpath+0x5e0/0x5e0 [ 979.895253] ? syscall_return_slowpath+0x31d/0x5e0 [ 979.900166] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 979.905180] ? prepare_exit_to_usermode+0x291/0x3b0 [ 979.910195] ? perf_trace_sys_enter+0xb10/0xb10 [ 979.914855] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 979.919684] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 979.924857] RIP: 0033:0x455ab9 [ 979.928024] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 979.947201] RSP: 002b:00007f8952c98c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 979.954895] RAX: ffffffffffffffda RBX: 00007f8952c996d4 RCX: 0000000000455ab9 [ 979.962146] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000005 [ 979.969397] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 979.976654] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 979.983912] R13: 00000000004bb7f3 R14: 00000000004c8c08 R15: 000000000000000a [ 979.991240] warn_alloc_show_mem: 1 callbacks suppressed [ 979.991243] Mem-Info: [ 979.999079] active_anon:19519 inactive_anon:3904 isolated_anon:0 [ 979.999079] active_file:5694 inactive_file:14959 isolated_file:0 [ 979.999079] unevictable:0 dirty:54 writeback:0 unstable:0 [ 979.999079] slab_reclaimable:13359 slab_unreclaimable:101511 [ 979.999079] mapped:75535 shmem:4441 pagetables:1050 bounce:0 [ 979.999079] free:1372901 free_pcp:366 free_cma:0 13:49:33 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:33 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 980.033008] Node 0 active_anon:75952kB inactive_anon:15616kB active_file:22776kB inactive_file:59836kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:302140kB dirty:216kB writeback:0kB shmem:17764kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 59392kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 980.061425] Node 0 DMA free:15908kB min:164kB low:204kB high:244kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 980.087621] lowmem_reserve[]: 0 2827 6331 6331 [ 980.092247] Node 0 DMA32 free:2898208kB min:30100kB low:37624kB high:45148kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129292kB managed:2898892kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:684kB local_pcp:684kB free_cma:0kB [ 980.120019] lowmem_reserve[]: 0 0 3504 3504 13:49:33 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 980.124387] Node 0 Normal free:2578612kB min:37316kB low:46644kB high:55972kB active_anon:78044kB inactive_anon:15616kB active_file:22772kB inactive_file:59912kB unevictable:0kB writepending:292kB present:4718592kB managed:3589008kB mlocked:0kB kernel_stack:5664kB pagetables:4076kB bounce:0kB free_pcp:920kB local_pcp:252kB free_cma:0kB [ 980.154302] lowmem_reserve[]: 0 0 0 0 [ 980.158154] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 980.171942] Node 0 DMA32: 2*4kB (M) 5*8kB (M) 1*16kB (M) 5*32kB (M) 1*64kB (M) 2*128kB (M) 1*256kB (M) 3*512kB (M) 4*1024kB (M) 2*2048kB (M) 705*4096kB (M) = 2898208kB 13:49:33 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 980.187184] Node 0 Normal: 153*4kB (UME) 170*8kB (UE) 32*16kB (UE) 89*32kB (UME) 58*64kB (UME) 16*128kB (UME) 70*256kB (UME) 81*512kB (UM) 59*1024kB (UM) 2*2048kB (UE) 596*4096kB (UM) = 2576212kB [ 980.204889] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 980.213496] 25111 total pagecache pages [ 980.217511] 0 pages in swap cache [ 980.220997] Swap cache stats: add 0, delete 0, find 0/0 [ 980.226406] Free swap = 0kB [ 980.229444] Total swap = 0kB [ 980.232496] 1965969 pages RAM [ 980.235619] 0 pages HighMem/MovableOnly 13:49:33 executing program 5 (fault-call:0 fault-nth:11): bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 980.239621] 340017 pages reserved 13:49:33 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:33 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000]}, 0x48) 13:49:33 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe800000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:33 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:33 executing program 4 (fault-call:4 fault-nth:0): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socket$kcm(0x2, 0x1, 0x0) [ 980.287535] FAULT_INJECTION: forcing a failure. [ 980.287535] name failslab, interval 1, probability 0, space 0, times 0 [ 980.298874] CPU: 0 PID: 671 Comm: syz-executor5 Not tainted 4.18.0-rc3+ #58 [ 980.305997] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 980.315354] Call Trace: [ 980.317980] dump_stack+0x1c9/0x2b4 [ 980.321626] ? dump_stack_print_info.cold.2+0x52/0x52 [ 980.326833] ? kasan_check_read+0x11/0x20 [ 980.330999] ? rcu_is_watching+0x8c/0x150 [ 980.335187] should_fail.cold.4+0xa/0x1a [ 980.339270] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 980.344418] ? __kernel_text_address+0xd/0x40 [ 980.348930] ? unwind_get_return_address+0x61/0xa0 [ 980.353874] ? __save_stack_trace+0x8d/0xf0 [ 980.358223] ? lock_acquire+0x1e4/0x540 [ 980.362209] ? fs_reclaim_acquire+0x20/0x20 [ 980.366549] ? lock_downgrade+0x8f0/0x8f0 [ 980.370707] ? bpf_check+0x662/0x5e60 [ 980.374520] ? check_same_owner+0x340/0x340 [ 980.378862] ? rcu_note_context_switch+0x730/0x730 [ 980.383809] __should_failslab+0x124/0x180 [ 980.388062] should_failslab+0x9/0x14 [ 980.391894] kmem_cache_alloc_node_trace+0x26f/0x770 [ 980.397040] ? rcu_note_context_switch+0x730/0x730 [ 980.401998] alloc_vmap_area+0x14a/0xa70 [ 980.406076] ? kasan_unpoison_shadow+0x35/0x50 [ 980.410677] ? kasan_kmalloc+0xc4/0xe0 [ 980.414587] ? purge_vmap_area_lazy+0x40/0x40 [ 980.419105] __get_vm_area_node+0x17e/0x390 [ 980.423450] __vmalloc_node_range+0xc4/0x760 [ 980.427869] ? bpf_prog_calc_tag+0xc9/0x7d0 [ 980.432203] ? bpf_prog_calc_tag+0xc9/0x7d0 [ 980.436537] vmalloc+0x6f/0x80 [ 980.439748] ? bpf_prog_calc_tag+0xc9/0x7d0 [ 980.444081] bpf_prog_calc_tag+0xc9/0x7d0 [ 980.448242] ? check_same_owner+0x340/0x340 [ 980.452583] ? __bpf_prog_free+0x50/0x50 [ 980.456664] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 980.462223] ? __vmalloc_node_range+0x477/0x760 [ 980.466909] bpf_check+0x662/0x5e60 [ 980.470545] ? pvclock_read_flags+0x160/0x160 [ 980.475480] ? fixup_bpf_calls+0x1fb0/0x1fb0 [ 980.479876] ? ktime_get_with_offset+0x32e/0x4b0 [ 980.484617] ? ktime_get+0x440/0x440 [ 980.488318] ? memset+0x31/0x40 [ 980.491581] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 980.497104] ? bpf_obj_name_cpy+0x17c/0x1c0 [ 980.501984] bpf_prog_load+0x1141/0x1c90 [ 980.506040] ? bpf_prog_new_fd+0x60/0x60 [ 980.510094] ? lock_acquire+0x1e4/0x540 [ 980.514062] ? __might_fault+0x12b/0x1e0 [ 980.518119] ? lock_downgrade+0x8f0/0x8f0 [ 980.522263] ? lock_release+0xa30/0xa30 [ 980.526223] ? check_same_owner+0x340/0x340 [ 980.530538] ? __check_object_size+0x9d/0x5f2 [ 980.535041] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 980.540566] __x64_sys_bpf+0x36c/0x510 [ 980.544439] ? bpf_prog_get+0x20/0x20 [ 980.548237] do_syscall_64+0x1b9/0x820 [ 980.552109] ? finish_task_switch+0x1d3/0x890 [ 980.556600] ? syscall_return_slowpath+0x5e0/0x5e0 [ 980.561513] ? syscall_return_slowpath+0x31d/0x5e0 [ 980.566434] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 980.571442] ? prepare_exit_to_usermode+0x291/0x3b0 [ 980.576443] ? perf_trace_sys_enter+0xb10/0xb10 [ 980.581105] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 980.585961] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 980.591142] RIP: 0033:0x455ab9 [ 980.594305] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 980.613441] RSP: 002b:00007f8952c98c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 980.621172] RAX: ffffffffffffffda RBX: 00007f8952c996d4 RCX: 0000000000455ab9 [ 980.628445] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000005 [ 980.635695] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 980.642957] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 980.650210] R13: 00000000004bb7f3 R14: 00000000004c8c08 R15: 000000000000000b [ 980.657654] syz-executor5: vmalloc: allocation failure: 128 bytes, mode:0x6000c0(GFP_KERNEL), nodemask=(null) [ 980.667742] syz-executor5 cpuset=syz5 mems_allowed=0 [ 980.672884] CPU: 0 PID: 671 Comm: syz-executor5 Not tainted 4.18.0-rc3+ #58 [ 980.679999] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 980.689342] Call Trace: [ 980.691918] dump_stack+0x1c9/0x2b4 [ 980.695543] ? dump_stack_print_info.cold.2+0x52/0x52 [ 980.700723] ? trace_hardirqs_off+0xd/0x10 [ 980.704951] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 980.710044] warn_alloc.cold.118+0xb7/0x1bd [ 980.714353] ? zone_watermark_ok_safe+0x3d0/0x3d0 [ 980.719197] ? quarantine_put+0x10d/0x1b0 [ 980.723341] ? __kasan_slab_free+0x131/0x170 [ 980.727734] ? __get_vm_area_node+0x2da/0x390 [ 980.732233] __vmalloc_node_range+0x472/0x760 [ 980.736724] ? bpf_prog_calc_tag+0xc9/0x7d0 [ 980.741041] vmalloc+0x6f/0x80 [ 980.744223] ? bpf_prog_calc_tag+0xc9/0x7d0 [ 980.748533] bpf_prog_calc_tag+0xc9/0x7d0 [ 980.752666] ? check_same_owner+0x340/0x340 [ 980.756984] ? __bpf_prog_free+0x50/0x50 [ 980.761052] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 980.766581] ? __vmalloc_node_range+0x477/0x760 [ 980.771249] bpf_check+0x662/0x5e60 [ 980.774872] ? pvclock_read_flags+0x160/0x160 [ 980.779372] ? fixup_bpf_calls+0x1fb0/0x1fb0 [ 980.783775] ? ktime_get_with_offset+0x32e/0x4b0 [ 980.788530] ? ktime_get+0x440/0x440 [ 980.792236] ? memset+0x31/0x40 [ 980.795527] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 980.801055] ? bpf_obj_name_cpy+0x17c/0x1c0 [ 980.805372] bpf_prog_load+0x1141/0x1c90 [ 980.809426] ? bpf_prog_new_fd+0x60/0x60 [ 980.813471] ? lock_acquire+0x1e4/0x540 [ 980.817427] ? __might_fault+0x12b/0x1e0 [ 980.821484] ? lock_downgrade+0x8f0/0x8f0 [ 980.825622] ? lock_release+0xa30/0xa30 [ 980.829584] ? check_same_owner+0x340/0x340 [ 980.833904] ? __check_object_size+0x9d/0x5f2 [ 980.838400] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 980.843939] __x64_sys_bpf+0x36c/0x510 [ 980.847830] ? bpf_prog_get+0x20/0x20 [ 980.851643] do_syscall_64+0x1b9/0x820 [ 980.855525] ? finish_task_switch+0x1d3/0x890 [ 980.860007] ? syscall_return_slowpath+0x5e0/0x5e0 [ 980.864939] ? syscall_return_slowpath+0x31d/0x5e0 [ 980.869870] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 980.874883] ? prepare_exit_to_usermode+0x291/0x3b0 [ 980.879888] ? perf_trace_sys_enter+0xb10/0xb10 [ 980.884551] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 980.889383] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 980.894554] RIP: 0033:0x455ab9 [ 980.897727] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 980.916861] RSP: 002b:00007f8952c98c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 980.924556] RAX: ffffffffffffffda RBX: 00007f8952c996d4 RCX: 0000000000455ab9 [ 980.931828] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000005 [ 980.939080] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 980.946333] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 980.953585] R13: 00000000004bb7f3 R14: 00000000004c8c08 R15: 000000000000000b [ 981.014496] FAULT_INJECTION: forcing a failure. [ 981.014496] name failslab, interval 1, probability 0, space 0, times 0 [ 981.023873] FAULT_INJECTION: forcing a failure. [ 981.023873] name failslab, interval 1, probability 0, space 0, times 0 [ 981.025858] CPU: 1 PID: 678 Comm: syz-executor4 Not tainted 4.18.0-rc3+ #58 [ 981.044165] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 981.053511] Call Trace: [ 981.056102] dump_stack+0x1c9/0x2b4 [ 981.059724] ? dump_stack_print_info.cold.2+0x52/0x52 [ 981.064904] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 981.069742] should_fail.cold.4+0xa/0x1a [ 981.073802] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 981.078895] ? lock_release+0xa30/0xa30 [ 981.082865] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 981.088400] ? _parse_integer+0x13b/0x190 [ 981.092543] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 981.098074] ? _kstrtoull+0x188/0x250 [ 981.101867] ? _parse_integer+0x190/0x190 [ 981.106013] ? lock_acquire+0x1e4/0x540 [ 981.109977] ? fs_reclaim_acquire+0x20/0x20 [ 981.114292] ? lock_downgrade+0x8f0/0x8f0 [ 981.118433] ? check_same_owner+0x340/0x340 [ 981.122753] ? get_pid_task+0xd8/0x1a0 [ 981.126631] ? rcu_note_context_switch+0x730/0x730 [ 981.131581] __should_failslab+0x124/0x180 [ 981.135809] should_failslab+0x9/0x14 [ 981.139601] kmem_cache_alloc+0x2af/0x760 [ 981.143747] ? __f_unlock_pos+0x19/0x20 [ 981.147720] sock_alloc_inode+0x78/0x320 [ 981.151779] ? sock_destroy_inode+0x70/0x70 [ 981.156090] ? proc_cwd_link+0x1d0/0x1d0 [ 981.160143] ? sock_destroy_inode+0x70/0x70 [ 981.164456] alloc_inode+0x63/0x190 [ 981.168074] new_inode_pseudo+0x71/0x1a0 [ 981.172210] ? prune_icache_sb+0x1b0/0x1b0 [ 981.176433] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 981.181350] ? fsnotify+0xbb4/0x14e0 [ 981.185053] ? vfs_write+0x2ee/0x560 [ 981.188777] sock_alloc+0x41/0x270 [ 981.192307] __sock_create+0x175/0x940 [ 981.196195] ? kernel_sock_ip_overhead+0x570/0x570 [ 981.201115] ? __sb_end_write+0xac/0xe0 [ 981.205089] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 981.210616] __sys_socket+0x106/0x260 [ 981.214408] ? move_addr_to_kernel+0x70/0x70 [ 981.218809] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 981.224340] __x64_sys_socket+0x73/0xb0 [ 981.228307] do_syscall_64+0x1b9/0x820 [ 981.232181] ? finish_task_switch+0x1d3/0x890 [ 981.236664] ? syscall_return_slowpath+0x5e0/0x5e0 [ 981.241588] ? syscall_return_slowpath+0x31d/0x5e0 [ 981.246508] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 981.251515] ? prepare_exit_to_usermode+0x291/0x3b0 [ 981.256522] ? perf_trace_sys_enter+0xb10/0xb10 [ 981.261184] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 981.266025] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 981.271203] RIP: 0033:0x455ab9 [ 981.274385] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 981.293640] RSP: 002b:00007fd16db8fc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 981.301349] RAX: ffffffffffffffda RBX: 00007fd16db906d4 RCX: 0000000000455ab9 [ 981.308605] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000002 13:49:34 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:34 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:34 executing program 5 (fault-call:0 fault-nth:12): bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:34 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a]}, 0x48) 13:49:34 executing program 3: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x9, 0x5048a5c5, 0x4, 0x101, 0x0, 0xa12f4db, 0x40, 0xf, 0xa, 0x8, 0xaf6, 0x101, 0x1, 0x800, 0x3f, 0x80, 0x100000000, 0x3ff, 0x9, 0x2c, 0x1, 0x0, 0x7, 0x2, 0x4e, 0x2, 0x8, 0x6, 0xffffffff, 0x6, 0x200, 0xfff, 0x7, 0x8, 0x80, 0x8001, 0x0, 0x985, 0x0, @perf_config_ext={0x8001, 0x2}, 0x10000, 0x2, 0x3, 0x4, 0x2, 0xffffffff00000001, 0xc9}, 0xffffffffffffffff, 0x7, 0xffffffffffffff9c, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000000c0)='wlan1@}ppp0eth0security!vmnet1/\x00') r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='wlan1@}ppp0eth0security!vmnet1/\x00') r2 = getpid() perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x99d, 0x6, 0x80000001, 0xea, 0x0, 0x7ff, 0x110, 0x8, 0xffff, 0x801, 0x9, 0x2, 0x7, 0x0, 0x2, 0x8, 0x5, 0xffffffff80000001, 0x9, 0x7, 0xff, 0x16, 0x6, 0x3, 0x9, 0x7, 0x8, 0x2, 0x4bcf, 0x7fff, 0x7fff, 0x1, 0x747f, 0x7, 0x6, 0x4, 0x0, 0x2, 0x4, @perf_config_ext={0xfffffffffffffff7, 0x7}, 0x40, 0x0, 0x100000001, 0x7, 0x2, 0x100000001, 0x7fff}, r2, 0x6, r0, 0x1) [ 981.315868] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 981.323123] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 981.330387] R13: 00000000004c1d93 R14: 00000000004d35d0 R15: 0000000000000000 [ 981.337664] CPU: 0 PID: 693 Comm: syz-executor5 Not tainted 4.18.0-rc3+ #58 [ 981.337713] socket: no more sockets [ 981.344756] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 981.344761] Call Trace: [ 981.344782] dump_stack+0x1c9/0x2b4 [ 981.363935] ? dump_stack_print_info.cold.2+0x52/0x52 [ 981.369223] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 981.374096] should_fail.cold.4+0xa/0x1a [ 981.378186] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 981.383297] ? perf_trace_lock+0x920/0x920 [ 981.387545] ? alloc_vmap_area+0x6c1/0xa70 [ 981.391787] ? lock_downgrade+0x8f0/0x8f0 [ 981.395951] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 981.401496] ? __insert_vmap_area+0x339/0x550 [ 981.406006] ? lock_acquire+0x1e4/0x540 [ 981.409984] ? fs_reclaim_acquire+0x20/0x20 [ 981.414309] ? lock_downgrade+0x8f0/0x8f0 [ 981.418461] ? lock_acquire+0x1e4/0x540 [ 981.422440] ? check_same_owner+0x340/0x340 [ 981.426773] ? rcu_note_context_switch+0x730/0x730 [ 981.431712] __should_failslab+0x124/0x180 [ 981.435956] should_failslab+0x9/0x14 [ 981.439760] kmem_cache_alloc_node_trace+0x26f/0x770 [ 981.444850] ? do_raw_spin_lock+0xc1/0x200 [ 981.449084] __kmalloc_node+0x33/0x70 [ 981.452881] __vmalloc_node_range+0x1ed/0x760 [ 981.457368] ? bpf_prog_calc_tag+0xc9/0x7d0 [ 981.461678] vmalloc+0x6f/0x80 [ 981.464860] ? bpf_prog_calc_tag+0xc9/0x7d0 [ 981.469167] bpf_prog_calc_tag+0xc9/0x7d0 [ 981.473302] ? check_same_owner+0x340/0x340 [ 981.477616] ? __bpf_prog_free+0x50/0x50 [ 981.481667] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 981.487191] ? __vmalloc_node_range+0x477/0x760 [ 981.491868] bpf_check+0x662/0x5e60 [ 981.495484] ? pvclock_read_flags+0x160/0x160 [ 981.499977] ? fixup_bpf_calls+0x1fb0/0x1fb0 [ 981.504370] ? ktime_get_with_offset+0x32e/0x4b0 [ 981.509116] ? ktime_get+0x440/0x440 [ 981.512824] ? memset+0x31/0x40 [ 981.516091] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 981.521614] ? bpf_obj_name_cpy+0x17c/0x1c0 [ 981.525922] bpf_prog_load+0x1141/0x1c90 [ 981.529979] ? bpf_prog_new_fd+0x60/0x60 [ 981.534031] ? lock_acquire+0x1e4/0x540 [ 981.537994] ? __might_fault+0x12b/0x1e0 [ 981.542044] ? lock_downgrade+0x8f0/0x8f0 [ 981.546187] ? __check_object_size+0x9d/0x5f2 [ 981.550688] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 981.556221] __x64_sys_bpf+0x36c/0x510 [ 981.560096] ? bpf_prog_get+0x20/0x20 [ 981.563897] do_syscall_64+0x1b9/0x820 [ 981.567767] ? finish_task_switch+0x1d3/0x890 [ 981.572258] ? syscall_return_slowpath+0x5e0/0x5e0 [ 981.577174] ? syscall_return_slowpath+0x31d/0x5e0 [ 981.582091] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 981.587212] ? prepare_exit_to_usermode+0x291/0x3b0 [ 981.592222] ? perf_trace_sys_enter+0xb10/0xb10 [ 981.596877] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 981.601720] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 981.606897] RIP: 0033:0x455ab9 [ 981.610076] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 981.629356] RSP: 002b:00007f8952c98c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 981.637054] RAX: ffffffffffffffda RBX: 00007f8952c996d4 RCX: 0000000000455ab9 [ 981.644315] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000005 [ 981.651566] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 981.658828] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 13:49:34 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:34 executing program 3: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='wlan1@}ppp0eth0security!vmnet1/\x00', 0xffffffffffffff9c}, 0x10) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x7, 0x6ac771be, 0xb9ab000, 0x100, 0x0, 0x400000000000000, 0x50000, 0x1, 0x81, 0x6, 0x5, 0x3ff, 0x1, 0x6, 0x6, 0x4af, 0x3, 0x7, 0x1, 0x0, 0x7, 0x3, 0x4, 0x1, 0xe491, 0x80000001, 0xff, 0x0, 0x10dc, 0x80000001, 0x9, 0xffffffffffff1e7b, 0x10000, 0x9, 0x3, 0x9ff, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000000), 0x4}, 0x20, 0xfff, 0x3, 0x1, 0x7, 0x2, 0x1}, r2, 0x4, r1, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='wlan1@}ppp0eth0security!vmnet1/\x00') 13:49:34 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:34 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 981.666083] R13: 00000000004bb7f3 R14: 00000000004c8c08 R15: 000000000000000c 13:49:34 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000]}, 0x48) 13:49:34 executing program 5 (fault-call:0 fault-nth:13): bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:34 executing program 4 (fault-call:4 fault-nth:1): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socket$kcm(0x2, 0x1, 0x0) 13:49:34 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:34 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='wlan1@}ppp0eth0security!vmnet1/\x00') 13:49:34 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:34 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:34 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:34 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a000000]}, 0x48) [ 981.842221] FAULT_INJECTION: forcing a failure. [ 981.842221] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 981.854190] CPU: 0 PID: 728 Comm: syz-executor5 Not tainted 4.18.0-rc3+ #58 [ 981.861295] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 981.870649] Call Trace: [ 981.873224] dump_stack+0x1c9/0x2b4 [ 981.876857] ? dump_stack_print_info.cold.2+0x52/0x52 [ 981.882067] should_fail.cold.4+0xa/0x1a [ 981.886150] ? fault_create_debugfs_attr+0x1f0/0x1f0 13:49:34 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdffffff]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 981.891268] ? kasan_check_read+0x11/0x20 [ 981.895424] ? rcu_is_watching+0x8c/0x150 [ 981.899587] ? is_bpf_text_address+0xd7/0x170 [ 981.904098] ? lock_acquire+0x1e4/0x540 [ 981.908083] ? fs_reclaim_acquire+0x20/0x20 [ 981.912420] ? lock_downgrade+0x8f0/0x8f0 [ 981.916590] ? check_same_owner+0x340/0x340 [ 981.920919] ? rcu_note_context_switch+0x730/0x730 [ 981.925861] ? save_stack+0xa9/0xd0 [ 981.929504] __alloc_pages_nodemask+0x36e/0xdb0 [ 981.934187] ? __alloc_pages_slowpath+0x2d90/0x2d90 13:49:34 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:34 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe80000000000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 981.939219] ? lock_release+0xa30/0xa30 [ 981.943206] ? lock_acquire+0x1e4/0x540 [ 981.947196] ? check_same_owner+0x340/0x340 [ 981.951541] ? kasan_unpoison_shadow+0x35/0x50 [ 981.956145] ? kasan_kmalloc+0xc4/0xe0 [ 981.960057] ? kmem_cache_alloc_node_trace+0x302/0x770 [ 981.965352] ? do_raw_spin_lock+0xc1/0x200 [ 981.969616] ? kasan_unpoison_shadow+0x35/0x50 [ 981.974216] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 981.979769] alloc_pages_current+0x10c/0x210 [ 981.984194] __vmalloc_node_range+0x498/0x760 [ 981.988707] ? bpf_prog_calc_tag+0xc9/0x7d0 13:49:35 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff0f]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 981.993047] vmalloc+0x6f/0x80 [ 981.996245] ? bpf_prog_calc_tag+0xc9/0x7d0 [ 982.000572] bpf_prog_calc_tag+0xc9/0x7d0 [ 982.004731] ? check_same_owner+0x340/0x340 [ 982.009071] ? __bpf_prog_free+0x50/0x50 [ 982.013151] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 982.018695] ? __vmalloc_node_range+0x477/0x760 [ 982.023462] bpf_check+0x662/0x5e60 [ 982.027091] ? pvclock_read_flags+0x160/0x160 [ 982.031598] ? fixup_bpf_calls+0x1fb0/0x1fb0 [ 982.036019] ? ktime_get_with_offset+0x32e/0x4b0 13:49:35 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 982.040794] ? ktime_get+0x440/0x440 [ 982.044513] ? memset+0x31/0x40 [ 982.047796] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 982.053341] ? bpf_obj_name_cpy+0x17c/0x1c0 [ 982.057669] bpf_prog_load+0x1141/0x1c90 [ 982.061735] ? bpf_prog_new_fd+0x60/0x60 [ 982.065805] ? lock_acquire+0x1e4/0x540 [ 982.069807] ? __might_fault+0x12b/0x1e0 [ 982.073878] ? lock_downgrade+0x8f0/0x8f0 [ 982.078035] ? lock_release+0xa30/0xa30 [ 982.082021] ? check_same_owner+0x340/0x340 [ 982.086356] ? __check_object_size+0x9d/0x5f2 13:49:35 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe80]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:35 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x218]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 982.090879] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 982.096513] __x64_sys_bpf+0x36c/0x510 [ 982.100402] ? bpf_prog_get+0x20/0x20 [ 982.104218] do_syscall_64+0x1b9/0x820 [ 982.108111] ? syscall_slow_exit_work+0x500/0x500 [ 982.112965] ? syscall_return_slowpath+0x5e0/0x5e0 [ 982.117907] ? syscall_return_slowpath+0x31d/0x5e0 [ 982.122849] ? prepare_exit_to_usermode+0x291/0x3b0 [ 982.127868] ? perf_trace_sys_enter+0xb10/0xb10 [ 982.132540] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 982.137389] entry_SYSCALL_64_after_hwframe+0x49/0xbe 13:49:35 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 982.142580] RIP: 0033:0x455ab9 [ 982.145763] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 982.165068] RSP: 002b:00007f8952c98c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 982.172790] RAX: ffffffffffffffda RBX: 00007f8952c996d4 RCX: 0000000000455ab9 [ 982.180067] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000005 [ 982.187345] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 982.194619] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 982.201919] R13: 00000000004bb7f3 R14: 00000000004c8c08 R15: 000000000000000d [ 982.209346] syz-executor5: vmalloc: allocation failure, allocated 0 of 8192 bytes, mode:0x6000c0(GFP_KERNEL), nodemask=(null) [ 982.220826] syz-executor5 cpuset=syz5 mems_allowed=0 [ 982.226006] CPU: 0 PID: 728 Comm: syz-executor5 Not tainted 4.18.0-rc3+ #58 [ 982.233331] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 982.242681] Call Trace: [ 982.245260] dump_stack+0x1c9/0x2b4 [ 982.248879] ? dump_stack_print_info.cold.2+0x52/0x52 [ 982.254059] ? lock_acquire+0x1e4/0x540 [ 982.258028] warn_alloc.cold.118+0xb7/0x1bd [ 982.262338] ? zone_watermark_ok_safe+0x3d0/0x3d0 [ 982.267166] ? kasan_kmalloc+0xc4/0xe0 [ 982.271047] ? kmem_cache_alloc_node_trace+0x302/0x770 [ 982.276314] ? do_raw_spin_lock+0xc1/0x200 [ 982.280535] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 982.286079] __vmalloc_node_range+0x527/0x760 [ 982.290566] ? bpf_prog_calc_tag+0xc9/0x7d0 [ 982.294870] vmalloc+0x6f/0x80 [ 982.298052] ? bpf_prog_calc_tag+0xc9/0x7d0 [ 982.302364] bpf_prog_calc_tag+0xc9/0x7d0 [ 982.306502] ? check_same_owner+0x340/0x340 [ 982.310818] ? __bpf_prog_free+0x50/0x50 [ 982.314872] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 982.320394] ? __vmalloc_node_range+0x477/0x760 [ 982.325053] bpf_check+0x662/0x5e60 [ 982.328663] ? pvclock_read_flags+0x160/0x160 [ 982.333143] ? fixup_bpf_calls+0x1fb0/0x1fb0 [ 982.337538] ? ktime_get_with_offset+0x32e/0x4b0 [ 982.342280] ? ktime_get+0x440/0x440 [ 982.346000] ? memset+0x31/0x40 [ 982.349278] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 982.354810] ? bpf_obj_name_cpy+0x17c/0x1c0 [ 982.359118] bpf_prog_load+0x1141/0x1c90 [ 982.363173] ? bpf_prog_new_fd+0x60/0x60 [ 982.367223] ? lock_acquire+0x1e4/0x540 [ 982.371182] ? __might_fault+0x12b/0x1e0 [ 982.375229] ? lock_downgrade+0x8f0/0x8f0 [ 982.379357] ? lock_release+0xa30/0xa30 [ 982.383314] ? check_same_owner+0x340/0x340 [ 982.387629] ? __check_object_size+0x9d/0x5f2 [ 982.392114] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 982.397638] __x64_sys_bpf+0x36c/0x510 [ 982.401523] ? bpf_prog_get+0x20/0x20 [ 982.405312] do_syscall_64+0x1b9/0x820 [ 982.409182] ? syscall_slow_exit_work+0x500/0x500 [ 982.414014] ? syscall_return_slowpath+0x5e0/0x5e0 [ 982.418934] ? syscall_return_slowpath+0x31d/0x5e0 [ 982.423853] ? prepare_exit_to_usermode+0x291/0x3b0 [ 982.428851] ? perf_trace_sys_enter+0xb10/0xb10 [ 982.433504] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 982.438333] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 982.443506] RIP: 0033:0x455ab9 [ 982.446684] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 982.465902] RSP: 002b:00007f8952c98c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 982.473596] RAX: ffffffffffffffda RBX: 00007f8952c996d4 RCX: 0000000000455ab9 [ 982.480848] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000005 [ 982.488100] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 982.495361] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 982.502614] R13: 00000000004bb7f3 R14: 00000000004c8c08 R15: 000000000000000d [ 982.510549] warn_alloc_show_mem: 1 callbacks suppressed [ 982.510552] Mem-Info: [ 982.518355] active_anon:17894 inactive_anon:3901 isolated_anon:0 [ 982.518355] active_file:5697 inactive_file:14996 isolated_file:0 [ 982.518355] unevictable:0 dirty:108 writeback:0 unstable:0 [ 982.518355] slab_reclaimable:13396 slab_unreclaimable:101363 [ 982.518355] mapped:75519 shmem:4441 pagetables:904 bounce:0 [ 982.518355] free:1374861 free_pcp:436 free_cma:0 [ 982.552246] Node 0 active_anon:71576kB inactive_anon:15604kB active_file:22788kB inactive_file:59984kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:302076kB dirty:432kB writeback:0kB shmem:17764kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 57344kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 982.580568] Node 0 DMA free:15908kB min:164kB low:204kB high:244kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 982.606721] lowmem_reserve[]: 0 2827 6331 6331 [ 982.611344] Node 0 DMA32 free:2898208kB min:30100kB low:37624kB high:45148kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129292kB managed:2898892kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:684kB local_pcp:684kB free_cma:0kB [ 982.639180] lowmem_reserve[]: 0 0 3504 3504 [ 982.643553] Node 0 Normal free:2585328kB min:37316kB low:46644kB high:55972kB active_anon:71576kB inactive_anon:15604kB active_file:22788kB inactive_file:59984kB unevictable:0kB writepending:432kB present:4718592kB managed:3589008kB mlocked:0kB kernel_stack:5344kB pagetables:3616kB bounce:0kB free_pcp:1048kB local_pcp:488kB free_cma:0kB [ 982.673561] lowmem_reserve[]: 0 0 0 0 [ 982.677400] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 982.691048] Node 0 DMA32: 2*4kB (M) 5*8kB (M) 1*16kB (M) 5*32kB (M) 1*64kB (M) 2*128kB (M) 1*256kB (M) 3*512kB (M) 4*1024kB (M) 2*2048kB (M) 705*4096kB (M) = 2898208kB [ 982.706269] Node 0 Normal: 216*4kB (UME) 73*8kB (UME) 90*16kB (UME) 103*32kB (UME) 57*64kB (UME) 16*128kB (UME) 70*256kB (UME) 81*512kB (UM) 59*1024kB (UM) 3*2048kB (UME) 597*4096kB (UM) = 2583144kB [ 982.718904] FAULT_INJECTION: forcing a failure. [ 982.718904] name failslab, interval 1, probability 0, space 0, times 0 [ 982.724153] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 982.724158] 25133 total pagecache pages [ 982.724174] 0 pages in swap cache [ 982.735421] CPU: 1 PID: 772 Comm: syz-executor4 Not tainted 4.18.0-rc3+ #58 [ 982.743999] Swap cache stats: add 0, delete 0, find 0/0 [ 982.747970] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 982.747977] Call Trace: [ 982.748002] dump_stack+0x1c9/0x2b4 [ 982.751428] Free swap = 0kB [ 982.758509] ? dump_stack_print_info.cold.2+0x52/0x52 [ 982.758527] ? __save_stack_trace+0x8d/0xf0 [ 982.763865] Total swap = 0kB [ 982.773194] should_fail.cold.4+0xa/0x1a [ 982.773214] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 982.775776] 1965969 pages RAM [ 982.779383] ? save_stack+0x43/0xd0 [ 982.779400] ? kasan_kmalloc+0xc4/0xe0 [ 982.782394] 0 pages HighMem/MovableOnly [ 982.787556] ? kasan_slab_alloc+0x12/0x20 [ 982.787567] ? kmem_cache_alloc+0x12e/0x760 [ 982.787583] ? sock_alloc_inode+0x78/0x320 [ 982.791880] 340017 pages reserved [ 982.794870] ? alloc_inode+0x63/0x190 [ 982.794887] ? new_inode_pseudo+0x71/0x1a0 [ 982.842654] ? __sock_create+0x175/0x940 [ 982.846706] ? __sys_socket+0x106/0x260 [ 982.850750] ? __x64_sys_socket+0x73/0xb0 [ 982.854888] ? do_syscall_64+0x1b9/0x820 [ 982.858944] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 982.864295] ? lock_acquire+0x1e4/0x540 [ 982.868253] ? percpu_ref_put_many+0x119/0x240 [ 982.872817] ? lock_downgrade+0x8f0/0x8f0 [ 982.877042] ? lock_acquire+0x1e4/0x540 [ 982.880999] ? fs_reclaim_acquire+0x20/0x20 [ 982.885317] ? lock_downgrade+0x8f0/0x8f0 [ 982.889451] ? lock_downgrade+0x8f0/0x8f0 [ 982.893584] ? check_same_owner+0x340/0x340 [ 982.897900] ? percpu_ref_put_many+0x131/0x240 [ 982.902473] ? rcu_note_context_switch+0x730/0x730 [ 982.907385] __should_failslab+0x124/0x180 [ 982.911604] should_failslab+0x9/0x14 [ 982.915395] kmem_cache_alloc_trace+0x2cb/0x780 [ 982.920053] ? kmem_cache_alloc+0x2fc/0x760 [ 982.924361] sock_alloc_inode+0xbc/0x320 [ 982.928403] ? sock_destroy_inode+0x70/0x70 [ 982.932718] ? proc_cwd_link+0x1d0/0x1d0 [ 982.936764] ? sock_destroy_inode+0x70/0x70 [ 982.941156] alloc_inode+0x63/0x190 [ 982.944769] new_inode_pseudo+0x71/0x1a0 [ 982.948898] ? prune_icache_sb+0x1b0/0x1b0 [ 982.953124] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 982.958036] ? fsnotify+0xbb4/0x14e0 [ 982.961736] ? vfs_write+0x2ee/0x560 [ 982.965447] sock_alloc+0x41/0x270 [ 982.968972] __sock_create+0x175/0x940 [ 982.972846] ? kernel_sock_ip_overhead+0x570/0x570 [ 982.977765] ? __sb_end_write+0xac/0xe0 [ 982.981737] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 982.987267] __sys_socket+0x106/0x260 [ 982.991063] ? move_addr_to_kernel+0x70/0x70 [ 982.995465] ? syscall_slow_exit_work+0x500/0x500 [ 983.000308] __x64_sys_socket+0x73/0xb0 [ 983.004266] do_syscall_64+0x1b9/0x820 [ 983.008143] ? finish_task_switch+0x1d3/0x890 [ 983.012621] ? syscall_return_slowpath+0x5e0/0x5e0 [ 983.017544] ? syscall_return_slowpath+0x31d/0x5e0 [ 983.022457] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 983.027458] ? prepare_exit_to_usermode+0x291/0x3b0 [ 983.032464] ? perf_trace_sys_enter+0xb10/0xb10 [ 983.037116] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 983.041953] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 983.047126] RIP: 0033:0x455ab9 [ 983.050292] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 983.069459] RSP: 002b:00007fd16db2cc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 983.077148] RAX: ffffffffffffffda RBX: 00007fd16db2d6d4 RCX: 0000000000455ab9 [ 983.084397] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000002 [ 983.091650] RBP: 000000000072c098 R08: 0000000000000000 R09: 0000000000000000 [ 983.098900] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 983.106158] R13: 00000000004c1d93 R14: 00000000004d35d0 R15: 0000000000000001 [ 983.113565] socket: no more sockets 13:49:36 executing program 5 (fault-call:0 fault-nth:14): bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 983.208608] FAULT_INJECTION: forcing a failure. [ 983.208608] name failslab, interval 1, probability 0, space 0, times 0 [ 983.219985] CPU: 0 PID: 788 Comm: syz-executor5 Not tainted 4.18.0-rc3+ #58 [ 983.227089] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 983.236436] Call Trace: [ 983.239029] dump_stack+0x1c9/0x2b4 [ 983.242643] ? dump_stack_print_info.cold.2+0x52/0x52 [ 983.247910] ? finish_task_switch+0x1d3/0x890 [ 983.252472] ? finish_task_switch+0x18a/0x890 [ 983.256953] ? trace_find_filtered_pid.part.61+0x50/0x50 [ 983.262402] should_fail.cold.4+0xa/0x1a [ 983.266457] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 983.271557] ? __schedule+0x884/0x1ed0 [ 983.275530] ? retint_kernel+0x10/0x10 [ 983.279404] ? __sched_text_start+0x8/0x8 [ 983.283540] ? lock_acquire+0x1e4/0x540 [ 983.287499] ? fs_reclaim_acquire+0x20/0x20 [ 983.291823] ? lock_downgrade+0x8f0/0x8f0 [ 983.295958] ? check_same_owner+0x340/0x340 [ 983.300271] __should_failslab+0x124/0x180 [ 983.304497] should_failslab+0x9/0x14 [ 983.308280] __kmalloc+0x2c8/0x760 [ 983.311808] ? bpf_check+0xb94/0x5e60 [ 983.315601] ? bpf_check+0xd29/0x5e60 [ 983.319391] ? write_comp_data+0x1/0x70 [ 983.323349] bpf_check+0xd29/0x5e60 [ 983.326971] ? pvclock_read_flags+0x160/0x160 [ 983.331465] ? fixup_bpf_calls+0x1fb0/0x1fb0 [ 983.335867] ? ktime_get_with_offset+0x32e/0x4b0 [ 983.340611] ? ktime_get+0x440/0x440 [ 983.344313] ? memset+0x31/0x40 [ 983.347577] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 983.353119] ? bpf_obj_name_cpy+0x17c/0x1c0 [ 983.357426] bpf_prog_load+0x1141/0x1c90 [ 983.361492] ? bpf_prog_new_fd+0x60/0x60 [ 983.365540] ? lock_acquire+0x1e4/0x540 [ 983.369508] ? __might_fault+0x12b/0x1e0 [ 983.373552] ? lock_downgrade+0x8f0/0x8f0 [ 983.377690] ? lock_release+0xa30/0xa30 [ 983.381654] ? check_same_owner+0x340/0x340 [ 983.385959] ? __check_object_size+0x9d/0x5f2 [ 983.390450] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 983.395982] __x64_sys_bpf+0x36c/0x510 [ 983.399853] ? bpf_prog_get+0x20/0x20 [ 983.403646] do_syscall_64+0x1b9/0x820 [ 983.407517] ? finish_task_switch+0x1d3/0x890 [ 983.411997] ? syscall_return_slowpath+0x5e0/0x5e0 [ 983.416913] ? syscall_return_slowpath+0x31d/0x5e0 [ 983.421833] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 983.426847] ? prepare_exit_to_usermode+0x291/0x3b0 [ 983.431846] ? perf_trace_sys_enter+0xb10/0xb10 [ 983.436509] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 983.441339] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 983.446510] RIP: 0033:0x455ab9 [ 983.449678] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 983.468878] RSP: 002b:00007f8952c98c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 983.476670] RAX: ffffffffffffffda RBX: 00007f8952c996d4 RCX: 0000000000455ab9 [ 983.483929] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000005 [ 983.491181] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 983.498433] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 983.505685] R13: 00000000004bb7f3 R14: 00000000004c8c08 R15: 000000000000000e 13:49:36 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socket$kcm(0x2, 0x1, 0x0) 13:49:36 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdffffff00000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:36 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:36 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, 0x48) 13:49:36 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:36 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:36 executing program 3: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='wlan1@}ppp0eth0security!vmnet1/\x00', 0xffffffffffffff9c}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000000c0)='wlan1@}ppp0eth0security!vmnet1/\x00') r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = gettid() r3 = perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x7fff, 0x4, 0x100000000, 0x80000001, 0x0, 0x2, 0x8, 0x1, 0x101, 0x8f2, 0x0, 0x3, 0x10001, 0x8cde, 0x6b89, 0x7fff, 0x6, 0x1, 0x1, 0x6, 0x8, 0x2, 0x3eac, 0xffffffffffffffff, 0x8, 0xe0, 0x8, 0xffffffffffffc5da, 0xfffffffffffffffc, 0x3, 0xffff, 0x2, 0x7, 0xe3c5, 0x6, 0x10000000000, 0x0, 0x7, 0x1, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x2, 0x1, 0x19a1731f, 0x3, 0x2}, r2, 0x0, r0, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='wlan1@}ppp0eth0security!vmnet1/\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000280)='/]cpusetnodev@\x00') openat$cgroup_ro(r0, &(0x7f0000000100)='cpuset.effective_mems\x00', 0x0, 0x0) 13:49:36 executing program 5 (fault-call:0 fault-nth:15): bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 983.610229] FAULT_INJECTION: forcing a failure. [ 983.610229] name failslab, interval 1, probability 0, space 0, times 0 [ 983.621788] CPU: 0 PID: 806 Comm: syz-executor5 Not tainted 4.18.0-rc3+ #58 [ 983.628935] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 983.638283] Call Trace: [ 983.640897] dump_stack+0x1c9/0x2b4 [ 983.644510] ? dump_stack_print_info.cold.2+0x52/0x52 [ 983.649693] ? __save_stack_trace+0x8d/0xf0 [ 983.653999] should_fail.cold.4+0xa/0x1a [ 983.658048] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 983.663140] ? save_stack+0x43/0xd0 [ 983.666748] ? kasan_kmalloc+0xc4/0xe0 [ 983.670618] ? __kmalloc+0x14e/0x760 [ 983.674317] ? bpf_check+0xd29/0x5e60 [ 983.678108] ? bpf_prog_load+0x1141/0x1c90 [ 983.682329] ? __x64_sys_bpf+0x36c/0x510 [ 983.686379] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 983.691729] ? trace_hardirqs_off+0xd/0x10 [ 983.695944] ? quarantine_put+0x10d/0x1b0 [ 983.700080] ? __kasan_slab_free+0x131/0x170 [ 983.704481] ? lock_acquire+0x1e4/0x540 [ 983.708439] ? fs_reclaim_acquire+0x20/0x20 [ 983.712743] ? lock_downgrade+0x8f0/0x8f0 [ 983.716961] ? vfree+0x6d/0x100 [ 983.720222] ? check_same_owner+0x340/0x340 [ 983.724524] ? cmp_subprogs+0x16/0x90 [ 983.728305] ? rcu_note_context_switch+0x730/0x730 [ 983.733215] ? bsearch+0xa6/0xc0 [ 983.736564] ? __reg_deduce_bounds+0x190/0x190 [ 983.741131] __should_failslab+0x124/0x180 [ 983.745351] should_failslab+0x9/0x14 [ 983.749135] __kmalloc+0x2c8/0x760 [ 983.752658] ? __reg_deduce_bounds+0x190/0x190 [ 983.757232] ? bpf_check+0x111c/0x5e60 [ 983.761102] bpf_check+0x111c/0x5e60 [ 983.764821] ? pvclock_read_flags+0x160/0x160 [ 983.769311] ? fixup_bpf_calls+0x1fb0/0x1fb0 [ 983.773701] ? ktime_get_with_offset+0x32e/0x4b0 [ 983.779223] ? ktime_get+0x440/0x440 [ 983.782922] ? memset+0x31/0x40 [ 983.786185] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 983.791711] ? bpf_obj_name_cpy+0x17c/0x1c0 [ 983.796105] bpf_prog_load+0x1141/0x1c90 [ 983.800151] ? bpf_prog_new_fd+0x60/0x60 [ 983.804195] ? lock_acquire+0x1e4/0x540 [ 983.808149] ? __might_fault+0x12b/0x1e0 [ 983.812192] ? lock_downgrade+0x8f0/0x8f0 [ 983.816320] ? lock_release+0xa30/0xa30 [ 983.820289] ? check_same_owner+0x340/0x340 [ 983.824592] ? __check_object_size+0x9d/0x5f2 [ 983.829171] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 983.834694] __x64_sys_bpf+0x36c/0x510 [ 983.838563] ? bpf_prog_get+0x20/0x20 [ 983.842352] do_syscall_64+0x1b9/0x820 [ 983.846219] ? finish_task_switch+0x1d3/0x890 [ 983.850706] ? syscall_return_slowpath+0x5e0/0x5e0 [ 983.855618] ? syscall_return_slowpath+0x31d/0x5e0 [ 983.860533] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 983.865529] ? prepare_exit_to_usermode+0x291/0x3b0 [ 983.870538] ? perf_trace_sys_enter+0xb10/0xb10 [ 983.875201] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 983.880069] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 983.885238] RIP: 0033:0x455ab9 [ 983.888404] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 13:49:36 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x58020000]}, 0x48) 13:49:36 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 983.907578] RSP: 002b:00007f8952c98c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 983.915267] RAX: ffffffffffffffda RBX: 00007f8952c996d4 RCX: 0000000000455ab9 [ 983.922519] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000005 [ 983.929770] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 983.937020] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 983.944268] R13: 00000000004bb7f3 R14: 00000000004c8c08 R15: 000000000000000f 13:49:37 executing program 5 (fault-call:0 fault-nth:16): bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:37 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:37 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='memory.swap.current\x00', 0x0, 0x0) write$cgroup_int(r1, &(0x7f0000000280)=0x7, 0x12) r2 = getpid() perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x56f, 0x15b, 0x2, 0x3, 0x0, 0x8, 0x100, 0x3, 0xc5c, 0x1, 0xcdf, 0xdc7e, 0x10001, 0x6, 0xd8, 0x7, 0x8b77, 0x1000, 0x48000000000, 0x400, 0x8001, 0x2, 0x7ff, 0x100, 0x0, 0x2, 0xfffffffffffffa64, 0x20, 0x9, 0x1c00000000, 0x1, 0x9, 0x4, 0xffffffff00000001, 0x2, 0x800, 0x0, 0x6, 0x1, @perf_config_ext={0x2}, 0x2, 0x2, 0x21, 0x6, 0x6, 0x7f, 0x3ff}, r2, 0x8, r0, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='wlan1@}ppp0eth0security!vmnet1/\x00') r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x22a000, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)="b26370757365746d643573756d2900", 0xffffffffffffff9c}, 0x10) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x7) ioctl$TUNSETFILTEREBPF(r3, 0x800454e1, &(0x7f0000000200)=r4) 13:49:37 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:37 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:37 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f01]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 984.113599] FAULT_INJECTION: forcing a failure. [ 984.113599] name failslab, interval 1, probability 0, space 0, times 0 [ 984.124921] CPU: 0 PID: 835 Comm: syz-executor5 Not tainted 4.18.0-rc3+ #58 [ 984.132033] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 984.141592] Call Trace: [ 984.144199] dump_stack+0x1c9/0x2b4 [ 984.147850] ? dump_stack_print_info.cold.2+0x52/0x52 [ 984.153055] ? __save_stack_trace+0x8d/0xf0 [ 984.157394] should_fail.cold.4+0xa/0x1a [ 984.161472] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 984.166590] ? save_stack+0x43/0xd0 [ 984.170228] ? kasan_kmalloc+0xc4/0xe0 [ 984.174130] ? __kmalloc+0x14e/0x760 [ 984.177857] ? bpf_check+0x111c/0x5e60 [ 984.181753] ? bpf_prog_load+0x1141/0x1c90 [ 984.186006] ? __x64_sys_bpf+0x36c/0x510 [ 984.190109] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 984.195589] ? trace_hardirqs_off+0xd/0x10 [ 984.199841] ? quarantine_put+0x10d/0x1b0 [ 984.204006] ? __kasan_slab_free+0x131/0x170 [ 984.208454] ? lock_acquire+0x1e4/0x540 13:49:37 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socket$kcm(0x2c, 0x1, 0x0) [ 984.212528] ? fs_reclaim_acquire+0x20/0x20 [ 984.216871] ? lock_downgrade+0x8f0/0x8f0 [ 984.221053] ? vfree+0x6d/0x100 [ 984.224339] ? check_same_owner+0x340/0x340 [ 984.228665] ? cmp_subprogs+0x16/0x90 [ 984.232474] ? rcu_note_context_switch+0x730/0x730 [ 984.237410] __should_failslab+0x124/0x180 [ 984.241741] should_failslab+0x9/0x14 [ 984.245545] __kmalloc+0x2c8/0x760 [ 984.249090] ? __reg_deduce_bounds+0x190/0x190 [ 984.253676] ? bpf_check+0x113e/0x5e60 [ 984.257570] bpf_check+0x113e/0x5e60 13:49:37 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:37 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5a]}, 0x48) [ 984.261295] ? pvclock_read_flags+0x160/0x160 [ 984.265813] ? fixup_bpf_calls+0x1fb0/0x1fb0 [ 984.270242] ? ktime_get_with_offset+0x32e/0x4b0 [ 984.275013] ? ktime_get+0x440/0x440 [ 984.278740] ? memset+0x31/0x40 [ 984.282031] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 984.287663] ? bpf_obj_name_cpy+0x17c/0x1c0 [ 984.291988] bpf_prog_load+0x1141/0x1c90 [ 984.296061] ? bpf_prog_new_fd+0x60/0x60 [ 984.300124] ? lock_acquire+0x1e4/0x540 [ 984.304101] ? __might_fault+0x12b/0x1e0 [ 984.308164] ? lock_downgrade+0x8f0/0x8f0 13:49:37 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 984.312312] ? lock_release+0xa30/0xa30 [ 984.316291] ? check_same_owner+0x340/0x340 [ 984.320625] ? __check_object_size+0x9d/0x5f2 [ 984.325182] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 984.330730] __x64_sys_bpf+0x36c/0x510 [ 984.334621] ? bpf_prog_get+0x20/0x20 [ 984.338432] do_syscall_64+0x1b9/0x820 [ 984.342321] ? finish_task_switch+0x1d3/0x890 [ 984.346825] ? syscall_return_slowpath+0x5e0/0x5e0 [ 984.351761] ? syscall_return_slowpath+0x31d/0x5e0 [ 984.356696] ? prepare_exit_to_usermode+0x3b0/0x3b0 13:49:37 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 984.361740] ? prepare_exit_to_usermode+0x291/0x3b0 [ 984.366772] ? perf_trace_sys_enter+0xb10/0xb10 [ 984.371451] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 984.376305] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 984.381493] RIP: 0033:0x455ab9 [ 984.384694] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 984.403904] RSP: 002b:00007f8952c98c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 13:49:37 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:37 executing program 5 (fault-call:0 fault-nth:17): bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:37 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdfbc1a0000000000]}, 0x48) [ 984.412749] RAX: ffffffffffffffda RBX: 00007f8952c996d4 RCX: 0000000000455ab9 [ 984.420033] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000005 [ 984.427567] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 984.434834] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 984.442129] R13: 00000000004bb7f3 R14: 00000000004c8c08 R15: 0000000000000010 13:49:37 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:37 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 984.489551] FAULT_INJECTION: forcing a failure. [ 984.489551] name failslab, interval 1, probability 0, space 0, times 0 [ 984.501664] CPU: 0 PID: 864 Comm: syz-executor5 Not tainted 4.18.0-rc3+ #58 [ 984.508841] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 984.518204] Call Trace: [ 984.520832] dump_stack+0x1c9/0x2b4 [ 984.524479] ? dump_stack_print_info.cold.2+0x52/0x52 [ 984.529714] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 984.534573] ? is_bpf_text_address+0xae/0x170 [ 984.539094] should_fail.cold.4+0xa/0x1a [ 984.543174] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 984.548296] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 984.553338] ? bpf_prog_kallsyms_find+0xde/0x4c0 [ 984.558116] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 984.563148] ? bpf_prog_kallsyms_find+0xde/0x4c0 [ 984.567927] ? lock_acquire+0x1e4/0x540 [ 984.572015] ? fs_reclaim_acquire+0x20/0x20 [ 984.576356] ? lock_downgrade+0x8f0/0x8f0 [ 984.580524] ? check_same_owner+0x340/0x340 [ 984.584857] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 984.589284] ? rcu_note_context_switch+0x730/0x730 [ 984.594238] __should_failslab+0x124/0x180 [ 984.598485] should_failslab+0x9/0x14 [ 984.602279] kmem_cache_alloc_trace+0x2cb/0x780 [ 984.606957] ? unwind_get_return_address+0x61/0xa0 [ 984.611874] ? __save_stack_trace+0x8d/0xf0 [ 984.616190] do_check+0x17d/0xb9d0 [ 984.619738] ? save_stack+0x43/0xd0 [ 984.623385] ? __kasan_slab_free+0x11a/0x170 [ 984.627800] ? kasan_slab_free+0xe/0x10 [ 984.631779] ? bpf_check+0x3865/0x5e60 [ 984.635670] ? bpf_prog_load+0x1141/0x1c90 [ 984.639893] ? __x64_sys_bpf+0x36c/0x510 [ 984.643950] ? do_syscall_64+0x1b9/0x820 [ 984.648016] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 984.653404] ? kasan_check_read+0x11/0x20 [ 984.657544] ? check_func_arg+0xce0/0xce0 [ 984.661684] ? kasan_check_write+0x14/0x20 [ 984.665927] ? do_raw_spin_lock+0xc1/0x200 [ 984.670163] ? trace_hardirqs_off+0xd/0x10 [ 984.674396] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 984.679489] ? debug_check_no_obj_freed+0x30b/0x595 [ 984.684497] ? trace_hardirqs_off+0xd/0x10 [ 984.688729] ? quarantine_put+0x10d/0x1b0 [ 984.692881] ? __kasan_slab_free+0x131/0x170 [ 984.697285] bpf_check+0x3872/0x5e60 [ 984.700995] ? pvclock_read_flags+0x160/0x160 [ 984.705482] ? fixup_bpf_calls+0x1fb0/0x1fb0 [ 984.709882] ? ktime_get_with_offset+0x32e/0x4b0 [ 984.714634] ? ktime_get+0x440/0x440 [ 984.718352] ? memset+0x31/0x40 [ 984.721619] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 984.727140] ? bpf_obj_name_cpy+0x17c/0x1c0 [ 984.731443] bpf_prog_load+0x1141/0x1c90 [ 984.735499] ? bpf_prog_new_fd+0x60/0x60 [ 984.739551] ? lock_acquire+0x1e4/0x540 [ 984.743518] ? __might_fault+0x12b/0x1e0 [ 984.747740] ? lock_downgrade+0x8f0/0x8f0 [ 984.751879] ? __check_object_size+0x9d/0x5f2 [ 984.756376] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 984.761906] __x64_sys_bpf+0x36c/0x510 [ 984.765793] ? bpf_prog_get+0x20/0x20 [ 984.769595] do_syscall_64+0x1b9/0x820 [ 984.773477] ? syscall_slow_exit_work+0x500/0x500 [ 984.778313] ? syscall_return_slowpath+0x5e0/0x5e0 [ 984.783240] ? syscall_return_slowpath+0x31d/0x5e0 [ 984.788180] ? prepare_exit_to_usermode+0x291/0x3b0 [ 984.793198] ? perf_trace_sys_enter+0xb10/0xb10 [ 984.797857] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 984.803572] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 984.808758] RIP: 0033:0x455ab9 [ 984.811945] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 984.831157] RSP: 002b:00007f8952c98c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 13:49:37 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 984.838870] RAX: ffffffffffffffda RBX: 00007f8952c996d4 RCX: 0000000000455ab9 [ 984.846144] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000005 [ 984.853404] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 984.860666] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 984.867936] R13: 00000000004bb7f3 R14: 00000000004c8c08 R15: 0000000000000011 13:49:37 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:37 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xe8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='wlan1@}ppp0eth0security!vmnet1/\x00') 13:49:37 executing program 5 (fault-call:0 fault-nth:18): bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:37 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:37 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74000000]}, 0x48) 13:49:37 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socket$kcm(0x2, 0xa, 0x0) 13:49:38 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:38 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 985.016175] FAULT_INJECTION: forcing a failure. [ 985.016175] name failslab, interval 1, probability 0, space 0, times 0 [ 985.027482] CPU: 0 PID: 892 Comm: syz-executor5 Not tainted 4.18.0-rc3+ #58 [ 985.034594] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 985.043955] Call Trace: [ 985.046563] dump_stack+0x1c9/0x2b4 [ 985.050221] ? dump_stack_print_info.cold.2+0x52/0x52 [ 985.055430] ? finish_task_switch+0x1d3/0x890 [ 985.059944] ? finish_task_switch+0x18a/0x890 [ 985.064464] ? trace_find_filtered_pid.part.61+0x50/0x50 [ 985.069934] should_fail.cold.4+0xa/0x1a [ 985.074192] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 985.079321] ? __schedule+0x884/0x1ed0 [ 985.083230] ? __sched_text_start+0x8/0x8 [ 985.087419] ? lock_acquire+0x1e4/0x540 [ 985.091408] ? fs_reclaim_acquire+0x20/0x20 [ 985.095751] ? lock_downgrade+0x8f0/0x8f0 [ 985.099923] ? check_same_owner+0x340/0x340 [ 985.104266] __should_failslab+0x124/0x180 [ 985.108520] should_failslab+0x9/0x14 13:49:38 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 985.112334] kmem_cache_alloc_trace+0x2cb/0x780 [ 985.117013] ? unwind_get_return_address+0x61/0xa0 [ 985.121975] ? __save_stack_trace+0x8d/0xf0 [ 985.126315] do_check+0x236/0xb9d0 [ 985.129904] ? save_stack+0x43/0xd0 [ 985.133582] ? __kasan_slab_free+0x11a/0x170 [ 985.137994] ? kasan_slab_free+0xe/0x10 [ 985.141981] ? bpf_check+0x3865/0x5e60 [ 985.145880] ? bpf_prog_load+0x1141/0x1c90 [ 985.150125] ? __x64_sys_bpf+0x36c/0x510 [ 985.154195] ? do_syscall_64+0x1b9/0x820 [ 985.158264] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 985.163645] ? kasan_check_read+0x11/0x20 [ 985.167811] ? check_func_arg+0xce0/0xce0 [ 985.171969] ? kasan_check_write+0x14/0x20 [ 985.176205] ? do_raw_spin_lock+0xc1/0x200 [ 985.180446] ? trace_hardirqs_off+0xd/0x10 [ 985.184668] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 985.189781] ? debug_check_no_obj_freed+0x30b/0x595 [ 985.194796] ? trace_hardirqs_off+0xd/0x10 [ 985.199031] ? quarantine_put+0x10d/0x1b0 [ 985.203168] ? __kasan_slab_free+0x131/0x170 [ 985.207563] bpf_check+0x3872/0x5e60 [ 985.211268] ? pvclock_read_flags+0x160/0x160 [ 985.215761] ? fixup_bpf_calls+0x1fb0/0x1fb0 [ 985.220154] ? ktime_get_with_offset+0x32e/0x4b0 [ 985.224895] ? ktime_get+0x440/0x440 [ 985.228606] ? memset+0x31/0x40 [ 985.231898] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 985.237439] ? bpf_obj_name_cpy+0x17c/0x1c0 [ 985.241768] bpf_prog_load+0x1141/0x1c90 [ 985.245835] ? bpf_prog_new_fd+0x60/0x60 [ 985.249902] ? lock_acquire+0x1e4/0x540 [ 985.253880] ? __might_fault+0x12b/0x1e0 [ 985.257942] ? lock_downgrade+0x8f0/0x8f0 [ 985.262075] ? lock_release+0xa30/0xa30 [ 985.266048] ? check_same_owner+0x340/0x340 [ 985.270371] ? __check_object_size+0x9d/0x5f2 [ 985.274887] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 985.280416] __x64_sys_bpf+0x36c/0x510 [ 985.284289] ? bpf_prog_get+0x20/0x20 [ 985.288092] do_syscall_64+0x1b9/0x820 [ 985.291965] ? finish_task_switch+0x1d3/0x890 [ 985.296453] ? syscall_return_slowpath+0x5e0/0x5e0 [ 985.301372] ? syscall_return_slowpath+0x31d/0x5e0 [ 985.306295] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 985.311407] ? prepare_exit_to_usermode+0x291/0x3b0 [ 985.316498] ? perf_trace_sys_enter+0xb10/0xb10 [ 985.321160] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 985.326002] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 985.331184] RIP: 0033:0x455ab9 [ 985.334353] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 985.353512] RSP: 002b:00007f8952c98c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 13:49:38 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7b, 0x80000000001, 0x3, 0x11, 0xffffffffffffff9c}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)="f63377ae5350957318c6c29dd4df39aecaabd6dd0e13fd448920cc927ff6c09bcdf8ea", &(0x7f0000000200)}, 0x20) 13:49:38 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 985.361221] RAX: ffffffffffffffda RBX: 00007f8952c996d4 RCX: 0000000000455ab9 [ 985.368485] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000005 [ 985.375745] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 985.383000] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 985.390269] R13: 00000000004bb7f3 R14: 00000000004c8c08 R15: 0000000000000012 13:49:38 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000]}, 0x48) 13:49:38 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:38 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:38 executing program 5 (fault-call:0 fault-nth:19): bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:38 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdffffff]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 985.517744] FAULT_INJECTION: forcing a failure. [ 985.517744] name failslab, interval 1, probability 0, space 0, times 0 [ 985.529091] CPU: 0 PID: 935 Comm: syz-executor5 Not tainted 4.18.0-rc3+ #58 [ 985.536202] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 985.545561] Call Trace: [ 985.548161] dump_stack+0x1c9/0x2b4 [ 985.551820] ? dump_stack_print_info.cold.2+0x52/0x52 [ 985.557031] ? __save_stack_trace+0x8d/0xf0 [ 985.561397] should_fail.cold.4+0xa/0x1a [ 985.565482] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 985.570601] ? save_stack+0x43/0xd0 [ 985.574243] ? kasan_kmalloc+0xc4/0xe0 [ 985.578148] ? kmem_cache_alloc_trace+0x152/0x780 [ 985.583010] ? do_check+0x17d/0xb9d0 [ 985.586735] ? bpf_check+0x3872/0x5e60 [ 985.590631] ? bpf_prog_load+0x1141/0x1c90 [ 985.594880] ? do_syscall_64+0x1b9/0x820 [ 985.598954] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 985.604337] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 985.609370] ? bpf_prog_kallsyms_find+0xde/0x4c0 [ 985.614146] ? lock_acquire+0x1e4/0x540 [ 985.618138] ? fs_reclaim_acquire+0x20/0x20 [ 985.622480] ? lock_downgrade+0x8f0/0x8f0 [ 985.626670] ? check_same_owner+0x340/0x340 [ 985.631000] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 985.635418] ? rcu_note_context_switch+0x730/0x730 [ 985.640345] __should_failslab+0x124/0x180 [ 985.644570] should_failslab+0x9/0x14 [ 985.648356] kmem_cache_alloc_trace+0x2cb/0x780 [ 985.653018] ? unwind_get_return_address+0x61/0xa0 [ 985.657946] ? __save_stack_trace+0x8d/0xf0 [ 985.662263] do_check+0x236/0xb9d0 13:49:38 executing program 3: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x23, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r1, &(0x7f0000002bc0)={&(0x7f0000002d80)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x80, &(0x7f0000003340)=[{&(0x7f0000002f00)}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000580)={&(0x7f0000000080)=@nfc={0x27, 0x0, 0x1, 0x6}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000100)="4da6f20d24e3fd1fab246022f13c653b4043098445b96a490dce17018164257f10d4c2452dd431e327f5c5c59eecdfe42490cf03b3c06e34a9027f7635081259fdd237de0e11940172f75b93af8d1e7ac71bfe800a8ea2b2160e1628f0250d2a832ca9f42da04262964a0fffd49cdc6c25d8c3647521a7fcbb37e8218b5afba3aff0e7a45cd12879137953b21ff7956f7358790a5b25d4", 0x97}, {&(0x7f00000001c0)="917e24540cbe092dcd7168bac428758f4b853acb64b2cb31e7ca4e21f004a0095aab7deb1f9694d3f0516509f280767abcddf8145b8ae56d9b60a9f0311b5f14a1200e29416df5f0ecf5c98df89b8c725331566a623b0a2ee6d208b1673fef9da8a4a26ef9567312956fc603464df9dead6a76f31d3175361610a802", 0x7c}, {&(0x7f0000000240)="649633cae27bac1f9b32be70a63e767f811c62a3054253162c2682cc02b402c5fb4e25ca8ad1bb43bc4fbcd4d1908f817363ad4a7957429009729659ecc812420e299a78e54c7bfb245b498e16eab8b55f8a4872b2e314f5b8d4857857cee79b23b90d7d62c036e08fa1026b0938c49dd063fa299e9b43267c2d50322e0db5634f2c5ea262dcd17cf129c4d29cf1f347ba43c1f58c2b311f260cf91e18903252b4fcf398fd250c72df55401dd2ea49e406e994831cce45638eb6d6bb33c97ca2aa4450d0c5813dc1d0f3336611231bec78703a5bfc3266dc9b8da44d9d664539cf6b02033a934db79ed621149972ccfa2f93", 0xf2}, {&(0x7f0000000340)="dce67b059fe540fc28a85e5e18ef122419ca44b3a58efcd9ae7de170a12e410aa8f08faa6424538b022635371a4f154c9036f1a778f669423bfcf6fca1a026637bd415d72dc5f3b120eac1190a0dc3a2ca05abd9ddb065a37dd0c631ed338abd6921b1b63c6765ced4cf5501c32da149f4160993068c96caa52c00cbc2187fd21b4e9f1a052071061ecaa7f847d3e2715fa6ae9d244e652e4040a2b7d54787f252f0fb4b430d2744dc2b93a55ec85ae9e6b2385ca353b5ee4cb9d295e8fe0bf26c99027897b718a492f39146a03ed2b60e77c9e9127e9d7a1805f2f6b6239802efbc17ac34286c3dc137f811690aef5eb008f16f", 0xf4}, {&(0x7f0000000440)="ff0d08628ebac81bf03ccf9f4518e986a16f358a776d04893f00dffb7d10d98f36a6051a28d4d8d5cd0a3975552a2040eea6c9e0984185424e5034ea5d849a511a1c18fbc2c2a96d806bb6f372fbd55fc972f3a23ce59a4945c9d2742b89e9c335b9b46638baf8b8", 0x68}, {&(0x7f00000004c0)="95e837200ff4c00da6b5c22ac720fe6c3916414ce9fad80c0d4a4fd61e25d0a78b472d36ba8858997ea7f1fb1ae8e309a4d6915c69c2f44396ae", 0x3a}], 0x6, 0x0, 0x0, 0x40000}, 0x10) 13:49:38 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:38 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socket$kcm(0x2, 0xf, 0x0) 13:49:38 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c]}, 0x48) [ 985.665793] ? save_stack+0x43/0xd0 [ 985.669409] ? __kasan_slab_free+0x11a/0x170 [ 985.673808] ? kasan_slab_free+0xe/0x10 [ 985.677769] ? bpf_check+0x3865/0x5e60 [ 985.681640] ? bpf_prog_load+0x1141/0x1c90 [ 985.685858] ? __x64_sys_bpf+0x36c/0x510 [ 985.689900] ? do_syscall_64+0x1b9/0x820 [ 985.693949] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 985.699305] ? kasan_check_read+0x11/0x20 [ 985.703451] ? check_func_arg+0xce0/0xce0 [ 985.707599] ? kasan_check_write+0x14/0x20 [ 985.711834] ? do_raw_spin_lock+0xc1/0x200 [ 985.716074] ? trace_hardirqs_off+0xd/0x10 [ 985.720315] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 985.725427] ? debug_check_no_obj_freed+0x30b/0x595 [ 985.730461] ? trace_hardirqs_off+0xd/0x10 [ 985.734886] ? quarantine_put+0x10d/0x1b0 [ 985.739050] ? __kasan_slab_free+0x131/0x170 [ 985.743563] bpf_check+0x3872/0x5e60 [ 985.747286] ? pvclock_read_flags+0x160/0x160 [ 985.751807] ? fixup_bpf_calls+0x1fb0/0x1fb0 [ 985.756224] ? ktime_get_with_offset+0x32e/0x4b0 [ 985.760992] ? ktime_get+0x440/0x440 [ 985.764722] ? memset+0x31/0x40 [ 985.768033] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 985.773581] ? bpf_obj_name_cpy+0x17c/0x1c0 [ 985.777921] bpf_prog_load+0x1141/0x1c90 [ 985.782001] ? bpf_prog_new_fd+0x60/0x60 [ 985.786076] ? lock_acquire+0x1e4/0x540 [ 985.790062] ? __might_fault+0x12b/0x1e0 [ 985.794173] ? lock_downgrade+0x8f0/0x8f0 [ 985.798327] ? lock_release+0xa30/0xa30 [ 985.802329] ? check_same_owner+0x340/0x340 [ 985.806667] ? __check_object_size+0x9d/0x5f2 [ 985.811200] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 13:49:38 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 985.816751] __x64_sys_bpf+0x36c/0x510 [ 985.820825] ? bpf_prog_get+0x20/0x20 [ 985.824663] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 985.830232] do_syscall_64+0x1b9/0x820 [ 985.834125] ? finish_task_switch+0x1d3/0x890 [ 985.838631] ? syscall_return_slowpath+0x5e0/0x5e0 [ 985.843582] ? syscall_return_slowpath+0x31d/0x5e0 [ 985.848613] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 985.853640] ? prepare_exit_to_usermode+0x291/0x3b0 [ 985.858708] ? perf_trace_sys_enter+0xb10/0xb10 [ 985.863397] ? trace_hardirqs_off_thunk+0x1a/0x1c 13:49:38 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 985.868336] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 985.873525] RIP: 0033:0x455ab9 [ 985.876710] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 985.896037] RSP: 002b:00007f8952c98c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 985.904193] RAX: ffffffffffffffda RBX: 00007f8952c996d4 RCX: 0000000000455ab9 [ 985.911469] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000005 13:49:38 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1802000000000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:38 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800000000000000]}, 0x48) 13:49:38 executing program 5 (fault-call:0 fault-nth:20): bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 985.918746] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 985.926022] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 985.933297] R13: 00000000004bb7f3 R14: 00000000004c8c08 R15: 0000000000000013 13:49:39 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 986.016375] FAULT_INJECTION: forcing a failure. [ 986.016375] name failslab, interval 1, probability 0, space 0, times 0 [ 986.027770] CPU: 0 PID: 973 Comm: syz-executor5 Not tainted 4.18.0-rc3+ #58 [ 986.034871] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 986.044213] Call Trace: [ 986.046793] dump_stack+0x1c9/0x2b4 [ 986.050415] ? dump_stack_print_info.cold.2+0x52/0x52 [ 986.055594] ? kernel_text_address+0x79/0xf0 [ 986.059991] should_fail.cold.4+0xa/0x1a [ 986.064050] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 986.069145] ? save_stack+0x43/0xd0 [ 986.072768] ? kasan_kmalloc+0xc4/0xe0 [ 986.076639] ? kmem_cache_alloc_trace+0x152/0x780 [ 986.081465] ? do_check+0x5fa/0xb9d0 [ 986.085162] ? bpf_prog_load+0x1141/0x1c90 [ 986.089380] ? __x64_sys_bpf+0x36c/0x510 [ 986.093426] ? do_syscall_64+0x1b9/0x820 [ 986.097473] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 986.102847] ? lock_acquire+0x1e4/0x540 [ 986.106811] ? fs_reclaim_acquire+0x20/0x20 [ 986.111128] ? lock_downgrade+0x8f0/0x8f0 [ 986.115262] ? lock_acquire+0x1e4/0x540 [ 986.119221] ? check_same_owner+0x340/0x340 [ 986.123534] ? rcu_note_context_switch+0x730/0x730 [ 986.128448] ? lock_release+0xa30/0xa30 [ 986.132414] __should_failslab+0x124/0x180 [ 986.136650] should_failslab+0x9/0x14 [ 986.140452] kmem_cache_alloc_trace+0x2cb/0x780 [ 986.145113] ? kasan_kmalloc+0xc4/0xe0 [ 986.148990] copy_verifier_state+0x44b/0x5c0 [ 986.153428] do_check+0x61a/0xb9d0 [ 986.156961] ? save_stack+0x65/0xd0 [ 986.160581] ? __kasan_slab_free+0x11a/0x170 [ 986.164977] ? kasan_slab_free+0xe/0x10 [ 986.168939] ? bpf_check+0x3865/0x5e60 [ 986.172811] ? bpf_prog_load+0x1141/0x1c90 [ 986.177030] ? __x64_sys_bpf+0x36c/0x510 [ 986.181080] ? kasan_check_read+0x11/0x20 [ 986.185220] ? check_func_arg+0xce0/0xce0 [ 986.189356] ? kasan_check_write+0x14/0x20 [ 986.193575] ? do_raw_spin_lock+0xc1/0x200 [ 986.197796] ? trace_hardirqs_off+0xd/0x10 [ 986.202017] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 986.207105] ? debug_check_no_obj_freed+0x30b/0x595 [ 986.212117] ? trace_hardirqs_off+0xd/0x10 [ 986.216332] ? quarantine_put+0x10d/0x1b0 [ 986.220468] ? __kasan_slab_free+0x131/0x170 [ 986.224863] bpf_check+0x3872/0x5e60 [ 986.228570] ? pvclock_read_flags+0x160/0x160 [ 986.233053] ? fixup_bpf_calls+0x1fb0/0x1fb0 [ 986.237446] ? ktime_get_with_offset+0x32e/0x4b0 [ 986.242185] ? ktime_get+0x440/0x440 [ 986.245886] ? memset+0x31/0x40 [ 986.249152] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 986.254673] ? bpf_obj_name_cpy+0x17c/0x1c0 [ 986.258981] bpf_prog_load+0x1141/0x1c90 [ 986.263029] ? bpf_prog_new_fd+0x60/0x60 [ 986.267075] ? lock_acquire+0x1e4/0x540 [ 986.271032] ? __might_fault+0x12b/0x1e0 [ 986.275076] ? lock_downgrade+0x8f0/0x8f0 [ 986.279211] ? __check_object_size+0x9d/0x5f2 [ 986.283709] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 986.289234] __x64_sys_bpf+0x36c/0x510 [ 986.293107] ? bpf_prog_get+0x20/0x20 [ 986.296907] do_syscall_64+0x1b9/0x820 [ 986.300784] ? finish_task_switch+0x1d3/0x890 [ 986.305263] ? syscall_return_slowpath+0x5e0/0x5e0 [ 986.310181] ? syscall_return_slowpath+0x31d/0x5e0 [ 986.315096] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 986.320098] ? prepare_exit_to_usermode+0x291/0x3b0 [ 986.325099] ? perf_trace_sys_enter+0xb10/0xb10 [ 986.329761] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 986.334605] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 986.339778] RIP: 0033:0x455ab9 [ 986.342945] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 13:49:39 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:39 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:39 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48000000]}, 0x48) [ 986.362145] RSP: 002b:00007f8952c98c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 986.369837] RAX: ffffffffffffffda RBX: 00007f8952c996d4 RCX: 0000000000455ab9 [ 986.377087] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000005 [ 986.384337] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 986.391598] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 986.398848] R13: 00000000004bb7f3 R14: 00000000004c8c08 R15: 0000000000000014 13:49:39 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:39 executing program 3: socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)) r0 = socket$kcm(0xa, 0x7, 0x88) sendmsg$kcm(r0, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0xe803) sendmsg$kcm(r0, &(0x7f0000000380)={&(0x7f0000000000)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'wp384\x00'}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000100)="0adc9205da9bdcaf0cce6f8b88256359092ba65cc8c0a6713c85da3242826a26337161de7ceea62d23ca949574a4939c414c5fddbaadbf225c73142d58c756271f96e861737a1567745e2522bd846fe46a2e288eef8427870c5b700d8496a420d2ef3023d78dae7dc7f27139bcff170fcec897bc52bd7fb18b9f41ec8450d8358c0cc61700efc2947c91f10d2a843e89a90718eada0b7c15fc3dd734c35adc7baf14e52ec23fcb6b31f1", 0xaa}, {&(0x7f00000001c0)="70d19e41c2ae21886553a8dc87cd3667ecc50ebb294f1bd3980e718a642a636f627873f6b12b944fa3236a4f8a926837c2f6361ba01e4f53730acf62124ca71a1118fdad1ee8405b441c94977367a9ed5c2da2f4b81d1d1d2e5d5459a4d0c4788ae89e26771416075a04bc1c9eb3985023c9aaa6a7595f90ba4d5bf78b599ed6f4042bd7a79e28555078c406f795be37d15a3edde20a1ed4084397825716287b6512bf0ea05a2cd198948a0a288204dae4e84c90e2d7673ecf3b6d225f1868ba5d5bb4c9f0797b77510d4736d66071192b", 0xd1}, {&(0x7f0000000300)="00f2d76c6e4dae2642a6ce36f0389eaccd54e8d4684fb7fe7d", 0x19}], 0x3, &(0x7f00000005c0)=[{0x80, 0x19f, 0x9, "6c16b68a82b6bce2e0d6b270f3363eae0826662094bd3061c403f66e42ffa9aa8df94f6ea92399a16d71de26d43b31b231d7a59a88bcac0b5588abf9634a94c11db6754b611b1da8317c8c85d3e92beae3cf53cfb9620d4b1c6d698abd3ae7c2285cda833b0114ec427c3a24"}, {0x1010, 0xff, 0x7fffffff, "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"}, {0x10, 0x11f, 0x7c}], 0x10a0, 0x4000000}, 0x4000000) 13:49:39 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socket$kcm(0x2, 0x1600, 0x0) 13:49:39 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:39 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:39 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5802]}, 0x48) 13:49:39 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:39 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x48) 13:49:39 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=ANY=[@ANYBLOB="850000002200000007000000000000209500000000000000"], &(0x7f0000014ff5)="73797a6b610000000500f3", 0x2, 0x1000, &(0x7f0000000400)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f000001b000)={r0, 0x0, 0x3a, 0x9d, &(0x7f0000000000)="e460019234060dc106621abc86dd6a00000000072feb3056603190b148f3e965ddf59ed18dc2f7561150825538008000000000d5000000010000", &(0x7f00000000c0)=""/157}, 0x28) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='io.stat\x00', 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f000000d800)={&(0x7f000000d1c0)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f000000d740)=[{&(0x7f000000d240)=""/120, 0x78}, {&(0x7f000000d2c0)=""/220, 0xdc}, {&(0x7f000000d3c0)=""/199, 0xc7}, {&(0x7f000000d4c0)=""/169, 0xa9}, {&(0x7f000000d580)=""/156, 0x9c}, {&(0x7f000000d640)=""/250, 0xfa}], 0x6, &(0x7f000000d7c0)=""/29, 0x1d, 0x81}, 0x10001) bpf$PROG_LOAD(0x5, &(0x7f000000d840)={0x1e, 0xc, &(0x7f0000000180)=@raw=[@map={0x18, 0xf, 0x1, 0x0, r1}, @alu={0x4, 0xb, 0xa, 0x2, 0x7, 0x6, 0x1}, @alu={0x7, 0x4, 0x5, 0xf, 0x8, 0xfffffffffffffffe, 0x1}, @generic={0x2, 0x98, 0x1, 0xfffffffffffffc01}, @ldst={0x0, 0x1, 0x1, 0x2, 0x3, 0x0, 0xfffffffffffffffc}, @jmp={0x5, 0x9c08, 0x3, 0x7, 0x4, 0xffffffffffffffff, 0x4}], &(0x7f0000000080)='syzkaller\x00', 0x9, 0xda, &(0x7f0000000200)=""/218, 0x41000, 0x0, [], r2, 0xf}, 0x48) 13:49:39 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:39 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:39 executing program 5 (fault-call:0 fault-nth:21): bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:39 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socket$kcm(0x2, 0x3, 0x0) 13:49:39 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:39 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18020000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:39 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}, 0x48) 13:49:39 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x100000, &(0x7f0000000440)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000000)='.\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="00ae46c16bbd606df0d9d28c8d34a9e648203cd0d906543294571db3995e4468b8b350a50fe19148f7a268527e49c407481a70ffff8e6a45fe80177eb95695e2ffde163e9b76ca53643ee25619c94bdb4a9b41385aa0666a3527a527e7b75be6da579e2f47ff64134d27e91be9f938d7d30c52efae70e004b01b43e888f74a209094b591bf5c6ead2c8fba20601d4ce28fb14c2f12936f0979cd6dad9d71ade117ed888efe8ba87e2e4313"]) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x5890, &(0x7f0000000480)) socketpair(0x10, 0x3, 0x100000001, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r0, &(0x7f0000000140)="3a1b04df20f810473b1a29afa57f"}, 0x10) [ 986.786333] FAULT_INJECTION: forcing a failure. [ 986.786333] name failslab, interval 1, probability 0, space 0, times 0 [ 986.797701] CPU: 0 PID: 1041 Comm: syz-executor5 Not tainted 4.18.0-rc3+ #58 [ 986.804902] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 986.814277] Call Trace: [ 986.816882] dump_stack+0x1c9/0x2b4 [ 986.820524] ? dump_stack_print_info.cold.2+0x52/0x52 [ 986.825731] should_fail.cold.4+0xa/0x1a [ 986.829805] ? copy_verifier_state+0x44b/0x5c0 13:49:39 executing program 3: r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)="2f02726f75702e7374617000", 0x2761, 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000040)) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r1, &(0x7f0000000140)="33586fc29cce904d497be988467230bf62e214330b3c826797ab98685c8f01e45fa2b4ef7aa1894375cedc3048a43a10e59888810025290fddab1436bc0fc73d491a79135570cd503896eff4a3eb7d6650e87a24c86378f91926944933431145cae9baa549a704d13ef98aaf62c28873eb9e9416774146ceee6cb73be73ad70537092a1b5d231ec8cac04b2351856510438c554065f5683b17548f630fb22cf38a39b72098fb0d6266c8"}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x6) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40286608, 0x20000003) [ 986.834405] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 986.839520] ? save_stack+0x43/0xd0 [ 986.843162] ? kasan_kmalloc+0xc4/0xe0 [ 986.847056] ? kmem_cache_alloc_trace+0x152/0x780 [ 986.851901] ? do_check+0x5fa/0xb9d0 [ 986.855633] ? bpf_check+0x3872/0x5e60 [ 986.859528] ? bpf_prog_load+0x1141/0x1c90 [ 986.863775] ? do_syscall_64+0x1b9/0x820 [ 986.867928] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 986.873302] ? lock_acquire+0x1e4/0x540 [ 986.877290] ? fs_reclaim_acquire+0x20/0x20 [ 986.881634] ? lock_acquire+0x1e4/0x540 13:49:39 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:39 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 986.885626] ? fs_reclaim_acquire+0x20/0x20 [ 986.889985] ? lock_downgrade+0x8f0/0x8f0 [ 986.894158] ? check_same_owner+0x340/0x340 [ 986.898497] ? kasan_kmalloc+0xc4/0xe0 [ 986.902417] ? rcu_note_context_switch+0x730/0x730 [ 986.907359] ? cmp_subprogs+0x16/0x90 [ 986.911169] __should_failslab+0x124/0x180 [ 986.915425] should_failslab+0x9/0x14 [ 986.919240] kmem_cache_alloc_trace+0x2cb/0x780 [ 986.923927] ? find_good_pkt_pointers+0x630/0x630 [ 986.928781] ? copy_verifier_state+0x3f9/0x5c0 [ 986.933377] do_check+0x4f2e/0xb9d0 13:49:39 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 986.937023] ? save_stack+0x65/0xd0 [ 986.940663] ? __kasan_slab_free+0x11a/0x170 [ 986.945079] ? kasan_slab_free+0xe/0x10 [ 986.949061] ? bpf_check+0x3865/0x5e60 [ 986.952990] ? bpf_prog_load+0x1185/0x1c90 [ 986.957253] ? __x64_sys_bpf+0x36c/0x510 [ 986.961337] ? check_func_arg+0xce0/0xce0 [ 986.965587] ? kasan_check_write+0x14/0x20 [ 986.969835] ? do_raw_spin_lock+0xc1/0x200 [ 986.974163] ? trace_hardirqs_off+0xd/0x10 [ 986.978407] ? _raw_spin_unlock_irqrestore+0x63/0xc0 13:49:40 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 986.983540] ? debug_check_no_obj_freed+0x30b/0x595 [ 986.988562] ? trace_hardirqs_off+0xd/0x10 [ 986.992808] ? quarantine_put+0x10d/0x1b0 [ 986.996974] ? __kasan_slab_free+0x131/0x170 [ 987.001394] bpf_check+0x3872/0x5e60 [ 987.005114] ? pvclock_read_flags+0x160/0x160 [ 987.009629] ? fixup_bpf_calls+0x1fb0/0x1fb0 [ 987.014042] ? ktime_get_with_offset+0x32e/0x4b0 [ 987.018811] ? ktime_get+0x440/0x440 [ 987.022536] ? memset+0x31/0x40 [ 987.025827] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 987.031369] ? bpf_obj_name_cpy+0x17c/0x1c0 13:49:40 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900000000000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 987.035702] bpf_prog_load+0x1141/0x1c90 [ 987.039777] ? bpf_prog_new_fd+0x60/0x60 [ 987.043933] ? lock_acquire+0x1e4/0x540 [ 987.047921] ? __might_fault+0x12b/0x1e0 [ 987.051991] ? lock_downgrade+0x8f0/0x8f0 [ 987.056146] ? lock_release+0xa30/0xa30 [ 987.060229] ? check_same_owner+0x340/0x340 [ 987.064609] ? __check_object_size+0x9d/0x5f2 [ 987.069142] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 987.074691] __x64_sys_bpf+0x36c/0x510 [ 987.078598] ? bpf_prog_get+0x20/0x20 [ 987.082421] do_syscall_64+0x1b9/0x820 13:49:40 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff0f000000000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 987.086318] ? finish_task_switch+0x1d3/0x890 [ 987.090827] ? syscall_return_slowpath+0x5e0/0x5e0 [ 987.095775] ? syscall_return_slowpath+0x31d/0x5e0 [ 987.100977] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 987.106000] ? prepare_exit_to_usermode+0x291/0x3b0 [ 987.111022] ? perf_trace_sys_enter+0xb10/0xb10 [ 987.115710] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 987.120561] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 987.125756] RIP: 0033:0x455ab9 13:49:40 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f01000000000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 987.128938] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 987.148188] RSP: 002b:00007f8952c98c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 987.155917] RAX: ffffffffffffffda RBX: 00007f8952c996d4 RCX: 0000000000455ab9 [ 987.163191] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000005 [ 987.170470] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 987.177742] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 987.185012] R13: 00000000004bb7f3 R14: 00000000004c8c08 R15: 0000000000000015 13:49:40 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:40 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:40 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:40 executing program 5 (fault-call:0 fault-nth:22): bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:40 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000]}, 0x48) 13:49:40 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socket$kcm(0x2, 0x5, 0x0) 13:49:40 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 987.269455] EXT4-fs warning (device sda1): ext4_group_add:1636: No reserved GDT blocks, can't resize 13:49:40 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c00]}, 0x48) 13:49:40 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x16, &(0x7f0000001000)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000009000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000f0000006706000002000000070600000ee60000bf150000000000001f650000000000006707000002000000070700004c0000000f75000000000000bf5400000000000007040000040000003d43010000000000950000000000000061560000000000000000000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) recvmsg(0xffffffffffffff9c, &(0x7f0000000580)={&(0x7f00000001c0)=@hci={0x0, 0x0}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000240)=""/194, 0xc2}, {&(0x7f0000000340)=""/65, 0x41}, {&(0x7f00000003c0)=""/178, 0xb2}], 0x3, &(0x7f00000004c0)=""/166, 0xa6, 0x2}, 0x2) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={&(0x7f0000000640)='GPL\x00', r0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000740)={r2, &(0x7f00000006c0)="26ead42338e17623159d9c0505a801bf6b150e35ce0f57fde8e510c364f9d1a1372dadb4", &(0x7f0000000700)=""/53}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x2, 0x4, &(0x7f0000000080)=@raw=[@call={0x85, 0x0, 0x0, 0x20}, @call={0x85, 0x0, 0x0, 0x4f}], &(0x7f00000000c0)='GPL\x00', 0x401, 0x54, &(0x7f0000000140)=""/84, 0x41f00, 0x1, [], r1, 0xf}, 0x48) [ 987.479612] FAULT_INJECTION: forcing a failure. [ 987.479612] name failslab, interval 1, probability 0, space 0, times 0 [ 987.490930] CPU: 0 PID: 1110 Comm: syz-executor5 Not tainted 4.18.0-rc3+ #58 [ 987.498119] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 987.507476] Call Trace: [ 987.510088] dump_stack+0x1c9/0x2b4 [ 987.513727] ? dump_stack_print_info.cold.2+0x52/0x52 [ 987.518931] ? __save_stack_trace+0x8d/0xf0 [ 987.523269] should_fail.cold.4+0xa/0x1a 13:49:40 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 987.527350] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 987.532464] ? save_stack+0x43/0xd0 [ 987.536117] ? kasan_kmalloc+0xc4/0xe0 [ 987.540212] ? kmem_cache_alloc_trace+0x152/0x780 [ 987.545072] ? do_check+0x4f2e/0xb9d0 [ 987.548870] ? bpf_check+0x3872/0x5e60 [ 987.552764] ? bpf_prog_load+0x1141/0x1c90 [ 987.557008] ? do_syscall_64+0x1b9/0x820 [ 987.561078] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 987.566457] ? lock_acquire+0x1e4/0x540 [ 987.570456] ? fs_reclaim_acquire+0x20/0x20 [ 987.574800] ? lock_acquire+0x1e4/0x540 13:49:40 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 987.578797] ? fs_reclaim_acquire+0x20/0x20 [ 987.583135] ? lock_downgrade+0x8f0/0x8f0 [ 987.587300] ? check_same_owner+0x340/0x340 [ 987.591631] ? kasan_kmalloc+0xc4/0xe0 [ 987.595532] ? rcu_note_context_switch+0x730/0x730 [ 987.600510] __should_failslab+0x124/0x180 [ 987.604783] should_failslab+0x9/0x14 [ 987.608597] kmem_cache_alloc_trace+0x2cb/0x780 [ 987.613280] ? mark_reg_known_zero+0x14b/0x3c0 [ 987.617879] ? find_good_pkt_pointers+0x630/0x630 [ 987.622750] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 13:49:40 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 987.628394] do_check+0x5fa/0xb9d0 [ 987.631990] ? optimal_redzone+0x55/0x60 [ 987.636068] ? __kasan_slab_free+0x11a/0x170 [ 987.640482] ? kasan_slab_free+0xe/0x10 [ 987.644463] ? bpf_check+0x3865/0x5e60 [ 987.648358] ? bpf_prog_load+0x1185/0x1c90 [ 987.652601] ? __x64_sys_bpf+0x36c/0x510 [ 987.656674] ? check_func_arg+0xce0/0xce0 [ 987.660827] ? kasan_check_write+0x14/0x20 [ 987.665086] ? do_raw_spin_lock+0xc1/0x200 [ 987.669935] ? trace_hardirqs_off+0xd/0x10 [ 987.674175] ? _raw_spin_unlock_irqrestore+0x63/0xc0 13:49:40 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 987.679282] ? debug_check_no_obj_freed+0x30b/0x595 [ 987.684308] ? trace_hardirqs_off+0xd/0x10 [ 987.688545] ? quarantine_put+0x10d/0x1b0 [ 987.692694] ? __kasan_slab_free+0x131/0x170 [ 987.697108] bpf_check+0x3872/0x5e60 [ 987.700824] ? pvclock_read_flags+0x160/0x160 [ 987.705330] ? fixup_bpf_calls+0x1fb0/0x1fb0 [ 987.709739] ? ktime_get_with_offset+0x32e/0x4b0 [ 987.715202] ? ktime_get+0x440/0x440 [ 987.718927] ? memset+0x31/0x40 [ 987.722217] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 13:49:40 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f010000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:40 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8729cdfeff3f0f70]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 987.727762] ? bpf_obj_name_cpy+0x17c/0x1c0 [ 987.732086] bpf_prog_load+0x1141/0x1c90 [ 987.736147] ? bpf_prog_new_fd+0x60/0x60 [ 987.740318] ? lock_acquire+0x1e4/0x540 [ 987.744304] ? __might_fault+0x12b/0x1e0 [ 987.748375] ? lock_downgrade+0x8f0/0x8f0 [ 987.752534] ? lock_release+0xa30/0xa30 [ 987.756537] ? check_same_owner+0x340/0x340 [ 987.760879] ? __check_object_size+0x9d/0x5f2 [ 987.765397] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 987.770963] __x64_sys_bpf+0x36c/0x510 [ 987.774855] ? bpf_prog_get+0x20/0x20 13:49:40 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 987.778669] do_syscall_64+0x1b9/0x820 [ 987.782561] ? finish_task_switch+0x1d3/0x890 [ 987.787068] ? syscall_return_slowpath+0x5e0/0x5e0 [ 987.792006] ? syscall_return_slowpath+0x31d/0x5e0 [ 987.796949] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 987.801985] ? prepare_exit_to_usermode+0x291/0x3b0 [ 987.807020] ? perf_trace_sys_enter+0xb10/0xb10 [ 987.811703] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 987.816572] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 987.821764] RIP: 0033:0x455ab9 [ 987.824962] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 987.844227] RSP: 002b:00007f8952c98c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 987.851975] RAX: ffffffffffffffda RBX: 00007f8952c996d4 RCX: 0000000000455ab9 [ 987.859254] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000005 [ 987.866532] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 987.873808] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 987.881086] R13: 00000000004bb7f3 R14: 00000000004c8c08 R15: 0000000000000016 13:49:40 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:40 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:40 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff00000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:40 executing program 5 (fault-call:0 fault-nth:23): bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:40 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe4ffffff00000000]}, 0x48) 13:49:41 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socket$kcm(0x2, 0x1, 0x8000a0ffffffff) 13:49:41 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:41 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='io.stat\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f00000000c0)) socketpair(0x1, 0x24000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net//yz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000780)="69705f76746930003d935c39431f02d48b99e970a1516c78e1e332efacd3adf77f8b3d0b5fe2c162f723db3d7e7a39501ddd16071506b17657d60279fa0deaee233f1e97719533bc3746483ee938ac738a0e") [ 987.991754] FAULT_INJECTION: forcing a failure. [ 987.991754] name failslab, interval 1, probability 0, space 0, times 0 [ 988.003067] CPU: 0 PID: 1162 Comm: syz-executor5 Not tainted 4.18.0-rc3+ #58 [ 988.010261] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 988.019628] Call Trace: [ 988.022230] dump_stack+0x1c9/0x2b4 [ 988.025876] ? dump_stack_print_info.cold.2+0x52/0x52 [ 988.031082] ? kernel_text_address+0x79/0xf0 [ 988.035595] should_fail.cold.4+0xa/0x1a 13:49:41 executing program 3: r0 = socket$kcm(0x11, 0x3, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xf, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x2c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f0000000080), &(0x7f0000000140)}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000040)=@sco={0x1f, {0x608}}, 0x80, &(0x7f0000000000), 0x0, 0x0, 0x147, 0x800}, 0x0) sendmsg$kcm(r0, &(0x7f0000002540)={&(0x7f0000000040)=@nfc={0x27, 0x9}, 0x80, &(0x7f00000024c0)=[{&(0x7f0000000200)="452df3fb7efa9a370930fc34ad52d9dd26df3b797c45545960b3fb9c5feee4d5be6745568c7af8085b2e82e5cf26573966f57b7638d3cd1e0d0f4e6b4c51e415f7b026541f354eca11bddf71ac8646d2384c9a3dbee3e8b1e9e29e70061e2b458ec6c15f41b215015c08d8e5f78c7b519712ab0bdeddc32ba0e5a1c933782b816bc3f16eb8b4255f8312f3f032ff7a", 0x8f}, {&(0x7f00000002c0)="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", 0x1000}, {&(0x7f00000012c0)="5a53937dd24556f978cbe33bb3d2c4e1b7443723926ffa2a135c518646c4e018a5a7de3bb5a628f39d69bb9ac108b9ab5a21af96654fe9a5214e8410fcc4e5438a393f69cd3b2bf656d126c994c24be79acf4fa5203f61ad6f11cbf509af8cd263b65706d9dd4f689133d643ad6916e85825f99acb4b05b4bd98a7d68dfa7d2b23988b02f0e72e8623d3a4af4dbff62d522bfde68bcfe6e950fd381dca852f1064045e6eb421bee8aaa979b06dc35ae9fb27a4f2eeaab67e0bbe9e5fd340b12c24b5deff5ab14dcb8282e5fa1d59c8beac722684e493", 0xd6}, {&(0x7f00000013c0)="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", 0x1000}, {&(0x7f0000000140)="4729af92fc5ae0c9580c060000d06744f8177e9a002d952aa125b68d297fe4", 0x1f}, {&(0x7f00000023c0)="414a4955922ff6773dd6a46ae2a1f637336a2375b2422968d66e9898edd91b7255596b2d6652850286a109d81d22607c8e133cdfe1c0938ccff5b8cb8d2dc52dcbe48706c7bfd17701134e5024c24fe252af1f9b5e4ffdc7c494b27824a93b326416f31752417b5070dfdfcdebe83a3b9900630e16f651e47919e7ca0202a934085f2c1131c4db07cd1b3733b2715d4b353150bdbaa15bbcaaae983a244aea9fa8b7e16d59b972b01ff9249c796a9a22de2d1f22434e12f7093ec9ab363ce69690861e48424dcdac2e91b159997d0af1cc87b597866d99893e04b5027e086c1c887905f3b96fe296", 0xe8}], 0x230}, 0x0) [ 988.038203] device ip_vti0 entered promiscuous mode [ 988.039669] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 988.039701] ? save_stack+0xa9/0xd0 [ 988.053407] ? save_stack+0x43/0xd0 [ 988.057037] ? kasan_kmalloc+0xc4/0xe0 [ 988.060940] ? kmem_cache_alloc_trace+0x152/0x780 [ 988.065790] ? do_check+0x5fa/0xb9d0 [ 988.069514] ? bpf_check+0x3872/0x5e60 [ 988.073414] ? bpf_prog_load+0x1141/0x1c90 [ 988.077658] ? __x64_sys_bpf+0x36c/0x510 [ 988.081729] ? do_syscall_64+0x1b9/0x820 [ 988.085802] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 988.091185] ? lock_acquire+0x1e4/0x540 [ 988.095175] ? fs_reclaim_acquire+0x20/0x20 [ 988.099513] ? lock_downgrade+0x8f0/0x8f0 [ 988.103678] ? lock_acquire+0x1e4/0x540 [ 988.107661] ? check_same_owner+0x340/0x340 [ 988.111996] ? rcu_note_context_switch+0x730/0x730 [ 988.116945] ? lock_release+0xa30/0xa30 [ 988.120931] __should_failslab+0x124/0x180 [ 988.125176] should_failslab+0x9/0x14 [ 988.128988] kmem_cache_alloc_trace+0x2cb/0x780 [ 988.133666] ? kasan_kmalloc+0xc4/0xe0 [ 988.137570] copy_verifier_state+0x44b/0x5c0 [ 988.141995] do_check+0x61a/0xb9d0 [ 988.145548] ? optimal_redzone+0x55/0x60 [ 988.149620] ? __kasan_slab_free+0x11a/0x170 [ 988.154034] ? kasan_slab_free+0xe/0x10 [ 988.158017] ? bpf_check+0x3865/0x5e60 [ 988.161912] ? bpf_prog_load+0x1185/0x1c90 [ 988.166164] ? __x64_sys_bpf+0x36c/0x510 [ 988.170253] ? check_func_arg+0xce0/0xce0 [ 988.174408] ? kasan_check_write+0x14/0x20 [ 988.178652] ? do_raw_spin_lock+0xc1/0x200 [ 988.182896] ? trace_hardirqs_off+0xd/0x10 [ 988.187142] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 988.192254] ? debug_check_no_obj_freed+0x30b/0x595 [ 988.197295] ? trace_hardirqs_off+0xd/0x10 [ 988.201537] ? quarantine_put+0x10d/0x1b0 [ 988.205700] ? __kasan_slab_free+0x131/0x170 [ 988.210120] bpf_check+0x3872/0x5e60 [ 988.213852] ? pvclock_read_flags+0x160/0x160 [ 988.218360] ? fixup_bpf_calls+0x1fb0/0x1fb0 [ 988.222808] ? ktime_get_with_offset+0x32e/0x4b0 [ 988.227578] ? ktime_get+0x440/0x440 [ 988.231300] ? memset+0x31/0x40 [ 988.234585] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 988.240131] ? bpf_obj_name_cpy+0x17c/0x1c0 [ 988.244463] bpf_prog_load+0x1141/0x1c90 [ 988.248535] ? bpf_prog_new_fd+0x60/0x60 [ 988.252796] ? lock_acquire+0x1e4/0x540 [ 988.256786] ? __might_fault+0x12b/0x1e0 [ 988.260851] ? lock_downgrade+0x8f0/0x8f0 [ 988.265003] ? lock_release+0xa30/0xa30 [ 988.268991] ? check_same_owner+0x340/0x340 [ 988.273328] ? __check_object_size+0x9d/0x5f2 [ 988.277839] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 988.283387] __x64_sys_bpf+0x36c/0x510 [ 988.287286] ? bpf_prog_get+0x20/0x20 [ 988.291103] do_syscall_64+0x1b9/0x820 [ 988.295011] ? finish_task_switch+0x1d3/0x890 [ 988.299530] ? syscall_return_slowpath+0x5e0/0x5e0 [ 988.304468] ? syscall_return_slowpath+0x31d/0x5e0 [ 988.309409] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 988.314436] ? prepare_exit_to_usermode+0x291/0x3b0 [ 988.319462] ? perf_trace_sys_enter+0xb10/0xb10 [ 988.324150] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 988.329007] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 988.334204] RIP: 0033:0x455ab9 [ 988.337388] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 988.356678] RSP: 002b:00007f8952c98c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 988.364412] RAX: ffffffffffffffda RBX: 00007f8952c996d4 RCX: 0000000000455ab9 [ 988.371701] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000005 [ 988.378976] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 988.386248] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 13:49:41 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4002000000000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:41 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700f3ffffecd2987]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:41 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:41 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:41 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:41 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe800000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:41 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 988.393513] R13: 00000000004bb7f3 R14: 00000000004c8c08 R15: 0000000000000017 13:49:41 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:41 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:41 executing program 5 (fault-call:0 fault-nth:24): bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:41 executing program 3: r0 = socket$kcm(0xa, 0x10522000000000, 0x11) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000580)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)="f4", 0x1}], 0x1}, 0x3ffe) 13:49:41 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:41 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socket$kcm(0x2, 0x1, 0x400000000000000) 13:49:41 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000]}, 0x48) [ 988.523725] FAULT_INJECTION: forcing a failure. [ 988.523725] name failslab, interval 1, probability 0, space 0, times 0 [ 988.535064] CPU: 0 PID: 1221 Comm: syz-executor5 Not tainted 4.18.0-rc3+ #58 [ 988.542253] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 988.551625] Call Trace: [ 988.554225] dump_stack+0x1c9/0x2b4 [ 988.557874] ? dump_stack_print_info.cold.2+0x52/0x52 [ 988.563079] ? __save_stack_trace+0x8d/0xf0 [ 988.567417] should_fail.cold.4+0xa/0x1a 13:49:41 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 988.571499] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 988.576621] ? save_stack+0x43/0xd0 [ 988.580269] ? kasan_kmalloc+0xc4/0xe0 [ 988.584170] ? kmem_cache_alloc_trace+0x152/0x780 [ 988.589027] ? copy_verifier_state+0x44b/0x5c0 [ 988.593616] ? do_check+0x61a/0xb9d0 [ 988.597338] ? bpf_check+0x3872/0x5e60 [ 988.601233] ? __x64_sys_bpf+0x36c/0x510 [ 988.605315] ? do_syscall_64+0x1b9/0x820 [ 988.609395] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 988.614774] ? save_stack+0x43/0xd0 [ 988.618412] ? kasan_kmalloc+0xc4/0xe0 13:49:41 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x400, 0x0) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x6) setsockopt$sock_attach_bpf(r0, 0x29, 0x11, &(0x7f0000000080), 0x4) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000100)={'nr0\x00'}) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000000c0)={r0}) [ 988.622308] ? kmem_cache_alloc_trace+0x152/0x780 [ 988.627161] ? do_check+0x5fa/0xb9d0 [ 988.630881] ? bpf_check+0x3872/0x5e60 [ 988.634779] ? bpf_prog_load+0x1141/0x1c90 [ 988.639023] ? __x64_sys_bpf+0x36c/0x510 [ 988.643096] ? do_syscall_64+0x1b9/0x820 [ 988.647165] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 988.652548] ? lock_acquire+0x1e4/0x540 [ 988.656536] ? fs_reclaim_acquire+0x20/0x20 [ 988.660872] ? lock_downgrade+0x8f0/0x8f0 [ 988.665035] ? lock_acquire+0x1e4/0x540 [ 988.669028] ? check_same_owner+0x340/0x340 13:49:41 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 988.673363] ? lock_downgrade+0x8f0/0x8f0 [ 988.677526] ? rcu_note_context_switch+0x730/0x730 [ 988.682502] __should_failslab+0x124/0x180 [ 988.686772] should_failslab+0x9/0x14 [ 988.690585] kmem_cache_alloc_trace+0x2cb/0x780 [ 988.695269] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 988.700816] ? realloc_func_state+0xaa/0x340 [ 988.705237] copy_verifier_state+0x44b/0x5c0 [ 988.709656] do_check+0x61a/0xb9d0 [ 988.713215] ? optimal_redzone+0x55/0x60 [ 988.717283] ? __kasan_slab_free+0x11a/0x170 13:49:41 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 988.721693] ? kasan_slab_free+0xe/0x10 [ 988.725676] ? bpf_check+0x3865/0x5e60 [ 988.729574] ? bpf_prog_load+0x1185/0x1c90 [ 988.733810] ? __x64_sys_bpf+0x36c/0x510 [ 988.737886] ? check_func_arg+0xce0/0xce0 [ 988.742042] ? kasan_check_write+0x14/0x20 [ 988.746280] ? do_raw_spin_lock+0xc1/0x200 [ 988.750525] ? trace_hardirqs_off+0xd/0x10 [ 988.754763] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 988.759874] ? debug_check_no_obj_freed+0x30b/0x595 [ 988.764910] ? trace_hardirqs_off+0xd/0x10 [ 988.769166] ? quarantine_put+0x10d/0x1b0 13:49:41 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 988.773325] ? __kasan_slab_free+0x131/0x170 [ 988.777748] bpf_check+0x3872/0x5e60 [ 988.781480] ? pvclock_read_flags+0x160/0x160 [ 988.785994] ? fixup_bpf_calls+0x1fb0/0x1fb0 [ 988.790410] ? ktime_get_with_offset+0x32e/0x4b0 [ 988.795179] ? ktime_get+0x440/0x440 [ 988.798900] ? memset+0x31/0x40 [ 988.802186] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 988.807740] ? bpf_obj_name_cpy+0x17c/0x1c0 [ 988.812071] bpf_prog_load+0x1141/0x1c90 [ 988.816144] ? bpf_prog_new_fd+0x60/0x60 [ 988.820214] ? lock_acquire+0x1e4/0x540 13:49:41 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:41 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 988.824193] ? __might_fault+0x12b/0x1e0 [ 988.828262] ? lock_downgrade+0x8f0/0x8f0 [ 988.832410] ? lock_release+0xa30/0xa30 [ 988.836421] ? check_same_owner+0x340/0x340 [ 988.840770] ? __check_object_size+0x9d/0x5f2 [ 988.845282] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 988.850838] __x64_sys_bpf+0x36c/0x510 [ 988.854822] ? bpf_prog_get+0x20/0x20 [ 988.858641] do_syscall_64+0x1b9/0x820 [ 988.862530] ? finish_task_switch+0x1d3/0x890 [ 988.867035] ? syscall_return_slowpath+0x5e0/0x5e0 13:49:41 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 988.871974] ? syscall_return_slowpath+0x31d/0x5e0 [ 988.876911] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 988.881934] ? prepare_exit_to_usermode+0x291/0x3b0 [ 988.886955] ? perf_trace_sys_enter+0xb10/0xb10 [ 988.891631] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 988.896482] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 988.901770] RIP: 0033:0x455ab9 [ 988.904951] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 13:49:41 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 988.924203] RSP: 002b:00007f8952c98c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 988.931916] RAX: ffffffffffffffda RBX: 00007f8952c996d4 RCX: 0000000000455ab9 [ 988.939204] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000005 [ 988.946572] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 988.953847] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 988.961117] R13: 00000000004bb7f3 R14: 00000000004c8c08 R15: 0000000000000018 13:49:42 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:42 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:42 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdfbc1a00]}, 0x48) 13:49:42 executing program 5 (fault-call:0 fault-nth:25): bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:42 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:42 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) setsockopt$sock_attach_bpf(r1, 0x29, 0x33, &(0x7f0000000700), 0x4) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'ip6gretap0\x00', 0x10}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0xf, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x9}, [@alu={0x7, 0x9, 0x5, 0x7, 0x7, 0x0, 0xfffffffffffffffc}, @exit={0x95}, @exit={0x95}, @jmp={0x5, 0x0, 0xfe1fe447934da2bb, 0x55ace218d1536395, 0x5, 0xfffffffffffffff8, 0x10}, @jmp={0x5, 0x1, 0xb, 0x6, 0xf, 0x0, 0xffffffffffffffff}, @exit={0x95}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0xffffffffffffffc0}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x100}], {0x95}}, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x1, [], 0x0, 0xa}, 0x48) 13:49:42 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socket$kcm(0x2, 0x1, 0xfeffffff00000000) 13:49:42 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 989.107019] FAULT_INJECTION: forcing a failure. [ 989.107019] name failslab, interval 1, probability 0, space 0, times 0 [ 989.118353] CPU: 0 PID: 1289 Comm: syz-executor5 Not tainted 4.18.0-rc3+ #58 [ 989.125549] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 989.134996] Call Trace: [ 989.137597] dump_stack+0x1c9/0x2b4 [ 989.141241] ? dump_stack_print_info.cold.2+0x52/0x52 [ 989.146457] should_fail.cold.4+0xa/0x1a [ 989.150536] ? copy_verifier_state+0x44b/0x5c0 13:49:42 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 989.155141] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 989.160264] ? save_stack+0x43/0xd0 [ 989.163922] ? kasan_kmalloc+0xc4/0xe0 [ 989.167825] ? kmem_cache_alloc_trace+0x152/0x780 [ 989.172685] ? do_check+0x5fa/0xb9d0 [ 989.176419] ? bpf_check+0x3872/0x5e60 [ 989.180313] ? bpf_prog_load+0x1141/0x1c90 [ 989.184565] ? do_syscall_64+0x1b9/0x820 [ 989.188643] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 989.194046] ? lock_acquire+0x1e4/0x540 [ 989.198050] ? fs_reclaim_acquire+0x20/0x20 [ 989.202400] ? lock_acquire+0x1e4/0x540 13:49:42 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 989.206404] ? fs_reclaim_acquire+0x20/0x20 [ 989.210759] ? lock_downgrade+0x8f0/0x8f0 [ 989.214944] ? check_same_owner+0x340/0x340 [ 989.219303] ? kasan_kmalloc+0xc4/0xe0 [ 989.223207] ? rcu_note_context_switch+0x730/0x730 [ 989.228160] __should_failslab+0x124/0x180 [ 989.232415] should_failslab+0x9/0x14 [ 989.236234] kmem_cache_alloc_trace+0x2cb/0x780 [ 989.240917] do_check+0x59ba/0xb9d0 [ 989.244562] ? optimal_redzone+0x55/0x60 [ 989.248639] ? bpf_prog_load+0x1115/0x1c90 [ 989.252889] ? __x64_sys_bpf+0x36c/0x510 13:49:42 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 989.256977] ? check_func_arg+0xce0/0xce0 [ 989.261142] ? kasan_check_write+0x14/0x20 [ 989.265392] ? do_raw_spin_lock+0xc1/0x200 [ 989.269676] ? trace_hardirqs_off+0xd/0x10 [ 989.273959] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 989.279084] ? debug_check_no_obj_freed+0x30b/0x595 [ 989.284285] ? trace_hardirqs_off+0xd/0x10 [ 989.288524] ? quarantine_put+0x10d/0x1b0 [ 989.292687] ? __kasan_slab_free+0x131/0x170 [ 989.297109] bpf_check+0x3872/0x5e60 [ 989.300853] ? pvclock_read_flags+0x160/0x160 13:49:42 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 989.305364] ? fixup_bpf_calls+0x1fb0/0x1fb0 [ 989.309790] ? ktime_get_with_offset+0x32e/0x4b0 [ 989.314576] ? ktime_get+0x440/0x440 [ 989.318303] ? memset+0x31/0x40 [ 989.321588] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 989.327126] ? bpf_obj_name_cpy+0x17c/0x1c0 [ 989.331462] bpf_prog_load+0x1141/0x1c90 [ 989.335534] ? bpf_prog_new_fd+0x60/0x60 [ 989.339601] ? lock_acquire+0x1e4/0x540 [ 989.343578] ? __might_fault+0x12b/0x1e0 [ 989.347644] ? lock_downgrade+0x8f0/0x8f0 [ 989.351799] ? lock_release+0xa30/0xa30 13:49:42 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 989.355781] ? check_same_owner+0x340/0x340 [ 989.360110] ? __check_object_size+0x9d/0x5f2 [ 989.364628] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 989.370168] __x64_sys_bpf+0x36c/0x510 [ 989.374056] ? bpf_prog_get+0x20/0x20 [ 989.377864] do_syscall_64+0x1b9/0x820 [ 989.381753] ? finish_task_switch+0x1d3/0x890 [ 989.386257] ? syscall_return_slowpath+0x5e0/0x5e0 [ 989.391199] ? syscall_return_slowpath+0x31d/0x5e0 [ 989.396142] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 989.401255] ? prepare_exit_to_usermode+0x291/0x3b0 13:49:42 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:42 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1802]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 989.406287] ? perf_trace_sys_enter+0xb10/0xb10 [ 989.410974] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 989.415835] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 989.421026] RIP: 0033:0x455ab9 [ 989.424210] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 989.443588] RSP: 002b:00007f8952c98c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 989.451310] RAX: ffffffffffffffda RBX: 00007f8952c996d4 RCX: 0000000000455ab9 13:49:42 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 989.458586] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000005 [ 989.465861] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 989.473144] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 989.480420] R13: 00000000004bb7f3 R14: 00000000004c8c08 R15: 0000000000000019 13:49:42 executing program 3: r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x11, &(0x7f0000000700), 0x3) socket$kcm(0x29, 0x5, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) 13:49:42 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:42 executing program 5 (fault-call:0 fault-nth:26): bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:42 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x48) 13:49:42 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:42 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80fe]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:42 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socket$kcm(0x2, 0x1, 0x1600000000000000) [ 989.638548] FAULT_INJECTION: forcing a failure. [ 989.638548] name failslab, interval 1, probability 0, space 0, times 0 [ 989.649961] CPU: 0 PID: 1353 Comm: syz-executor5 Not tainted 4.18.0-rc3+ #58 [ 989.657182] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 989.666541] Call Trace: [ 989.669144] dump_stack+0x1c9/0x2b4 [ 989.672789] ? dump_stack_print_info.cold.2+0x52/0x52 [ 989.678002] should_fail.cold.4+0xa/0x1a [ 989.682080] ? copy_verifier_state+0x44b/0x5c0 13:49:42 executing program 3: r0 = socket$kcm(0x2, 0x6, 0x0) setsockopt$sock_attach_bpf(r0, 0x6, 0x12, &(0x7f0000000000)=r0, 0x4) 13:49:42 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}, 0x48) [ 989.686681] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 989.691801] ? save_stack+0x43/0xd0 [ 989.695440] ? kasan_kmalloc+0xc4/0xe0 [ 989.699339] ? kmem_cache_alloc_trace+0x152/0x780 [ 989.704192] ? do_check+0x5fa/0xb9d0 [ 989.708007] ? bpf_prog_load+0x1141/0x1c90 [ 989.712255] ? do_syscall_64+0x1b9/0x820 [ 989.716333] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 989.721723] ? lock_acquire+0x1e4/0x540 [ 989.725715] ? fs_reclaim_acquire+0x20/0x20 [ 989.730059] ? lock_acquire+0x1e4/0x540 [ 989.734050] ? fs_reclaim_acquire+0x20/0x20 13:49:42 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 989.738392] ? lock_downgrade+0x8f0/0x8f0 [ 989.742568] ? lock_downgrade+0x8f0/0x8f0 [ 989.746734] ? check_same_owner+0x340/0x340 [ 989.751076] ? kasan_kmalloc+0xc4/0xe0 [ 989.754979] ? rcu_note_context_switch+0x730/0x730 [ 989.759924] __should_failslab+0x124/0x180 [ 989.764188] should_failslab+0x9/0x14 [ 989.768002] kmem_cache_alloc_trace+0x2cb/0x780 [ 989.772693] do_check+0x59ba/0xb9d0 [ 989.776344] ? optimal_redzone+0x55/0x60 [ 989.780425] ? bpf_prog_load+0x1115/0x1c90 [ 989.784668] ? __x64_sys_bpf+0x36c/0x510 13:49:42 executing program 3: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000040)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4, 0x0, {0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x80, &(0x7f0000000400), 0x0, &(0x7f0000000780)}, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) sendmsg(r0, &(0x7f00000002c0)={&(0x7f0000000140)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000280)=[{&(0x7f00000001c0)="d5c1f1d8f2867e35c88761c4a76530f35ae433621eece0bd6ff22746a7e02f674937529b6a4630f9d324ff8753c1d2bda13f8a05f6406dee1ee6808ebd82f6b4dbafe7636ab3061428787c01884673351f45fe836498a1075cbb0f2d035c007a55fff2310e09398b97b3f255a7b2bd5cab714797fed4c0ece32a26dda97341b25d11ed20df6ec5da0c32160eb40658271ce641c51d894d916fd08867", 0x9c}, {&(0x7f0000000000)="84938eda", 0x4}], 0x2, 0x0, 0x0, 0x81}, 0x41) sendmsg(r0, &(0x7f0000000080)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000707000700f6ff00000000001e6d5a9b1cf96169fab58580608897dd20c2b7e3a802bb542598859b7d152b4adada2436b3d010992671272aba456a04598c044b3afad6c21335e0718429d9385de11ba9d583cad4260c7d1e2da1d2436fb07e5cf523f73efe1d6ee1cd0cd9e22112c2cab716423ddeea714ae5dcbefbc116bf74541d76b3edfed766b6e256a457627cab91"], 0x18}, 0x0) [ 989.788750] ? check_func_arg+0xce0/0xce0 [ 989.792927] ? kasan_check_write+0x14/0x20 [ 989.797190] ? do_raw_spin_lock+0xc1/0x200 [ 989.801446] ? trace_hardirqs_off+0xd/0x10 [ 989.805701] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 989.810831] ? debug_check_no_obj_freed+0x30b/0x595 [ 989.815865] ? trace_hardirqs_off+0xd/0x10 [ 989.820106] ? quarantine_put+0x10d/0x1b0 [ 989.824275] ? __kasan_slab_free+0x131/0x170 [ 989.828696] bpf_check+0x3872/0x5e60 [ 989.832415] ? pvclock_read_flags+0x160/0x160 13:49:42 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 989.836927] ? fixup_bpf_calls+0x1fb0/0x1fb0 [ 989.841343] ? ktime_get_with_offset+0x32e/0x4b0 [ 989.846116] ? ktime_get+0x440/0x440 [ 989.849839] ? memset+0x31/0x40 [ 989.853128] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 989.858668] ? bpf_obj_name_cpy+0x17c/0x1c0 [ 989.862996] bpf_prog_load+0x1141/0x1c90 [ 989.867066] ? bpf_prog_new_fd+0x60/0x60 [ 989.871135] ? lock_acquire+0x1e4/0x540 [ 989.875115] ? __might_fault+0x12b/0x1e0 [ 989.879181] ? lock_downgrade+0x8f0/0x8f0 [ 989.883333] ? lock_release+0xa30/0xa30 13:49:42 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000300)={0x400000000000006, 0xfffffffffffffffc, 0x7f, 0x4, 0x0, 0x1, 0x800}, 0x2c) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000000180)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, 0x80, &(0x7f0000000000)=[{&(0x7f0000001480)=""/64, 0x40}, {&(0x7f00000014c0)=""/182, 0xb6}, {&(0x7f0000000080)=""/248, 0xf8}, {&(0x7f0000001680)=""/129, 0x81}, {&(0x7f0000001740)=""/97, 0x61}, {&(0x7f00000017c0)=""/200, 0xc8}], 0x6, &(0x7f0000001940)=""/167, 0xa7, 0x3}, 0x0) sendmsg$kcm(r0, &(0x7f0000001dc0)={&(0x7f0000001a40)=@sco={0x1f, {0x5de6, 0x1, 0x0, 0x1f, 0x7}}, 0x80, &(0x7f0000001b80)=[{&(0x7f0000001ac0)="ca704222f10888e2d82b748f3ead9da821e10db34aa9a559ba23684df14ff8935d6319b210875d2dade01a225d800fc9bb7fc37be17811b0cd3dd692345904fb1b473bd1748b811205215bc8aafdedcd2a7568bf81d0d7ba1bbf298c18114b4ec2575802c94b41953ac5251cbf0415c3839f055ea59b59f5abf950edd9745938e5b46b66343ecc5e00e0a057d6f38a1a7d56cc8c687177de73e4910aaf7e2c66493b6e3210f3f267b81668f865a736a8e96a5e", 0xb3}], 0x1, &(0x7f0000001bc0)=[{0xa0, 0x101, 0x7ff, "3ebfe99657c617812797437ea83e7b2289ec5cc4c8a6092dc0ee7367ee0b5c8448f033e3d0bc8a85835289029b629b358cea8a281d8d9a0cce5c7e89f6298f8854547e154087b360f69a3e4377aa96d4fa626e17e3ddebb208b6d5e7d1f00bae9541c07b7824b6d76fc9d76fa5186cded42280a300a1f72db515c61ea7f00eea35221226a3128b45dedc251fc26a38ad"}, {0xf8, 0x13b, 0x1ff, "175889ea23d6d2b97a14cd8aaa139aa320ac10e894f2f9097484f61aba26aeb39d24d87b67470719f9c1f17b47766619244f345c1b673c76ce653e862a9be5c2da4c171ec890c7622b84adbfe569bae4e8dc0d81f310f2fce419ffe5d74409cba816e7264560812548ab2fde459fc568f3a392530977ffd994a501f3727d203da4ff91e1fe40793b7c93080527a556be9363bf01f482f00daf13dc4617873dde5f19a375ce1379cc9ac9261d7c3d98bf4f16b307a47a4b599eafc351b370bf1d5aaa7c397ebd26022a1e4b68edaf2c69a6529877c50a68dd852b07d72bf104eb95a7d204649e"}, {0x40, 0x11e, 0x7, "52315941290e435015d0dc6f95730a251d031ee987d5f93f30a772d4b0998883bf796af8d7217b5ed3cff0f3f705e99b"}], 0x1d8, 0x8000}, 0x0) 13:49:42 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 989.887322] ? check_same_owner+0x340/0x340 [ 989.891680] ? __check_object_size+0x9d/0x5f2 [ 989.896197] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 989.901751] __x64_sys_bpf+0x36c/0x510 [ 989.905750] ? bpf_prog_get+0x20/0x20 [ 989.909573] do_syscall_64+0x1b9/0x820 [ 989.913473] ? syscall_return_slowpath+0x5e0/0x5e0 [ 989.918403] ? syscall_return_slowpath+0x31d/0x5e0 [ 989.923336] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 989.928369] ? prepare_exit_to_usermode+0x291/0x3b0 [ 989.933393] ? perf_trace_sys_enter+0xb10/0xb10 [ 989.938069] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 989.942924] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 989.948115] RIP: 0033:0x455ab9 [ 989.951298] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 989.970607] RSP: 002b:00007f8952c98c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 989.978329] RAX: ffffffffffffffda RBX: 00007f8952c996d4 RCX: 0000000000455ab9 13:49:43 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup\x00\x00ontrollers\x00', 0x7b260000, 0x0) [ 989.985633] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000005 [ 989.992913] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 990.000190] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 990.007467] R13: 00000000004bb7f3 R14: 00000000004c8c08 R15: 000000000000001a 13:49:43 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:43 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:43 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:43 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff8000]}, 0x48) 13:49:43 executing program 5 (fault-call:0 fault-nth:27): bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:43 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:43 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000140)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ff00ff79a4f0b100000000b7060000ffffffff2d640500d4ea0000000065e50400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000089500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair(0x19, 0x3, 0x4, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000000c0)=r0, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0xe4, &(0x7f0000000080)="2e1e6c22c5cf507721c822a54a75", &(0x7f0000000480)=""/228}, 0x28) 13:49:43 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socket$kcm(0x2, 0x1, 0xffffffffa0008000) [ 990.135322] FAULT_INJECTION: forcing a failure. [ 990.135322] name failslab, interval 1, probability 0, space 0, times 0 [ 990.146630] CPU: 0 PID: 1405 Comm: syz-executor5 Not tainted 4.18.0-rc3+ #58 [ 990.153819] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 990.163174] Call Trace: [ 990.165776] dump_stack+0x1c9/0x2b4 [ 990.169426] ? dump_stack_print_info.cold.2+0x52/0x52 [ 990.174639] ? kernel_text_address+0x79/0xf0 [ 990.179062] should_fail.cold.4+0xa/0x1a 13:49:43 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1400000000000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 990.183144] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 990.188262] ? save_stack+0xa9/0xd0 [ 990.191898] ? save_stack+0x43/0xd0 [ 990.195539] ? kasan_kmalloc+0xc4/0xe0 [ 990.199444] ? kmem_cache_alloc_trace+0x152/0x780 [ 990.204299] ? do_check+0x59ba/0xb9d0 [ 990.208116] ? bpf_check+0x3872/0x5e60 [ 990.212016] ? bpf_prog_load+0x1141/0x1c90 [ 990.216271] ? __x64_sys_bpf+0x36c/0x510 [ 990.220352] ? do_syscall_64+0x1b9/0x820 [ 990.224427] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 990.229917] ? lock_acquire+0x1e4/0x540 [ 990.233908] ? fs_reclaim_acquire+0x20/0x20 [ 990.238243] ? lock_downgrade+0x8f0/0x8f0 [ 990.242409] ? lock_acquire+0x1e4/0x540 [ 990.246404] ? check_same_owner+0x340/0x340 [ 990.250748] ? rcu_note_context_switch+0x730/0x730 [ 990.255747] ? lock_release+0xa30/0xa30 [ 990.259757] __should_failslab+0x124/0x180 [ 990.264019] should_failslab+0x9/0x14 [ 990.267859] kmem_cache_alloc_trace+0x2cb/0x780 [ 990.272549] ? kasan_kmalloc+0xc4/0xe0 [ 990.276463] copy_verifier_state+0x44b/0x5c0 [ 990.280889] do_check+0x5aca/0xb9d0 13:49:43 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:43 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 990.284549] ? optimal_redzone+0x55/0x60 [ 990.288627] ? bpf_prog_load+0x1115/0x1c90 [ 990.292886] ? check_func_arg+0xce0/0xce0 [ 990.297061] ? kasan_check_write+0x14/0x20 [ 990.301321] ? do_raw_spin_lock+0xc1/0x200 [ 990.305579] ? trace_hardirqs_off+0xd/0x10 [ 990.309839] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 990.314958] ? debug_check_no_obj_freed+0x30b/0x595 [ 990.319990] ? trace_hardirqs_off+0xd/0x10 [ 990.324226] ? quarantine_put+0x10d/0x1b0 [ 990.328385] ? __kasan_slab_free+0x131/0x170 13:49:43 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 990.332804] bpf_check+0x3872/0x5e60 [ 990.336525] ? pvclock_read_flags+0x160/0x160 [ 990.341047] ? fixup_bpf_calls+0x1fb0/0x1fb0 [ 990.345465] ? ktime_get_with_offset+0x32e/0x4b0 [ 990.351193] ? ktime_get+0x440/0x440 [ 990.354925] ? memset+0x31/0x40 [ 990.358220] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 990.363785] ? bpf_obj_name_cpy+0x17c/0x1c0 [ 990.368117] bpf_prog_load+0x1141/0x1c90 [ 990.372190] ? bpf_prog_new_fd+0x60/0x60 [ 990.376266] ? lock_acquire+0x1e4/0x540 [ 990.380250] ? __might_fault+0x12b/0x1e0 13:49:43 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff0f0000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 990.384328] ? lock_downgrade+0x8f0/0x8f0 [ 990.388482] ? lock_release+0xa30/0xa30 [ 990.392480] ? check_same_owner+0x340/0x340 [ 990.396811] ? __check_object_size+0x9d/0x5f2 [ 990.401333] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 990.406886] __x64_sys_bpf+0x36c/0x510 [ 990.410778] ? bpf_prog_get+0x20/0x20 [ 990.414593] do_syscall_64+0x1b9/0x820 [ 990.418486] ? finish_task_switch+0x1d3/0x890 [ 990.422988] ? syscall_return_slowpath+0x5e0/0x5e0 [ 990.428011] ? syscall_return_slowpath+0x31d/0x5e0 13:49:43 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 990.432963] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 990.438002] ? prepare_exit_to_usermode+0x291/0x3b0 [ 990.443033] ? perf_trace_sys_enter+0xb10/0xb10 [ 990.447712] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 990.452587] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 990.457785] RIP: 0033:0x455ab9 [ 990.460972] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 13:49:43 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11f]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:43 executing program 5 (fault-call:0 fault-nth:28): bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 990.480404] RSP: 002b:00007f8952c98c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 990.488119] RAX: ffffffffffffffda RBX: 00007f8952c996d4 RCX: 0000000000455ab9 [ 990.495397] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000005 [ 990.503385] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 990.510658] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 990.517932] R13: 00000000004bb7f3 R14: 00000000004c8c08 R15: 000000000000001b 13:49:43 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:43 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffe4]}, 0x48) [ 990.571762] FAULT_INJECTION: forcing a failure. [ 990.571762] name failslab, interval 1, probability 0, space 0, times 0 [ 990.583061] CPU: 0 PID: 1454 Comm: syz-executor5 Not tainted 4.18.0-rc3+ #58 [ 990.590254] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 990.599635] Call Trace: [ 990.602243] dump_stack+0x1c9/0x2b4 [ 990.605886] ? dump_stack_print_info.cold.2+0x52/0x52 [ 990.611086] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 990.615948] should_fail.cold.4+0xa/0x1a [ 990.620030] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 990.625151] ? save_stack+0x43/0xd0 [ 990.628785] ? kmem_cache_alloc_trace+0x152/0x780 [ 990.633632] ? do_check+0x59ba/0xb9d0 [ 990.637448] ? bpf_prog_load+0x1141/0x1c90 [ 990.641695] ? do_syscall_64+0x1b9/0x820 [ 990.645768] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 990.651154] ? lock_acquire+0x1e4/0x540 [ 990.655139] ? fs_reclaim_acquire+0x20/0x20 [ 990.659481] ? lock_acquire+0x1e4/0x540 [ 990.663466] ? fs_reclaim_acquire+0x20/0x20 [ 990.667802] ? lock_downgrade+0x8f0/0x8f0 [ 990.671967] ? check_same_owner+0x340/0x340 [ 990.676303] ? kasan_kmalloc+0xc4/0xe0 [ 990.680200] ? rcu_note_context_switch+0x730/0x730 [ 990.685260] __should_failslab+0x124/0x180 [ 990.689549] should_failslab+0x9/0x14 [ 990.693372] kmem_cache_alloc_trace+0x2cb/0x780 [ 990.698061] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 990.703092] ? copy_verifier_state+0x3f9/0x5c0 [ 990.707695] do_check+0x5fa/0xb9d0 [ 990.711258] ? save_stack+0x97/0xd0 [ 990.714915] ? bpf_prog_load+0x1115/0x1c90 [ 990.719181] ? check_func_arg+0xce0/0xce0 [ 990.723346] ? kasan_check_write+0x14/0x20 [ 990.727603] ? do_raw_spin_lock+0xc1/0x200 [ 990.731856] ? trace_hardirqs_off+0xd/0x10 [ 990.736144] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 990.741268] ? debug_check_no_obj_freed+0x30b/0x595 [ 990.746328] ? trace_hardirqs_off+0xd/0x10 [ 990.750575] ? quarantine_put+0x10d/0x1b0 [ 990.754727] ? __kasan_slab_free+0x131/0x170 [ 990.759145] bpf_check+0x3872/0x5e60 [ 990.762863] ? pvclock_read_flags+0x160/0x160 [ 990.767351] ? fixup_bpf_calls+0x1fb0/0x1fb0 [ 990.771745] ? ktime_get_with_offset+0x32e/0x4b0 [ 990.776498] ? ktime_get+0x440/0x440 [ 990.780210] ? memset+0x31/0x40 [ 990.783572] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 990.789116] ? bpf_obj_name_cpy+0x17c/0x1c0 [ 990.793433] bpf_prog_load+0x1141/0x1c90 [ 990.797571] ? bpf_prog_new_fd+0x60/0x60 [ 990.801629] ? lock_acquire+0x1e4/0x540 [ 990.805686] ? __might_fault+0x12b/0x1e0 [ 990.809730] ? lock_downgrade+0x8f0/0x8f0 [ 990.813864] ? __check_object_size+0x9d/0x5f2 [ 990.818361] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 990.823892] __x64_sys_bpf+0x36c/0x510 [ 990.827771] ? bpf_prog_get+0x20/0x20 [ 990.831563] do_syscall_64+0x1b9/0x820 [ 990.835441] ? finish_task_switch+0x1d3/0x890 [ 990.839922] ? syscall_return_slowpath+0x5e0/0x5e0 [ 990.844921] ? syscall_return_slowpath+0x31d/0x5e0 [ 990.849844] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 990.854855] ? prepare_exit_to_usermode+0x291/0x3b0 [ 990.859876] ? perf_trace_sys_enter+0xb10/0xb10 [ 990.864528] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 990.869360] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 990.874538] RIP: 0033:0x455ab9 [ 990.877705] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 990.896885] RSP: 002b:00007f8952c98c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 990.904599] RAX: ffffffffffffffda RBX: 00007f8952c996d4 RCX: 0000000000455ab9 [ 990.911861] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000005 [ 990.919131] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 990.926471] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 990.933732] R13: 00000000004bb7f3 R14: 00000000004c8c08 R15: 000000000000001c 13:49:44 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:44 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:44 executing program 3: socketpair(0x9, 0xa, 0x2, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_type(r1, &(0x7f0000000040)='threaded\x00', 0x9) close(r0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={r0, 0x50, &(0x7f0000000080)}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0xe, 0x6, 0x800, 0x8, 0x1, r1, 0xff}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={r0, 0x50, &(0x7f0000000180)}, 0x10) socketpair(0x0, 0x80f, 0x6, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000380)={r3, &(0x7f0000000280)="9457479d5383743dae9d026966863b0b70886a54709c15f8cbc6ce5f88a42a973e418bbabcd95c3b39929a6359418cac07704a808215a278401f3357d3fe4dc334940debb9a7a132b9e701ce33bdffde70b89ea0944d9d89f688a4aefae67aa4e478cf7e798b2e61dedd457874edd46f601aec5651153cb1", &(0x7f0000000300)=""/122}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000004c0)={r4, &(0x7f00000003c0)="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"}, 0x10) mkdir(&(0x7f0000000500)='./file0\x00', 0x50) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(r1, &(0x7f0000005640)={&(0x7f0000004100)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000005500)=[{&(0x7f0000004180)=""/4096, 0x1000}, {&(0x7f0000005180)=""/33, 0x21}, {&(0x7f00000051c0)=""/164, 0xa4}, {&(0x7f0000005280)=""/178, 0xb2}, {&(0x7f0000005340)=""/110, 0x6e}, {&(0x7f00000053c0)=""/245, 0xf5}, {&(0x7f00000054c0)=""/52, 0x34}], 0x7, &(0x7f0000005580)=""/159, 0x9f}, 0x101) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f0000005680)=r5) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000005740)={r1, 0x50, &(0x7f00000056c0)}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000005980)={r2, &(0x7f0000005780)="fec1ca07d5a214c0c6e0a4c22adfafaac6c2fdcdf9463da81c6ee4251aa6147a8d6b32be5932d8f37b14614d3784c2d1a935b4591d9b9bfe179b2198756873cfbe0e16b82f2b5a4d85747b97869284b42894336496855eafc13fddf877e898528eaa7250115bc6d8adf5ae5e2bf6ebc8ecb40fd49fd12cd3219e5a2b1559bf8a80ab286991775359464e71b8f7a5e78cffda167cb69da76eb8b2617f1e22cca568215101464cff31eb2b50973c656af8a39c39ec923d66ed4d60b2d494422e30d858abe1254bb64a6a90dc487281", &(0x7f0000005880)="ef7b2aeffc30e5730ca802b6fd3dfbb616d3dfeca06fe1e221cfa669312fbaf603e4a054598a1c23437c76ad38eee1832bb556b99630bba96ff8e6bb07378e35614f963b40e2119f8e131369eca9cc7ba54b5b036c36808fbbc923ab95228440f23642849aa72ad9bbf6d59449223418062b190f98cfb1d7525df83e4c18f3e45493ad7534278f9dd3f125d2193ab3ff0e7cfa2259a14e491fa9abe60a880f7d4941931cbeb0653f2402616c529d177c52af936ae4e22bef987eda300381be8c158dd3", 0x2}, 0x20) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000059c0)={0xf, 0x2, 0x0, 0x2, 0xe, r4, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000006b00)={r4, &(0x7f0000005a00)="49e8e5791917972f4ea74eec83d38a08482840ee7f718f0790f31ebe626e32ccf33330bc4090c9f63a3451faa3450b417739c098f1fb39d87440e141c93804ca726e210e191be65aa9beb7bb2cacc64369016737551ce43b33be8b52d51908755ad350adb6c3e71163d2b64603344b50388e9825e46e5f921a8a02b9d801d5cae1e210d6e7a01190dfaa99e6d9ee92eea334c98395313786b0bce7f1a61f9b821849e8557d77b450b1c9e57ac10c4af369974a6ab803cfc58d1e029ce87c00ed4e96a4e053855099f0146fc0b20708b1067fe1438bb9164f9977517d9a2b45030fd3abff27adfb19788d092211a505d38c2b29667e8776e749aef30b638c2bd44ff157129cf2208cb5c91e44ed9ea7f66375bc07177342ad880e32ce97ac3c1b809c81873cf02a86ac787f1e9978ebe8699ba1e86ea10fe71806dab91cf547528e776babc44192763ede3984de03259707d95b6e6eccf07a9cd7ee9014d78dec8f204bd2c8316457bd3b827ace000904a640475c55b87ae54f5f89cc1ae320ebc01971baf58bd790c1d481069d78562e54fe0654535d4d497fc02ec49c2fa7291e5ede387c7ced3fbe3ff249413c5adc6529e8776990e1a1f97d458ac61d0fb72aea270634dbaf64e7115ff5d32a009a95796f5fd6291a99bb252d75eccb17a080b75634a083f763678c5ca61148a17a2b9e717ef14c7f15542c8c179f0bc85f75da7549102a6e816f592b3d4cf7a8e984b4307b15fd5e722acc4671f381088bd98f655486f1a4462f479a475c6b8fb679fa4fb2ecd0d633daa6f5f1bfd680b8620fdb4b67dd02258995c0f393dee971d1f31eae6d240071cd9617c75836956e80ec52748606fb3e22eac372639ee0d614d00eca435738f54adbfae4e900ccfd38d7fc87ec1eafb41aa05a2c122525972580b262b52f644cd1a3164b3fa242c89c750c1f6f39b7f707367b5b716273102a8696345460b721fe4992c76249b2b4afb5d79e3a51a24473b0c448be116d4746c20f0b75936dc9efeaca37f6a8f4e27da64f5600e7baf943540c06637fbabbd5493bec65d80aa8204f7e02c5accbbac314f4eef6a69d31df39a64e23e9ff31f6bf452d4cdfeffba071f614ba4ce5f6802995830165974f87998df879fc320e0bbbd2f00e9d403dbe80c43572a26e9f8a25f97660e8e94ec1e4c90797c4a90ce48c7559d3dec44cd37da1247fbfb239632806baa18db1b53aecda0465ff2df8e43cf469e8c9b3844d54b95b1ea0ba607395584bbb6edde56dcafa945dd4e83698dabf6a28fc06c7bbf45976215a78b30e902c76a448a5a32a0a28f44e643a4aa1f8e47beb5fb454cef5c79032ff4e023176585e65b9b8745c80c460c86c4e59f5f7122c57b536f1a3fc7cde2cdefd2e61b77d04974c242f9e70f068b04cd749e083faa2b44e3039ba7219a8350aa8d819b482b7685318c8e71298bf3f1f8830e4ac8b5d7fd74796af24c36c6b32a1291c1dc67a09fc44d70cff67c93fbae77a70f0886bad1cfe5275b40e79c4909cb2c662ef73730600a8ca1a26d67e141c9a3efba4ebc3e0fe3e7a4dfb68125f231ee75ad58584415f34a6ffbaee1b28a837ed93a41bb800ffdb82815dce866e8b078849907a5b8c10e2cbe89b15c7ae56335ac248441b92a2b88c62bcba6add8d4b45732527482b228f5d7be8ed540bcb49a72d3f9a9ba4ba733942d2802be3d2ba37f36c6a81e69ed63f92672a2f13d563d33f419cb69eae02505765ae6094698630f17eff4a06695191fd298f03517623af13193333fb99f6d2b4bc2f0af31474beeda269dc6c45376f36cd8a0ba81bd35fb0e8d7181f74161279dafb08f1d438e6bb4bc6af221cba47736d827ed97ae7ec2b293b0e76c633c1d7375d71349c6420bf478953671642a781ba72f87e4b72fc014e554c7dae21f8481ceb8249cee0ae32ea9a916011dd77219c1f5212911ade2d872265743cffa69c13743b001f29608317a680504f86750f79d6cab87d97c25b3a9f179ccace63901e0eb8354de0595439a82d05e0639d5569537f14ea71d7bacdf9050d78f60cff9f68ac07442f72ade8e0274c5af45f1446378058dcb7f62b5d5534356aeb2af8ee86cae97349f82b8bfd0b94831ccc4bebc38249ca0260f05ca6fc50ce2446ea734ae97c0585b3dc8abd7cd99ec300fba90a93443db66ca3688dc890c0142d36c6008a5aab4c4ab80e4e90d093d097d7d9a267574bc92ff8e7a27be613bfb7c35199617c08db9f6a30c08832a664a4b23fe8a9497d7de81a62fbd784a0d0b4c12af07da15765267eb9b6a86446963390085b0b0b7ab28c39906a72d8f7c0013b8d0852f33cad37a4a8901eaa4b49ff0d65532f227b8f19e9eec5c37fa2c53b84893e67676a43f9b2cfada5184595e889679c22d4cf8bdbfd3ffc882b445bb198bd7cb2a233d2cbad40523a65411ef5c7edbb90553f32c317c9a0e12728dc76bde2cda60b5f640187a6b9e1441836d3c50eb534201dcd0c4070a78fad4d0f7e880556a110940f768617a5d21ee02ca02fd7c855b5c5acb2f3762562364dd805d27bd4ee66fe74a9d90eea746666ffa69561f51360bd7f8c8b54c5ed3fd2e428fd853a37d1dd7bbbaef832a9e437a4bce05355ebd79fb7efb89d64bc2129791960e149dcbdbd3c6a8a833e671cbc1006814c35999875b6150f55d2d61c7b58100e8c114ddf43606dd7ff3f8c8e933e336fbe0ce2ccdb29d861dfb607e4dd0d20376ad787cc879b4f6072422cd9c14a47f5f682bcb2d9664547071b2b53393dde0475e9e6f1b47dbdc597d05c9a08bc7c4eb7108f44bd110053cfa6c67765e8ba093b28bcb07ea0b5dabe4af030ae9decef93ad8523a222c03b26be56ac127cc7f1d4c6eb8100762245e99dad6f11ea65e8dc846b8c816cca437f1cb24a14ec2b409784d09ae4385a9ad49e72bc2baced4c0afb2dca1ef4a0072e4220df5190f8951b2bde86a9b5aa18886059705b9f2f14c0088301d33e6b1854f48378097d8f302b3cd1f05d52937976193d5be42974c26b758d19742adfd3184ccf2730e947cd81d68f44e5bf6f245ee6a269ed1330eab1f46898a97358557a7a259f4d4a0285081f88eaa87a93092168e9ad4982bf5f201320044970b6b25c4ac6cda9760b71e57324141800e4fefeaf8071ea6dcee66080f460a441b74e3009a9545b0af80a570904cbf1f4b6a8e4ee5012c064f5205c6b4b373f988aa49f81c993f6e921752efa14ef669cd48fe9cbd79c42fa052e8ef69bbb0ddc73614272c8f1cbc38223658f279e5e4d1a0b96ba82f46909b319fb28d90fcca74f233bb5c59b99a169cf19b0078c2f1f7c47c1108738152556074b504cfb54b5f61bbf170ea680da28346a6218181149c482bd271263a5aaad67f981f1979d0f460a9fd8508a33eafcf09759dc8c8e1e03eebd8cb23527d77fa9c294364dc3714ac3e94b26754e1510b524e8c5451464215087245f5d440a2b55dbf3f727a19733316dde89122662e3a1a9fcd1de40b4fa3af1c36682deb0f757a77e0c99cb2d103ad0d4ccfccafa7c5bf8ae6038c01219b68dbc983c928f79b61639d6dff4ca56965febd22e20e09c5ff7e438d3d38ef8fde6cc5a8bdd3ddf18f8ebaded56ace4dbab141f11da20ff7b1874e85039cba20b329e0dd1ad47113a33f4d3e4af5fa1e9b15c31e7dc2413ef41b7d857b081820d6d2ce674388591fd7d9ed4aaaeef5aa20517bd99b4dd172acd36d14d7276fbe0b86d871f90e6c305b9d5ee9a85dc8d449f70722650d1ea44ebc91bd6cff7aa1aa812957b37203707ebc423fb812f253231dd6b04c6206c9bd4a11be0026e8ad22442bc82157d29d1bda8ea98847f7d76440b9c69dad43b5692ace4547a3511a94bab396e3c9b244e173716450820871286c0eb966c267d792d37c3f2583a516e20733eb90ffae42d4f604709ac19679331b25be587951482d59e237e5a88d377fe48991bb0e040bc7318e8824389415447ac9a0401e9afc58b1cffc6ee3baae28b2b860a7ea90760fc0dd58c91f019d215dcf268dca551684437bfc4d9650885d8026ff24cd244705b8def18ef3a25228f37c0dd5e5afbbff8918e3a46837f446edcb3ff94ba0ca62169f1df29e5d83d52815f52e313092894e0734ce79fe823fe2265db3004eae66dc4d9e77e1f1be5d06ead2e1ca0f051b8f350531afd76e742b81681291c27b7eb219d6f96f9894aea32e93c5c3eb29434d6c0fbe148023a9d576e4213873b34d783438163c040b1829b366d59398bbba7f4c3a4630c0e459f38f5126debcf400e64848763a2fe3bb946e98ccf20b0091515a65b6dcd69efb89110a0f0b2eaef75cdc6c5168db94056875bc07e9481e9b945f629363ec43218ad2f78b4f940574398b5caf3fe757bb657275104fb04ff0e5c45959eaaa7a68ead1985f7555c68a21b17b48f2ffb6771aa308fd2e8323c549360c2a7e8370beeeac29d1a3d72f4aaa67fe5e62a5e2a588eee8d1f9436241a09b92baaccf10bdc5f530c99f54d3c1c68c423ac8989997f300942ff44f32c9e461c8a69002d8812b6e3e6b4ae9e6df08c9dff4375a07cffff52cb5f4147f5eebd6e0fe691d941b77151792320436b6a227046d86e8ca1ab0f7ebe13fecc27fef35a13790edbe8c317166d8e90407780cbef45d4893e3f230a3cbc32da86a4e1294487f5ee75227d75c8fe0af8f26eb1ffad2adaea44aefa55faea742b097c9c5a2140fb273604eb8ff5975ba2e29921cf8bff49be504af203439b9e31726e8e078a0d04456c95eff510374ce928545f5565f2ae053ed859ea93a01a0bd73207c599713d62a7f9b00ac6e16f13a5a5543d15a34ce83d7fb889eec486ca02fe10a96c6d20910de956df986d3627f43232f0964a1bc39f06e8cfc72fb2eb5e9274dc2d9e88b40e619cee22551444b44fb98d5f0bc48f22bcc0d2934140b06d96ff7fc6e482c2b90e58b2fee6866be7685ee09c98f5bfcf2cc316c3358c2c48d84bdd6f58e5c0928bc310ebafc3fde43aecd8dad83294f4ac577146330e7ee1f86ad01e09424a7080f83a8c66d85a9271c57f99da807e385f5467b2253cbc8d264472fb8f73dc25e20669970e72b060e000dfdc85013bd9b9a021fc4ed0e75e898de574ee0b5803f083e816b1866d7280d2138eeeb0028025dcd881e058fcf23d6906b1d3bf18f5f66a698b835305fb4dffcd8baffef7a3fd810bcb4475f0fd5eeb4a664be2111b552ce701a3bec7224697c5745f6c950dc4417d309d683b26038e778534f5c26a2db40155bf840f5300ad8b91bccd841b7f0ccc7df53e468009e2195006f4fc9a11a68270ae7eb3a4183c7f64ad0ee1ec129d46401e7bbc900272170b4765e7cbab8c16235d2ada68654010011be16e5a11bbcd52eaf3b6298280086244d85f1d06633a57fae1acecd28408d0617fe2c66f804a05eba8204f802e348f7f6c5ac0efd1a6e0d5467f27f749b4b8d4fe007ed0f28428aa0d3fd75ed35af35593dd249cd0b78f8bdf115edf547d2a4878499827fbbfa5498b0c1254aa179a83dc2625fe9aa5d68bd84a6ba33d17308cbe04c7ef4c6454ffaf5c8197a7200e86d735fc8e8d76a327e7578a1e2d764ab00a335b0e587082a0d53135b04d21d379a5d82bfcb952b57d86908f8659f469343a349bc41847a16fca5c415bc647fcce1e757ecc8ad2aded08e4ecd446f7bd9def317b539a9547f67981b2b4c2a9ec843f1ccb42f136b377456fefc2f20862260a04eeb37b5345d648886ddd426dae8ad0ef", &(0x7f0000006a00)="00dd23662ea805e310df1427d3fb1bddd8f77b98aa4f43ec514bec532338f11f227f318c578f88ae60cbcd853f3b86840694db6d018e5772d5b80c9d95908b42e1dd33eba8f27ac337ae3225e987897c0e16ea9d0ac109c9b072876c92e9ca906187267da31e7ed7d343f11b02158579654dcb13486571af1639a6a368e3e6ce59e373c7b00f3d827783a510c2b0ee9cb08ac5740e46e11803a16455080d23def66f22090e47b208c3dc10847b26fe07d43b320d7a79cef98c0ac7294d2f2a052da3cbf575c5a9402851f7fbc6c172ffd7551722dd0643d71fac439fae0a86a83b9c3805be9bc8497a3609591a4ce00cc022d41cb36c"}, 0x20) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000006b40)={r1}) ioctl$TUNSETFILTEREBPF(r3, 0x800454e1, &(0x7f0000006b80)=r4) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x8) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000006bc0)={r7, r4}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000006c00)=r0, 0x4) bpf$OBJ_GET_MAP(0x7, &(0x7f0000006c80)={&(0x7f0000006c40)='./file1\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000006cc0)={r0, r1}) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000006d00)=r0, 0x4) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000006d40)=0x2, 0x4) socket$kcm(0x29, 0x7, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000006dc0)={&(0x7f0000006d80)='./file1\x00', r6}, 0x10) ioctl$TUNSETPERSIST(r4, 0x400454cb, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000006e00)='./cgroup.net/syz1\x00', 0x1ff) 13:49:44 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:44 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000]}, 0x48) 13:49:44 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socket$kcm(0x2, 0x1, 0x4) 13:49:44 executing program 5 (fault-call:0 fault-nth:29): bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:44 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:44 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000]}, 0x48) 13:49:44 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 991.058738] FAULT_INJECTION: forcing a failure. [ 991.058738] name failslab, interval 1, probability 0, space 0, times 0 [ 991.070096] CPU: 0 PID: 1486 Comm: syz-executor5 Not tainted 4.18.0-rc3+ #58 [ 991.077307] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 991.086928] Call Trace: [ 991.089536] dump_stack+0x1c9/0x2b4 [ 991.093179] ? dump_stack_print_info.cold.2+0x52/0x52 [ 991.098395] should_fail.cold.4+0xa/0x1a [ 991.102477] ? copy_verifier_state+0x44b/0x5c0 13:49:44 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4002]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 991.107076] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 991.112195] ? save_stack+0x43/0xd0 [ 991.115833] ? kasan_kmalloc+0xc4/0xe0 [ 991.119742] ? kmem_cache_alloc_trace+0x152/0x780 [ 991.124600] ? do_check+0x59ba/0xb9d0 [ 991.128455] ? bpf_check+0x3872/0x5e60 [ 991.132356] ? bpf_prog_load+0x1141/0x1c90 [ 991.136607] ? do_syscall_64+0x1b9/0x820 [ 991.140684] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 991.146072] ? lock_acquire+0x1e4/0x540 [ 991.150063] ? fs_reclaim_acquire+0x20/0x20 [ 991.154427] ? lock_acquire+0x1e4/0x540 13:49:44 executing program 3: r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x9}, 0x80, &(0x7f0000000040)=[{&(0x7f00000015c0)="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", 0x4e8}], 0x1, &(0x7f00000001c0)=ANY=[]}, 0x8000) sendmsg$kcm(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000100)="37713f9fe63d4f107ca1e061fb6c673461918b876bfda23ca3a336b06b897e188cfd7facc215c026ac1a47c411e69d833431a25d48a57a295f1271de73df7cab3b1004ffe1ff4b814c269027b201d9c091d6a8bbba85bd8f7d2a89a27c917826bb57a09071c772109450dfb5a911af2a232986b4bef216272dbe889863541a0717a603e157e173ec20c937d887bd53ffefc183", 0x93}], 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x178}, 0x40) unlink(&(0x7f0000000000)='./file0\x00') [ 991.158420] ? fs_reclaim_acquire+0x20/0x20 [ 991.162765] ? lock_downgrade+0x8f0/0x8f0 [ 991.166941] ? check_same_owner+0x340/0x340 [ 991.171285] ? kasan_kmalloc+0xc4/0xe0 [ 991.175191] ? rcu_note_context_switch+0x730/0x730 [ 991.180151] __should_failslab+0x124/0x180 [ 991.184405] should_failslab+0x9/0x14 [ 991.188220] kmem_cache_alloc_trace+0x2cb/0x780 [ 991.192915] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 991.197941] ? copy_verifier_state+0x3f9/0x5c0 [ 991.202535] do_check+0x5fa/0xb9d0 13:49:44 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40020000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 991.206105] ? save_stack+0x97/0xd0 [ 991.209746] ? bpf_prog_load+0x1115/0x1c90 [ 991.214013] ? check_func_arg+0xce0/0xce0 [ 991.218174] ? kasan_check_write+0x14/0x20 [ 991.222422] ? do_raw_spin_lock+0xc1/0x200 [ 991.226707] ? trace_hardirqs_off+0xd/0x10 [ 991.230957] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 991.236068] ? debug_check_no_obj_freed+0x30b/0x595 [ 991.241090] ? trace_hardirqs_off+0xd/0x10 [ 991.245329] ? quarantine_put+0x10d/0x1b0 [ 991.249482] ? __kasan_slab_free+0x131/0x170 [ 991.253900] bpf_check+0x3872/0x5e60 13:49:44 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x11, 0x4, 0x4, 0x400, 0x0, 0x1}, 0x3ef) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x408000, 0x0) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x5, 0x0, 0xa90, 0x3}]}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000000)="340367", &(0x7f00000002c0)}, 0x20) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x40000, 0x0) ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000080)={0x1, 0x3, [@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}]}) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000100)=0x9) [ 991.257619] ? pvclock_read_flags+0x160/0x160 [ 991.262124] ? fixup_bpf_calls+0x1fb0/0x1fb0 [ 991.266543] ? ktime_get_with_offset+0x32e/0x4b0 [ 991.271308] ? ktime_get+0x440/0x440 [ 991.275123] ? memset+0x31/0x40 [ 991.278411] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 991.284036] ? bpf_obj_name_cpy+0x17c/0x1c0 [ 991.288366] bpf_prog_load+0x1141/0x1c90 [ 991.292436] ? bpf_prog_new_fd+0x60/0x60 [ 991.296506] ? lock_acquire+0x1e4/0x540 [ 991.300483] ? __might_fault+0x12b/0x1e0 [ 991.304553] ? lock_downgrade+0x8f0/0x8f0 13:49:44 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 991.308892] ? lock_release+0xa30/0xa30 [ 991.312885] ? check_same_owner+0x340/0x340 [ 991.317218] ? __check_object_size+0x9d/0x5f2 [ 991.321738] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 991.327292] __x64_sys_bpf+0x36c/0x510 [ 991.331196] ? bpf_prog_get+0x20/0x20 [ 991.335021] do_syscall_64+0x1b9/0x820 [ 991.338916] ? finish_task_switch+0x1d3/0x890 [ 991.343421] ? syscall_return_slowpath+0x5e0/0x5e0 [ 991.348360] ? syscall_return_slowpath+0x31d/0x5e0 [ 991.353297] ? prepare_exit_to_usermode+0x3b0/0x3b0 13:49:44 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0xf, 0x7, 0x101, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r1, &(0x7f00000053c0)={&(0x7f0000004ec0)=@can={0x0, 0x0}, 0x80, &(0x7f0000005300)=[{&(0x7f0000004f40)=""/177, 0xb1}, {&(0x7f0000005000)=""/132, 0x84}, {&(0x7f00000050c0)=""/13, 0xd}, {&(0x7f0000005100)=""/94, 0x5e}, {&(0x7f0000005180)=""/54, 0x36}, {&(0x7f00000051c0)=""/79, 0x4f}, {&(0x7f0000005240)=""/182, 0xb6}], 0x7, &(0x7f0000005380)=""/64, 0x40, 0x1}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000005400)={0xf, 0x2, &(0x7f0000000280)=@raw=[@generic={0x3, 0x63054536, 0x2bec52a5, 0x8c}], &(0x7f00000002c0)='syzkaller\x00', 0xffff, 0x0, 0x0, 0x41000, 0x1, [], r3, 0xb}, 0x48) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000240)={r4}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000000)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8946, &(0x7f0000000100)="6c6f00966fd651b159a9c84a2c60d29800000020") [ 991.358327] ? prepare_exit_to_usermode+0x291/0x3b0 [ 991.363350] ? perf_trace_sys_enter+0xb10/0xb10 [ 991.368033] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 991.372890] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 991.378343] RIP: 0033:0x455ab9 [ 991.381528] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 991.400864] RSP: 002b:00007f8952c98c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 13:49:44 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 991.408581] RAX: ffffffffffffffda RBX: 00007f8952c996d4 RCX: 0000000000455ab9 [ 991.415876] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000005 [ 991.423146] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 991.430419] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 991.437693] R13: 00000000004bb7f3 R14: 00000000004c8c08 R15: 000000000000001d 13:49:44 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:44 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:44 executing program 5 (fault-call:0 fault-nth:30): bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:44 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000]}, 0x48) [ 991.559590] FAULT_INJECTION: forcing a failure. [ 991.559590] name failslab, interval 1, probability 0, space 0, times 0 [ 991.570929] CPU: 0 PID: 1550 Comm: syz-executor5 Not tainted 4.18.0-rc3+ #58 [ 991.578127] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 991.587483] Call Trace: [ 991.590068] dump_stack+0x1c9/0x2b4 [ 991.593685] ? dump_stack_print_info.cold.2+0x52/0x52 [ 991.598866] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 991.603708] ? __save_stack_trace+0x8d/0xf0 [ 991.608031] should_fail.cold.4+0xa/0x1a [ 991.612083] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 991.617173] ? save_stack+0x43/0xd0 [ 991.620786] ? kasan_kmalloc+0xc4/0xe0 [ 991.624660] ? kmem_cache_alloc_trace+0x152/0x780 [ 991.629489] ? copy_verifier_state+0x44b/0x5c0 [ 991.634055] ? do_check+0x61a/0xb9d0 [ 991.637752] ? bpf_check+0x3872/0x5e60 [ 991.641625] ? __x64_sys_bpf+0x36c/0x510 [ 991.645670] ? do_syscall_64+0x1b9/0x820 [ 991.649722] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 991.655075] ? save_stack+0x43/0xd0 [ 991.658693] ? kmem_cache_alloc_trace+0x152/0x780 [ 991.663522] ? do_check+0x5fa/0xb9d0 [ 991.667222] ? bpf_check+0x3872/0x5e60 [ 991.671103] ? bpf_prog_load+0x1141/0x1c90 [ 991.675322] ? __x64_sys_bpf+0x36c/0x510 [ 991.679375] ? do_syscall_64+0x1b9/0x820 [ 991.683422] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 991.688778] ? lock_acquire+0x1e4/0x540 [ 991.692741] ? fs_reclaim_acquire+0x20/0x20 [ 991.697060] ? lock_downgrade+0x8f0/0x8f0 [ 991.701203] ? lock_acquire+0x1e4/0x540 [ 991.705165] ? check_same_owner+0x340/0x340 [ 991.709491] ? rcu_note_context_switch+0x730/0x730 [ 991.714419] __should_failslab+0x124/0x180 [ 991.718645] should_failslab+0x9/0x14 [ 991.722434] kmem_cache_alloc_trace+0x2cb/0x780 [ 991.727091] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 991.732614] ? realloc_func_state+0xaa/0x340 [ 991.737017] copy_verifier_state+0x44b/0x5c0 [ 991.741417] do_check+0x61a/0xb9d0 [ 991.744964] ? save_stack+0x97/0xd0 [ 991.748578] ? bpf_prog_load+0x1115/0x1c90 [ 991.752809] ? check_func_arg+0xce0/0xce0 [ 991.756946] ? kasan_check_write+0x14/0x20 [ 991.761165] ? do_raw_spin_lock+0xc1/0x200 [ 991.765389] ? trace_hardirqs_off+0xd/0x10 [ 991.769621] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 991.774721] ? debug_check_no_obj_freed+0x30b/0x595 [ 991.779779] ? trace_hardirqs_off+0xd/0x10 [ 991.784003] ? quarantine_put+0x10d/0x1b0 [ 991.788154] ? __kasan_slab_free+0x131/0x170 [ 991.792558] bpf_check+0x3872/0x5e60 [ 991.796260] ? pvclock_read_flags+0x160/0x160 [ 991.800756] ? fixup_bpf_calls+0x1fb0/0x1fb0 [ 991.805149] ? ktime_get_with_offset+0x32e/0x4b0 [ 991.809904] ? ktime_get+0x440/0x440 [ 991.813611] ? memset+0x31/0x40 [ 991.816881] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 991.822415] ? bpf_obj_name_cpy+0x17c/0x1c0 [ 991.826737] bpf_prog_load+0x1141/0x1c90 [ 991.830879] ? bpf_prog_new_fd+0x60/0x60 [ 991.834930] ? lock_acquire+0x1e4/0x540 [ 991.838888] ? __might_fault+0x12b/0x1e0 [ 991.842935] ? lock_downgrade+0x8f0/0x8f0 [ 991.847084] ? __check_object_size+0x9d/0x5f2 [ 991.851590] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 991.857127] __x64_sys_bpf+0x36c/0x510 [ 991.861013] ? bpf_prog_get+0x20/0x20 [ 991.864998] do_syscall_64+0x1b9/0x820 [ 991.868874] ? syscall_slow_exit_work+0x500/0x500 [ 991.873711] ? syscall_return_slowpath+0x5e0/0x5e0 [ 991.878629] ? syscall_return_slowpath+0x31d/0x5e0 [ 991.883549] ? prepare_exit_to_usermode+0x291/0x3b0 [ 991.888554] ? perf_trace_sys_enter+0xb10/0xb10 [ 991.893210] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 991.898045] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 991.903219] RIP: 0033:0x455ab9 [ 991.906390] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 991.925667] RSP: 002b:00007f8952c98c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 991.933363] RAX: ffffffffffffffda RBX: 00007f8952c996d4 RCX: 0000000000455ab9 [ 991.940616] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000005 [ 991.947869] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 991.955125] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 991.962552] R13: 00000000004bb7f3 R14: 00000000004c8c08 R15: 000000000000001e 13:49:45 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socket$kcm(0x2, 0x1, 0xfffffffe) 13:49:45 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:45 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffff00000000]}, 0x48) 13:49:45 executing program 5 (fault-call:0 fault-nth:31): bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:45 executing program 3: r0 = socket$kcm(0xa, 0x3, 0x3a) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000140)='cgroup.subtree_control\x00', 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000740)=@nl=@unspec, 0x80, &(0x7f0000000040), 0x0, &(0x7f00000007c0)}, 0x40000) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000300)='vboxnet0[+mime_typelo^wlan1[ppp1&+vmnet1\x00'}, 0x10) ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f00000003c0)={0x1, 0x3, [@dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xf}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @random="7921b5aeb648"]}) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, r0, 0x1, 0x1, 0x0, 0x3, {0xa, 0x4e23, 0x80c, @local={0xfe, 0x80, [], 0xaa}, 0x100000001}}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000100)="e9d61fb30cfd1a94b74f6b4004d2626fef2507863ad10889527ece85f902525c05e71d", 0x23}, {&(0x7f00000001c0)="fae95f51dbf8a1563fae403481cce0b2429ee174f76b911657fd8f5d07901487ab07eadc6bf0451c6e52697cccfac8fac99c9cdcfff1", 0x36}, {&(0x7f0000000280)="3d6dbffc0fc62ef6e992309eac0021c8577828922b5b64030accc50eb207fabe0d01712db6f99f62ba819de4f2085ab4cc10e0e299cd916c89fef4e3d1425b2889abb70d01cbb3e7c87357d20c", 0x4d}], 0x3, &(0x7f0000000300), 0x0, 0x40}, 0x40) recvmsg$kcm(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000440)=""/101, 0x65}, {&(0x7f00000004c0)=""/237, 0xed}, {&(0x7f00000005c0)=""/18, 0x12}, {&(0x7f0000000600)=""/53, 0x35}, {&(0x7f0000000640)=""/44, 0x2c}], 0x5, 0x0, 0x0, 0x81}, 0x41) sendmsg$kcm(r0, &(0x7f0000001c80)={&(0x7f00000007c0)=@nfc={0x27}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000180)="25d5f6cf9e12a7b2895dee3ff9570b6932300e70cc67cd239f08ee9d81cbf2cdee184c319e3bb512e7eb66fd0d18", 0x2e}, {&(0x7f0000000840)="0ec2326257a55ec48d32a19d1428faa274ee058c7515830589d8972baed7b66652cd1c94c79078e3cef3014a9aee65ee938d0d6a58298ec8166e252f30499a632c417365117a39aaab3d16f06e1aefa68286d4b947d97d8a0b229c9403", 0x5d}], 0x2, &(0x7f00000008c0)=[{0x1010, 0x105, 0x3, "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"}, {0xe8, 0x10c, 0x1, "157911f2f175e7bbc13d421f2ae25a8a197035fa09ce4b6fe666e72ffe7d2e8d3168cf600703c5c6e7c4b5cf44355f3b6a82065d7fc305ba7888e54d6c4fc5b45a9aca1f08e396ba4e6e86b0036647048edf4d607c2a68a03336f6690d70d078ace4038d5ec7c80c13dfe1aaafe3e571cdfa877333521c3e7db0880c49e59e385993e9ce5635359bc32b14fddde58e71b9f31916e1b650f96354dd00de0cfb1d97cdb5a428c6ae4b4341cf7c96b4f29535050a16466196efc9147d726a75a9dcf1a43869b6fe2456614c8be78eb1c50c5bb8ffcd893703f9"}, {0xd8, 0x11f, 0x8fd, "a2b0a908ae65d88163d3db4905d176a2c010da0c98e9335e8656fa7947bedce76e7a251562da94e7fdf0f1639e82ffbb13407746cd9b3d9ec0971d32199f1cef63451d83074db6a57b7ad40ccc41258b8a1b16df642d1e008392de3c3afe42ee20ef0385363c6416a0570a978976592759d179a91d8b1a9a72bdd2110d8fbf591d5e01629c109b2c3e8ee2a7c83bd28fe9cadd30ae7eedcf575b0f96166206450516cc11a97ed5e4eb8c0b6ef4820f2197c76324bf6f25987035a4dca18a6d90343456c9359b"}, {0xe8, 0x101, 0x4, "a517c62054db619974f726ea5d6c16c4bf8fefd11fb7e43e44e1c6e0709a7e0d9b0c3447e448687da1402af11860bfd4891861f1835fbebb150a1e8bfd82e5a091f9e7bb1cc0da0e379d27387db7798bd5a0e9294a19b5f9d884f2af44bcd1e5259cb065da835782e6d5af9d296ca5a49b9c329068ea48de4a50da5e96c86963f70d06b58bbbe5d15d1a574bb35dc4fc58687f21c612aa52694ed8f0ef49162404c63668157828b14cd262944cb7b359b4b17342aea3275965095823b9410b0dede74ec6d0c3a31360f2265398760c7031cb544de38d"}, {0xe0, 0x115, 0x5e, "f95fb19730b2626b9e39fa911ff8e9572526a6b0843b998d38a46b9a46affb3d09e018595793620c763d3f511eace1bb17e4c0a7c70fb3b5b374d6726ab5fb63f8e883baed0d1a74e0a4f1f56e77649c0dc62861fb2a1fce9aa37ece193eccd0a6af2fa628878469614e605a79189992262fecc632073ca427673cb5f022ee35b2928d62b4d0b41e2ee53f3b2c4b82ab32f86964a70d8e86df5095f1e1ceb4b4ce5dcae7d0e86212b9438a0e5ec63006a7b70f63f093663531f5a05184d367bc69438bb9af4609d8bf4852"}], 0x1398, 0x40004}, 0x20004000) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000400)={r0, r2}) 13:49:45 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:45 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 992.045803] FAULT_INJECTION: forcing a failure. [ 992.045803] name failslab, interval 1, probability 0, space 0, times 0 [ 992.057139] CPU: 0 PID: 1563 Comm: syz-executor5 Not tainted 4.18.0-rc3+ #58 [ 992.064341] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 992.073702] Call Trace: [ 992.076312] dump_stack+0x1c9/0x2b4 [ 992.079960] ? dump_stack_print_info.cold.2+0x52/0x52 [ 992.085227] ? __kernel_text_address+0xd/0x40 [ 992.089749] should_fail.cold.4+0xa/0x1a 13:49:45 executing program 3: r0 = socket$kcm(0x11, 0x3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='$-\x00'}, 0x10) setsockopt$sock_attach_bpf(r0, 0x107, 0xf, &(0x7f0000000180), 0x4) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000080)) sendmsg(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@nfc={0x27, 0x2}, 0x80, &(0x7f0000000000), 0x27e, &(0x7f00000002c0)}, 0x0) 13:49:45 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x240]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 992.093834] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 992.098957] ? save_stack+0xa9/0xd0 [ 992.102607] ? save_stack+0x43/0xd0 [ 992.106252] ? __kasan_slab_free+0x11a/0x170 [ 992.110679] ? kasan_slab_free+0xe/0x10 [ 992.114692] ? kfree+0xd9/0x260 [ 992.118002] ? free_func_state.part.20+0x3f/0x50 [ 992.122785] ? do_check+0x4c4d/0xb9d0 [ 992.126597] ? bpf_check+0x3872/0x5e60 [ 992.130500] ? bpf_prog_load+0x1141/0x1c90 [ 992.134746] ? __x64_sys_bpf+0x36c/0x510 [ 992.138845] ? do_syscall_64+0x1b9/0x820 [ 992.142931] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 992.148321] ? lock_acquire+0x1e4/0x540 [ 992.152312] ? fs_reclaim_acquire+0x20/0x20 [ 992.156654] ? lock_downgrade+0x8f0/0x8f0 [ 992.160839] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 992.165988] ? check_same_owner+0x340/0x340 [ 992.170346] ? kasan_kmalloc+0xc4/0xe0 [ 992.174254] ? rcu_note_context_switch+0x730/0x730 [ 992.179207] __should_failslab+0x124/0x180 [ 992.183459] should_failslab+0x9/0x14 [ 992.187276] kmem_cache_alloc_trace+0x2cb/0x780 [ 992.191974] ? trace_hardirqs_on+0xd/0x10 13:49:45 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 992.196143] do_check+0x5fa/0xb9d0 [ 992.199709] ? save_stack+0x1f/0xd0 [ 992.203360] ? bpf_prog_load+0x1195/0x1c90 [ 992.207633] ? check_func_arg+0xce0/0xce0 [ 992.211801] ? kasan_check_write+0x14/0x20 [ 992.216049] ? do_raw_spin_lock+0xc1/0x200 [ 992.220298] ? trace_hardirqs_off+0xd/0x10 [ 992.224545] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 992.229660] ? debug_check_no_obj_freed+0x30b/0x595 [ 992.234713] ? trace_hardirqs_off+0xd/0x10 [ 992.238957] ? quarantine_put+0x10d/0x1b0 13:49:45 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f00000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 992.243112] ? __kasan_slab_free+0x131/0x170 [ 992.247546] bpf_check+0x3872/0x5e60 [ 992.251280] ? pvclock_read_flags+0x160/0x160 [ 992.255800] ? fixup_bpf_calls+0x1fb0/0x1fb0 [ 992.260222] ? ktime_get_with_offset+0x32e/0x4b0 [ 992.264994] ? ktime_get+0x440/0x440 [ 992.268722] ? memset+0x31/0x40 [ 992.272096] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 992.277638] ? bpf_obj_name_cpy+0x17c/0x1c0 [ 992.281969] bpf_prog_load+0x1141/0x1c90 [ 992.286053] ? bpf_prog_new_fd+0x60/0x60 [ 992.290125] ? lock_acquire+0x1e4/0x540 13:49:45 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 992.294113] ? __might_fault+0x12b/0x1e0 [ 992.298189] ? lock_downgrade+0x8f0/0x8f0 [ 992.302388] ? lock_release+0xa30/0xa30 [ 992.306374] ? check_same_owner+0x340/0x340 [ 992.310704] ? __check_object_size+0x9d/0x5f2 [ 992.315217] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 992.320770] __x64_sys_bpf+0x36c/0x510 [ 992.324662] ? bpf_prog_get+0x20/0x20 [ 992.328478] do_syscall_64+0x1b9/0x820 [ 992.332370] ? finish_task_switch+0x1d3/0x890 [ 992.336960] ? syscall_return_slowpath+0x5e0/0x5e0 [ 992.341998] ? syscall_return_slowpath+0x31d/0x5e0 13:49:45 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff5]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 992.346943] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 992.351970] ? prepare_exit_to_usermode+0x291/0x3b0 [ 992.356997] ? perf_trace_sys_enter+0xb10/0xb10 [ 992.361678] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 992.366536] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 992.371728] RIP: 0033:0x455ab9 [ 992.374915] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 13:49:45 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1500000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:45 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:45 executing program 5 (fault-call:0 fault-nth:32): bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 992.394528] RSP: 002b:00007f8952c98c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 992.402262] RAX: ffffffffffffffda RBX: 00007f8952c996d4 RCX: 0000000000455ab9 [ 992.409534] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000005 [ 992.416799] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 992.424068] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 992.431329] R13: 00000000004bb7f3 R14: 00000000004c8c08 R15: 000000000000001f [ 992.504911] FAULT_INJECTION: forcing a failure. [ 992.504911] name failslab, interval 1, probability 0, space 0, times 0 [ 992.516237] CPU: 0 PID: 1614 Comm: syz-executor5 Not tainted 4.18.0-rc3+ #58 [ 992.523429] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 992.532784] Call Trace: [ 992.535381] dump_stack+0x1c9/0x2b4 [ 992.538997] ? dump_stack_print_info.cold.2+0x52/0x52 [ 992.544177] ? kernel_text_address+0x79/0xf0 [ 992.548574] should_fail.cold.4+0xa/0x1a [ 992.552623] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 992.557721] ? save_stack+0x43/0xd0 [ 992.561334] ? kasan_kmalloc+0xc4/0xe0 [ 992.565203] ? kmem_cache_alloc_trace+0x152/0x780 [ 992.570032] ? do_check+0x5fa/0xb9d0 [ 992.573729] ? bpf_prog_load+0x1141/0x1c90 [ 992.577961] ? __x64_sys_bpf+0x36c/0x510 [ 992.582019] ? do_syscall_64+0x1b9/0x820 [ 992.586064] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 992.591427] ? __kasan_slab_free+0x11a/0x170 [ 992.595821] ? lock_acquire+0x1e4/0x540 [ 992.599777] ? fs_reclaim_acquire+0x20/0x20 [ 992.604082] ? lock_downgrade+0x8f0/0x8f0 [ 992.608216] ? lock_acquire+0x1e4/0x540 [ 992.612175] ? check_same_owner+0x340/0x340 [ 992.616481] ? rcu_note_context_switch+0x730/0x730 [ 992.621390] ? lock_release+0xa30/0xa30 [ 992.625348] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 992.630438] __should_failslab+0x124/0x180 [ 992.634657] should_failslab+0x9/0x14 [ 992.638442] kmem_cache_alloc_trace+0x2cb/0x780 [ 992.643107] ? kasan_kmalloc+0xc4/0xe0 [ 992.646989] copy_verifier_state+0x44b/0x5c0 [ 992.651391] do_check+0x61a/0xb9d0 [ 992.654921] ? save_stack+0x1f/0xd0 [ 992.658540] ? bpf_prog_load+0x1195/0x1c90 [ 992.662771] ? check_func_arg+0xce0/0xce0 [ 992.666906] ? kasan_check_write+0x14/0x20 [ 992.671128] ? do_raw_spin_lock+0xc1/0x200 [ 992.675348] ? trace_hardirqs_off+0xd/0x10 [ 992.679574] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 992.684660] ? debug_check_no_obj_freed+0x30b/0x595 [ 992.689670] ? trace_hardirqs_off+0xd/0x10 [ 992.693885] ? quarantine_put+0x10d/0x1b0 [ 992.698021] ? __kasan_slab_free+0x131/0x170 [ 992.702512] bpf_check+0x3872/0x5e60 [ 992.706210] ? pvclock_read_flags+0x160/0x160 [ 992.710720] ? fixup_bpf_calls+0x1fb0/0x1fb0 [ 992.715110] ? ktime_get_with_offset+0x32e/0x4b0 [ 992.719859] ? ktime_get+0x440/0x440 [ 992.723559] ? memset+0x31/0x40 [ 992.726821] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 992.732340] ? bpf_obj_name_cpy+0x17c/0x1c0 [ 992.736644] bpf_prog_load+0x1141/0x1c90 [ 992.740688] ? bpf_prog_new_fd+0x60/0x60 [ 992.744735] ? lock_acquire+0x1e4/0x540 [ 992.748693] ? __might_fault+0x12b/0x1e0 [ 992.752739] ? lock_downgrade+0x8f0/0x8f0 [ 992.756877] ? lock_release+0xa30/0xa30 [ 992.760837] ? check_same_owner+0x340/0x340 [ 992.765144] ? __check_object_size+0x9d/0x5f2 [ 992.769632] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 992.775156] __x64_sys_bpf+0x36c/0x510 [ 992.779027] ? bpf_prog_get+0x20/0x20 [ 992.782821] do_syscall_64+0x1b9/0x820 [ 992.786687] ? finish_task_switch+0x1d3/0x890 [ 992.791165] ? syscall_return_slowpath+0x5e0/0x5e0 [ 992.796076] ? syscall_return_slowpath+0x31d/0x5e0 [ 992.800990] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 992.806003] ? prepare_exit_to_usermode+0x291/0x3b0 [ 992.811009] ? perf_trace_sys_enter+0xb10/0xb10 [ 992.815664] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 992.820494] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 992.825665] RIP: 0033:0x455ab9 [ 992.828834] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 992.848213] RSP: 002b:00007f8952c98c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 13:49:45 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socket$kcm(0x2, 0x1, 0xff00000000000000) 13:49:45 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000000000000000000000000000010000800000000000000000000000000000000000000000"], &(0x7f00000001c0)="47504cc2a9d18308782043289fcfc43c9ed50c4a0bb6782a0508189b0a43b469f2c0a19a59e4088df03ccb86f4156f25b5df0b10c30aedd470fa0079c4f92d38c3f10500eb13e6777e98fc6370eae8d020c28f033f801f5986cf0005fe7964426bf2afcad1c25c5850beb0594683c827cb7c33cb12c5a8cbb5e27d2483b14446f31596e40e56d9ba3ae78fe079dcb2cd24aeceb1d169f5b0b657cd15bfe129a68bfd6c3144410df3ff", 0x0, 0xfb, &(0x7f00000000c0)=""/251, 0x0, 0x1}, 0x48) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='\x00', r0}, 0xfffffffffffffff5) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0x84, 0xc5, &(0x7f00000003c0)="e19b6557f58937612cd1b66b4d73eb9504df646ec5f78437f2ef6762da07587d52b2c7eef25a15fd22071fd3d8a29d68a769daf4b8ee70863cf4602a5b29df9a2f903ffb7d32df61d5be220a216f236aadfb336ed9c6cf54c4d8e11d56d0f7a57769ec0923e0083a0bd6951aee4bd8db8030a7a1852f5dc718da66a83d9f516167f53bd6", &(0x7f0000000480)=""/197, 0x8b8}, 0x28) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000300)=0x7) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000080)) 13:49:45 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:45 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x48) 13:49:45 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 992.855904] RAX: ffffffffffffffda RBX: 00007f8952c996d4 RCX: 0000000000455ab9 [ 992.863156] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000005 [ 992.870408] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 992.877668] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 992.884921] R13: 00000000004bb7f3 R14: 00000000004c8c08 R15: 0000000000000020 13:49:45 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:45 executing program 5 (fault-call:0 fault-nth:33): bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:45 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:46 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:46 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[]) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x100000, &(0x7f0000000440)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000040)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000000580)=ANY=[]) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='bpf\x00', 0x0, &(0x7f0000000340)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) [ 993.036115] FAULT_INJECTION: forcing a failure. [ 993.036115] name failslab, interval 1, probability 0, space 0, times 0 [ 993.047519] CPU: 0 PID: 1641 Comm: syz-executor5 Not tainted 4.18.0-rc3+ #58 [ 993.054701] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 993.064047] Call Trace: [ 993.066623] dump_stack+0x1c9/0x2b4 [ 993.070239] ? dump_stack_print_info.cold.2+0x52/0x52 [ 993.075414] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 993.080244] ? compat_start_thread+0x80/0x80 [ 993.084642] should_fail.cold.4+0xa/0x1a [ 993.088700] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 993.093792] ? trace_find_filtered_pid.part.61+0x50/0x50 [ 993.099235] ? preempt_notifier_register+0x200/0x200 [ 993.104332] ? tnum_intersect+0x89/0x190 [ 993.108377] ? tnum_mul+0x280/0x280 [ 993.112002] ? lock_acquire+0x1e4/0x540 [ 993.115968] ? fs_reclaim_acquire+0x20/0x20 [ 993.120276] ? lock_downgrade+0x8f0/0x8f0 [ 993.124411] ? check_same_owner+0x340/0x340 [ 993.128717] ? kasan_kmalloc+0xc4/0xe0 [ 993.132601] ? rcu_note_context_switch+0x730/0x730 [ 993.137538] __should_failslab+0x124/0x180 [ 993.141772] should_failslab+0x9/0x14 [ 993.145559] kmem_cache_alloc_trace+0x2cb/0x780 [ 993.150222] ? mark_reg_unknown+0x213/0x4c0 [ 993.154535] do_check+0x5fa/0xb9d0 [ 993.158065] ? save_stack+0x65/0xd0 [ 993.161695] ? bpf_prog_load+0x1195/0x1c90 [ 993.165922] ? check_func_arg+0xce0/0xce0 [ 993.170056] ? kasan_check_write+0x14/0x20 [ 993.174278] ? do_raw_spin_lock+0xc1/0x200 [ 993.178508] ? trace_hardirqs_off+0xd/0x10 [ 993.182729] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 993.187827] ? debug_check_no_obj_freed+0x30b/0x595 [ 993.192835] ? trace_hardirqs_off+0xd/0x10 [ 993.197061] ? quarantine_put+0x10d/0x1b0 [ 993.201204] ? __kasan_slab_free+0x131/0x170 [ 993.205605] bpf_check+0x3872/0x5e60 [ 993.209307] ? pvclock_read_flags+0x160/0x160 [ 993.213793] ? fixup_bpf_calls+0x1fb0/0x1fb0 [ 993.218194] ? ktime_get_with_offset+0x32e/0x4b0 [ 993.222935] ? ktime_get+0x440/0x440 [ 993.226637] ? memset+0x31/0x40 [ 993.229903] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 993.235424] ? bpf_obj_name_cpy+0x17c/0x1c0 [ 993.239732] bpf_prog_load+0x1141/0x1c90 [ 993.243782] ? bpf_prog_new_fd+0x60/0x60 [ 993.247830] ? lock_acquire+0x1e4/0x540 [ 993.251789] ? __might_fault+0x12b/0x1e0 [ 993.255836] ? lock_downgrade+0x8f0/0x8f0 [ 993.259975] ? __check_object_size+0x9d/0x5f2 [ 993.264483] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 993.270020] __x64_sys_bpf+0x36c/0x510 [ 993.273892] ? bpf_prog_get+0x20/0x20 [ 993.277695] do_syscall_64+0x1b9/0x820 [ 993.281567] ? finish_task_switch+0x1d3/0x890 [ 993.286048] ? syscall_return_slowpath+0x5e0/0x5e0 [ 993.290970] ? syscall_return_slowpath+0x31d/0x5e0 [ 993.295885] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 993.300889] ? prepare_exit_to_usermode+0x291/0x3b0 [ 993.305893] ? perf_trace_sys_enter+0xb10/0xb10 [ 993.310549] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 993.315389] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 993.320574] RIP: 0033:0x455ab9 [ 993.323770] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 993.343002] RSP: 002b:00007f8952c98c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 993.351923] RAX: ffffffffffffffda RBX: 00007f8952c996d4 RCX: 0000000000455ab9 [ 993.359177] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000005 [ 993.366430] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 993.373684] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 13:49:46 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:46 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 993.380937] R13: 00000000004bb7f3 R14: 00000000004c8c08 R15: 0000000000000021 13:49:46 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x258]}, 0x48) 13:49:46 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socket$kcm(0x2, 0x1, 0xfeffffff) 13:49:46 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:46 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}, 0x48) 13:49:46 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:46 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:46 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x48) 13:49:46 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:46 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000a0}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:46 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800000000000000]}, 0x48) 13:49:46 executing program 5 (fault-call:0 fault-nth:34): bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:46 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:46 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:46 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socket$kcm(0x2, 0x1, 0x600) 13:49:46 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x48) 13:49:46 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x48) 13:49:46 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:46 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe4ffffff]}, 0x48) 13:49:46 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:46 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 993.814284] FAULT_INJECTION: forcing a failure. [ 993.814284] name failslab, interval 1, probability 0, space 0, times 0 [ 993.825577] CPU: 0 PID: 1712 Comm: syz-executor5 Not tainted 4.18.0-rc3+ #58 [ 993.832766] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 993.842125] Call Trace: [ 993.844750] dump_stack+0x1c9/0x2b4 [ 993.848394] ? dump_stack_print_info.cold.2+0x52/0x52 [ 993.853607] ? kernel_text_address+0x79/0xf0 [ 993.858046] should_fail.cold.4+0xa/0x1a [ 993.862137] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 993.867260] ? save_stack+0xa9/0xd0 [ 993.870899] ? save_stack+0x43/0xd0 [ 993.874531] ? kasan_kmalloc+0xc4/0xe0 [ 993.878427] ? kmem_cache_alloc_trace+0x152/0x780 [ 993.883291] ? do_check+0x5fa/0xb9d0 [ 993.887041] ? bpf_check+0x3872/0x5e60 [ 993.890963] ? bpf_prog_load+0x1141/0x1c90 [ 993.895208] ? __x64_sys_bpf+0x36c/0x510 [ 993.899293] ? do_syscall_64+0x1b9/0x820 [ 993.903370] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 993.908750] ? tnum_mul+0x280/0x280 13:49:46 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:46 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 993.912387] ? free_func_state.part.20+0x3f/0x50 [ 993.917167] ? lock_acquire+0x1e4/0x540 [ 993.921152] ? fs_reclaim_acquire+0x20/0x20 [ 993.925490] ? lock_downgrade+0x8f0/0x8f0 [ 993.929654] ? lock_acquire+0x1e4/0x540 [ 993.933634] ? check_same_owner+0x340/0x340 [ 993.937962] ? rcu_note_context_switch+0x730/0x730 [ 993.942902] ? lock_release+0xa30/0xa30 [ 993.946883] __should_failslab+0x124/0x180 [ 993.951135] should_failslab+0x9/0x14 [ 993.954949] kmem_cache_alloc_trace+0x2cb/0x780 [ 993.959657] ? kasan_kmalloc+0xc4/0xe0 13:49:46 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 993.963565] copy_verifier_state+0x44b/0x5c0 [ 993.967989] do_check+0x61a/0xb9d0 [ 993.971545] ? save_stack+0x65/0xd0 [ 993.975184] ? bpf_prog_load+0x1195/0x1c90 [ 993.979436] ? check_func_arg+0xce0/0xce0 [ 993.983598] ? kasan_check_write+0x14/0x20 [ 993.987841] ? do_raw_spin_lock+0xc1/0x200 [ 993.992081] ? trace_hardirqs_off+0xd/0x10 [ 993.996312] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 994.001413] ? debug_check_no_obj_freed+0x30b/0x595 [ 994.006438] ? trace_hardirqs_off+0xd/0x10 [ 994.010677] ? quarantine_put+0x10d/0x1b0 13:49:47 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe80000000000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 994.014846] ? __kasan_slab_free+0x131/0x170 [ 994.019259] bpf_check+0x3872/0x5e60 [ 994.022980] ? pvclock_read_flags+0x160/0x160 [ 994.027490] ? fixup_bpf_calls+0x1fb0/0x1fb0 [ 994.031900] ? ktime_get_with_offset+0x32e/0x4b0 [ 994.036659] ? ktime_get+0x440/0x440 [ 994.040380] ? memset+0x31/0x40 [ 994.043665] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 994.049202] ? bpf_obj_name_cpy+0x17c/0x1c0 [ 994.053527] bpf_prog_load+0x1141/0x1c90 [ 994.057595] ? bpf_prog_new_fd+0x60/0x60 [ 994.061662] ? lock_acquire+0x1e4/0x540 13:49:47 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 994.065645] ? __might_fault+0x12b/0x1e0 [ 994.069719] ? lock_downgrade+0x8f0/0x8f0 [ 994.073868] ? lock_release+0xa30/0xa30 [ 994.077838] ? check_same_owner+0x340/0x340 [ 994.082189] ? __check_object_size+0x9d/0x5f2 [ 994.086701] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 994.092248] __x64_sys_bpf+0x36c/0x510 [ 994.096148] ? bpf_prog_get+0x20/0x20 [ 994.099966] do_syscall_64+0x1b9/0x820 [ 994.103854] ? finish_task_switch+0x1d3/0x890 [ 994.108357] ? syscall_return_slowpath+0x5e0/0x5e0 13:49:47 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 994.113294] ? syscall_return_slowpath+0x31d/0x5e0 [ 994.118234] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 994.123260] ? prepare_exit_to_usermode+0x291/0x3b0 [ 994.128283] ? perf_trace_sys_enter+0xb10/0xb10 [ 994.133115] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 994.138070] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 994.143264] RIP: 0033:0x455ab9 [ 994.146449] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 13:49:47 executing program 5 (fault-call:0 fault-nth:35): bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:47 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4002]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 994.165798] RSP: 002b:00007f8952c98c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 994.173513] RAX: ffffffffffffffda RBX: 00007f8952c996d4 RCX: 0000000000455ab9 [ 994.180790] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000005 [ 994.188068] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 994.195322] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 994.202580] R13: 00000000004bb7f3 R14: 00000000004c8c08 R15: 0000000000000022 [ 994.249200] FAULT_INJECTION: forcing a failure. [ 994.249200] name failslab, interval 1, probability 0, space 0, times 0 [ 994.260492] CPU: 0 PID: 1751 Comm: syz-executor5 Not tainted 4.18.0-rc3+ #58 [ 994.267687] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 994.277045] Call Trace: [ 994.279649] dump_stack+0x1c9/0x2b4 [ 994.283294] ? dump_stack_print_info.cold.2+0x52/0x52 [ 994.288506] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 994.293368] should_fail.cold.4+0xa/0x1a [ 994.297448] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 994.302563] ? save_stack+0x43/0xd0 [ 994.306286] ? kmem_cache_alloc_trace+0x152/0x780 [ 994.311227] ? do_check+0x5fa/0xb9d0 [ 994.314956] ? bpf_check+0x3872/0x5e60 [ 994.318861] ? bpf_prog_load+0x1141/0x1c90 [ 994.323107] ? do_syscall_64+0x1b9/0x820 [ 994.327179] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 994.332563] ? tnum_mul+0x280/0x280 [ 994.336201] ? free_func_state.part.20+0x3f/0x50 [ 994.341059] ? lock_acquire+0x1e4/0x540 [ 994.345041] ? fs_reclaim_acquire+0x20/0x20 [ 994.349384] ? lock_acquire+0x1e4/0x540 [ 994.353388] ? fs_reclaim_acquire+0x20/0x20 [ 994.357733] ? lock_downgrade+0x8f0/0x8f0 [ 994.361904] ? check_same_owner+0x340/0x340 [ 994.366243] ? kasan_kmalloc+0xc4/0xe0 [ 994.370144] ? rcu_note_context_switch+0x730/0x730 [ 994.375083] ? cmp_subprogs+0x16/0x90 [ 994.378876] __should_failslab+0x124/0x180 [ 994.383113] should_failslab+0x9/0x14 [ 994.386921] kmem_cache_alloc_trace+0x2cb/0x780 [ 994.391574] ? find_good_pkt_pointers+0x630/0x630 [ 994.396401] ? copy_verifier_state+0x3f9/0x5c0 [ 994.401018] do_check+0x4f2e/0xb9d0 [ 994.404649] ? save_stack+0x65/0xd0 [ 994.408280] ? bpf_prog_load+0x1185/0x1c90 [ 994.412503] ? check_func_arg+0xce0/0xce0 [ 994.416634] ? kasan_check_write+0x14/0x20 [ 994.420855] ? do_raw_spin_lock+0xc1/0x200 [ 994.425075] ? trace_hardirqs_off+0xd/0x10 [ 994.429296] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 994.434395] ? debug_check_no_obj_freed+0x30b/0x595 [ 994.439408] ? trace_hardirqs_off+0xd/0x10 [ 994.443625] ? quarantine_put+0x10d/0x1b0 [ 994.447775] ? __kasan_slab_free+0x131/0x170 [ 994.452172] bpf_check+0x3872/0x5e60 [ 994.455878] ? pvclock_read_flags+0x160/0x160 [ 994.460359] ? fixup_bpf_calls+0x1fb0/0x1fb0 [ 994.464748] ? ktime_get_with_offset+0x32e/0x4b0 [ 994.469493] ? ktime_get+0x440/0x440 [ 994.473218] ? memset+0x31/0x40 [ 994.476485] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 994.482002] ? bpf_obj_name_cpy+0x17c/0x1c0 [ 994.486320] bpf_prog_load+0x1141/0x1c90 [ 994.490368] ? bpf_prog_new_fd+0x60/0x60 [ 994.494428] ? lock_acquire+0x1e4/0x540 [ 994.498395] ? __might_fault+0x12b/0x1e0 [ 994.502866] ? lock_downgrade+0x8f0/0x8f0 [ 994.507014] ? __check_object_size+0x9d/0x5f2 [ 994.511504] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 994.517041] __x64_sys_bpf+0x36c/0x510 [ 994.520926] ? bpf_prog_get+0x20/0x20 [ 994.524723] do_syscall_64+0x1b9/0x820 [ 994.528590] ? finish_task_switch+0x1d3/0x890 [ 994.533075] ? syscall_return_slowpath+0x5e0/0x5e0 [ 994.537988] ? syscall_return_slowpath+0x31d/0x5e0 [ 994.542986] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 994.547994] ? prepare_exit_to_usermode+0x291/0x3b0 [ 994.552999] ? perf_trace_sys_enter+0xb10/0xb10 [ 994.557665] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 994.562491] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 994.567658] RIP: 0033:0x455ab9 [ 994.570823] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 994.589986] RSP: 002b:00007f8952c98c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 13:49:47 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:47 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socket$kcm(0x2, 0x1, 0x8) 13:49:47 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:47 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:47 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c00]}, 0x48) 13:49:47 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x48) 13:49:47 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:47 executing program 5 (fault-call:0 fault-nth:36): bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 994.597687] RAX: ffffffffffffffda RBX: 00007f8952c996d4 RCX: 0000000000455ab9 [ 994.604949] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000005 [ 994.612202] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 994.619455] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 994.626709] R13: 00000000004bb7f3 R14: 00000000004c8c08 R15: 0000000000000023 [ 994.697191] FAULT_INJECTION: forcing a failure. [ 994.697191] name failslab, interval 1, probability 0, space 0, times 0 [ 994.708524] CPU: 0 PID: 1775 Comm: syz-executor5 Not tainted 4.18.0-rc3+ #58 [ 994.715755] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 994.725231] Call Trace: [ 994.727823] dump_stack+0x1c9/0x2b4 [ 994.731451] ? dump_stack_print_info.cold.2+0x52/0x52 [ 994.736653] ? __save_stack_trace+0x8d/0xf0 [ 994.741003] should_fail.cold.4+0xa/0x1a [ 994.745061] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 994.750163] ? save_stack+0x43/0xd0 [ 994.753778] ? kasan_kmalloc+0xc4/0xe0 [ 994.757652] ? kmem_cache_alloc_trace+0x152/0x780 [ 994.762479] ? do_check+0x4f2e/0xb9d0 [ 994.766275] ? bpf_check+0x3872/0x5e60 [ 994.770145] ? bpf_prog_load+0x1141/0x1c90 [ 994.774376] ? do_syscall_64+0x1b9/0x820 [ 994.778434] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 994.783787] ? tnum_mul+0x280/0x280 [ 994.787408] ? free_func_state.part.20+0x3f/0x50 [ 994.792155] ? lock_acquire+0x1e4/0x540 [ 994.796117] ? fs_reclaim_acquire+0x20/0x20 [ 994.800437] ? lock_acquire+0x1e4/0x540 [ 994.804395] ? fs_reclaim_acquire+0x20/0x20 [ 994.808712] ? lock_downgrade+0x8f0/0x8f0 [ 994.812860] ? check_same_owner+0x340/0x340 [ 994.817167] ? kasan_kmalloc+0xc4/0xe0 [ 994.821055] ? rcu_note_context_switch+0x730/0x730 [ 994.825974] __should_failslab+0x124/0x180 [ 994.830200] should_failslab+0x9/0x14 [ 994.833989] kmem_cache_alloc_trace+0x2cb/0x780 [ 994.838649] ? mark_reg_known_zero+0x14b/0x3c0 [ 994.843224] ? find_good_pkt_pointers+0x630/0x630 [ 994.848054] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 994.853580] do_check+0x10ab/0xb9d0 [ 994.857209] ? optimal_redzone+0x55/0x60 [ 994.861255] ? bpf_prog_load+0x1185/0x1c90 [ 994.865493] ? check_func_arg+0xce0/0xce0 [ 994.869629] ? kasan_check_write+0x14/0x20 [ 994.873847] ? do_raw_spin_lock+0xc1/0x200 [ 994.878069] ? trace_hardirqs_off+0xd/0x10 [ 994.882303] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 994.887400] ? debug_check_no_obj_freed+0x30b/0x595 [ 994.892415] ? trace_hardirqs_off+0xd/0x10 [ 994.896636] ? quarantine_put+0x10d/0x1b0 [ 994.900773] ? __kasan_slab_free+0x131/0x170 [ 994.905174] bpf_check+0x3872/0x5e60 [ 994.908883] ? pvclock_read_flags+0x160/0x160 [ 994.913378] ? fixup_bpf_calls+0x1fb0/0x1fb0 [ 994.917774] ? ktime_get_with_offset+0x32e/0x4b0 [ 994.922522] ? ktime_get+0x440/0x440 [ 994.926323] ? memset+0x31/0x40 [ 994.929599] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 994.935122] ? bpf_obj_name_cpy+0x17c/0x1c0 [ 994.939439] bpf_prog_load+0x1141/0x1c90 [ 994.943490] ? bpf_prog_new_fd+0x60/0x60 [ 994.947537] ? lock_acquire+0x1e4/0x540 [ 994.951497] ? __might_fault+0x12b/0x1e0 [ 994.955546] ? lock_downgrade+0x8f0/0x8f0 [ 994.959684] ? lock_release+0xa30/0xa30 [ 994.963647] ? check_same_owner+0x340/0x340 [ 994.967957] ? __check_object_size+0x9d/0x5f2 [ 994.972453] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 994.977980] __x64_sys_bpf+0x36c/0x510 [ 994.981871] ? bpf_prog_get+0x20/0x20 [ 994.985683] do_syscall_64+0x1b9/0x820 [ 994.989562] ? finish_task_switch+0x1d3/0x890 [ 994.994052] ? syscall_return_slowpath+0x5e0/0x5e0 [ 994.998969] ? syscall_return_slowpath+0x31d/0x5e0 [ 995.003888] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 995.008898] ? prepare_exit_to_usermode+0x291/0x3b0 [ 995.014029] ? perf_trace_sys_enter+0xb10/0xb10 [ 995.018703] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 995.023537] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 995.028713] RIP: 0033:0x455ab9 [ 995.031883] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 995.051268] RSP: 002b:00007f8952c98c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 995.058964] RAX: ffffffffffffffda RBX: 00007f8952c996d4 RCX: 0000000000455ab9 [ 995.066219] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000005 [ 995.073480] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 995.080735] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 995.087997] R13: 00000000004bb7f3 R14: 00000000004c8c08 R15: 0000000000000024 13:49:48 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, 0x48) 13:49:48 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:48 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:48 executing program 5 (fault-call:0 fault-nth:37): bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:48 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:48 executing program 3: r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x46, &(0x7f0000000400), 0x2) sendmsg$kcm(r0, &(0x7f0000000380)={&(0x7f0000000140)=@in6={0xa, 0x4e24, 0x0, @loopback={0x0, 0x1}}, 0xfebf, &(0x7f0000000340)}, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xc, 0x3fe, 0x2, 0x4, 0x9, 0xffffffffffffffff, 0x6c3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x4, 0x8, 0x10000, 0x7db, 0x2, r1}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r1, 0x28, &(0x7f0000000040)}, 0x10) 13:49:48 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:48 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf]}, 0x48) [ 995.246304] FAULT_INJECTION: forcing a failure. [ 995.246304] name failslab, interval 1, probability 0, space 0, times 0 [ 995.257712] CPU: 0 PID: 1803 Comm: syz-executor5 Not tainted 4.18.0-rc3+ #58 [ 995.264959] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 995.274316] Call Trace: [ 995.276926] dump_stack+0x1c9/0x2b4 [ 995.280599] ? dump_stack_print_info.cold.2+0x52/0x52 [ 995.285903] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 995.290793] ? __save_stack_trace+0x8d/0xf0 13:49:48 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$bpf(0x20002000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x2001001, &(0x7f0000000100)=ANY=[@ANYBLOB="07000000f2cffc00"]) [ 995.295142] should_fail.cold.4+0xa/0x1a [ 995.299238] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 995.304360] ? save_stack+0x43/0xd0 [ 995.308006] ? kasan_kmalloc+0xc4/0xe0 [ 995.311922] ? kmem_cache_alloc_trace+0x152/0x780 [ 995.316869] ? do_check+0x4f2e/0xb9d0 [ 995.320712] ? bpf_check+0x3872/0x5e60 [ 995.324617] ? bpf_prog_load+0x1141/0x1c90 [ 995.328873] ? do_syscall_64+0x1b9/0x820 [ 995.332958] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 995.338360] ? lock_acquire+0x1e4/0x540 [ 995.342349] ? fs_reclaim_acquire+0x20/0x20 [ 995.346701] ? lock_acquire+0x1e4/0x540 [ 995.350730] ? fs_reclaim_acquire+0x20/0x20 [ 995.355162] ? lock_downgrade+0x8f0/0x8f0 [ 995.359341] ? check_same_owner+0x340/0x340 [ 995.363705] ? kasan_kmalloc+0xc4/0xe0 [ 995.367910] ? rcu_note_context_switch+0x730/0x730 [ 995.373319] __should_failslab+0x124/0x180 [ 995.377572] should_failslab+0x9/0x14 [ 995.381381] kmem_cache_alloc_trace+0x2cb/0x780 [ 995.386420] ? mark_reg_known_zero+0x14b/0x3c0 [ 995.390995] ? find_good_pkt_pointers+0x630/0x630 [ 995.395844] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 995.401400] do_check+0x10ab/0xb9d0 [ 995.405059] ? optimal_redzone+0x55/0x60 [ 995.409314] ? bpf_prog_load+0x1185/0x1c90 [ 995.413586] ? check_func_arg+0xce0/0xce0 [ 995.417914] ? kasan_check_write+0x14/0x20 [ 995.422153] ? do_raw_spin_lock+0xc1/0x200 [ 995.426672] ? trace_hardirqs_off+0xd/0x10 [ 995.431016] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 995.436139] ? debug_check_no_obj_freed+0x30b/0x595 [ 995.441168] ? trace_hardirqs_off+0xd/0x10 [ 995.445402] ? quarantine_put+0x10d/0x1b0 [ 995.449540] ? __kasan_slab_free+0x131/0x170 [ 995.453959] bpf_check+0x3872/0x5e60 [ 995.457667] ? pvclock_read_flags+0x160/0x160 [ 995.462167] ? fixup_bpf_calls+0x1fb0/0x1fb0 [ 995.466825] ? ktime_get_with_offset+0x32e/0x4b0 [ 995.471572] ? ktime_get+0x440/0x440 [ 995.475285] ? memset+0x31/0x40 [ 995.478553] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 995.484084] ? bpf_obj_name_cpy+0x17c/0x1c0 [ 995.488402] bpf_prog_load+0x1141/0x1c90 [ 995.492453] ? bpf_prog_new_fd+0x60/0x60 [ 995.496511] ? lock_acquire+0x1e4/0x540 [ 995.500479] ? __might_fault+0x12b/0x1e0 [ 995.504540] ? lock_downgrade+0x8f0/0x8f0 [ 995.508902] ? __check_object_size+0x9d/0x5f2 [ 995.513567] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 995.519099] __x64_sys_bpf+0x36c/0x510 [ 995.522988] ? bpf_prog_get+0x20/0x20 [ 995.526800] do_syscall_64+0x1b9/0x820 [ 995.530773] ? finish_task_switch+0x1d3/0x890 [ 995.535368] ? syscall_return_slowpath+0x5e0/0x5e0 [ 995.540297] ? syscall_return_slowpath+0x31d/0x5e0 [ 995.545216] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 995.550307] ? prepare_exit_to_usermode+0x291/0x3b0 [ 995.555349] ? perf_trace_sys_enter+0xb10/0xb10 [ 995.560021] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 995.564884] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 995.570059] RIP: 0033:0x455ab9 [ 995.573234] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 995.592446] RSP: 002b:00007f8952c98c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 995.600181] RAX: ffffffffffffffda RBX: 00007f8952c996d4 RCX: 0000000000455ab9 [ 995.607436] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000005 [ 995.614787] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 995.622223] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 995.629653] R13: 00000000004bb7f3 R14: 00000000004c8c08 R15: 0000000000000025 13:49:48 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socket$kcm(0x2, 0x1, 0x600000000000000) 13:49:48 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:48 executing program 5 (fault-call:0 fault-nth:38): bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:48 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa0008000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:48 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:48 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}, 0x48) 13:49:48 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:48 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf]}, 0x48) [ 995.765609] FAULT_INJECTION: forcing a failure. [ 995.765609] name failslab, interval 1, probability 0, space 0, times 0 [ 995.776931] CPU: 0 PID: 1837 Comm: syz-executor5 Not tainted 4.18.0-rc3+ #58 [ 995.784148] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 995.793532] Call Trace: [ 995.796127] dump_stack+0x1c9/0x2b4 [ 995.799741] ? dump_stack_print_info.cold.2+0x52/0x52 [ 995.804936] ? __save_stack_trace+0x8d/0xf0 [ 995.809276] should_fail.cold.4+0xa/0x1a 13:49:48 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}, 0x48) [ 995.813367] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 995.818488] ? save_stack+0x43/0xd0 [ 995.822126] ? kasan_kmalloc+0xc4/0xe0 [ 995.826024] ? kmem_cache_alloc_trace+0x152/0x780 [ 995.830877] ? do_check+0x4f2e/0xb9d0 [ 995.834684] ? bpf_check+0x3872/0x5e60 [ 995.838578] ? bpf_prog_load+0x1141/0x1c90 [ 995.842827] ? do_syscall_64+0x1b9/0x820 [ 995.846901] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 995.852292] ? lock_acquire+0x1e4/0x540 [ 995.856293] ? fs_reclaim_acquire+0x20/0x20 [ 995.860654] ? lock_downgrade+0x8f0/0x8f0 13:49:48 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 995.864998] ? check_same_owner+0x340/0x340 [ 995.869336] ? kasan_check_write+0x14/0x20 [ 995.873600] ? rcu_note_context_switch+0x730/0x730 [ 995.878563] __should_failslab+0x124/0x180 [ 995.882845] should_failslab+0x9/0x14 [ 995.886709] kmem_cache_alloc_trace+0x2cb/0x780 [ 995.891392] ? mark_reg_known_zero+0x14b/0x3c0 [ 995.895997] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 995.901562] do_check+0x10ab/0xb9d0 [ 995.905221] ? optimal_redzone+0x55/0x60 [ 995.909325] ? bpf_prog_load+0x1185/0x1c90 13:49:48 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff0f0000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 995.913588] ? check_func_arg+0xce0/0xce0 [ 995.917758] ? kasan_check_write+0x14/0x20 [ 995.922022] ? do_raw_spin_lock+0xc1/0x200 [ 995.926276] ? trace_hardirqs_off+0xd/0x10 [ 995.930534] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 995.935668] ? debug_check_no_obj_freed+0x30b/0x595 [ 995.940709] ? trace_hardirqs_off+0xd/0x10 [ 995.944983] ? quarantine_put+0x10d/0x1b0 [ 995.949166] ? __kasan_slab_free+0x131/0x170 [ 995.953593] bpf_check+0x3872/0x5e60 [ 995.957323] ? pvclock_read_flags+0x160/0x160 [ 995.961834] ? fixup_bpf_calls+0x1fb0/0x1fb0 13:49:49 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 995.966257] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 995.971026] ? retint_kernel+0x10/0x10 [ 995.974924] ? memset+0x31/0x40 [ 995.978216] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 995.983760] ? bpf_obj_name_cpy+0x17c/0x1c0 [ 995.988091] bpf_prog_load+0x1141/0x1c90 [ 995.992168] ? bpf_prog_new_fd+0x60/0x60 [ 995.996243] ? lock_acquire+0x1e4/0x540 [ 996.000222] ? __might_fault+0x12b/0x1e0 [ 996.004290] ? lock_downgrade+0x8f0/0x8f0 [ 996.008439] ? lock_release+0xa30/0xa30 [ 996.012427] ? check_same_owner+0x340/0x340 13:49:49 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff0f]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 996.016757] ? __check_object_size+0x9d/0x5f2 [ 996.021273] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 996.026826] __x64_sys_bpf+0x36c/0x510 [ 996.030728] ? bpf_prog_get+0x20/0x20 [ 996.034655] do_syscall_64+0x1b9/0x820 [ 996.038546] ? finish_task_switch+0x1d3/0x890 [ 996.043048] ? syscall_return_slowpath+0x5e0/0x5e0 [ 996.047989] ? syscall_return_slowpath+0x31d/0x5e0 [ 996.052928] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 996.057959] ? prepare_exit_to_usermode+0x291/0x3b0 13:49:49 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 996.062997] ? perf_trace_sys_enter+0xb10/0xb10 [ 996.067721] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 996.072591] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 996.077804] RIP: 0033:0x455ab9 [ 996.081029] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 996.100421] RSP: 002b:00007f8952c98c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 996.108378] RAX: ffffffffffffffda RBX: 00007f8952c996d4 RCX: 0000000000455ab9 13:49:49 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:49 executing program 5 (fault-call:0 fault-nth:39): bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 996.115659] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000005 [ 996.122939] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 996.130216] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 996.137498] R13: 00000000004bb7f3 R14: 00000000004c8c08 R15: 0000000000000026 13:49:49 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socket$kcm(0x2, 0x1, 0x800000000000000) 13:49:49 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00]}, 0x48) 13:49:49 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf]}, 0x48) [ 996.230184] FAULT_INJECTION: forcing a failure. [ 996.230184] name failslab, interval 1, probability 0, space 0, times 0 [ 996.241511] CPU: 0 PID: 1887 Comm: syz-executor5 Not tainted 4.18.0-rc3+ #58 [ 996.248707] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 996.258954] Call Trace: [ 996.261561] dump_stack+0x1c9/0x2b4 [ 996.265205] ? dump_stack_print_info.cold.2+0x52/0x52 [ 996.270433] ? __save_stack_trace+0x8d/0xf0 [ 996.274786] should_fail.cold.4+0xa/0x1a [ 996.278879] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 996.284087] ? save_stack+0x43/0xd0 [ 996.287835] ? kasan_kmalloc+0xc4/0xe0 [ 996.291731] ? kmem_cache_alloc_trace+0x152/0x780 [ 996.296591] ? copy_verifier_state+0x44b/0x5c0 [ 996.301174] ? do_check+0x61a/0xb9d0 [ 996.304900] ? bpf_check+0x3872/0x5e60 [ 996.308877] ? __x64_sys_bpf+0x36c/0x510 [ 996.312931] ? do_syscall_64+0x1b9/0x820 [ 996.316985] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 996.322393] ? save_stack+0x43/0xd0 [ 996.326705] ? kasan_kmalloc+0xc4/0xe0 [ 996.330580] ? kmem_cache_alloc_trace+0x152/0x780 [ 996.335818] ? do_check+0x5fa/0xb9d0 [ 996.339550] ? bpf_check+0x3872/0x5e60 [ 996.343454] ? bpf_prog_load+0x1141/0x1c90 [ 996.347679] ? __x64_sys_bpf+0x36c/0x510 [ 996.352185] ? do_syscall_64+0x1b9/0x820 [ 996.356333] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 996.361701] ? save_stack+0x43/0xd0 [ 996.365331] ? __kasan_slab_free+0x11a/0x170 [ 996.370003] ? lock_acquire+0x1e4/0x540 [ 996.374241] ? fs_reclaim_acquire+0x20/0x20 [ 996.378576] ? lock_downgrade+0x8f0/0x8f0 [ 996.382736] ? lock_acquire+0x1e4/0x540 [ 996.386875] ? check_same_owner+0x340/0x340 [ 996.391283] ? kasan_check_write+0x14/0x20 [ 996.395511] ? rcu_note_context_switch+0x730/0x730 [ 996.400705] __should_failslab+0x124/0x180 [ 996.404932] should_failslab+0x9/0x14 [ 996.408720] kmem_cache_alloc_trace+0x2cb/0x780 [ 996.413390] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 996.418930] ? realloc_func_state+0xaa/0x340 [ 996.423348] copy_verifier_state+0x44b/0x5c0 [ 996.427751] do_check+0x61a/0xb9d0 [ 996.431289] ? optimal_redzone+0x55/0x60 [ 996.435377] ? check_func_arg+0xce0/0xce0 [ 996.439526] ? kasan_check_write+0x14/0x20 [ 996.444098] ? do_raw_spin_lock+0xc1/0x200 [ 996.448323] ? trace_hardirqs_off+0xd/0x10 [ 996.452660] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 996.457775] ? debug_check_no_obj_freed+0x30b/0x595 [ 996.462963] ? trace_hardirqs_off+0xd/0x10 [ 996.467445] ? quarantine_put+0x10d/0x1b0 [ 996.471610] ? __kasan_slab_free+0x131/0x170 [ 996.476024] bpf_check+0x3872/0x5e60 [ 996.479740] ? pvclock_read_flags+0x160/0x160 [ 996.484246] ? fixup_bpf_calls+0x1fb0/0x1fb0 [ 996.488654] ? ktime_get_with_offset+0x32e/0x4b0 [ 996.493402] ? ktime_get+0x440/0x440 [ 996.497136] ? memset+0x31/0x40 [ 996.501242] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 996.506770] ? bpf_obj_name_cpy+0x17c/0x1c0 [ 996.511083] bpf_prog_load+0x1141/0x1c90 [ 996.515139] ? bpf_prog_new_fd+0x60/0x60 [ 996.519199] ? lock_acquire+0x1e4/0x540 [ 996.523337] ? __might_fault+0x12b/0x1e0 [ 996.527473] ? lock_downgrade+0x8f0/0x8f0 [ 996.531721] ? lock_release+0xa30/0xa30 [ 996.535688] ? check_same_owner+0x340/0x340 [ 996.540000] ? __check_object_size+0x9d/0x5f2 [ 996.544501] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 996.550031] __x64_sys_bpf+0x36c/0x510 [ 996.553916] ? bpf_prog_get+0x20/0x20 [ 996.557721] do_syscall_64+0x1b9/0x820 [ 996.561595] ? finish_task_switch+0x1d3/0x890 [ 996.566181] ? syscall_return_slowpath+0x5e0/0x5e0 [ 996.571102] ? syscall_return_slowpath+0x31d/0x5e0 [ 996.576026] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 996.581035] ? prepare_exit_to_usermode+0x291/0x3b0 [ 996.586044] ? perf_trace_sys_enter+0xb10/0xb10 [ 996.590806] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 996.595843] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 996.601023] RIP: 0033:0x455ab9 [ 996.604383] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 996.623742] RSP: 002b:00007f8952c98c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 13:49:49 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:49 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:49 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 996.631443] RAX: ffffffffffffffda RBX: 00007f8952c996d4 RCX: 0000000000455ab9 [ 996.638700] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000005 [ 996.645969] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 996.653227] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 996.660906] R13: 00000000004bb7f3 R14: 00000000004c8c08 R15: 0000000000000027 13:49:49 executing program 3: socketpair(0x9, 0x80f, 0x80, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r0, 0x50, &(0x7f0000000040)}, 0x35) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140)={0x0, r1, 0x7}, 0x14) socketpair(0x5, 0x5, 0x6f01, &(0x7f0000000100)) 13:49:49 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:49 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:49 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x48) 13:49:49 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:49 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:49 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000]}, 0x48) 13:49:49 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:49 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:49 executing program 5 (fault-call:0 fault-nth:40): bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:49 executing program 3: r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x18, &(0x7f0000000700), 0x3) socket$kcm(0x29, 0x5, 0x0) 13:49:49 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socket$kcm(0x2, 0x1, 0x4000000) 13:49:49 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:49 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000]}, 0x48) 13:49:49 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 997.011195] FAULT_INJECTION: forcing a failure. [ 997.011195] name failslab, interval 1, probability 0, space 0, times 0 [ 997.022678] CPU: 0 PID: 1955 Comm: syz-executor5 Not tainted 4.18.0-rc3+ #58 [ 997.029878] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 997.039341] Call Trace: [ 997.041949] dump_stack+0x1c9/0x2b4 [ 997.045617] ? dump_stack_print_info.cold.2+0x52/0x52 [ 997.050912] ? __save_stack_trace+0x8d/0xf0 [ 997.055253] should_fail.cold.4+0xa/0x1a [ 997.059354] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 997.064485] ? save_stack+0x43/0xd0 [ 997.068122] ? kasan_kmalloc+0xc4/0xe0 [ 997.072101] ? kmem_cache_alloc_trace+0x152/0x780 [ 997.076962] ? copy_verifier_state+0x44b/0x5c0 [ 997.082775] ? do_check+0x61a/0xb9d0 [ 997.086525] ? bpf_check+0x3872/0x5e60 [ 997.090416] ? __x64_sys_bpf+0x36c/0x510 [ 997.094465] ? do_syscall_64+0x1b9/0x820 [ 997.098523] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 997.103893] ? save_stack+0x43/0xd0 [ 997.107599] ? kasan_kmalloc+0xc4/0xe0 [ 997.112178] ? kmem_cache_alloc_trace+0x152/0x780 [ 997.117028] ? do_check+0x5fa/0xb9d0 [ 997.120880] ? bpf_check+0x3872/0x5e60 [ 997.124770] ? bpf_prog_load+0x1141/0x1c90 [ 997.128990] ? __x64_sys_bpf+0x36c/0x510 [ 997.133139] ? do_syscall_64+0x1b9/0x820 [ 997.137188] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 997.142547] ? save_stack+0x43/0xd0 [ 997.146161] ? __kasan_slab_free+0x11a/0x170 [ 997.150656] ? lock_acquire+0x1e4/0x540 [ 997.154702] ? fs_reclaim_acquire+0x20/0x20 [ 997.159027] ? lock_downgrade+0x8f0/0x8f0 [ 997.163176] ? lock_acquire+0x1e4/0x540 [ 997.167148] ? check_same_owner+0x340/0x340 [ 997.171454] ? kasan_check_write+0x14/0x20 [ 997.175677] ? rcu_note_context_switch+0x730/0x730 [ 997.180604] __should_failslab+0x124/0x180 [ 997.184833] should_failslab+0x9/0x14 [ 997.188920] kmem_cache_alloc_trace+0x2cb/0x780 [ 997.193576] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 997.199100] ? realloc_func_state+0xaa/0x340 [ 997.203497] copy_verifier_state+0x44b/0x5c0 [ 997.207904] do_check+0x61a/0xb9d0 [ 997.211436] ? optimal_redzone+0x55/0x60 [ 997.216646] ? check_func_arg+0xce0/0xce0 [ 997.220782] ? kasan_check_write+0x14/0x20 [ 997.225002] ? do_raw_spin_lock+0xc1/0x200 [ 997.229227] ? trace_hardirqs_off+0xd/0x10 [ 997.233450] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 997.238614] ? debug_check_no_obj_freed+0x30b/0x595 [ 997.243892] ? trace_hardirqs_off+0xd/0x10 [ 997.248115] ? quarantine_put+0x10d/0x1b0 [ 997.252513] ? __kasan_slab_free+0x131/0x170 [ 997.256934] bpf_check+0x3872/0x5e60 [ 997.260643] ? pvclock_read_flags+0x160/0x160 [ 997.265130] ? fixup_bpf_calls+0x1fb0/0x1fb0 [ 997.269629] ? ktime_get_with_offset+0x32e/0x4b0 [ 997.274480] ? ktime_get+0x440/0x440 [ 997.278185] ? memset+0x31/0x40 [ 997.281455] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 997.286990] ? bpf_obj_name_cpy+0x17c/0x1c0 [ 997.291303] bpf_prog_load+0x1141/0x1c90 [ 997.295549] ? bpf_prog_new_fd+0x60/0x60 [ 997.299611] ? lock_acquire+0x1e4/0x540 [ 997.303584] ? __might_fault+0x12b/0x1e0 [ 997.307780] ? lock_downgrade+0x8f0/0x8f0 [ 997.311942] ? lock_release+0xa30/0xa30 [ 997.315903] ? check_same_owner+0x340/0x340 [ 997.320215] ? __check_object_size+0x9d/0x5f2 [ 997.324718] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 997.330268] __x64_sys_bpf+0x36c/0x510 [ 997.334152] ? bpf_prog_get+0x20/0x20 [ 997.337948] do_syscall_64+0x1b9/0x820 [ 997.341827] ? finish_task_switch+0x1d3/0x890 [ 997.346320] ? syscall_return_slowpath+0x5e0/0x5e0 [ 997.351346] ? syscall_return_slowpath+0x31d/0x5e0 [ 997.356263] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 997.361278] ? prepare_exit_to_usermode+0x291/0x3b0 [ 997.366282] ? perf_trace_sys_enter+0xb10/0xb10 [ 997.370951] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 997.375796] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 997.380974] RIP: 0033:0x455ab9 [ 997.384755] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 997.404225] RSP: 002b:00007f8952c98c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 13:49:50 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:50 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:50 executing program 3: socketpair(0x1f, 0x7, 0x200, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000040)={0x1, 0x2, [@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @empty]}) r1 = socket$kcm(0x2, 0x4, 0x0) setsockopt$sock_attach_bpf(r1, 0x84, 0x65, &(0x7f0000000280), 0xc8f8023d009323a7) 13:49:50 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 997.411931] RAX: ffffffffffffffda RBX: 00007f8952c996d4 RCX: 0000000000455ab9 [ 997.419197] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000005 [ 997.426455] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 997.433719] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 997.440998] R13: 00000000004bb7f3 R14: 00000000004c8c08 R15: 0000000000000028 13:49:50 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0x48) 13:49:50 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff8000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:50 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:50 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffff]}, 0x48) 13:49:50 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:50 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:50 executing program 5 (fault-call:0 fault-nth:41): bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:50 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x4, 0x40, 0x1, 0x0, 0x1}, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={r0, &(0x7f0000000180), &(0x7f0000000040)="a820c186aca0ffe0dc4c535ef63217bbd30628", 0x1}, 0x20) socketpair(0x10, 0x6, 0x9, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000100)) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x28000, 0x0) 13:49:50 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:50 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:50 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c000000]}, 0x48) 13:49:50 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socket$kcm(0x2, 0x1, 0x16) 13:49:50 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:50 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:50 executing program 3: r0 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000000)={r0}) sendmsg$kcm(r0, &(0x7f0000000700)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x200000c0}}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000200)='O', 0x1}], 0x1, &(0x7f0000000000)}, 0x20004040) [ 997.809312] FAULT_INJECTION: forcing a failure. [ 997.809312] name failslab, interval 1, probability 0, space 0, times 0 [ 997.821046] CPU: 0 PID: 2023 Comm: syz-executor5 Not tainted 4.18.0-rc3+ #58 [ 997.828530] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 997.837893] Call Trace: [ 997.840500] dump_stack+0x1c9/0x2b4 [ 997.844146] ? dump_stack_print_info.cold.2+0x52/0x52 [ 997.849362] should_fail.cold.4+0xa/0x1a [ 997.853442] ? copy_verifier_state+0x44b/0x5c0 13:49:50 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00]}, 0x48) [ 997.858044] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 997.863164] ? save_stack+0x43/0xd0 [ 997.866803] ? kasan_kmalloc+0xc4/0xe0 [ 997.870703] ? kmem_cache_alloc_trace+0x152/0x780 [ 997.875550] ? do_check+0x5fa/0xb9d0 [ 997.879297] ? bpf_prog_load+0x1141/0x1c90 [ 997.884268] ? do_syscall_64+0x1b9/0x820 [ 997.888550] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 997.893940] ? lock_acquire+0x1e4/0x540 [ 997.897950] ? fs_reclaim_acquire+0x20/0x20 [ 997.902309] ? lock_acquire+0x1e4/0x540 13:49:50 executing program 3: r0 = perf_event_open(&(0x7f0000014f88)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x78, 0x5, 0x2, 0x7, 0x0, 0x0, 0x60, 0xb, 0x3, 0x4, 0xffffffffffffff19, 0x3, 0x9, 0x1, 0x4fb1df9e, 0x5, 0x5, 0x81, 0x2e0f, 0x5, 0x8, 0x101, 0x38b, 0x0, 0x0, 0x1, 0x7fffffff, 0x800, 0xffffffffffffff00, 0x80, 0x956e, 0x6, 0xffffffff00000000, 0xfffffffffffffffa, 0x0, 0x420, 0x0, 0x6d, 0x2, @perf_bp={&(0x7f0000000040), 0xa}, 0x105, 0x7, 0x81, 0x1, 0x400, 0x9, 0x4}, r1, 0xe, r0, 0x1) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='selinux&\x00', 0xffffffffffffff9c}, 0x10) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x0) perf_event_open(&(0x7f0000014f88)={0x1, 0x70, 0x5}, 0x0, 0x0, r0, 0x0) [ 997.906326] ? fs_reclaim_acquire+0x20/0x20 [ 997.910750] ? lock_downgrade+0x8f0/0x8f0 [ 997.914912] ? kasan_check_write+0x14/0x20 [ 997.919170] ? check_same_owner+0x340/0x340 [ 997.923529] ? kasan_kmalloc+0xc4/0xe0 [ 997.927609] ? rcu_note_context_switch+0x730/0x730 [ 997.932559] __should_failslab+0x124/0x180 [ 997.936834] should_failslab+0x9/0x14 [ 997.940699] kmem_cache_alloc_trace+0x2cb/0x780 [ 997.945409] do_check+0x59ba/0xb9d0 [ 997.949051] ? optimal_redzone+0x55/0x60 [ 997.953117] ? check_func_arg+0xce0/0xce0 [ 997.957275] ? kasan_check_write+0x14/0x20 [ 997.961515] ? do_raw_spin_lock+0xc1/0x200 [ 997.965746] ? trace_hardirqs_off+0xd/0x10 [ 997.969982] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 997.975075] ? debug_check_no_obj_freed+0x30b/0x595 [ 997.980084] ? trace_hardirqs_off+0xd/0x10 [ 997.984318] ? quarantine_put+0x10d/0x1b0 [ 997.988643] ? __kasan_slab_free+0x131/0x170 [ 997.993274] bpf_check+0x3872/0x5e60 [ 997.996987] ? pvclock_read_flags+0x160/0x160 [ 998.001490] ? fixup_bpf_calls+0x1fb0/0x1fb0 [ 998.005886] ? ktime_get_with_offset+0x32e/0x4b0 [ 998.010627] ? ktime_get+0x440/0x440 [ 998.014340] ? memset+0x31/0x40 [ 998.017635] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 998.023255] ? bpf_obj_name_cpy+0x17c/0x1c0 [ 998.027751] bpf_prog_load+0x1141/0x1c90 [ 998.031808] ? bpf_prog_new_fd+0x60/0x60 [ 998.035872] ? lock_acquire+0x1e4/0x540 [ 998.039838] ? __might_fault+0x12b/0x1e0 [ 998.043984] ? lock_downgrade+0x8f0/0x8f0 [ 998.048121] ? lock_release+0xa30/0xa30 [ 998.052082] ? check_same_owner+0x340/0x340 [ 998.056389] ? __check_object_size+0x9d/0x5f2 [ 998.061061] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 998.066589] __x64_sys_bpf+0x36c/0x510 [ 998.070473] ? bpf_prog_get+0x20/0x20 [ 998.074273] do_syscall_64+0x1b9/0x820 [ 998.078158] ? finish_task_switch+0x1d3/0x890 [ 998.082639] ? syscall_return_slowpath+0x5e0/0x5e0 [ 998.087568] ? syscall_return_slowpath+0x31d/0x5e0 [ 998.092633] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 998.097637] ? prepare_exit_to_usermode+0x291/0x3b0 [ 998.102652] ? perf_trace_sys_enter+0xb10/0xb10 [ 998.107488] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 998.112334] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 998.117531] RIP: 0033:0x455ab9 [ 998.120886] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 998.140092] RSP: 002b:00007f8952c98c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 998.147789] RAX: ffffffffffffffda RBX: 00007f8952c996d4 RCX: 0000000000455ab9 13:49:51 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 998.155053] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000005 [ 998.162442] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 998.169809] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 998.177238] R13: 00000000004bb7f3 R14: 00000000004c8c08 R15: 0000000000000029 13:49:51 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00]}, 0x48) 13:49:51 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:51 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:51 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:51 executing program 5 (fault-call:0 fault-nth:42): bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:51 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:51 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaf9f190000000000]}, 0x48) 13:49:51 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x240]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:51 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:51 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socket$kcm(0x2, 0x1, 0xa0008000) 13:49:51 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:51 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0xc, &(0x7f0000000180)=@raw=[@exit={0x95}, @jmp={0x5}, @map={0x18, 0x0, 0x1}, @initr0={0x18}, @exit={0x95}, @ldst={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x7e, &(0x7f0000000240)=""/126}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@nl=@unspec, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000480)="a61a", 0x2}], 0x1, &(0x7f00000004c0)}, 0x8000) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000002c0)=@nl=@unspec, 0x80, &(0x7f0000000040)=[{&(0x7f0000000240)="0f25f16bd420", 0x6}], 0x1}, 0x0) 13:49:51 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000]}, 0x48) 13:49:51 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x27}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x2000000000000046, &(0x7f0000346fc8)=@raw=[@jmp={0x5, 0x3, 0x9, 0x5, 0x1, 0xffffffffffffffff, 0xfffffffffffffffc}, @alu={0x7, 0x2, 0xf, 0x1, 0x9, 0x80, 0x1}], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) r1 = openat$cgroup_ro(r0, &(0x7f0000002800)='memory.events\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002840)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000002880)={r2}) 13:49:51 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 998.481183] FAULT_INJECTION: forcing a failure. [ 998.481183] name failslab, interval 1, probability 0, space 0, times 0 [ 998.492785] CPU: 0 PID: 2094 Comm: syz-executor5 Not tainted 4.18.0-rc3+ #58 [ 998.500548] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 998.509910] Call Trace: [ 998.512515] dump_stack+0x1c9/0x2b4 [ 998.516198] ? dump_stack_print_info.cold.2+0x52/0x52 [ 998.521421] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 998.526284] ? __save_stack_trace+0x8d/0xf0 13:49:51 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 998.530625] should_fail.cold.4+0xa/0x1a [ 998.534716] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 998.539837] ? save_stack+0x43/0xd0 [ 998.543482] ? kasan_kmalloc+0xc4/0xe0 [ 998.547375] ? kmem_cache_alloc_trace+0x152/0x780 [ 998.552227] ? copy_verifier_state+0x44b/0x5c0 [ 998.556826] ? do_check+0x5aca/0xb9d0 [ 998.560647] ? bpf_check+0x3872/0x5e60 [ 998.564567] ? __x64_sys_bpf+0x36c/0x510 [ 998.568659] ? do_syscall_64+0x1b9/0x820 [ 998.572743] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 998.578207] ? save_stack+0x43/0xd0 [ 998.581859] ? kmem_cache_alloc_trace+0x152/0x780 [ 998.587565] ? do_check+0x59ba/0xb9d0 [ 998.591396] ? bpf_check+0x3872/0x5e60 [ 998.595317] ? bpf_prog_load+0x1141/0x1c90 [ 998.599574] ? __x64_sys_bpf+0x36c/0x510 [ 998.603679] ? do_syscall_64+0x1b9/0x820 [ 998.607864] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 998.613264] ? save_stack+0x43/0xd0 [ 998.616913] ? __kasan_slab_free+0x11a/0x170 [ 998.621373] ? lock_acquire+0x1e4/0x540 [ 998.625632] ? fs_reclaim_acquire+0x20/0x20 13:49:51 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 998.630094] ? lock_downgrade+0x8f0/0x8f0 [ 998.634351] ? lock_acquire+0x1e4/0x540 [ 998.638493] ? check_same_owner+0x340/0x340 [ 998.642836] ? rcu_note_context_switch+0x730/0x730 [ 998.647789] __should_failslab+0x124/0x180 [ 998.652058] should_failslab+0x9/0x14 [ 998.655872] kmem_cache_alloc_trace+0x2cb/0x780 [ 998.660564] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 998.666203] ? realloc_func_state+0xaa/0x340 [ 998.670717] copy_verifier_state+0x44b/0x5c0 [ 998.675239] do_check+0x5aca/0xb9d0 13:49:51 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 998.678886] ? optimal_redzone+0x55/0x60 [ 998.682969] ? check_func_arg+0xce0/0xce0 [ 998.687327] ? kasan_check_write+0x14/0x20 [ 998.691571] ? do_raw_spin_lock+0xc1/0x200 [ 998.696429] ? trace_hardirqs_off+0xd/0x10 [ 998.700704] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 998.706167] ? debug_check_no_obj_freed+0x30b/0x595 [ 998.712842] ? trace_hardirqs_off+0xd/0x10 [ 998.717082] ? quarantine_put+0x10d/0x1b0 [ 998.721352] ? __kasan_slab_free+0x131/0x170 [ 998.725793] bpf_check+0x3872/0x5e60 13:49:51 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 998.729536] ? pvclock_read_flags+0x160/0x160 [ 998.734046] ? fixup_bpf_calls+0x1fb0/0x1fb0 [ 998.738510] ? ktime_get_with_offset+0x32e/0x4b0 [ 998.743279] ? ktime_get+0x440/0x440 [ 998.747011] ? memset+0x31/0x40 [ 998.750302] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 998.755845] ? bpf_obj_name_cpy+0x17c/0x1c0 [ 998.760196] bpf_prog_load+0x1141/0x1c90 [ 998.764354] ? bpf_prog_new_fd+0x60/0x60 [ 998.768535] ? lock_acquire+0x1e4/0x540 [ 998.772553] ? __might_fault+0x12b/0x1e0 [ 998.776891] ? lock_downgrade+0x8f0/0x8f0 13:49:51 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 998.781057] ? __check_object_size+0x9d/0x5f2 [ 998.785594] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 998.791156] __x64_sys_bpf+0x36c/0x510 [ 998.795056] ? bpf_prog_get+0x20/0x20 [ 998.798876] do_syscall_64+0x1b9/0x820 [ 998.802784] ? finish_task_switch+0x1d3/0x890 [ 998.807291] ? syscall_return_slowpath+0x5e0/0x5e0 [ 998.812236] ? syscall_return_slowpath+0x31d/0x5e0 [ 998.817263] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 998.822291] ? prepare_exit_to_usermode+0x291/0x3b0 [ 998.827320] ? perf_trace_sys_enter+0xb10/0xb10 [ 998.832008] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 998.836973] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 998.842166] RIP: 0033:0x455ab9 [ 998.845363] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 998.865318] RSP: 002b:00007f8952c98c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 13:49:51 executing program 5 (fault-call:0 fault-nth:43): bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:51 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 998.875911] RAX: ffffffffffffffda RBX: 00007f8952c996d4 RCX: 0000000000455ab9 [ 998.883635] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000005 [ 998.890893] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 998.898160] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 998.905436] R13: 00000000004bb7f3 R14: 00000000004c8c08 R15: 000000000000002a 13:49:51 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000]}, 0x48) 13:49:51 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 998.957840] FAULT_INJECTION: forcing a failure. [ 998.957840] name failslab, interval 1, probability 0, space 0, times 0 [ 998.969136] CPU: 0 PID: 2138 Comm: syz-executor5 Not tainted 4.18.0-rc3+ #58 [ 998.976417] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 998.985781] Call Trace: [ 998.988393] dump_stack+0x1c9/0x2b4 [ 998.992042] ? dump_stack_print_info.cold.2+0x52/0x52 [ 998.997256] should_fail.cold.4+0xa/0x1a [ 999.001893] ? copy_verifier_state+0x44b/0x5c0 [ 999.006498] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 999.011714] ? save_stack+0x43/0xd0 [ 999.015392] ? kasan_kmalloc+0xc4/0xe0 [ 999.019297] ? kmem_cache_alloc_trace+0x152/0x780 [ 999.024190] ? do_check+0x59ba/0xb9d0 [ 999.028024] ? bpf_check+0x3872/0x5e60 [ 999.031958] ? bpf_prog_load+0x1141/0x1c90 [ 999.036202] ? do_syscall_64+0x1b9/0x820 [ 999.040267] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 999.045809] ? save_stack+0x43/0xd0 [ 999.049425] ? __kasan_slab_free+0x11a/0x170 [ 999.053823] ? lock_acquire+0x1e4/0x540 [ 999.057788] ? fs_reclaim_acquire+0x20/0x20 [ 999.062101] ? lock_acquire+0x1e4/0x540 [ 999.066062] ? fs_reclaim_acquire+0x20/0x20 [ 999.070381] ? lock_downgrade+0x8f0/0x8f0 [ 999.074514] ? kasan_check_write+0x14/0x20 [ 999.078752] ? check_same_owner+0x340/0x340 [ 999.083061] ? kasan_kmalloc+0xc4/0xe0 [ 999.086943] ? rcu_note_context_switch+0x730/0x730 [ 999.091878] __should_failslab+0x124/0x180 [ 999.096189] should_failslab+0x9/0x14 [ 999.099985] kmem_cache_alloc_trace+0x2cb/0x780 [ 999.104644] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 999.109657] ? copy_verifier_state+0x3f9/0x5c0 [ 999.114229] do_check+0x10ab/0xb9d0 [ 999.117941] ? save_stack+0x97/0xd0 [ 999.121570] ? check_func_arg+0xce0/0xce0 [ 999.125721] ? kasan_check_write+0x14/0x20 [ 999.129958] ? do_raw_spin_lock+0xc1/0x200 [ 999.134193] ? trace_hardirqs_off+0xd/0x10 [ 999.138434] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 999.143541] ? debug_check_no_obj_freed+0x30b/0x595 [ 999.148656] ? trace_hardirqs_off+0xd/0x10 [ 999.152970] ? quarantine_put+0x10d/0x1b0 [ 999.157978] ? __kasan_slab_free+0x131/0x170 [ 999.162732] bpf_check+0x3872/0x5e60 [ 999.167227] ? pvclock_read_flags+0x160/0x160 [ 999.172170] ? fixup_bpf_calls+0x1fb0/0x1fb0 [ 999.176747] ? ktime_get_with_offset+0x32e/0x4b0 [ 999.181491] ? ktime_get+0x440/0x440 [ 999.185291] ? memset+0x31/0x40 [ 999.188591] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 999.194113] ? bpf_obj_name_cpy+0x17c/0x1c0 [ 999.198434] bpf_prog_load+0x1141/0x1c90 [ 999.202569] ? bpf_prog_new_fd+0x60/0x60 [ 999.206637] ? lock_acquire+0x1e4/0x540 [ 999.210701] ? __might_fault+0x12b/0x1e0 [ 999.214837] ? lock_downgrade+0x8f0/0x8f0 [ 999.218971] ? lock_release+0xa30/0xa30 [ 999.223375] ? check_same_owner+0x340/0x340 [ 999.228746] ? __check_object_size+0x9d/0x5f2 [ 999.234643] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 999.240528] __x64_sys_bpf+0x36c/0x510 [ 999.245718] ? bpf_prog_get+0x20/0x20 [ 999.249523] do_syscall_64+0x1b9/0x820 [ 999.253397] ? finish_task_switch+0x1d3/0x890 [ 999.257883] ? syscall_return_slowpath+0x5e0/0x5e0 [ 999.263503] ? syscall_return_slowpath+0x31d/0x5e0 [ 999.268424] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 999.273440] ? prepare_exit_to_usermode+0x291/0x3b0 [ 999.278441] ? perf_trace_sys_enter+0xb10/0xb10 [ 999.287400] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 999.292249] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 999.298824] RIP: 0033:0x455ab9 [ 999.302900] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 999.323466] RSP: 002b:00007f8952c98c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 999.331694] RAX: ffffffffffffffda RBX: 00007f8952c996d4 RCX: 0000000000455ab9 [ 999.339046] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000005 [ 999.346439] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 13:49:52 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 999.353877] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 999.361131] R13: 00000000004bb7f3 R14: 00000000004c8c08 R15: 000000000000002b 13:49:52 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socket$kcm(0x2, 0x1, 0xff000000) 13:49:52 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}, 0x48) 13:49:52 executing program 3: r0 = socket$kcm(0x2, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000580)={&(0x7f0000000440)=@generic={0x2, "3767b4818fa51940a75a64ff601bed813ca4a744c0b30776cbb54beba33938bf9ccf422347bed9adea3ea7b2af4dc38251de34ee1983e9f78ee47cdbc9f40f1c533e017a6210f8b1ae7433ba79ea888efd4d2ca875816bb74e7216bf0a3da8b1dbb6bd851d93d102318daaf0f7c44c2c16d06122e97f68275e698782a0a1"}, 0x80, &(0x7f0000001140)=[{&(0x7f0000000c00)='w', 0x1}], 0x1, &(0x7f0000001000)=ANY=[]}, 0x0) recvmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000000)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @dev}}}, 0x80, &(0x7f00000000c0), 0x0, &(0x7f00000005c0)=""/201, 0xc9}, 0x0) recvmsg$kcm(r1, &(0x7f00000004c0)={&(0x7f0000000180)=@pppoe={0x0, 0x0, {0x0, @link_local}}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x5f}, {&(0x7f0000000280)=""/232, 0xe8}], 0x2, &(0x7f00000003c0)=""/122, 0x7a, 0x100000000}, 0x1) setsockopt$sock_attach_bpf(r0, 0x84, 0xb, &(0x7f0000000500), 0x4) sendmsg$kcm(r0, &(0x7f0000001d40)={&(0x7f0000000740)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x16}}, 0x80, &(0x7f0000001c00)=[{&(0x7f0000001bc0)="01", 0x1}], 0x1, &(0x7f0000001c80)}, 0x0) recvmsg$kcm(r0, &(0x7f000000c040)={&(0x7f000000bdc0)=@xdp={0x0, 0x0, 0x0}, 0x80, &(0x7f000000bf40)=[{&(0x7f000000be40)=""/230, 0xe6}], 0x1, &(0x7f000000bf80)=""/136, 0x88, 0x6}, 0x2020) bpf$PROG_LOAD(0x5, &(0x7f000000c080)={0xf, 0x2, &(0x7f00000000c0)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000140)='GPL\x00', 0x1, 0x0, 0x0, 0x41100, 0x0, [], r2, 0x7}, 0x48) 13:49:52 executing program 5 (fault-call:0 fault-nth:44): bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:52 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff5]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:52 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:52 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:52 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 999.478677] FAULT_INJECTION: forcing a failure. [ 999.478677] name failslab, interval 1, probability 0, space 0, times 0 [ 999.490702] CPU: 0 PID: 2157 Comm: syz-executor5 Not tainted 4.18.0-rc3+ #58 [ 999.498069] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 999.507457] Call Trace: [ 999.510072] dump_stack+0x1c9/0x2b4 [ 999.514005] ? dump_stack_print_info.cold.2+0x52/0x52 [ 999.520346] ? kernel_text_address+0x79/0xf0 [ 999.524773] should_fail.cold.4+0xa/0x1a 13:49:52 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1802000000000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 999.528852] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 999.534152] ? save_stack+0xa9/0xd0 [ 999.537807] ? save_stack+0x43/0xd0 [ 999.541466] ? __kasan_slab_free+0x11a/0x170 [ 999.545899] ? kasan_slab_free+0xe/0x10 [ 999.549876] ? kfree+0xd9/0x260 [ 999.553164] ? do_check+0x165c/0xb9d0 [ 999.556983] ? bpf_check+0x3872/0x5e60 [ 999.560879] ? bpf_prog_load+0x1141/0x1c90 [ 999.565211] ? __x64_sys_bpf+0x36c/0x510 [ 999.569287] ? do_syscall_64+0x1b9/0x820 [ 999.573410] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 13:49:52 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 999.578885] ? lock_acquire+0x1e4/0x540 [ 999.582900] ? fs_reclaim_acquire+0x20/0x20 [ 999.587338] ? lock_downgrade+0x8f0/0x8f0 [ 999.591600] ? kasan_check_write+0x14/0x20 [ 999.595868] ? check_same_owner+0x340/0x340 [ 999.600214] ? debug_check_no_obj_freed+0x30b/0x595 [ 999.605249] ? rcu_note_context_switch+0x730/0x730 [ 999.610204] __should_failslab+0x124/0x180 [ 999.614460] should_failslab+0x9/0x14 [ 999.618296] kmem_cache_alloc_trace+0x2cb/0x780 [ 999.622998] ? __kasan_slab_free+0x131/0x170 13:49:52 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 999.627422] ? trace_hardirqs_on+0xd/0x10 [ 999.631586] do_check+0x5fa/0xb9d0 [ 999.635344] ? save_stack+0x97/0xd0 [ 999.640599] ? check_func_arg+0xce0/0xce0 [ 999.644850] ? kasan_check_write+0x14/0x20 [ 999.649089] ? do_raw_spin_lock+0xc1/0x200 [ 999.653330] ? trace_hardirqs_off+0xd/0x10 [ 999.657590] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 999.662707] ? debug_check_no_obj_freed+0x30b/0x595 [ 999.670644] ? trace_hardirqs_off+0xd/0x10 [ 999.674986] ? quarantine_put+0x10d/0x1b0 13:49:52 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1400000000000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:52 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11f]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 999.679165] ? __kasan_slab_free+0x131/0x170 [ 999.683589] bpf_check+0x3872/0x5e60 [ 999.687308] ? pvclock_read_flags+0x160/0x160 [ 999.691814] ? fixup_bpf_calls+0x1fb0/0x1fb0 [ 999.696330] ? ktime_get_with_offset+0x32e/0x4b0 [ 999.701101] ? ktime_get+0x440/0x440 [ 999.705007] ? memset+0x31/0x40 [ 999.708300] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 999.714561] ? bpf_obj_name_cpy+0x17c/0x1c0 [ 999.719320] bpf_prog_load+0x1141/0x1c90 [ 999.723392] ? bpf_prog_new_fd+0x60/0x60 13:49:52 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 999.727471] ? lock_acquire+0x1e4/0x540 [ 999.732434] ? __might_fault+0x12b/0x1e0 [ 999.736620] ? lock_downgrade+0x8f0/0x8f0 [ 999.740774] ? lock_release+0xa30/0xa30 [ 999.744756] ? check_same_owner+0x340/0x340 [ 999.749093] ? __check_object_size+0x9d/0x5f2 [ 999.753593] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 999.759137] __x64_sys_bpf+0x36c/0x510 [ 999.763121] ? bpf_prog_get+0x20/0x20 [ 999.766938] do_syscall_64+0x1b9/0x820 [ 999.770828] ? finish_task_switch+0x1d3/0x890 13:49:52 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 999.775680] ? syscall_return_slowpath+0x5e0/0x5e0 [ 999.780707] ? syscall_return_slowpath+0x31d/0x5e0 [ 999.785654] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 999.790695] ? prepare_exit_to_usermode+0x291/0x3b0 [ 999.795913] ? perf_trace_sys_enter+0xb10/0xb10 [ 999.800594] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 999.805456] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 999.810672] RIP: 0033:0x455ab9 13:49:52 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 999.813857] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 999.833141] RSP: 002b:00007f8952c98c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 999.840864] RAX: ffffffffffffffda RBX: 00007f8952c996d4 RCX: 0000000000455ab9 [ 999.848167] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000005 [ 999.855441] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 999.862720] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 999.869997] R13: 00000000004bb7f3 R14: 00000000004c8c08 R15: 000000000000002c 13:49:52 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socket$kcm(0x2, 0x1, 0xff00) 13:49:52 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5a00]}, 0x48) 13:49:53 executing program 3: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000700)={&(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e21, @broadcast=0xffffffff}, 0x1, 0x2, 0x2, 0x3}}, 0x80, &(0x7f0000001740)=[{&(0x7f0000000100)='N', 0x1}], 0x1, &(0x7f00000001c0)=[{0x60, 0x10f, 0x1, "e9cbcfe5577012b69463b19fdeec771b68bc013402c7675e56d34ce87bf6be40b35de3a4c0c16cb602c0ab4b27442254d00acdead82c30e851e193abc121e608841617afdac4fae5c41251aebc73"}, {0x38, 0x1, 0x200, "56081f02919edfaf2be8a639c51b731e1b66d57f187cf65fea46f048157bd01ddbc9ecb06bde"}, {0x110, 0x0, 0x1, "eec1807f606c6e9d0757049f84f0ccd94f2cb6e676419c07539ce9b2b271364da89e216536bdf5bd3e29f60398fcc47635c87afe878b330c11be3af8aab6e02c4af66d6cabaa16681f96d963ca2cc747a5112570cc9d503723fe1ac359082f30209b5051a384c7d7676e0b54046e346e7bf95cf899639fce2ca5fcefe13f1c479ec565ee7dc65c2d0afc5ff8173c3c67aa21beab9b3192116df4060f7bea92022cd9f7ca54b0fef7d5d85fb9c72b0bf79ea36b7bc753287701771cd5242c02287f72fea6be760736e52afd1ea28fe70027a44aa2b0a929073cf38963725ea69758b24bbd288ab16b171d261729b58d8806f86e2b24075e4c0469"}], 0x1a8}, 0x20004040) r1 = gettid() perf_event_open(&(0x7f0000000140)={0x6, 0x70, 0x8, 0x7f, 0xffffffffffffffff, 0x7fffffff, 0x0, 0x5, 0x2001, 0x8, 0xfffffffffffffffb, 0x1ff, 0x6, 0x2, 0x12000000000000, 0x81, 0x4, 0x20, 0x54d5, 0x9, 0x0, 0x1, 0xffff, 0x1000, 0x57, 0xf4, 0x7, 0x10001, 0x7, 0x3, 0x1000, 0x1ff, 0x5, 0x18, 0x81, 0x16, 0x7f, 0x3f, 0x0, 0x7, 0x6, @perf_config_ext={0x4, 0xffffffffffff0000}, 0x440, 0x7, 0x7, 0x6, 0x7, 0x6, 0x8}, r1, 0xc, 0xffffffffffffffff, 0x3) socket$kcm(0x29, 0xfffffffffffffffd, 0x0) 13:49:53 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:53 executing program 5 (fault-call:0 fault-nth:45): bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:53 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:53 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:53 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000]}, 0x48) 13:49:53 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:53 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socket$kcm(0x2, 0x1, 0x8000a0) 13:49:53 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:53 executing program 3: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000380)={&(0x7f0000000100)=@generic={0x2, "1b68e1a49701fc3dde3ee19562a537ee691e53634b9d7275fae8e5def7302df1ca9336db0c15f06bb6a5bcff11fcdeb5186eafc90c30fa82113aacfaa2d792ef87818dade78f9d5f2c9863edf457b8c6b0ceb25a2ba035c839f82690f791cf5c2403a04c34bb11cbd6b8063e5349cb949f1048d4b345388e984b738f44f7"}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000180)="746a3a3d8acdf3de8f28b6bb8397ba8c765c51d22da9f5f6ad548b7376c4f002b50f558eb5467c63d944288f28c491c43e288b2adabdfd6ba49bc6b4e6cb65c9fbc2e6d9966c8f49b244966f465b2e56d254fd94ff26049101aa4aec13da1ea9bc996d7dc5f80ae43271dbd130f10439affd2f74da0de90ea51210430fa8813c66ec3f13a8c035e8d743715f03acb64262592aba13d21919a72a9201405e866fe66ec3463c9861367b67454a65cd3548ce33bbccd9ef40986d8b3340ad0432520220613b427ea221329fe3b89895d1187d8526a9ac06d328a796eb782763ca84ebc75d100ccc80bea764", 0xea}, {&(0x7f0000000280)="0ef9eff3fe666b78fc03b7ddfb28d3dba380ee93bad3a1dde375582ae89d16130ccf95f1f6c96ea871f849ed3a88c11a5b52c36088653d91ee7548", 0x3b}, {&(0x7f00000002c0)="9bd252cfa3cfed62ad2692cb1cf09d2284df5a22393185cb4da376bddde9d6626fef77b2dea03e28b58a11e48e0a33b52d0be997be5da573a878299628a67790a868c0f34ac049a6da3bfd65c520af2ed52284fb382ef7c212708e", 0x5b}], 0x3, &(0x7f0000001580)=[{0x78, 0x189, 0x4, "7d16f5a031c72e57026778bd4fb12067c928676dc23f18a37358649bd3036f029f38d78b0e792455d9be9ab2f02e2810c539a18e908c34a71efbfc13be82785850adae530fef10137926990ff0b03afa221c28a6eae4110a3cf990b016cde8d84e12fb"}, {0x1010, 0x111, 0x22, "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"}, {0x108, 0x1ff, 0x40, "5cfa7b521a18b4651e1ba843af2cf3c8c0de85518a38e7a708b5afde11cf2e951123f67c20fd71a2c0d630056e6c24135c269d72f72ded0a84fe9f04eccacd29c3aae4ed480edde3ef53b668084d8c6a13bea1c577e0393c9f42d51b6b9a71f5515794f4884217ee65f1c3e530ac43f0fabebb2642bf5b8f17c7623e7e8f52944a3c4037272d45cff91bbb1d1dcc20c649ed881b7203eb4f4233f2b82cdac49ae8eaed957f7bb1e763dc39202db59acf429907ac0da1c7ae9ef06fea577d0210a9064722c206a72ab362cfcca9551cbfb120dc0b28b47845c2bd503eedefd30d529efea3963563e74ea7076c63dd83186f5d2c5c66fa99"}, {0xd0, 0x101, 0x3, "bd00dbb4be65efef6f805605d19da0aa8e9973aee46579ea2e6323263bdc7113514ebdc1114dabf7e26dfafdf9ac32d854457285aae5087b1f678ace439560819c991cd916cff1cc0ee3ea57990f513597a8e7fb7315d6f18f187f446a5ab944850a8de3ad0d278d8f56856a0c55a01311ab4c818b69b5d59ac8ab5672d09980d7c3e89f6787cb8bf7c273a67c2641c0e9611b46976bf5a54afb6724838e249569384d32252bc01cd0b97ac768bf10ed8ff10de2fb20407d017164"}], 0x1260, 0x4000010}, 0x20000000) sendmsg$kcm(r0, &(0x7f0000001540)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f00000000c0)="c10800000000200000021fe4ac1414", 0xf}], 0x1}, 0x0) [ 1000.569989] FAULT_INJECTION: forcing a failure. [ 1000.569989] name failslab, interval 1, probability 0, space 0, times 0 [ 1000.581439] CPU: 0 PID: 2248 Comm: syz-executor5 Not tainted 4.18.0-rc3+ #58 [ 1000.588638] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1000.598002] Call Trace: [ 1000.600606] dump_stack+0x1c9/0x2b4 [ 1000.604254] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1000.609470] ? kernel_text_address+0x79/0xf0 [ 1000.613898] should_fail.cold.4+0xa/0x1a [ 1000.617984] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1000.623196] ? save_stack+0xa9/0xd0 [ 1000.626839] ? save_stack+0x43/0xd0 [ 1000.630485] ? kasan_kmalloc+0xc4/0xe0 [ 1000.634401] ? kmem_cache_alloc_trace+0x152/0x780 [ 1000.639257] ? do_check+0x5fa/0xb9d0 [ 1000.642977] ? bpf_check+0x3872/0x5e60 [ 1000.646895] ? bpf_prog_load+0x1141/0x1c90 [ 1000.651146] ? __x64_sys_bpf+0x36c/0x510 [ 1000.655220] ? do_syscall_64+0x1b9/0x820 [ 1000.659574] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1000.664964] ? save_stack+0x43/0xd0 [ 1000.668619] ? __kasan_slab_free+0x11a/0x170 [ 1000.673076] ? lock_acquire+0x1e4/0x540 [ 1000.677075] ? fs_reclaim_acquire+0x20/0x20 [ 1000.681438] ? lock_downgrade+0x8f0/0x8f0 [ 1000.685618] ? lock_acquire+0x1e4/0x540 [ 1000.689607] ? check_same_owner+0x340/0x340 [ 1000.693959] ? kasan_check_write+0x14/0x20 [ 1000.698210] ? rcu_note_context_switch+0x730/0x730 [ 1000.703167] ? lock_release+0xa30/0xa30 [ 1000.707158] __should_failslab+0x124/0x180 [ 1000.711555] should_failslab+0x9/0x14 [ 1000.715557] kmem_cache_alloc_trace+0x2cb/0x780 [ 1000.720263] ? kasan_kmalloc+0xc4/0xe0 [ 1000.724170] copy_verifier_state+0x44b/0x5c0 [ 1000.728619] do_check+0x61a/0xb9d0 [ 1000.732177] ? save_stack+0x97/0xd0 [ 1000.735842] ? check_func_arg+0xce0/0xce0 [ 1000.740100] ? kasan_check_write+0x14/0x20 [ 1000.744370] ? do_raw_spin_lock+0xc1/0x200 [ 1000.748614] ? trace_hardirqs_off+0xd/0x10 [ 1000.752852] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 1000.757973] ? debug_check_no_obj_freed+0x30b/0x595 [ 1000.762998] ? trace_hardirqs_off+0xd/0x10 [ 1000.767241] ? quarantine_put+0x10d/0x1b0 [ 1000.771402] ? __kasan_slab_free+0x131/0x170 [ 1000.775822] bpf_check+0x3872/0x5e60 [ 1000.779565] ? pvclock_read_flags+0x160/0x160 [ 1000.784079] ? fixup_bpf_calls+0x1fb0/0x1fb0 [ 1000.788498] ? ktime_get_with_offset+0x32e/0x4b0 [ 1000.793265] ? ktime_get+0x440/0x440 [ 1000.796990] ? memset+0x31/0x40 [ 1000.800498] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1000.806040] ? bpf_obj_name_cpy+0x17c/0x1c0 [ 1000.810373] bpf_prog_load+0x1141/0x1c90 [ 1000.814453] ? bpf_prog_new_fd+0x60/0x60 [ 1000.818523] ? lock_acquire+0x1e4/0x540 [ 1000.822525] ? __might_fault+0x12b/0x1e0 [ 1000.826596] ? lock_downgrade+0x8f0/0x8f0 [ 1000.830778] ? lock_release+0xa30/0xa30 [ 1000.834853] ? check_same_owner+0x340/0x340 [ 1000.839282] ? __check_object_size+0x9d/0x5f2 [ 1000.843795] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1000.849369] __x64_sys_bpf+0x36c/0x510 [ 1000.853290] ? bpf_prog_get+0x20/0x20 [ 1000.857109] do_syscall_64+0x1b9/0x820 [ 1000.861025] ? finish_task_switch+0x1d3/0x890 [ 1000.865534] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1000.870483] ? syscall_return_slowpath+0x31d/0x5e0 [ 1000.875453] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1000.880503] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1000.885550] ? perf_trace_sys_enter+0xb10/0xb10 [ 1000.890234] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1000.895096] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1000.900392] RIP: 0033:0x455ab9 sendmsg$kcm(r0, &(0x7f0000000800)={&(0x7f0000000400)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e22, @multicast2=0xe0000002}, 0x3, 0x3, 0x0, 0x3}}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000480)="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", 0xfb}, {&(0x7f0000000580)="d9d821106cdeb7cd10e1d4cb4f15a8e1b6624d9c8b14c22cdcaf6a3088fc6dbb8df6c98ddf5e3e2d738c89db520ca9e11713f95ead541c6775e68edad309ac91d148585835fc652cdab164ff7e52c5db70cd559f760a36a40396b8af1b949dc1359e3d1b2a111191c4f315d9c5349648a3c1de678c12a958305e970ae37274c7e0cc6d65c68c979c3c3d2e426b133ff7a98dd25286782bdc369911ae2317808fc34e4bafbe20a03375ee616fc27fe7ad53c9c3782b67ddfd7845cfc92b547f42e0edacd33aecf8b6e310e13b02edc50d91a572ffdae8aa6e191bc865dd22cdf4470639155c1d", 0xe6}, {&(0x7f0000000680)="a528c0f53d8b6485a54c6e7168ccd306a7c4b247e395d234df687f798cd3b8ab2fbf27d91ee471b1f3bbd342", 0x2c}, {&(0x7f00000006c0)="e02831a73fd902efc1542d8898a5eff533c87c49275009d5c20c99d3d8839e034250c8666c2c8df7b9e7bcdedf910e2f582253a919d5b2cff5ef3366034eac26d325d3f066ab65c6017a1b6b91bbc2b277fbb6b61ca473d0da70c7bbd670a6f5b5d1714b2961d2876e9e194df6edc1363750f91c5e9364d6451989029e827c4c5fdc9d5e386898e957b0e64d6a47d274c0e29cf317e98ee4706a0d79896d51cf8f8d77b114eb7671affaa855dceaf31f741459a7b62deca4778a9ef8094188692f38ec794a1c26b423cd36fe246f0b4f94753c33dd5e49d3c9422a27d48da7aca776f405990a4542f6", 0xe9}], 0x4, &(0x7f0000004c40)=ANY=[@ANYBLOB="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"], 0x23e8, 0x90}, 0x4040000) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f00000003c0)={r0}) 13:49:53 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:53 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:53 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8729cdfeff3f0f70]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:53 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4002000000000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:53 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:53 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:53 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:53 executing program 5 (fault-call:0 fault-nth:46): bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 1000.903577] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1000.923028] RSP: 002b:00007f8952c98c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1000.930775] RAX: ffffffffffffffda RBX: 00007f8952c996d4 RCX: 0000000000455ab9 [ 1000.938145] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000005 [ 1000.945442] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 1000.952721] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 1000.960019] R13: 00000000004bb7f3 R14: 00000000004c8c08 R15: 000000000000002d 13:49:54 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000]}, 0x48) 13:49:54 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1001.008577] FAULT_INJECTION: forcing a failure. [ 1001.008577] name failslab, interval 1, probability 0, space 0, times 0 [ 1001.020011] CPU: 0 PID: 2295 Comm: syz-executor5 Not tainted 4.18.0-rc3+ #58 [ 1001.027225] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1001.036585] Call Trace: [ 1001.039184] dump_stack+0x1c9/0x2b4 [ 1001.042827] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1001.048032] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 1001.052892] ? kernel_text_address+0x79/0xf0 [ 1001.057342] should_fail.cold.4+0xa/0x1a [ 1001.061449] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1001.066582] ? save_stack+0xa9/0xd0 [ 1001.070227] ? save_stack+0x43/0xd0 [ 1001.073870] ? __kasan_slab_free+0x11a/0x170 [ 1001.078303] ? kfree+0xd9/0x260 [ 1001.081698] ? do_check+0x165c/0xb9d0 [ 1001.085513] ? bpf_prog_load+0x1141/0x1c90 [ 1001.089762] ? __x64_sys_bpf+0x36c/0x510 [ 1001.094022] ? do_syscall_64+0x1b9/0x820 [ 1001.098120] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1001.103511] ? lock_acquire+0x1e4/0x540 [ 1001.107502] ? fs_reclaim_acquire+0x20/0x20 [ 1001.112021] ? lock_downgrade+0x8f0/0x8f0 [ 1001.116233] ? check_same_owner+0x340/0x340 [ 1001.120576] ? debug_check_no_obj_freed+0x30b/0x595 [ 1001.125635] ? rcu_note_context_switch+0x730/0x730 [ 1001.130691] __should_failslab+0x124/0x180 [ 1001.134945] should_failslab+0x9/0x14 [ 1001.138793] kmem_cache_alloc_trace+0x2cb/0x780 [ 1001.143482] ? __kasan_slab_free+0x131/0x170 [ 1001.147916] ? trace_hardirqs_on+0xd/0x10 [ 1001.152180] do_check+0x5fa/0xb9d0 [ 1001.155752] ? save_stack+0x97/0xd0 [ 1001.159387] ? check_func_arg+0xce0/0xce0 [ 1001.163547] ? kasan_check_write+0x14/0x20 [ 1001.167790] ? do_raw_spin_lock+0xc1/0x200 [ 1001.172029] ? trace_hardirqs_off+0xd/0x10 [ 1001.176267] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 1001.181362] ? debug_check_no_obj_freed+0x30b/0x595 [ 1001.186370] ? trace_hardirqs_off+0xd/0x10 [ 1001.190607] ? quarantine_put+0x10d/0x1b0 [ 1001.194752] ? __kasan_slab_free+0x131/0x170 [ 1001.199161] bpf_check+0x3872/0x5e60 [ 1001.202875] ? pvclock_read_flags+0x160/0x160 [ 1001.207361] ? fixup_bpf_calls+0x1fb0/0x1fb0 [ 1001.211753] ? ktime_get_with_offset+0x32e/0x4b0 [ 1001.216495] ? ktime_get+0x440/0x440 [ 1001.220209] ? memset+0x31/0x40 [ 1001.223480] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1001.229001] ? bpf_obj_name_cpy+0x17c/0x1c0 [ 1001.233319] bpf_prog_load+0x1141/0x1c90 [ 1001.237375] ? bpf_prog_new_fd+0x60/0x60 [ 1001.241427] ? lock_acquire+0x1e4/0x540 [ 1001.245385] ? __might_fault+0x12b/0x1e0 [ 1001.249436] ? lock_downgrade+0x8f0/0x8f0 [ 1001.253574] ? __check_object_size+0x9d/0x5f2 [ 1001.258065] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1001.263600] __x64_sys_bpf+0x36c/0x510 [ 1001.267484] ? bpf_prog_get+0x20/0x20 [ 1001.271278] do_syscall_64+0x1b9/0x820 [ 1001.275151] ? finish_task_switch+0x1d3/0x890 [ 1001.279647] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1001.284564] ? syscall_return_slowpath+0x31d/0x5e0 [ 1001.289488] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1001.294501] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1001.299512] ? perf_trace_sys_enter+0xb10/0xb10 [ 1001.304179] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1001.309043] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1001.314338] RIP: 0033:0x455ab9 [ 1001.317514] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1001.336727] RSP: 002b:00007f8952c98c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1001.344432] RAX: ffffffffffffffda RBX: 00007f8952c996d4 RCX: 0000000000455ab9 [ 1001.351695] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000005 [ 1001.358966] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 1001.366234] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 1001.373506] R13: 00000000004bb7f3 R14: 00000000004c8c08 R15: 000000000000002e 13:49:54 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:54 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) r0 = socket$kcm(0xa, 0x3, 0x87) recvmsg$kcm(r0, &(0x7f0000002300)={&(0x7f0000000080)=@hci, 0x80, &(0x7f0000002280)=[{&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)=""/4096, 0x1000}, {&(0x7f00000027c0)=""/4096, 0x1000}, {&(0x7f0000002100)=""/164, 0xa4}, {&(0x7f00000021c0)=""/151, 0x97}], 0x5, 0x0, 0x0, 0x5}, 0x2) sendmsg$kcm(r0, &(0x7f0000002780)={&(0x7f0000000000)=@un=@abs, 0x80, &(0x7f0000001380), 0x2ed, &(0x7f0000000100)}, 0x0) 13:49:54 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:54 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a00]}, 0x48) 13:49:54 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:54 executing program 5 (fault-call:0 fault-nth:47): bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:54 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socket$kcm(0x2, 0x1, 0x6000000) 13:49:54 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1001.489474] FAULT_INJECTION: forcing a failure. [ 1001.489474] name failslab, interval 1, probability 0, space 0, times 0 [ 1001.500794] CPU: 0 PID: 2323 Comm: syz-executor5 Not tainted 4.18.0-rc3+ #58 [ 1001.507996] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1001.518074] Call Trace: [ 1001.520677] dump_stack+0x1c9/0x2b4 [ 1001.524324] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1001.529525] ? kernel_text_address+0x79/0xf0 [ 1001.533931] should_fail.cold.4+0xa/0x1a [ 1001.537992] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1001.543086] ? save_stack+0xa9/0xd0 [ 1001.546709] ? save_stack+0x43/0xd0 [ 1001.550331] ? kasan_kmalloc+0xc4/0xe0 [ 1001.554205] ? kmem_cache_alloc_trace+0x152/0x780 [ 1001.559035] ? do_check+0x5fa/0xb9d0 [ 1001.562840] ? bpf_check+0x3872/0x5e60 [ 1001.566798] ? bpf_prog_load+0x1141/0x1c90 [ 1001.571029] ? __x64_sys_bpf+0x36c/0x510 [ 1001.575077] ? do_syscall_64+0x1b9/0x820 [ 1001.579138] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1001.584510] ? save_stack+0x43/0xd0 [ 1001.588137] ? __kasan_slab_free+0x11a/0x170 [ 1001.592536] ? lock_acquire+0x1e4/0x540 [ 1001.596511] ? fs_reclaim_acquire+0x20/0x20 [ 1001.600822] ? lock_downgrade+0x8f0/0x8f0 [ 1001.605056] ? lock_acquire+0x1e4/0x540 [ 1001.609028] ? check_same_owner+0x340/0x340 [ 1001.613343] ? kasan_check_write+0x14/0x20 [ 1001.617566] ? rcu_note_context_switch+0x730/0x730 [ 1001.622485] ? lock_release+0xa30/0xa30 [ 1001.626461] __should_failslab+0x124/0x180 [ 1001.630687] should_failslab+0x9/0x14 [ 1001.634475] kmem_cache_alloc_trace+0x2cb/0x780 [ 1001.639136] ? kasan_kmalloc+0xc4/0xe0 [ 1001.643098] copy_verifier_state+0x44b/0x5c0 [ 1001.647504] do_check+0x61a/0xb9d0 [ 1001.651035] ? save_stack+0x97/0xd0 [ 1001.654653] ? check_func_arg+0xce0/0xce0 [ 1001.658811] ? kasan_check_write+0x14/0x20 [ 1001.663041] ? do_raw_spin_lock+0xc1/0x200 [ 1001.667272] ? trace_hardirqs_off+0xd/0x10 [ 1001.671581] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 1001.676689] ? debug_check_no_obj_freed+0x30b/0x595 [ 1001.681695] ? trace_hardirqs_off+0xd/0x10 [ 1001.685941] ? quarantine_put+0x10d/0x1b0 [ 1001.690094] ? __kasan_slab_free+0x131/0x170 [ 1001.694525] bpf_check+0x3872/0x5e60 [ 1001.698226] ? pvclock_read_flags+0x160/0x160 [ 1001.702720] ? fixup_bpf_calls+0x1fb0/0x1fb0 [ 1001.707203] ? ktime_get_with_offset+0x32e/0x4b0 [ 1001.711957] ? ktime_get+0x440/0x440 [ 1001.715667] ? memset+0x31/0x40 [ 1001.719115] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1001.724635] ? bpf_obj_name_cpy+0x17c/0x1c0 [ 1001.728956] bpf_prog_load+0x1141/0x1c90 [ 1001.733022] ? bpf_prog_new_fd+0x60/0x60 [ 1001.737072] ? lock_acquire+0x1e4/0x540 [ 1001.741031] ? __might_fault+0x12b/0x1e0 [ 1001.745079] ? lock_downgrade+0x8f0/0x8f0 [ 1001.749213] ? lock_release+0xa30/0xa30 [ 1001.753188] ? check_same_owner+0x340/0x340 [ 1001.757507] ? __check_object_size+0x9d/0x5f2 [ 1001.761995] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1001.767523] __x64_sys_bpf+0x36c/0x510 [ 1001.771406] ? bpf_prog_get+0x20/0x20 [ 1001.775199] do_syscall_64+0x1b9/0x820 [ 1001.779071] ? finish_task_switch+0x1d3/0x890 [ 1001.783564] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1001.788484] ? syscall_return_slowpath+0x31d/0x5e0 [ 1001.793404] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1001.798421] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1001.803427] ? perf_trace_sys_enter+0xb10/0xb10 [ 1001.808086] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1001.812922] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1001.818109] RIP: 0033:0x455ab9 [ 1001.821280] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 13:49:54 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}, 0x48) 13:49:54 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80fe]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 1001.840460] RSP: 002b:00007f8952c98c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1001.848173] RAX: ffffffffffffffda RBX: 00007f8952c996d4 RCX: 0000000000455ab9 [ 1001.855426] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000005 [ 1001.862680] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 1001.869945] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 1001.877201] R13: 00000000004bb7f3 R14: 00000000004c8c08 R15: 000000000000002f 13:49:54 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:54 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:54 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:54 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1abcdf]}, 0x48) 13:49:55 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:55 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socket$kcm(0x2, 0x1, 0x1600) 13:49:55 executing program 5 (fault-call:0 fault-nth:48): bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) [ 1002.120960] FAULT_INJECTION: forcing a failure. [ 1002.120960] name failslab, interval 1, probability 0, space 0, times 0 [ 1002.132438] CPU: 0 PID: 2364 Comm: syz-executor5 Not tainted 4.18.0-rc3+ #58 [ 1002.139664] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1002.149593] Call Trace: [ 1002.152206] dump_stack+0x1c9/0x2b4 [ 1002.155854] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1002.161092] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 1002.165963] ? kernel_text_address+0x79/0xf0 [ 1002.170396] should_fail.cold.4+0xa/0x1a [ 1002.174605] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1002.179827] ? save_stack+0xa9/0xd0 [ 1002.183453] ? save_stack+0x43/0xd0 [ 1002.187104] ? kmem_cache_alloc_trace+0x152/0x780 [ 1002.191964] ? do_check+0x5fa/0xb9d0 [ 1002.195683] ? bpf_check+0x3872/0x5e60 [ 1002.199574] ? bpf_prog_load+0x1141/0x1c90 [ 1002.203801] ? __x64_sys_bpf+0x36c/0x510 [ 1002.207856] ? do_syscall_64+0x1b9/0x820 [ 1002.211914] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1002.217273] ? __kasan_slab_free+0x11a/0x170 [ 1002.221669] ? kasan_slab_free+0xe/0x10 [ 1002.225635] ? kfree+0xd9/0x260 [ 1002.228913] ? free_func_state.part.20+0x3f/0x50 [ 1002.233667] ? lock_acquire+0x1e4/0x540 [ 1002.237639] ? fs_reclaim_acquire+0x20/0x20 [ 1002.241966] ? lock_downgrade+0x8f0/0x8f0 [ 1002.246132] ? lock_acquire+0x1e4/0x540 [ 1002.250113] ? check_same_owner+0x340/0x340 [ 1002.254452] ? rcu_note_context_switch+0x730/0x730 [ 1002.259398] ? lock_release+0xa30/0xa30 [ 1002.263463] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 1002.268581] __should_failslab+0x124/0x180 [ 1002.272821] should_failslab+0x9/0x14 [ 1002.276621] kmem_cache_alloc_trace+0x2cb/0x780 [ 1002.281397] ? kasan_kmalloc+0xc4/0xe0 [ 1002.285296] copy_verifier_state+0x44b/0x5c0 [ 1002.289791] do_check+0x61a/0xb9d0 [ 1002.293341] ? save_stack+0x9f/0xd0 [ 1002.296979] ? check_func_arg+0xce0/0xce0 [ 1002.301124] ? kasan_check_write+0x14/0x20 [ 1002.305350] ? do_raw_spin_lock+0xc1/0x200 [ 1002.309572] ? trace_hardirqs_off+0xd/0x10 [ 1002.313798] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 1002.318898] ? debug_check_no_obj_freed+0x30b/0x595 [ 1002.323914] ? trace_hardirqs_off+0xd/0x10 [ 1002.328147] ? quarantine_put+0x10d/0x1b0 [ 1002.332342] ? __kasan_slab_free+0x131/0x170 [ 1002.336760] bpf_check+0x3872/0x5e60 [ 1002.340485] ? pvclock_read_flags+0x160/0x160 [ 1002.344999] ? fixup_bpf_calls+0x1fb0/0x1fb0 [ 1002.349422] ? ktime_get_with_offset+0x32e/0x4b0 [ 1002.354203] ? ktime_get+0x440/0x440 [ 1002.357956] ? memset+0x31/0x40 [ 1002.361380] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1002.367114] ? bpf_obj_name_cpy+0x17c/0x1c0 13:49:55 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x114) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x9) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x8953, &(0x7f0000000000)=0x2) 13:49:55 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}, 0x48) 13:49:55 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:55 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:55 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x218]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:55 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1002.371436] bpf_prog_load+0x1141/0x1c90 [ 1002.375502] ? bpf_prog_new_fd+0x60/0x60 [ 1002.379569] ? lock_acquire+0x1e4/0x540 [ 1002.383722] ? __might_fault+0x12b/0x1e0 [ 1002.387804] ? lock_downgrade+0x8f0/0x8f0 [ 1002.391975] ? __check_object_size+0x9d/0x5f2 [ 1002.396520] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1002.402082] __x64_sys_bpf+0x36c/0x510 [ 1002.405988] ? bpf_prog_get+0x20/0x20 [ 1002.409841] do_syscall_64+0x1b9/0x820 [ 1002.413829] ? finish_task_switch+0x1d3/0x890 [ 1002.418370] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1002.423392] ? syscall_return_slowpath+0x31d/0x5e0 [ 1002.428358] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1002.433404] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1002.438435] ? perf_trace_sys_enter+0xb10/0xb10 [ 1002.443120] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1002.447985] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1002.453204] RIP: 0033:0x455ab9 13:49:55 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdffffff]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 1002.456409] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1002.476551] RSP: 002b:00007f8952c98c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1002.484264] RAX: ffffffffffffffda RBX: 00007f8952c996d4 RCX: 0000000000455ab9 [ 1002.491707] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000005 [ 1002.498966] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 1002.506801] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 1002.514060] R13: 00000000004bb7f3 R14: 00000000004c8c08 R15: 0000000000000030 13:49:55 executing program 5 (fault-call:0 fault-nth:49): bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:55 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a00000000000000]}, 0x48) 13:49:55 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socket$kcm(0x2, 0x1, 0x6) 13:49:55 executing program 3: r0 = socket$kcm(0x2, 0x5, 0x0) r1 = socket$kcm(0x2, 0x2, 0x300) socket$kcm(0x29, 0x2, 0x0) recvmsg$kcm(r1, &(0x7f0000000100)={&(0x7f00000002c0)=@pppol2tp, 0x80, &(0x7f00000009c0), 0x81, &(0x7f0000000a80)=""/185, 0x3a6}, 0x0) sendmsg(r0, &(0x7f0000000040)={&(0x7f0000000080)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x80, &(0x7f0000000000)=[{&(0x7f00000002c0)='A', 0x1}], 0x1, &(0x7f00000003c0)}, 0x0) recvmsg$kcm(r1, &(0x7f0000001f80)={0x0, 0x0, &(0x7f0000001e40), 0x0, &(0x7f0000001ec0)=""/189, 0xbd}, 0x0) 13:49:55 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:55 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0008000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1002.634630] FAULT_INJECTION: forcing a failure. [ 1002.634630] name failslab, interval 1, probability 0, space 0, times 0 [ 1002.645944] CPU: 0 PID: 2393 Comm: syz-executor5 Not tainted 4.18.0-rc3+ #58 [ 1002.653145] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1002.662781] Call Trace: [ 1002.665557] dump_stack+0x1c9/0x2b4 [ 1002.669313] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1002.674546] ? __kernel_text_address+0xd/0x40 [ 1002.679065] should_fail.cold.4+0xa/0x1a [ 1002.683145] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1002.688253] ? save_stack+0xa9/0xd0 [ 1002.691890] ? save_stack+0x43/0xd0 [ 1002.695508] ? __kasan_slab_free+0x11a/0x170 [ 1002.699993] ? kasan_slab_free+0xe/0x10 [ 1002.703962] ? kfree+0xd9/0x260 [ 1002.707235] ? free_func_state.part.20+0x3f/0x50 [ 1002.712094] ? do_check+0x4c4d/0xb9d0 [ 1002.715892] ? bpf_check+0x3872/0x5e60 [ 1002.719797] ? bpf_prog_load+0x1141/0x1c90 [ 1002.724025] ? __x64_sys_bpf+0x36c/0x510 [ 1002.728089] ? do_syscall_64+0x1b9/0x820 [ 1002.732263] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1002.737639] ? lock_acquire+0x1e4/0x540 [ 1002.741626] ? fs_reclaim_acquire+0x20/0x20 [ 1002.745938] ? lock_downgrade+0x8f0/0x8f0 [ 1002.750079] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 1002.755177] ? check_same_owner+0x340/0x340 [ 1002.759489] ? kasan_kmalloc+0xc4/0xe0 [ 1002.763368] ? rcu_note_context_switch+0x730/0x730 [ 1002.768295] __should_failslab+0x124/0x180 [ 1002.772527] should_failslab+0x9/0x14 [ 1002.776320] kmem_cache_alloc_trace+0x2cb/0x780 [ 1002.780997] ? trace_hardirqs_on+0xd/0x10 [ 1002.785237] do_check+0x5fa/0xb9d0 [ 1002.788787] ? save_stack+0x9f/0xd0 [ 1002.792515] ? check_func_arg+0xce0/0xce0 [ 1002.796743] ? kasan_check_write+0x14/0x20 [ 1002.801058] ? do_raw_spin_lock+0xc1/0x200 [ 1002.805286] ? trace_hardirqs_off+0xd/0x10 [ 1002.809513] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 1002.814606] ? debug_check_no_obj_freed+0x30b/0x595 [ 1002.819631] ? trace_hardirqs_off+0xd/0x10 [ 1002.823866] ? quarantine_put+0x10d/0x1b0 [ 1002.828027] ? __kasan_slab_free+0x131/0x170 [ 1002.832433] bpf_check+0x3872/0x5e60 [ 1002.836312] ? pvclock_read_flags+0x160/0x160 [ 1002.840892] ? fixup_bpf_calls+0x1fb0/0x1fb0 [ 1002.845303] ? ktime_get_with_offset+0x32e/0x4b0 [ 1002.850051] ? ktime_get+0x440/0x440 [ 1002.853768] ? memset+0x31/0x40 [ 1002.857040] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1002.862572] ? bpf_obj_name_cpy+0x17c/0x1c0 [ 1002.866884] bpf_prog_load+0x1141/0x1c90 [ 1002.870937] ? bpf_prog_new_fd+0x60/0x60 [ 1002.874999] ? lock_acquire+0x1e4/0x540 [ 1002.878965] ? __might_fault+0x12b/0x1e0 [ 1002.883022] ? lock_downgrade+0x8f0/0x8f0 [ 1002.887161] ? lock_release+0xa30/0xa30 [ 1002.891229] ? check_same_owner+0x340/0x340 [ 1002.895543] ? __check_object_size+0x9d/0x5f2 [ 1002.900313] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1002.905860] __x64_sys_bpf+0x36c/0x510 [ 1002.909746] ? bpf_prog_get+0x20/0x20 [ 1002.913551] do_syscall_64+0x1b9/0x820 [ 1002.917438] ? finish_task_switch+0x1d3/0x890 [ 1002.921926] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1002.926848] ? syscall_return_slowpath+0x31d/0x5e0 [ 1002.931782] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1002.936805] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1002.941909] ? perf_trace_sys_enter+0xb10/0xb10 [ 1002.946567] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1002.951415] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1002.956594] RIP: 0033:0x455ab9 [ 1002.959778] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1002.979061] RSP: 002b:00007f8952c98c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1002.986758] RAX: ffffffffffffffda RBX: 00007f8952c996d4 RCX: 0000000000455ab9 [ 1002.994031] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000005 [ 1003.001289] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 1003.008555] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 1003.015812] R13: 00000000004bb7f3 R14: 00000000004c8c08 R15: 0000000000000031 13:49:56 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:56 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:56 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaf9f1900]}, 0x48) 13:49:56 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:56 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:56 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:56 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socket$kcm(0x2, 0x1, 0x1000000000000) 13:49:56 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x48) 13:49:56 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:56 executing program 5 (fault-call:0 fault-nth:50): bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:56 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:56 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:56 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1003.310306] FAULT_INJECTION: forcing a failure. [ 1003.310306] name failslab, interval 1, probability 0, space 0, times 0 [ 1003.321604] CPU: 0 PID: 2448 Comm: syz-executor5 Not tainted 4.18.0-rc3+ #58 [ 1003.328802] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1003.338169] Call Trace: [ 1003.340775] dump_stack+0x1c9/0x2b4 [ 1003.344426] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1003.349661] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 1003.354525] ? __kernel_text_address+0xd/0x40 [ 1003.359292] should_fail.cold.4+0xa/0x1a [ 1003.363381] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1003.368535] ? save_stack+0xa9/0xd0 [ 1003.372186] ? save_stack+0x43/0xd0 [ 1003.375840] ? __kasan_slab_free+0x11a/0x170 [ 1003.380269] ? kasan_slab_free+0xe/0x10 [ 1003.384266] ? kfree+0xd9/0x260 [ 1003.387562] ? free_func_state.part.20+0x3f/0x50 [ 1003.392340] ? bpf_check+0x3872/0x5e60 [ 1003.396254] ? bpf_prog_load+0x1141/0x1c90 [ 1003.400812] ? __x64_sys_bpf+0x36c/0x510 [ 1003.404926] ? do_syscall_64+0x1b9/0x820 [ 1003.409038] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1003.414435] ? lock_acquire+0x1e4/0x540 [ 1003.418417] ? fs_reclaim_acquire+0x20/0x20 [ 1003.422772] ? lock_downgrade+0x8f0/0x8f0 [ 1003.426957] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 1003.432109] ? check_same_owner+0x340/0x340 [ 1003.436614] ? kasan_kmalloc+0xc4/0xe0 [ 1003.440506] ? rcu_note_context_switch+0x730/0x730 [ 1003.445450] __should_failslab+0x124/0x180 [ 1003.449692] should_failslab+0x9/0x14 [ 1003.453490] kmem_cache_alloc_trace+0x2cb/0x780 [ 1003.458258] ? trace_hardirqs_on+0xd/0x10 [ 1003.462425] do_check+0x5fa/0xb9d0 [ 1003.465975] ? save_stack+0x9f/0xd0 [ 1003.469624] ? check_func_arg+0xce0/0xce0 [ 1003.473778] ? kasan_check_write+0x14/0x20 [ 1003.478024] ? do_raw_spin_lock+0xc1/0x200 [ 1003.482266] ? trace_hardirqs_off+0xd/0x10 [ 1003.486502] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 1003.491597] ? debug_check_no_obj_freed+0x30b/0x595 [ 1003.496610] ? trace_hardirqs_off+0xd/0x10 [ 1003.500847] ? quarantine_put+0x10d/0x1b0 [ 1003.504987] ? __kasan_slab_free+0x131/0x170 [ 1003.509399] bpf_check+0x3872/0x5e60 [ 1003.513107] ? pvclock_read_flags+0x160/0x160 [ 1003.517616] ? fixup_bpf_calls+0x1fb0/0x1fb0 [ 1003.522038] ? ktime_get_with_offset+0x32e/0x4b0 [ 1003.526879] ? ktime_get+0x440/0x440 [ 1003.530602] ? memset+0x31/0x40 [ 1003.533873] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1003.539405] ? bpf_obj_name_cpy+0x17c/0x1c0 [ 1003.543713] bpf_prog_load+0x1141/0x1c90 [ 1003.547772] ? bpf_prog_new_fd+0x60/0x60 [ 1003.551822] ? lock_acquire+0x1e4/0x540 [ 1003.555785] ? __might_fault+0x12b/0x1e0 [ 1003.559830] ? lock_downgrade+0x8f0/0x8f0 [ 1003.563970] ? __check_object_size+0x9d/0x5f2 [ 1003.568471] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1003.574031] __x64_sys_bpf+0x36c/0x510 [ 1003.577911] ? bpf_prog_get+0x20/0x20 [ 1003.581738] do_syscall_64+0x1b9/0x820 [ 1003.585625] ? finish_task_switch+0x1d3/0x890 [ 1003.590119] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1003.595056] ? syscall_return_slowpath+0x31d/0x5e0 [ 1003.599991] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1003.605015] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1003.610041] ? perf_trace_sys_enter+0xb10/0xb10 [ 1003.614701] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1003.619544] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1003.624721] RIP: 0033:0x455ab9 [ 1003.627903] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1003.647114] RSP: 002b:00007f8952c98c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1003.654812] RAX: ffffffffffffffda RBX: 00007f8952c996d4 RCX: 0000000000455ab9 [ 1003.662072] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000005 [ 1003.669333] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 1003.676606] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 1003.683866] R13: 00000000004bb7f3 R14: 00000000004c8c08 R15: 0000000000000032 13:49:57 executing program 3: socketpair(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x8}, 0x2c) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8946, &(0x7f0000000040)="6c6f00966fd651b159a9c84a2c723d1010000020") write$cgroup_subtree(r1, &(0x7f0000000100)={[{0x0, 'io', 0x20}, {0x2d, 'cpu', 0x20}, {0x2d, 'cpu', 0x20}, {0x2f, 'rdma', 0x20}, {0x2d, 'cpu', 0x20}, {0x2f, 'rdma', 0x20}]}, 0x1f) socketpair(0x3, 0x800, 0x800, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) 13:49:57 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000]}, 0x48) 13:49:57 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:57 executing program 5 (fault-call:0 fault-nth:51): bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:57 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socket$kcm(0x2, 0x1, 0x16000000) 13:49:57 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:57 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:57 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1004.068376] FAULT_INJECTION: forcing a failure. [ 1004.068376] name failslab, interval 1, probability 0, space 0, times 0 [ 1004.079769] CPU: 0 PID: 2475 Comm: syz-executor5 Not tainted 4.18.0-rc3+ #58 [ 1004.086964] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1004.096352] Call Trace: [ 1004.098949] dump_stack+0x1c9/0x2b4 [ 1004.102569] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1004.107748] ? kernel_text_address+0x79/0xf0 [ 1004.112181] should_fail.cold.4+0xa/0x1a [ 1004.116236] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1004.121334] ? save_stack+0xa9/0xd0 [ 1004.124952] ? save_stack+0x43/0xd0 [ 1004.128565] ? __kasan_slab_free+0x11a/0x170 [ 1004.132962] ? kasan_slab_free+0xe/0x10 [ 1004.137034] ? kfree+0xd9/0x260 [ 1004.140303] ? do_check+0x165c/0xb9d0 [ 1004.144101] ? bpf_check+0x3872/0x5e60 [ 1004.147976] ? bpf_prog_load+0x1141/0x1c90 [ 1004.152198] ? __x64_sys_bpf+0x36c/0x510 [ 1004.156263] ? do_syscall_64+0x1b9/0x820 [ 1004.160314] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1004.165692] ? lock_acquire+0x1e4/0x540 [ 1004.169654] ? fs_reclaim_acquire+0x20/0x20 [ 1004.173977] ? lock_downgrade+0x8f0/0x8f0 [ 1004.178125] ? kasan_check_write+0x14/0x20 [ 1004.182351] ? check_same_owner+0x340/0x340 [ 1004.186666] ? debug_check_no_obj_freed+0x30b/0x595 [ 1004.191672] ? rcu_note_context_switch+0x730/0x730 [ 1004.196594] __should_failslab+0x124/0x180 [ 1004.200929] should_failslab+0x9/0x14 [ 1004.204720] kmem_cache_alloc_trace+0x2cb/0x780 [ 1004.209385] ? __kasan_slab_free+0x131/0x170 [ 1004.213784] ? trace_hardirqs_on+0xd/0x10 [ 1004.217925] do_check+0x10ab/0xb9d0 [ 1004.221552] ? save_stack+0x97/0xd0 [ 1004.225183] ? check_func_arg+0xce0/0xce0 [ 1004.229322] ? kasan_check_write+0x14/0x20 [ 1004.233544] ? do_raw_spin_lock+0xc1/0x200 [ 1004.237777] ? trace_hardirqs_off+0xd/0x10 [ 1004.241999] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 1004.247093] ? debug_check_no_obj_freed+0x30b/0x595 [ 1004.252103] ? trace_hardirqs_off+0xd/0x10 [ 1004.256333] ? quarantine_put+0x10d/0x1b0 [ 1004.260483] ? __kasan_slab_free+0x131/0x170 [ 1004.264882] bpf_check+0x3872/0x5e60 [ 1004.268585] ? pvclock_read_flags+0x160/0x160 [ 1004.273085] ? fixup_bpf_calls+0x1fb0/0x1fb0 [ 1004.277492] ? ktime_get_with_offset+0x32e/0x4b0 [ 1004.282238] ? ktime_get+0x440/0x440 [ 1004.285943] ? memset+0x31/0x40 [ 1004.289213] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1004.294745] ? bpf_obj_name_cpy+0x17c/0x1c0 [ 1004.299067] bpf_prog_load+0x1141/0x1c90 [ 1004.303119] ? bpf_prog_new_fd+0x60/0x60 [ 1004.307171] ? lock_acquire+0x1e4/0x540 [ 1004.311133] ? __might_fault+0x12b/0x1e0 [ 1004.315184] ? lock_downgrade+0x8f0/0x8f0 [ 1004.319316] ? lock_release+0xa30/0xa30 [ 1004.323279] ? check_same_owner+0x340/0x340 [ 1004.327598] ? __check_object_size+0x9d/0x5f2 [ 1004.332127] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1004.337687] __x64_sys_bpf+0x36c/0x510 [ 1004.341564] ? bpf_prog_get+0x20/0x20 [ 1004.345375] do_syscall_64+0x1b9/0x820 [ 1004.349249] ? finish_task_switch+0x1d3/0x890 [ 1004.353730] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1004.358665] ? syscall_return_slowpath+0x31d/0x5e0 [ 1004.363584] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1004.368600] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1004.373616] ? perf_trace_sys_enter+0xb10/0xb10 [ 1004.378274] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1004.383110] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1004.388298] RIP: 0033:0x455ab9 [ 1004.391480] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1004.411105] RSP: 002b:00007f8952c98c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 13:49:57 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800]}, 0x48) [ 1004.418804] RAX: ffffffffffffffda RBX: 00007f8952c996d4 RCX: 0000000000455ab9 [ 1004.426236] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000005 [ 1004.433511] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 1004.440778] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 1004.448037] R13: 00000000004bb7f3 R14: 00000000004c8c08 R15: 0000000000000033 13:49:57 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:57 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff0f000000000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:57 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:57 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:57 executing program 3: r0 = socket$kcm(0x2, 0x5, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2=0xe0000002}}}, 0x80, &(0x7f0000000740), 0x0, &(0x7f00000008c0)=ANY=[]}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.swap.current\x00', 0x0, 0x0) recvmsg$kcm(r0, &(0x7f000000b000)={&(0x7f0000008b40)=@hci={0x0, 0x0}, 0x80, &(0x7f000000aec0)=[{&(0x7f0000008bc0)=""/70, 0x46}, {&(0x7f0000008c40)=""/4096, 0x1000}, {&(0x7f0000009c40)=""/24, 0x18}, {&(0x7f0000009c80)=""/166, 0xa6}, {&(0x7f0000009d40)=""/40, 0x28}, {&(0x7f0000009d80)=""/25, 0x19}, {&(0x7f0000009dc0)=""/4096, 0x1000}, {&(0x7f000000adc0)=""/223, 0xdf}], 0x8, &(0x7f000000af40)=""/149, 0x95, 0x5}, 0x40002100) socket$kcm(0x29, 0x5, 0x0) sendmsg(r0, &(0x7f0000000780)={&(0x7f0000000500)=@ipx={0x4, 0x1, 0xffffffffffffffff, "29691bf79345", 0xffffffff}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000580)="514d3bc84cbf768f7a13100fb8a29d131eee00f0c593cf42c99e21a55a0a157bae8a8bbdcacbbac978cd32cf59eaf97a6bfd29e489f75b0f8cd75d5a27c8038383813812490797c6f60f26fe6f27dfe2707aca72e3927ee706adf0df0d5c7475b8055bf42ed1ac4d07c974600b2e0883e26c45c77aab52ea8746e15281be289abeba21ddf7960103", 0x88}, {&(0x7f0000000640)="288fc2dd96f0dcbe81aed89dab7eb1cdb6ef2df5131852565eccfd0c2c45bfd8dee852f36c5cd2bb7cc5cb4e382b9b4147a35c518d286a06236d0e1de3227a558b5eeaafeaedbce6183b2ebf4c27adb69d2ab9291eacc4fc9716e80d3834e158c7b0edeb4a8541a47dc5b8f7a76879b4fcd212bef535eb9597889968fef319791260c55c76abebcbd33dc8e3b0edc4cd8ce400877ea3", 0x96}, {&(0x7f0000000700)="d8300736630ad7b5cc20f3ed61f466a388", 0x11}], 0x3, 0x0, 0x0, 0x24000840}, 0x20004005) openat$cgroup_ro(r1, &(0x7f00000007c0)='memory.current\x00', 0x0, 0x0) recvmsg$kcm(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f00000008c0)=""/4096, 0x1000}, {&(0x7f0000000180)=""/250, 0xfa}, {&(0x7f0000000040)=""/45, 0x2d}, {&(0x7f0000000280)=""/88, 0x58}, {&(0x7f0000000300)=""/129, 0x81}, {&(0x7f00000003c0)=""/83, 0x53}], 0x6, &(0x7f00000000c0)=""/54, 0x36, 0x9}, 0x2) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f000000b040)=r2) setsockopt$sock_attach_bpf(r0, 0x84, 0x9, &(0x7f0000000080), 0x98) 13:49:57 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:57 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:57 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f00000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:57 executing program 5 (fault-call:0 fault-nth:52): bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:57 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000]}, 0x48) 13:49:57 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:57 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socket$kcm(0x2, 0x1, 0x8000000) 13:49:57 executing program 3: recvmsg(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000080)=@can={0x0, 0x0}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)=""/16, 0x10}, {&(0x7f0000000180)=""/99, 0x63}], 0x2, 0x0, 0x319, 0x9}, 0x21) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x200001cd, &(0x7f0000001000)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0xfffffffffffffea6, 0x0, 0x41000, 0x0, [], r0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r1, 0x0, 0x64, 0x81, &(0x7f0000000240)="0413855f8931307be45219c98c9264ae94bed83ba5d63e900f98bd6f76db70e0e9a437ef9530f1b9c026f0b0d50e274662b6a18bc385de6e1d3d0ea254b49bdae124da79a233b07a1c4fecef3156e04cd00946e54bf4d700d12a4a824dd1979cc0861e5b", &(0x7f0000000300)=""/129, 0x1}, 0x28) [ 1004.724917] FAULT_INJECTION: forcing a failure. [ 1004.724917] name failslab, interval 1, probability 0, space 0, times 0 [ 1004.736505] CPU: 0 PID: 2525 Comm: syz-executor5 Not tainted 4.18.0-rc3+ #58 [ 1004.743727] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1004.753088] Call Trace: [ 1004.755701] dump_stack+0x1c9/0x2b4 [ 1004.759443] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1004.764688] ? kernel_text_address+0x79/0xf0 [ 1004.769127] should_fail.cold.4+0xa/0x1a 13:49:57 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 1004.773214] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1004.778343] ? save_stack+0xa9/0xd0 [ 1004.782018] ? save_stack+0x43/0xd0 [ 1004.785663] ? __kasan_slab_free+0x11a/0x170 [ 1004.790082] ? kasan_slab_free+0xe/0x10 [ 1004.794077] ? kfree+0xd9/0x260 [ 1004.797369] ? do_check+0x165c/0xb9d0 [ 1004.801186] ? bpf_prog_load+0x1141/0x1c90 [ 1004.805457] ? __x64_sys_bpf+0x36c/0x510 [ 1004.809535] ? do_syscall_64+0x1b9/0x820 [ 1004.813612] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1004.819000] ? lock_acquire+0x1e4/0x540 [ 1004.822998] ? fs_reclaim_acquire+0x20/0x20 [ 1004.827325] ? lock_downgrade+0x8f0/0x8f0 [ 1004.831482] ? kasan_check_write+0x14/0x20 [ 1004.835720] ? check_same_owner+0x340/0x340 [ 1004.840044] ? debug_check_no_obj_freed+0x30b/0x595 [ 1004.845150] ? rcu_note_context_switch+0x730/0x730 [ 1004.850080] __should_failslab+0x124/0x180 [ 1004.854318] should_failslab+0x9/0x14 [ 1004.858386] kmem_cache_alloc_trace+0x2cb/0x780 [ 1004.863055] ? __kasan_slab_free+0x131/0x170 [ 1004.867457] ? trace_hardirqs_on+0xd/0x10 [ 1004.871606] do_check+0x10ab/0xb9d0 [ 1004.875236] ? save_stack+0x97/0xd0 [ 1004.878867] ? check_func_arg+0xce0/0xce0 [ 1004.883140] ? kasan_check_write+0x14/0x20 [ 1004.887385] ? do_raw_spin_lock+0xc1/0x200 [ 1004.891628] ? trace_hardirqs_off+0xd/0x10 [ 1004.895948] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 1004.901050] ? debug_check_no_obj_freed+0x30b/0x595 [ 1004.906069] ? trace_hardirqs_off+0xd/0x10 [ 1004.910299] ? quarantine_put+0x10d/0x1b0 [ 1004.914445] ? __kasan_slab_free+0x131/0x170 [ 1004.918855] bpf_check+0x3872/0x5e60 [ 1004.922558] ? pvclock_read_flags+0x160/0x160 [ 1004.927063] ? fixup_bpf_calls+0x1fb0/0x1fb0 [ 1004.931471] ? ktime_get_with_offset+0x32e/0x4b0 [ 1004.936229] ? ktime_get+0x440/0x440 [ 1004.939933] ? memset+0x31/0x40 [ 1004.943201] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1004.948737] ? bpf_obj_name_cpy+0x17c/0x1c0 [ 1004.953058] bpf_prog_load+0x1141/0x1c90 [ 1004.957137] ? bpf_prog_new_fd+0x60/0x60 [ 1004.961191] ? lock_acquire+0x1e4/0x540 [ 1004.965161] ? __might_fault+0x12b/0x1e0 [ 1004.969210] ? lock_downgrade+0x8f0/0x8f0 [ 1004.973344] ? lock_release+0xa30/0xa30 [ 1004.977319] ? check_same_owner+0x340/0x340 [ 1004.981641] ? __check_object_size+0x9d/0x5f2 [ 1004.986164] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1004.991708] __x64_sys_bpf+0x36c/0x510 [ 1004.995593] ? bpf_prog_get+0x20/0x20 [ 1004.999392] do_syscall_64+0x1b9/0x820 [ 1005.003275] ? syscall_slow_exit_work+0x500/0x500 [ 1005.008136] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1005.013062] ? syscall_return_slowpath+0x31d/0x5e0 [ 1005.017992] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1005.023000] ? perf_trace_sys_enter+0xb10/0xb10 [ 1005.027668] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1005.032499] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1005.037672] RIP: 0033:0x455ab9 [ 1005.040844] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1005.060080] RSP: 002b:00007f8952c98c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1005.067786] RAX: ffffffffffffffda RBX: 00007f8952c996d4 RCX: 0000000000455ab9 13:49:58 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000]}, 0x48) [ 1005.075147] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000005 [ 1005.082414] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 1005.089693] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 1005.096968] R13: 00000000004bb7f3 R14: 00000000004c8c08 R15: 0000000000000034 13:49:58 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:58 executing program 5 (fault-call:0 fault-nth:53): bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:58 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:58 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:58 executing program 3: r0 = socket$kcm(0xa, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) r2 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x8550, 0xc0, 0xdd, 0x3, 0x0, 0x2, 0x2000, 0x7, 0x10000, 0x1, 0x1, 0x0, 0x8, 0x9, 0x100, 0xffff, 0xfffffffffffffffd, 0x7b19, 0x8, 0x5, 0x1, 0x20, 0xfffffffffffffffc, 0x1, 0x7fffffff, 0x8, 0xfff, 0x8, 0x1, 0x100, 0x0, 0x6, 0x8f00000, 0x40, 0x80, 0x1, 0x0, 0x81, 0x5, @perf_bp={&(0x7f0000000040), 0x5}, 0x31452, 0x7, 0x6, 0x3, 0xfffffffffffffffc, 0x0, 0x3}, r2, 0xd, r1, 0x2) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, r1, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8910, &(0x7f0000000080)) socket$kcm(0x29, 0x4, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r1, 0x28, &(0x7f0000000140)}, 0x10) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000001c0)) 13:49:58 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="180000b754772172086e0cacdda1dcba7ddd2500ffea00fd49480e7ac12af0a0419a51ff00000000896e5eaa786183369213c115eab38b88593e9fa4cdd82bb4cc1b4662ccffd8f2c01ad16d9e55f2fc3ea4a1a65a0bb735ebc8bc218cb215fccb248b43c00130198e47233f5a1475b6fcdcb29c6e7d33e81e845d510e73e72d968f4a0a5c75b196b884d5b6cca05ebf69821f4320b6fc0daa1e6a76592d1dcc80453acb3fe08bef17c3a7ed76c733d17db71d7c12d08dbbcd35a060df8d0193de0d60be2cd63eb76e3d36b3d6bcfd8029cbfed86f0d29925ab74dcd6b09bcf15f87e15e65af314ef7ea6b"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socket$kcm(0x2, 0x1, 0x0) 13:49:58 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1802]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:58 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce]}, 0x48) [ 1005.276210] FAULT_INJECTION: forcing a failure. [ 1005.276210] name failslab, interval 1, probability 0, space 0, times 0 [ 1005.287711] CPU: 0 PID: 2561 Comm: syz-executor5 Not tainted 4.18.0-rc3+ #58 [ 1005.294922] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1005.304300] Call Trace: [ 1005.306915] dump_stack+0x1c9/0x2b4 [ 1005.310569] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1005.315775] ? kernel_text_address+0x79/0xf0 [ 1005.320199] should_fail.cold.4+0xa/0x1a 13:49:58 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 1005.324285] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1005.329414] ? save_stack+0xa9/0xd0 [ 1005.333053] ? save_stack+0x43/0xd0 [ 1005.336696] ? __kasan_slab_free+0x11a/0x170 [ 1005.341108] ? kasan_slab_free+0xe/0x10 [ 1005.345094] ? kfree+0xd9/0x260 [ 1005.348383] ? do_check+0x165c/0xb9d0 [ 1005.352195] ? bpf_check+0x3872/0x5e60 [ 1005.356122] ? bpf_prog_load+0x1141/0x1c90 [ 1005.360391] ? __x64_sys_bpf+0x36c/0x510 [ 1005.364639] ? do_syscall_64+0x1b9/0x820 [ 1005.368724] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 13:49:58 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f01]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 1005.374118] ? lock_acquire+0x1e4/0x540 [ 1005.378115] ? fs_reclaim_acquire+0x20/0x20 [ 1005.382455] ? lock_downgrade+0x8f0/0x8f0 [ 1005.386617] ? kasan_check_write+0x14/0x20 [ 1005.390950] ? check_same_owner+0x340/0x340 [ 1005.395330] ? debug_check_no_obj_freed+0x30b/0x595 [ 1005.400370] ? rcu_note_context_switch+0x730/0x730 [ 1005.405315] __should_failslab+0x124/0x180 [ 1005.409569] should_failslab+0x9/0x14 [ 1005.413387] kmem_cache_alloc_trace+0x2cb/0x780 [ 1005.418090] ? __kasan_slab_free+0x131/0x170 [ 1005.422526] ? trace_hardirqs_on+0xd/0x10 13:49:58 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:58 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f01000000000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 1005.426695] do_check+0x10ab/0xb9d0 [ 1005.430341] ? save_stack+0x97/0xd0 [ 1005.433995] ? check_func_arg+0xce0/0xce0 [ 1005.438161] ? kasan_check_write+0x14/0x20 [ 1005.442406] ? do_raw_spin_lock+0xc1/0x200 [ 1005.446658] ? trace_hardirqs_off+0xd/0x10 [ 1005.450907] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 1005.456075] ? debug_check_no_obj_freed+0x30b/0x595 [ 1005.461109] ? trace_hardirqs_off+0xd/0x10 [ 1005.465444] ? quarantine_put+0x10d/0x1b0 [ 1005.469608] ? __kasan_slab_free+0x131/0x170 13:49:58 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900000000000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 1005.474028] bpf_check+0x3872/0x5e60 [ 1005.477756] ? pvclock_read_flags+0x160/0x160 [ 1005.482438] ? fixup_bpf_calls+0x1fb0/0x1fb0 [ 1005.486854] ? ktime_get_with_offset+0x32e/0x4b0 [ 1005.491814] ? ktime_get+0x440/0x440 [ 1005.495548] ? memset+0x31/0x40 [ 1005.498840] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1005.504386] ? bpf_obj_name_cpy+0x17c/0x1c0 [ 1005.508727] bpf_prog_load+0x1141/0x1c90 [ 1005.512798] ? bpf_prog_new_fd+0x60/0x60 [ 1005.516956] ? lock_acquire+0x1e4/0x540 [ 1005.520936] ? __might_fault+0x12b/0x1e0 13:49:58 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 1005.525006] ? lock_downgrade+0x8f0/0x8f0 [ 1005.529164] ? lock_release+0xa30/0xa30 [ 1005.533174] ? check_same_owner+0x340/0x340 [ 1005.537502] ? __check_object_size+0x9d/0x5f2 [ 1005.542102] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1005.547654] __x64_sys_bpf+0x36c/0x510 [ 1005.551549] ? bpf_prog_get+0x20/0x20 [ 1005.555369] do_syscall_64+0x1b9/0x820 [ 1005.559261] ? finish_task_switch+0x1d3/0x890 [ 1005.563777] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1005.568741] ? syscall_return_slowpath+0x31d/0x5e0 13:49:58 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe800000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 1005.573678] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1005.578700] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1005.583749] ? perf_trace_sys_enter+0xb10/0xb10 [ 1005.588424] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1005.593279] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1005.598491] RIP: 0033:0x455ab9 [ 1005.601674] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 13:49:58 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18020000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 1005.620894] RSP: 002b:00007f8952c98c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1005.628612] RAX: ffffffffffffffda RBX: 00007f8952c996d4 RCX: 0000000000455ab9 [ 1005.635892] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000005 [ 1005.643169] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 1005.650449] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 1005.657726] R13: 00000000004bb7f3 R14: 00000000004c8c08 R15: 0000000000000035 13:49:58 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:58 executing program 5 (fault-call:0 fault-nth:54): bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:58 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48]}, 0x48) 13:49:58 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:58 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:58 executing program 3: socketpair(0xa, 0x80000, 0x1ff, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000180)=ANY=[@ANYBLOB="0600000000000000000000000000bf63000000000000000000d34a7498badd6b51edd4d9a5b2938b4ec7bd657dabf8569619e2fca8d2b917876f0853fa5c5b95c96a9e652c42a2d16714cb457d24bb13b3e3e863a6d26b38b5b74bca5b7aea05a7af5d04f93e9d222a5f31ad3d3bfef1c7421d860a01427e281698a5b4373b987ad56108886cb3256c8c93e251e7c9345986d6a40b96e2a4f188966e3ade8fa9b32b5e44b04a15d5c2b931482b8683c821eefcf95371b03926a19248ebe957671b27370d206865"]) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000000)={0x0, 0x0}) sendmsg(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000380), 0x217, &(0x7f0000000180)}, 0x0) recvmsg(r2, &(0x7f000000b7c0)={&(0x7f000000a400)=@can={0x0, 0x0}, 0x80, &(0x7f000000b700)=[{&(0x7f000000b600)=""/218, 0xda}], 0x10000000000000f1, &(0x7f000000b780)=""/15, 0xf}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000b800)={0x3, 0x2, &(0x7f00000003c0)=@raw=[@exit={0x95}], &(0x7f0000000400)='GPL\x00', 0x0, 0x39, &(0x7f0000000440)=""/57, 0x0, 0x1, [], r3}, 0x48) 13:49:58 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0xf, 0x9, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3}, [@exit={0x95}, @jmp={0x5, 0x9, 0x9, 0xb, 0x1, 0xfffffffffffffff4, 0xffffffffffffffff}, @jmp={0x5, 0x7fffffff, 0x9, 0x8, 0x8, 0xfffffffffffffffc, 0xfffffffffffffffd}], {0x95}}, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x62, &(0x7f0000000380)=""/98, 0x41100, 0x0, [], 0x0, 0xf}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x29, 0x5, 0x0) socketpair(0x6, 0x0, 0xffffffffffffff3f, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000000840)={&(0x7f0000000500)=@nfc_llcp, 0x80, &(0x7f0000000700)=[{&(0x7f0000000580)=""/222, 0xde}, {&(0x7f0000000680)=""/10, 0xa}, {&(0x7f00000006c0)=""/11, 0xb}], 0x3, &(0x7f0000000740)=""/228, 0xe4, 0x5}, 0x10001) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f00000004c0)={r4}) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280), 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r5) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r6) socket$kcm(0x2, 0x1, 0x0) [ 1005.785652] FAULT_INJECTION: forcing a failure. [ 1005.785652] name failslab, interval 1, probability 0, space 0, times 0 [ 1005.797006] CPU: 0 PID: 2612 Comm: syz-executor5 Not tainted 4.18.0-rc3+ #58 [ 1005.804263] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1005.813627] Call Trace: [ 1005.816333] dump_stack+0x1c9/0x2b4 [ 1005.819980] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1005.825193] ? kernel_text_address+0x79/0xf0 [ 1005.829621] should_fail.cold.4+0xa/0x1a 13:49:58 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40020000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 1005.833701] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1005.838839] ? save_stack+0xa9/0xd0 [ 1005.842480] ? save_stack+0x43/0xd0 [ 1005.846123] ? __kasan_slab_free+0x11a/0x170 [ 1005.850544] ? kasan_slab_free+0xe/0x10 [ 1005.854527] ? kfree+0xd9/0x260 [ 1005.857827] ? do_check+0x165c/0xb9d0 [ 1005.861637] ? bpf_check+0x3872/0x5e60 [ 1005.865562] ? bpf_prog_load+0x1141/0x1c90 [ 1005.869904] ? __x64_sys_bpf+0x36c/0x510 [ 1005.874013] ? do_syscall_64+0x1b9/0x820 [ 1005.878109] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 13:49:58 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe80]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 1005.883500] ? lock_acquire+0x1e4/0x540 [ 1005.887492] ? fs_reclaim_acquire+0x20/0x20 [ 1005.891832] ? lock_downgrade+0x8f0/0x8f0 [ 1005.895995] ? kasan_check_write+0x14/0x20 [ 1005.900291] ? check_same_owner+0x340/0x340 [ 1005.904918] ? debug_check_no_obj_freed+0x30b/0x595 [ 1005.909949] ? rcu_note_context_switch+0x730/0x730 [ 1005.914899] __should_failslab+0x124/0x180 [ 1005.919155] should_failslab+0x9/0x14 [ 1005.922991] kmem_cache_alloc_trace+0x2cb/0x780 [ 1005.927690] ? __kasan_slab_free+0x131/0x170 [ 1005.932121] ? trace_hardirqs_on+0xd/0x10 13:49:58 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:58 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 1005.936320] do_check+0x10ab/0xb9d0 [ 1005.939968] ? save_stack+0x97/0xd0 [ 1005.943614] ? check_func_arg+0xce0/0xce0 [ 1005.947775] ? kasan_check_write+0x14/0x20 [ 1005.952029] ? do_raw_spin_lock+0xc1/0x200 [ 1005.956280] ? trace_hardirqs_off+0xd/0x10 [ 1005.960531] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 1005.965658] ? debug_check_no_obj_freed+0x30b/0x595 [ 1005.970700] ? trace_hardirqs_off+0xd/0x10 [ 1005.974942] ? quarantine_put+0x10d/0x1b0 [ 1005.979105] ? __kasan_slab_free+0x131/0x170 13:49:59 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff00000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 1005.983519] bpf_check+0x3872/0x5e60 [ 1005.987235] ? pvclock_read_flags+0x160/0x160 [ 1005.991769] ? fixup_bpf_calls+0x1fb0/0x1fb0 [ 1005.996202] ? ktime_get_with_offset+0x32e/0x4b0 [ 1006.000971] ? ktime_get+0x440/0x440 [ 1006.004722] ? memset+0x31/0x40 [ 1006.008034] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1006.013693] ? bpf_obj_name_cpy+0x17c/0x1c0 [ 1006.018030] bpf_prog_load+0x1141/0x1c90 [ 1006.022197] ? bpf_prog_new_fd+0x60/0x60 [ 1006.026268] ? lock_acquire+0x1e4/0x540 [ 1006.030251] ? __might_fault+0x12b/0x1e0 13:49:59 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdffffff00000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 1006.034319] ? lock_downgrade+0x8f0/0x8f0 [ 1006.038474] ? lock_release+0xa30/0xa30 [ 1006.042452] ? check_same_owner+0x340/0x340 [ 1006.046788] ? __check_object_size+0x9d/0x5f2 [ 1006.051307] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1006.056866] __x64_sys_bpf+0x36c/0x510 [ 1006.060765] ? bpf_prog_get+0x20/0x20 [ 1006.064582] do_syscall_64+0x1b9/0x820 [ 1006.068476] ? finish_task_switch+0x1d3/0x890 [ 1006.073027] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1006.077971] ? syscall_return_slowpath+0x31d/0x5e0 13:49:59 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 1006.082936] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1006.087966] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1006.093039] ? perf_trace_sys_enter+0xb10/0xb10 [ 1006.097723] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1006.102589] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1006.107962] RIP: 0033:0x455ab9 [ 1006.111150] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 13:49:59 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700f3ffffecd2987]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 1006.130457] RSP: 002b:00007f8952c98c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1006.138178] RAX: ffffffffffffffda RBX: 00007f8952c996d4 RCX: 0000000000455ab9 [ 1006.145459] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000005 [ 1006.152738] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 1006.160053] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 1006.167328] R13: 00000000004bb7f3 R14: 00000000004c8c08 R15: 0000000000000036 13:49:59 executing program 5 (fault-call:0 fault-nth:55): bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:59 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:59 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:59 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000280a26dde896748b050d600611840"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x10, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x1f3, &(0x7f0000000300)=""/187}, 0x48) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x2, &(0x7f0000000140)=[{0xff, 0x1f, 0x4, 0x4}, {0x8, 0x2, 0x9, 0xffffffff}]}) 13:49:59 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000]}, 0x48) 13:49:59 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1006.282856] FAULT_INJECTION: forcing a failure. [ 1006.282856] name failslab, interval 1, probability 0, space 0, times 0 [ 1006.294192] CPU: 0 PID: 2666 Comm: syz-executor5 Not tainted 4.18.0-rc3+ #58 [ 1006.301427] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1006.310800] Call Trace: [ 1006.313405] dump_stack+0x1c9/0x2b4 [ 1006.317075] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1006.322287] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 1006.327153] ? kernel_text_address+0x79/0xf0 13:49:59 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 1006.331784] should_fail.cold.4+0xa/0x1a [ 1006.335870] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1006.341002] ? save_stack+0xa9/0xd0 [ 1006.344646] ? save_stack+0x43/0xd0 [ 1006.348288] ? __kasan_slab_free+0x11a/0x170 [ 1006.352710] ? kfree+0xd9/0x260 [ 1006.356025] ? do_check+0x165c/0xb9d0 [ 1006.359842] ? bpf_check+0x3872/0x5e60 [ 1006.363750] ? bpf_prog_load+0x1141/0x1c90 [ 1006.368087] ? __x64_sys_bpf+0x36c/0x510 [ 1006.372167] ? do_syscall_64+0x1b9/0x820 [ 1006.376348] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1006.382004] ? lock_acquire+0x1e4/0x540 [ 1006.386283] ? fs_reclaim_acquire+0x20/0x20 [ 1006.390941] ? lock_downgrade+0x8f0/0x8f0 [ 1006.395119] ? check_same_owner+0x340/0x340 [ 1006.399661] ? debug_check_no_obj_freed+0x30b/0x595 [ 1006.405084] ? rcu_note_context_switch+0x730/0x730 [ 1006.410220] __should_failslab+0x124/0x180 [ 1006.414484] should_failslab+0x9/0x14 [ 1006.418295] kmem_cache_alloc_trace+0x2cb/0x780 [ 1006.422991] ? __kasan_slab_free+0x131/0x170 [ 1006.427505] ? trace_hardirqs_on+0xd/0x10 [ 1006.431669] do_check+0x10ab/0xb9d0 [ 1006.435312] ? save_stack+0x97/0xd0 [ 1006.438952] ? check_func_arg+0xce0/0xce0 [ 1006.443112] ? kasan_check_write+0x14/0x20 [ 1006.447346] ? do_raw_spin_lock+0xc1/0x200 [ 1006.451577] ? trace_hardirqs_off+0xd/0x10 [ 1006.455814] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 1006.460907] ? debug_check_no_obj_freed+0x30b/0x595 [ 1006.465928] ? trace_hardirqs_off+0xd/0x10 [ 1006.470156] ? quarantine_put+0x10d/0x1b0 [ 1006.474296] ? __kasan_slab_free+0x131/0x170 [ 1006.478729] bpf_check+0x3872/0x5e60 [ 1006.482464] ? pvclock_read_flags+0x160/0x160 [ 1006.486965] ? fixup_bpf_calls+0x1fb0/0x1fb0 [ 1006.491383] ? ktime_get_with_offset+0x32e/0x4b0 [ 1006.496145] ? ktime_get+0x440/0x440 [ 1006.500566] ? memset+0x31/0x40 [ 1006.503861] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1006.509411] ? bpf_obj_name_cpy+0x17c/0x1c0 [ 1006.513736] bpf_prog_load+0x1141/0x1c90 [ 1006.517802] ? bpf_prog_new_fd+0x60/0x60 [ 1006.521865] ? lock_acquire+0x1e4/0x540 [ 1006.525921] ? __might_fault+0x12b/0x1e0 [ 1006.529995] ? lock_downgrade+0x8f0/0x8f0 [ 1006.534148] ? __check_object_size+0x9d/0x5f2 [ 1006.538640] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1006.544182] __x64_sys_bpf+0x36c/0x510 [ 1006.548067] ? bpf_prog_get+0x20/0x20 [ 1006.551866] do_syscall_64+0x1b9/0x820 [ 1006.555759] ? finish_task_switch+0x1d3/0x890 [ 1006.560249] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1006.565179] ? syscall_return_slowpath+0x31d/0x5e0 [ 1006.570185] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1006.575202] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1006.580222] ? perf_trace_sys_enter+0xb10/0xb10 [ 1006.584880] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1006.589732] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1006.594932] RIP: 0033:0x455ab9 [ 1006.598108] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1006.617303] RSP: 002b:00007f8952c98c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1006.625018] RAX: ffffffffffffffda RBX: 00007f8952c996d4 RCX: 0000000000455ab9 [ 1006.632294] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000005 [ 1006.639567] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 1006.646829] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 1006.654090] R13: 00000000004bb7f3 R14: 00000000004c8c08 R15: 0000000000000037 13:49:59 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000001300"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f00000002c0)={0x5, 0x70, 0x200, 0xe58, 0x7f, 0x8, 0x0, 0x80000000, 0x4, 0x8, 0x10000, 0x9bb, 0x658, 0x7, 0x1cc, 0x1f, 0x3f, 0xfffffffffffffff7, 0x9, 0x9, 0x0, 0x1, 0x8, 0xf953, 0x2, 0x101, 0x5, 0x4, 0x0, 0x4, 0x40, 0x56af7ff8, 0xfe, 0x1, 0x9d53, 0x6, 0x78000000000000, 0x75, 0x0, 0x6c7, 0x6, @perf_bp={&(0x7f0000000280), 0xf}, 0x10000, 0x200, 0x4, 0x5, 0x4, 0x9, 0x10000}) socket$kcm(0x2, 0x1, 0x0) 13:49:59 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:49:59 executing program 5 (fault-call:0 fault-nth:56): bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:49:59 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00000000000000]}, 0x48) 13:49:59 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:59 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:49:59 executing program 3: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000340)}, 0x20) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f0, &(0x7f0000000300)='gre0\x00') socket$kcm(0x29, 0x7, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000000)='vmnet0\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') [ 1006.753309] FAULT_INJECTION: forcing a failure. [ 1006.753309] name failslab, interval 1, probability 0, space 0, times 0 [ 1006.764610] CPU: 0 PID: 2693 Comm: syz-executor5 Not tainted 4.18.0-rc3+ #58 [ 1006.771809] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1006.781173] Call Trace: [ 1006.783782] dump_stack+0x1c9/0x2b4 [ 1006.787428] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1006.792640] ? kasan_check_read+0x11/0x20 [ 1006.796823] ? rcu_is_watching+0x8c/0x150 [ 1006.800998] should_fail.cold.4+0xa/0x1a [ 1006.805084] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1006.810225] ? __kernel_text_address+0xd/0x40 [ 1006.814868] ? unwind_get_return_address+0x61/0xa0 [ 1006.819817] ? __save_stack_trace+0x8d/0xf0 [ 1006.824172] ? lock_acquire+0x1e4/0x540 [ 1006.828177] ? fs_reclaim_acquire+0x20/0x20 [ 1006.832515] ? lock_downgrade+0x8f0/0x8f0 [ 1006.836679] ? fixup_bpf_calls+0xb37/0x1fb0 [ 1006.841023] ? check_same_owner+0x340/0x340 [ 1006.845363] ? __save_stack_trace+0x8d/0xf0 13:49:59 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 1006.849896] ? rcu_note_context_switch+0x730/0x730 [ 1006.854929] __should_failslab+0x124/0x180 [ 1006.859195] should_failslab+0x9/0x14 [ 1006.863032] kmem_cache_alloc_node_trace+0x26f/0x770 [ 1006.868177] ? rcu_note_context_switch+0x730/0x730 [ 1006.873138] alloc_vmap_area+0x14a/0xa70 [ 1006.877238] ? kasan_unpoison_shadow+0x35/0x50 [ 1006.881865] ? kasan_kmalloc+0xc4/0xe0 [ 1006.885790] ? purge_vmap_area_lazy+0x40/0x40 [ 1006.890322] ? kasan_check_read+0x11/0x20 [ 1006.894481] ? rcu_is_watching+0x8c/0x150 [ 1006.898671] __get_vm_area_node+0x17e/0x390 13:49:59 executing program 3: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000340)}, 0x20) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f0, &(0x7f0000000300)='gre0\x00') socket$kcm(0x29, 0x7, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000000)='vmnet0\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') [ 1006.903016] __vmalloc_node_range+0xc4/0x760 [ 1006.907441] ? bpf_patch_insn_data+0xf3/0x320 [ 1006.911974] ? bpf_adj_branches+0x45d/0x4b0 [ 1006.916333] ? bpf_patch_insn_data+0xf3/0x320 [ 1006.920860] vzalloc+0x6f/0x80 [ 1006.924069] ? bpf_patch_insn_data+0xf3/0x320 [ 1006.928595] bpf_patch_insn_data+0xf3/0x320 [ 1006.932929] ? save_stack+0xa9/0xd0 [ 1006.936572] fixup_bpf_calls+0xb37/0x1fb0 [ 1006.940751] ? bpf_prog_load+0x1141/0x1c90 [ 1006.945001] ? convert_ctx_accesses+0x1310/0x1310 [ 1006.949875] ? do_check+0xb9d0/0xb9d0 13:49:59 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f010000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 1006.953704] ? trace_hardirqs_off+0xd/0x10 [ 1006.957977] ? quarantine_put+0x10d/0x1b0 [ 1006.962137] ? cmp_subprogs+0x16/0x90 [ 1006.965968] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1006.971542] ? bsearch+0xa6/0xc0 [ 1006.974943] ? __reg_deduce_bounds+0x190/0x190 [ 1006.979536] ? find_subprog+0xbb/0x100 [ 1006.983431] ? find_good_pkt_pointers+0x630/0x630 [ 1006.988282] ? trace_hardirqs_on+0xd/0x10 [ 1006.992437] bpf_check+0x2426/0x5e60 [ 1006.996161] ? pvclock_read_flags+0x160/0x160 [ 1007.000685] ? fixup_bpf_calls+0x1fb0/0x1fb0 [ 1007.005097] ? ktime_get_with_offset+0x32e/0x4b0 [ 1007.009870] ? ktime_get+0x440/0x440 [ 1007.013597] ? memset+0x31/0x40 [ 1007.016892] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1007.022435] ? bpf_obj_name_cpy+0x17c/0x1c0 [ 1007.026789] bpf_prog_load+0x1141/0x1c90 [ 1007.030860] ? bpf_prog_new_fd+0x60/0x60 [ 1007.034933] ? lock_acquire+0x1e4/0x540 [ 1007.038952] ? __might_fault+0x12b/0x1e0 [ 1007.043021] ? lock_downgrade+0x8f0/0x8f0 [ 1007.047178] ? lock_release+0xa30/0xa30 [ 1007.051164] ? check_same_owner+0x340/0x340 [ 1007.055492] ? __check_object_size+0x9d/0x5f2 [ 1007.059993] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1007.065524] __x64_sys_bpf+0x36c/0x510 [ 1007.069397] ? bpf_prog_get+0x20/0x20 [ 1007.073198] do_syscall_64+0x1b9/0x820 [ 1007.077092] ? finish_task_switch+0x1d3/0x890 [ 1007.081587] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1007.086506] ? syscall_return_slowpath+0x31d/0x5e0 [ 1007.091519] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1007.096531] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1007.101537] ? perf_trace_sys_enter+0xb10/0xb10 [ 1007.106203] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1007.111040] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1007.116215] RIP: 0033:0x455ab9 [ 1007.119387] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1007.138525] RSP: 002b:00007f8952c98c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1007.146220] RAX: ffffffffffffffda RBX: 00007f8952c996d4 RCX: 0000000000455ab9 [ 1007.153487] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000005 [ 1007.160761] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 1007.168030] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 1007.175477] R13: 00000000004bb7f3 R14: 00000000004c8c08 R15: 0000000000000038 [ 1007.182905] syz-executor5: vmalloc: allocation failure: 312 bytes, mode:0x6080c0(GFP_KERNEL|__GFP_ZERO), nodemask=(null) [ 1007.193956] syz-executor5 cpuset=syz5 mems_allowed=0 [ 1007.199099] CPU: 0 PID: 2693 Comm: syz-executor5 Not tainted 4.18.0-rc3+ #58 [ 1007.206279] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1007.215643] Call Trace: [ 1007.218240] dump_stack+0x1c9/0x2b4 [ 1007.221866] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1007.227054] ? trace_hardirqs_off+0xd/0x10 [ 1007.231293] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 1007.236396] warn_alloc.cold.118+0xb7/0x1bd [ 1007.240725] ? zone_watermark_ok_safe+0x3d0/0x3d0 [ 1007.245563] ? quarantine_put+0x10d/0x1b0 [ 1007.249698] ? __kasan_slab_free+0x131/0x170 [ 1007.254105] ? __get_vm_area_node+0x2da/0x390 [ 1007.258598] __vmalloc_node_range+0x472/0x760 [ 1007.263095] ? bpf_adj_branches+0x45d/0x4b0 [ 1007.267417] ? bpf_patch_insn_data+0xf3/0x320 [ 1007.271913] vzalloc+0x6f/0x80 [ 1007.275104] ? bpf_patch_insn_data+0xf3/0x320 [ 1007.279609] bpf_patch_insn_data+0xf3/0x320 [ 1007.283929] ? save_stack+0xa9/0xd0 [ 1007.287556] fixup_bpf_calls+0xb37/0x1fb0 [ 1007.291710] ? bpf_prog_load+0x1141/0x1c90 [ 1007.295944] ? convert_ctx_accesses+0x1310/0x1310 [ 1007.300793] ? do_check+0xb9d0/0xb9d0 [ 1007.304600] ? trace_hardirqs_off+0xd/0x10 [ 1007.308824] ? quarantine_put+0x10d/0x1b0 [ 1007.312957] ? cmp_subprogs+0x16/0x90 [ 1007.316756] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1007.322285] ? bsearch+0xa6/0xc0 [ 1007.325656] ? __reg_deduce_bounds+0x190/0x190 [ 1007.330244] ? find_subprog+0xbb/0x100 [ 1007.334136] ? find_good_pkt_pointers+0x630/0x630 [ 1007.338973] ? trace_hardirqs_on+0xd/0x10 [ 1007.343127] bpf_check+0x2426/0x5e60 [ 1007.346828] ? pvclock_read_flags+0x160/0x160 [ 1007.351327] ? fixup_bpf_calls+0x1fb0/0x1fb0 [ 1007.355738] ? ktime_get_with_offset+0x32e/0x4b0 [ 1007.360500] ? ktime_get+0x440/0x440 [ 1007.364202] ? memset+0x31/0x40 [ 1007.367918] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1007.374762] ? bpf_obj_name_cpy+0x17c/0x1c0 [ 1007.379074] bpf_prog_load+0x1141/0x1c90 [ 1007.383138] ? bpf_prog_new_fd+0x60/0x60 [ 1007.387229] ? lock_acquire+0x1e4/0x540 [ 1007.391195] ? __might_fault+0x12b/0x1e0 [ 1007.395266] ? lock_downgrade+0x8f0/0x8f0 [ 1007.399401] ? lock_release+0xa30/0xa30 [ 1007.403974] ? check_same_owner+0x340/0x340 [ 1007.408289] ? __check_object_size+0x9d/0x5f2 [ 1007.412779] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1007.418321] __x64_sys_bpf+0x36c/0x510 [ 1007.422199] ? bpf_prog_get+0x20/0x20 [ 1007.425993] do_syscall_64+0x1b9/0x820 [ 1007.429880] ? finish_task_switch+0x1d3/0x890 [ 1007.434377] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1007.439305] ? syscall_return_slowpath+0x31d/0x5e0 [ 1007.444244] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1007.449258] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1007.454268] ? perf_trace_sys_enter+0xb10/0xb10 [ 1007.458928] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1007.463777] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1007.468962] RIP: 0033:0x455ab9 [ 1007.472137] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1007.491337] RSP: 002b:00007f8952c98c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1007.499045] RAX: ffffffffffffffda RBX: 00007f8952c996d4 RCX: 0000000000455ab9 [ 1007.506314] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000005 [ 1007.513570] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 1007.520836] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 1007.528109] R13: 00000000004bb7f3 R14: 00000000004c8c08 R15: 0000000000000038 [ 1007.535409] Mem-Info: [ 1007.537909] active_anon:20016 inactive_anon:3905 isolated_anon:0 [ 1007.537909] active_file:5718 inactive_file:15220 isolated_file:0 [ 1007.537909] unevictable:0 dirty:130 writeback:0 unstable:0 [ 1007.537909] slab_reclaimable:13826 slab_unreclaimable:100543 [ 1007.537909] mapped:75566 shmem:4441 pagetables:945 bounce:0 [ 1007.537909] free:1373042 free_pcp:417 free_cma:0 [ 1007.572104] Node 0 active_anon:80064kB inactive_anon:15620kB active_file:22872kB inactive_file:60880kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:302264kB dirty:520kB writeback:0kB shmem:17764kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 55296kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1007.600487] Node 0 DMA free:15908kB min:164kB low:204kB high:244kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1007.626660] lowmem_reserve[]: 0 2827 6331 6331 [ 1007.631337] Node 0 DMA32 free:2898208kB min:30100kB low:37624kB high:45148kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129292kB managed:2898892kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:684kB local_pcp:684kB free_cma:0kB [ 1007.659075] lowmem_reserve[]: 0 0 3504 3504 [ 1007.663446] Node 0 Normal free:2577948kB min:37316kB low:46644kB high:55972kB active_anon:80064kB inactive_anon:15620kB active_file:22872kB inactive_file:60880kB unevictable:0kB writepending:520kB present:4718592kB managed:3589008kB mlocked:0kB kernel_stack:5600kB pagetables:3780kB bounce:0kB free_pcp:932kB local_pcp:376kB free_cma:0kB [ 1007.693426] lowmem_reserve[]: 0 0 0 0 [ 1007.697250] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 1007.711185] Node 0 DMA32: 2*4kB (M) 5*8kB (M) 1*16kB (M) 5*32kB (M) 1*64kB (M) 2*128kB (M) 1*256kB (M) 3*512kB (M) 4*1024kB (M) 2*2048kB (M) 705*4096kB (M) = 2898208kB [ 1007.726428] Node 0 Normal: 223*4kB (UME) 144*8kB (UME) 181*16kB (U) 107*32kB (UME) 48*64kB (UME) 13*128kB (UME) 69*256kB (UME) 81*512kB (UM) 59*1024kB (UM) 3*2048kB (UME) 595*4096kB (UM) = 2575916kB [ 1007.744532] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1007.753124] 25393 total pagecache pages 13:50:00 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:50:00 executing program 3: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000340)}, 0x20) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f0, &(0x7f0000000300)='gre0\x00') socket$kcm(0x29, 0x7, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000000)='vmnet0\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 13:50:00 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 1007.757124] 0 pages in swap cache [ 1007.760634] Swap cache stats: add 0, delete 0, find 0/0 [ 1007.766025] Free swap = 0kB [ 1007.769049] Total swap = 0kB [ 1007.772118] 1965969 pages RAM [ 1007.775231] 0 pages HighMem/MovableOnly [ 1007.779222] 340017 pages reserved 13:50:00 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:50:00 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000]}, 0x48) 13:50:00 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:50:00 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socketpair(0x11, 0x8000e, 0x3, &(0x7f0000000280)={0xffffffffffffffff}) openat$cgroup(r2, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) socket$kcm(0x2, 0x1, 0x0) 13:50:00 executing program 5 (fault-call:0 fault-nth:57): bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:00 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:50:00 executing program 3: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000340)}, 0x20) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f0, &(0x7f0000000300)='gre0\x00') socket$kcm(0x29, 0x7, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000000)='vmnet0\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 13:50:00 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:50:00 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000]}, 0x48) [ 1007.935015] FAULT_INJECTION: forcing a failure. [ 1007.935015] name failslab, interval 1, probability 0, space 0, times 0 [ 1007.946381] CPU: 0 PID: 2750 Comm: syz-executor5 Not tainted 4.18.0-rc3+ #58 [ 1007.953576] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1007.962958] Call Trace: [ 1007.965561] dump_stack+0x1c9/0x2b4 [ 1007.969316] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1007.974530] ? kasan_check_read+0x11/0x20 [ 1007.978695] ? rcu_is_watching+0x8c/0x150 [ 1007.982867] should_fail.cold.4+0xa/0x1a [ 1007.986949] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1007.992077] ? __kernel_text_address+0xd/0x40 [ 1007.996578] ? unwind_get_return_address+0x61/0xa0 [ 1008.001516] ? __save_stack_trace+0x8d/0xf0 [ 1008.005864] ? lock_acquire+0x1e4/0x540 [ 1008.009863] ? fs_reclaim_acquire+0x20/0x20 [ 1008.014183] ? lock_downgrade+0x8f0/0x8f0 [ 1008.018318] ? fixup_bpf_calls+0xb37/0x1fb0 [ 1008.022632] ? check_same_owner+0x340/0x340 [ 1008.026941] ? __save_stack_trace+0x8d/0xf0 [ 1008.031252] ? rcu_note_context_switch+0x730/0x730 [ 1008.036187] __should_failslab+0x124/0x180 [ 1008.040415] should_failslab+0x9/0x14 [ 1008.044234] kmem_cache_alloc_node_trace+0x26f/0x770 [ 1008.049340] ? rcu_note_context_switch+0x730/0x730 [ 1008.054266] alloc_vmap_area+0x14a/0xa70 [ 1008.058341] ? kasan_unpoison_shadow+0x35/0x50 [ 1008.062939] ? kasan_kmalloc+0xc4/0xe0 [ 1008.066821] ? purge_vmap_area_lazy+0x40/0x40 [ 1008.071321] ? kasan_check_read+0x11/0x20 [ 1008.075635] ? rcu_is_watching+0x8c/0x150 [ 1008.079877] __get_vm_area_node+0x17e/0x390 [ 1008.084204] __vmalloc_node_range+0xc4/0x760 [ 1008.088637] ? bpf_patch_insn_data+0xf3/0x320 [ 1008.093145] ? bpf_adj_branches+0x45d/0x4b0 [ 1008.097475] ? bpf_patch_insn_data+0xf3/0x320 [ 1008.101970] vzalloc+0x6f/0x80 [ 1008.105163] ? bpf_patch_insn_data+0xf3/0x320 [ 1008.109657] bpf_patch_insn_data+0xf3/0x320 [ 1008.113981] ? save_stack+0xa9/0xd0 [ 1008.117609] fixup_bpf_calls+0xb37/0x1fb0 [ 1008.121740] ? bpf_prog_load+0x1141/0x1c90 [ 1008.125964] ? convert_ctx_accesses+0x1310/0x1310 [ 1008.130800] ? do_check+0xb9d0/0xb9d0 [ 1008.134593] ? trace_hardirqs_off+0xd/0x10 [ 1008.138816] ? quarantine_put+0x10d/0x1b0 [ 1008.142965] ? cmp_subprogs+0x16/0x90 [ 1008.146758] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1008.152282] ? bsearch+0xa6/0xc0 [ 1008.155635] ? __reg_deduce_bounds+0x190/0x190 [ 1008.160206] ? find_subprog+0xbb/0x100 [ 1008.164084] ? find_good_pkt_pointers+0x630/0x630 [ 1008.168919] ? trace_hardirqs_on+0xd/0x10 [ 1008.173083] bpf_check+0x2426/0x5e60 [ 1008.176787] ? pvclock_read_flags+0x160/0x160 [ 1008.181389] ? fixup_bpf_calls+0x1fb0/0x1fb0 [ 1008.185798] ? ktime_get_with_offset+0x32e/0x4b0 [ 1008.190661] ? ktime_get+0x440/0x440 [ 1008.194375] ? memset+0x31/0x40 [ 1008.197666] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1008.203197] ? bpf_obj_name_cpy+0x17c/0x1c0 [ 1008.207504] bpf_prog_load+0x1141/0x1c90 [ 1008.211564] ? bpf_prog_new_fd+0x60/0x60 [ 1008.215636] ? lock_acquire+0x1e4/0x540 [ 1008.219605] ? __might_fault+0x12b/0x1e0 [ 1008.223675] ? lock_downgrade+0x8f0/0x8f0 [ 1008.227814] ? lock_release+0xa30/0xa30 [ 1008.231792] ? check_same_owner+0x340/0x340 [ 1008.236109] ? __check_object_size+0x9d/0x5f2 [ 1008.240648] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1008.246183] __x64_sys_bpf+0x36c/0x510 [ 1008.250069] ? bpf_prog_get+0x20/0x20 [ 1008.253862] do_syscall_64+0x1b9/0x820 [ 1008.257740] ? finish_task_switch+0x1d3/0x890 [ 1008.262240] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1008.267162] ? syscall_return_slowpath+0x31d/0x5e0 [ 1008.272111] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1008.277127] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1008.282165] ? perf_trace_sys_enter+0xb10/0xb10 [ 1008.286882] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1008.291733] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1008.296919] RIP: 0033:0x455ab9 [ 1008.300275] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1008.319413] RSP: 002b:00007f8952c98c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1008.327126] RAX: ffffffffffffffda RBX: 00007f8952c996d4 RCX: 0000000000455ab9 [ 1008.334411] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000005 [ 1008.341686] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 1008.348949] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 1008.356215] R13: 00000000004bb7f3 R14: 00000000004c8c08 R15: 0000000000000039 [ 1008.363746] syz-executor5: vmalloc: allocation failure: 312 bytes, mode:0x6080c0(GFP_KERNEL|__GFP_ZERO), nodemask=(null) [ 1008.374787] syz-executor5 cpuset=syz5 mems_allowed=0 [ 1008.379931] CPU: 0 PID: 2750 Comm: syz-executor5 Not tainted 4.18.0-rc3+ #58 [ 1008.387140] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1008.396490] Call Trace: [ 1008.399079] dump_stack+0x1c9/0x2b4 [ 1008.402714] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1008.407916] ? trace_hardirqs_off+0xd/0x10 [ 1008.412148] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 1008.417252] warn_alloc.cold.118+0xb7/0x1bd [ 1008.421566] ? zone_watermark_ok_safe+0x3d0/0x3d0 [ 1008.426395] ? quarantine_put+0x10d/0x1b0 [ 1008.430544] ? __kasan_slab_free+0x131/0x170 [ 1008.434946] ? __get_vm_area_node+0x2da/0x390 [ 1008.439430] __vmalloc_node_range+0x472/0x760 [ 1008.443923] ? bpf_adj_branches+0x45d/0x4b0 [ 1008.448240] ? bpf_patch_insn_data+0xf3/0x320 [ 1008.452720] vzalloc+0x6f/0x80 [ 1008.455902] ? bpf_patch_insn_data+0xf3/0x320 [ 1008.460382] bpf_patch_insn_data+0xf3/0x320 [ 1008.464698] ? save_stack+0xa9/0xd0 [ 1008.468322] fixup_bpf_calls+0xb37/0x1fb0 [ 1008.472472] ? bpf_prog_load+0x1141/0x1c90 [ 1008.476696] ? convert_ctx_accesses+0x1310/0x1310 [ 1008.481544] ? do_check+0xb9d0/0xb9d0 [ 1008.485351] ? trace_hardirqs_off+0xd/0x10 [ 1008.489592] ? quarantine_put+0x10d/0x1b0 [ 1008.493758] ? cmp_subprogs+0x16/0x90 [ 1008.497551] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1008.503788] ? bsearch+0xa6/0xc0 [ 1008.507156] ? __reg_deduce_bounds+0x190/0x190 [ 1008.511742] ? find_subprog+0xbb/0x100 [ 1008.515635] ? find_good_pkt_pointers+0x630/0x630 [ 1008.520476] ? trace_hardirqs_on+0xd/0x10 [ 1008.524621] bpf_check+0x2426/0x5e60 [ 1008.528331] ? pvclock_read_flags+0x160/0x160 [ 1008.532833] ? fixup_bpf_calls+0x1fb0/0x1fb0 [ 1008.537229] ? ktime_get_with_offset+0x32e/0x4b0 [ 1008.541977] ? ktime_get+0x440/0x440 [ 1008.545703] ? memset+0x31/0x40 [ 1008.548972] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1008.554506] ? bpf_obj_name_cpy+0x17c/0x1c0 [ 1008.558833] bpf_prog_load+0x1141/0x1c90 [ 1008.562897] ? bpf_prog_new_fd+0x60/0x60 [ 1008.566978] ? lock_acquire+0x1e4/0x540 [ 1008.570954] ? __might_fault+0x12b/0x1e0 [ 1008.575030] ? lock_downgrade+0x8f0/0x8f0 [ 1008.579183] ? lock_release+0xa30/0xa30 [ 1008.583166] ? check_same_owner+0x340/0x340 [ 1008.587504] ? __check_object_size+0x9d/0x5f2 [ 1008.591994] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1008.597526] __x64_sys_bpf+0x36c/0x510 [ 1008.601422] ? bpf_prog_get+0x20/0x20 [ 1008.605238] do_syscall_64+0x1b9/0x820 [ 1008.609116] ? finish_task_switch+0x1d3/0x890 [ 1008.613616] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1008.618560] ? syscall_return_slowpath+0x31d/0x5e0 [ 1008.623490] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1008.628593] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1008.633608] ? perf_trace_sys_enter+0xb10/0xb10 [ 1008.638266] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1008.643098] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1008.648289] RIP: 0033:0x455ab9 [ 1008.651458] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1008.670689] RSP: 002b:00007f8952c98c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1008.678405] RAX: ffffffffffffffda RBX: 00007f8952c996d4 RCX: 0000000000455ab9 [ 1008.685679] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000005 [ 1008.692947] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 1008.700225] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 1008.707495] R13: 00000000004bb7f3 R14: 00000000004c8c08 R15: 0000000000000039 [ 1008.714818] Mem-Info: [ 1008.717273] active_anon:18409 inactive_anon:3908 isolated_anon:0 [ 1008.717273] active_file:5720 inactive_file:15233 isolated_file:0 [ 1008.717273] unevictable:0 dirty:168 writeback:0 unstable:0 [ 1008.717273] slab_reclaimable:13825 slab_unreclaimable:100519 [ 1008.717273] mapped:75530 shmem:4441 pagetables:914 bounce:0 [ 1008.717273] free:1374626 free_pcp:418 free_cma:0 [ 1008.751224] Node 0 active_anon:75756kB inactive_anon:15620kB active_file:22880kB inactive_file:60980kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:302096kB dirty:680kB writeback:0kB shmem:17764kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 59392kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1008.779531] Node 0 DMA free:15908kB min:164kB low:204kB high:244kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1008.805682] lowmem_reserve[]: 0 2827 6331 6331 [ 1008.810310] Node 0 DMA32 free:2898208kB min:30100kB low:37624kB high:45148kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129292kB managed:2898892kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:684kB local_pcp:684kB free_cma:0kB [ 1008.838110] lowmem_reserve[]: 0 0 3504 3504 [ 1008.842478] Node 0 Normal free:2582492kB min:37316kB low:46644kB high:55972kB active_anon:75756kB inactive_anon:15620kB active_file:22880kB inactive_file:60980kB unevictable:0kB writepending:680kB present:4718592kB managed:3589008kB mlocked:0kB kernel_stack:5664kB pagetables:3628kB bounce:0kB free_pcp:1048kB local_pcp:416kB free_cma:0kB [ 1008.872480] lowmem_reserve[]: 0 0 0 0 [ 1008.876301] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 1008.890060] Node 0 DMA32: 2*4kB (M) 5*8kB (M) 1*16kB (M) 5*32kB (M) 1*64kB (M) 2*128kB (M) 1*256kB (M) 3*512kB (M) 4*1024kB (M) 2*2048kB (M) 705*4096kB (M) = 2898208kB [ 1008.905278] Node 0 Normal: 300*4kB (UME) 124*8kB (UME) 201*16kB (U) 103*32kB (UME) 48*64kB (UME) 13*128kB (UME) 69*256kB (UME) 81*512kB (UM) 59*1024kB (UM) 2*2048kB (UE) 597*4096kB (UM) = 2582400kB [ 1008.923064] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1008.931676] 25405 total pagecache pages [ 1008.935666] 0 pages in swap cache [ 1008.939139] Swap cache stats: add 0, delete 0, find 0/0 [ 1008.944513] Free swap = 0kB [ 1008.947540] Total swap = 0kB [ 1008.950679] 1965969 pages RAM [ 1008.953789] 0 pages HighMem/MovableOnly [ 1008.957803] 340017 pages reserved 13:50:02 executing program 3: perf_event_open(&(0x7f0000014f88)={0x1, 0x70, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000014f88)={0x1, 0x70, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 13:50:02 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:50:02 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:50:02 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f00000007c0)={&(0x7f0000000540)=@pptp={0x0, 0x0, {0x0, @local}}, 0x80, &(0x7f0000000680)=[{&(0x7f00000005c0)=""/89, 0x59}, {&(0x7f0000000640)=""/53, 0x35}], 0x2, &(0x7f00000006c0)=""/209, 0xd1, 0x7}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x10c, &(0x7f00000002c0)=ANY=[], &(0x7f0000000280)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251, 0x41100}, 0x48) r4 = gettid() recvmsg(r1, &(0x7f00000008c0)={&(0x7f0000000400)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000800)=""/173, 0xad}], 0x1, &(0x7f00000004c0)=""/52, 0x34, 0xfff}, 0x40000000) sendmsg$kcm(r5, &(0x7f0000000a40)={&(0x7f0000000900)=@pptp={0x18, 0x2, {0x2, @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000980)="4ea26928a43f6f2a8c79d9e051eb023efd482372122d010022a3261b5dbde3ce92f05d9ceac4ec6f0bf8fdc5", 0x2c}, {&(0x7f00000009c0)="ee7abe4bc93dd5cf2307ba5e92f7024750d98975cf0ef1085c1455ea9bdcd2e678b45e924c4332283c86d27711c6", 0x2e}], 0x2, 0x0, 0x0, 0x44001}, 0x40000) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r6, 0x800454cf, &(0x7f0000000380)) perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x81, 0x3, 0x2, 0xfff, 0x0, 0x8c, 0x4402, 0xe, 0x2027, 0xa7, 0x7, 0x2, 0xd54, 0x101, 0x32, 0x1000, 0x3, 0x79d, 0x401, 0x2, 0xd5f6, 0x6, 0x6, 0x1a88, 0x9, 0x40, 0x7, 0x2, 0x400, 0x10001, 0x67, 0x8001, 0x8, 0x3000000, 0x7f, 0x4c, 0x0, 0x101, 0x2, @perf_config_ext={0x366, 0x1}, 0x8, 0x9, 0x8, 0x0, 0x3, 0x3, 0xfffffffffffffffd}, r4, 0x2, 0xffffffffffffff9c, 0xb) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r3) socket$kcm(0x2, 0x1, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000003c0)=0xfffffffffffeffff, 0x4) 13:50:02 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5a000000]}, 0x48) 13:50:02 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:50:02 executing program 5 (fault-call:0 fault-nth:58): bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:02 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:50:02 executing program 3: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='vboxnet1\x00', 0xffffffffffffff9c}, 0x10) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000001c0)={0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}) r1 = perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000002c0)="63707526a00a7c0a0000010000039cd3060000001d3d0b0a1c60666f8dcc6d5c76fd2e9e09626b31deea1b0d3b8184872d58b62cc5b4223726b5797482fb1d83e6f82e2d6d0af3b128e9604401695c8d6c866c68a8fc80de2c4b74f41ac55d593b0906be2aaa26bd16785186f3d61afdd00427799b7ce4b70845ed9780731957b75bf0253e4d4df570013200bbbe9d7235af657010520b26afa8247f3756ed4c4a34cf9040d5540acac2865fc1ce8ded62538de97482f4317a7772e66f88e5e3e7476378c03c51ba15f6517d0f30e19b91498dfde4bb73bf298ad052c3c12c62201c2349527a36fe4a7edad75fbe1fe586b17800") ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000040)="63707526a00a7c0a0000010000039cd3060000001d3d0b0a1c60666f8dcc6d5c76fd2e9e09626b31deea1b0d3b8184872d58b62cc5b4223726b5797482fb1d83e6f82e2d6d0af3b128e9604401695c8d6c866c68a8fc80de2c4b74f41ac55d593b0906be2aaa26bd16785186f3d61afdd00427799b7ce4b70845ed9780731957b75bf0253e4d4df570013200bbbe9d7235af657010520b26afa8247f3756ed4c4a34cf9040d5540acac2865fc1ce8ded62538de97482f4317a7772e66f88e5e3e7476378c03c51ba15f6517d0f30e19b91498dfde4bb73bf298ad052c3c12c62201c2349527a36fe4a7edad75fbe1fe586b17800") 13:50:02 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00]}, 0x48) [ 1009.154046] FAULT_INJECTION: forcing a failure. [ 1009.154046] name failslab, interval 1, probability 0, space 0, times 0 [ 1009.165415] CPU: 0 PID: 2797 Comm: syz-executor5 Not tainted 4.18.0-rc3+ #58 [ 1009.172618] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1009.183910] Call Trace: [ 1009.186546] dump_stack+0x1c9/0x2b4 [ 1009.190233] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1009.195468] ? perf_trace_lock_acquire+0xeb/0x9a0 13:50:02 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 1009.200337] ? kasan_check_read+0x11/0x20 [ 1009.204627] ? rcu_is_watching+0x8c/0x150 [ 1009.208809] should_fail.cold.4+0xa/0x1a [ 1009.212919] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1009.218040] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1009.222824] ? retint_kernel+0x10/0x10 [ 1009.226748] ? do_syscall_64+0x1b9/0x820 [ 1009.230846] ? lock_acquire+0x1e4/0x540 [ 1009.234925] ? fs_reclaim_acquire+0x20/0x20 [ 1009.239293] ? lock_downgrade+0x8f0/0x8f0 [ 1009.243492] ? check_same_owner+0x340/0x340 [ 1009.247842] ? __save_stack_trace+0x8d/0xf0 13:50:02 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 1009.252210] ? rcu_note_context_switch+0x730/0x730 [ 1009.257171] __should_failslab+0x124/0x180 [ 1009.261461] should_failslab+0x9/0x14 [ 1009.265284] kmem_cache_alloc_node_trace+0x26f/0x770 [ 1009.270440] ? rcu_note_context_switch+0x730/0x730 [ 1009.275406] alloc_vmap_area+0x14a/0xa70 [ 1009.279672] ? kasan_unpoison_shadow+0x35/0x50 [ 1009.284284] ? kasan_kmalloc+0xc4/0xe0 [ 1009.288218] ? purge_vmap_area_lazy+0x40/0x40 [ 1009.292745] ? kasan_check_read+0x11/0x20 [ 1009.297008] ? rcu_is_watching+0x8c/0x150 13:50:02 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 1009.301188] __get_vm_area_node+0x17e/0x390 [ 1009.305656] __vmalloc_node_range+0xc4/0x760 [ 1009.310181] ? bpf_patch_insn_data+0xf3/0x320 [ 1009.314703] ? bpf_adj_branches+0x45d/0x4b0 [ 1009.319072] ? bpf_patch_insn_data+0xf3/0x320 [ 1009.323616] vzalloc+0x6f/0x80 [ 1009.326838] ? bpf_patch_insn_data+0xf3/0x320 [ 1009.331373] bpf_patch_insn_data+0xf3/0x320 [ 1009.335719] ? save_stack+0xa9/0xd0 [ 1009.339409] fixup_bpf_calls+0xb37/0x1fb0 [ 1009.343569] ? bpf_prog_load+0x1141/0x1c90 [ 1009.348701] ? convert_ctx_accesses+0x1310/0x1310 13:50:02 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 1009.353568] ? do_check+0xb9d0/0xb9d0 [ 1009.357411] ? trace_hardirqs_off+0xd/0x10 [ 1009.361708] ? quarantine_put+0x10d/0x1b0 [ 1009.365878] ? cmp_subprogs+0x16/0x90 [ 1009.369708] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1009.376144] ? bsearch+0xa6/0xc0 [ 1009.380930] ? __reg_deduce_bounds+0x190/0x190 [ 1009.385591] ? find_subprog+0xbb/0x100 [ 1009.398828] ? find_good_pkt_pointers+0x630/0x630 13:50:02 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 1009.403786] ? trace_hardirqs_on+0xd/0x10 [ 1009.409105] bpf_check+0x2426/0x5e60 [ 1009.412852] ? pvclock_read_flags+0x160/0x160 [ 1009.417428] ? fixup_bpf_calls+0x1fb0/0x1fb0 [ 1009.421852] ? ktime_get_with_offset+0x32e/0x4b0 [ 1009.426632] ? ktime_get+0x440/0x440 [ 1009.430369] ? memset+0x31/0x40 [ 1009.433692] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1009.439280] ? bpf_obj_name_cpy+0x17c/0x1c0 [ 1009.443622] bpf_prog_load+0x1141/0x1c90 [ 1009.447717] ? bpf_prog_new_fd+0x60/0x60 [ 1009.451805] ? lock_acquire+0x1e4/0x540 13:50:02 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x240]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 1009.455971] ? __might_fault+0x12b/0x1e0 [ 1009.460052] ? lock_downgrade+0x8f0/0x8f0 [ 1009.464258] ? __check_object_size+0x9d/0x5f2 [ 1009.468783] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1009.474346] __x64_sys_bpf+0x36c/0x510 [ 1009.478261] ? bpf_prog_get+0x20/0x20 [ 1009.482307] do_syscall_64+0x1b9/0x820 [ 1009.486224] ? finish_task_switch+0x1d3/0x890 [ 1009.490743] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1009.495694] ? syscall_return_slowpath+0x31d/0x5e0 [ 1009.501355] ? prepare_exit_to_usermode+0x3b0/0x3b0 13:50:02 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11f]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 1009.506389] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1009.511428] ? perf_trace_sys_enter+0xb10/0xb10 [ 1009.516290] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1009.521154] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1009.526358] RIP: 0033:0x455ab9 [ 1009.529568] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1009.548887] RSP: 002b:00007f8952c98c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1009.556616] RAX: ffffffffffffffda RBX: 00007f8952c996d4 RCX: 0000000000455ab9 [ 1009.563901] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000005 [ 1009.571178] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 1009.578552] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 1009.586003] R13: 00000000004bb7f3 R14: 00000000004c8c08 R15: 000000000000003a [ 1009.593514] syz-executor5: vmalloc: allocation failure: 312 bytes, mode:0x6080c0(GFP_KERNEL|__GFP_ZERO), nodemask=(null) [ 1009.604641] syz-executor5 cpuset=syz5 mems_allowed=0 [ 1009.609813] CPU: 0 PID: 2797 Comm: syz-executor5 Not tainted 4.18.0-rc3+ #58 [ 1009.617011] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1009.626376] Call Trace: [ 1009.628971] dump_stack+0x1c9/0x2b4 [ 1009.632601] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1009.637793] ? trace_hardirqs_off+0xd/0x10 [ 1009.642039] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 1009.647157] warn_alloc.cold.118+0xb7/0x1bd [ 1009.651468] ? zone_watermark_ok_safe+0x3d0/0x3d0 [ 1009.656339] ? quarantine_put+0x10d/0x1b0 [ 1009.660542] ? __kasan_slab_free+0x131/0x170 [ 1009.664983] ? __get_vm_area_node+0x2da/0x390 [ 1009.669482] __vmalloc_node_range+0x472/0x760 [ 1009.673984] ? bpf_adj_branches+0x45d/0x4b0 [ 1009.678306] ? bpf_patch_insn_data+0xf3/0x320 [ 1009.682811] vzalloc+0x6f/0x80 [ 1009.686015] ? bpf_patch_insn_data+0xf3/0x320 [ 1009.690523] bpf_patch_insn_data+0xf3/0x320 [ 1009.694852] ? save_stack+0xa9/0xd0 [ 1009.698480] fixup_bpf_calls+0xb37/0x1fb0 [ 1009.702621] ? bpf_prog_load+0x1141/0x1c90 [ 1009.706861] ? convert_ctx_accesses+0x1310/0x1310 [ 1009.711719] ? do_check+0xb9d0/0xb9d0 [ 1009.715541] ? trace_hardirqs_off+0xd/0x10 [ 1009.719769] ? quarantine_put+0x10d/0x1b0 [ 1009.723912] ? cmp_subprogs+0x16/0x90 [ 1009.727719] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1009.733347] ? bsearch+0xa6/0xc0 [ 1009.736717] ? __reg_deduce_bounds+0x190/0x190 [ 1009.741298] ? find_subprog+0xbb/0x100 [ 1009.745176] ? find_good_pkt_pointers+0x630/0x630 [ 1009.750027] ? trace_hardirqs_on+0xd/0x10 [ 1009.754183] bpf_check+0x2426/0x5e60 [ 1009.757894] ? pvclock_read_flags+0x160/0x160 [ 1009.762394] ? fixup_bpf_calls+0x1fb0/0x1fb0 [ 1009.766806] ? ktime_get_with_offset+0x32e/0x4b0 [ 1009.771569] ? ktime_get+0x440/0x440 [ 1009.775298] ? memset+0x31/0x40 [ 1009.778582] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1009.784311] ? bpf_obj_name_cpy+0x17c/0x1c0 [ 1009.788729] bpf_prog_load+0x1141/0x1c90 [ 1009.792785] ? bpf_prog_new_fd+0x60/0x60 [ 1009.796838] ? lock_acquire+0x1e4/0x540 [ 1009.800810] ? __might_fault+0x12b/0x1e0 [ 1009.804876] ? lock_downgrade+0x8f0/0x8f0 [ 1009.809036] ? __check_object_size+0x9d/0x5f2 [ 1009.813545] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1009.819107] __x64_sys_bpf+0x36c/0x510 [ 1009.822985] ? bpf_prog_get+0x20/0x20 [ 1009.826786] do_syscall_64+0x1b9/0x820 [ 1009.830671] ? finish_task_switch+0x1d3/0x890 [ 1009.835166] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1009.840088] ? syscall_return_slowpath+0x31d/0x5e0 [ 1009.845030] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1009.850138] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1009.855159] ? perf_trace_sys_enter+0xb10/0xb10 [ 1009.859848] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1009.864705] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1009.869884] RIP: 0033:0x455ab9 [ 1009.873056] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1009.892253] RSP: 002b:00007f8952c98c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1009.899957] RAX: ffffffffffffffda RBX: 00007f8952c996d4 RCX: 0000000000455ab9 [ 1009.907218] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000005 [ 1009.914485] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 1009.921764] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 1009.929038] R13: 00000000004bb7f3 R14: 00000000004c8c08 R15: 000000000000003a [ 1009.936379] Mem-Info: [ 1009.938819] active_anon:20535 inactive_anon:3908 isolated_anon:0 [ 1009.938819] active_file:5720 inactive_file:15246 isolated_file:0 [ 1009.938819] unevictable:0 dirty:177 writeback:0 unstable:0 [ 1009.938819] slab_reclaimable:13773 slab_unreclaimable:100630 [ 1009.938819] mapped:75552 shmem:4441 pagetables:988 bounce:0 [ 1009.938819] free:1372494 free_pcp:331 free_cma:0 [ 1009.973110] Node 0 active_anon:82140kB inactive_anon:15632kB active_file:22880kB inactive_file:60984kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:302208kB dirty:708kB writeback:0kB shmem:17764kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 59392kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1010.001422] Node 0 DMA free:15908kB min:164kB low:204kB high:244kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1010.027687] lowmem_reserve[]: 0 2827 6331 6331 [ 1010.032339] Node 0 DMA32 free:2898208kB min:30100kB low:37624kB high:45148kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129292kB managed:2898892kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:684kB local_pcp:684kB free_cma:0kB [ 1010.060146] lowmem_reserve[]: 0 0 3504 3504 [ 1010.064515] Node 0 Normal free:2575860kB min:37316kB low:46644kB high:55972kB active_anon:82140kB inactive_anon:15632kB active_file:22880kB inactive_file:60984kB unevictable:0kB writepending:708kB present:4718592kB managed:3589008kB mlocked:0kB kernel_stack:5632kB pagetables:3952kB bounce:0kB free_pcp:608kB local_pcp:88kB free_cma:0kB [ 1010.094316] lowmem_reserve[]: 0 0 0 0 [ 1010.098184] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 1010.111816] Node 0 DMA32: 2*4kB (M) 5*8kB (M) 1*16kB (M) 5*32kB (M) 1*64kB (M) 2*128kB (M) 1*256kB (M) 3*512kB (M) 4*1024kB (M) 2*2048kB (M) 705*4096kB (M) = 2898208kB [ 1010.127044] Node 0 Normal: 235*4kB (UE) 122*8kB (UME) 177*16kB (UM) 105*32kB (UME) 48*64kB (UME) 13*128kB (UME) 69*256kB (UME) 81*512kB (UM) 59*1024kB (UM) 3*2048kB (UME) 595*4096kB (UM) = 2575660kB [ 1010.144990] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1010.153612] 25412 total pagecache pages 13:50:03 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1010.157616] 0 pages in swap cache [ 1010.161098] Swap cache stats: add 0, delete 0, find 0/0 [ 1010.166516] Free swap = 0kB [ 1010.169557] Total swap = 0kB [ 1010.172591] 1965969 pages RAM [ 1010.175705] 0 pages HighMem/MovableOnly [ 1010.179698] 340017 pages reserved 13:50:03 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:50:03 executing program 4: r0 = gettid() perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000008000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) socket$kcm(0x2, 0x1, 0x0) 13:50:03 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f00000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:50:03 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:50:03 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}, [], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x199faf]}, 0x48) 13:50:03 executing program 5 (fault-call:0 fault-nth:59): bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf1600000000000085100000050000003f00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 13:50:03 executing program 6: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 13:50:03 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000006000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x7}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000002000)={0x9, 0x5, &(0x7f0000006000)=@framed={{0x18}, [@ldst={0x1, 0x0, 0x3, 0xffffffc5, 0x1, 0x4}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x4, 0x1000, &(0x7f0000008000)=""/4096}, 0x48) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000000)=r1) 13:50:03 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff00000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 1010.318862] FAULT_INJECTION: forcing a failure. [ 1010.318862] name failslab, interval 1, probability 0, space 0, times 0 [ 1010.333192] CPU: 0 PID: 2863 Comm: syz-executor5 Not tainted 4.18.0-rc3+ #58 [ 1010.340471] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1010.349912] Call Trace: [ 1010.352523] dump_stack+0x1c9/0x2b4 [ 1010.356175] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1010.361384] ? __kasan_slab_free+0x131/0x170 13:50:03 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 1010.365811] should_fail.cold.4+0xa/0x1a [ 1010.369891] ? __vunmap+0x338/0x460 [ 1010.373570] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1010.378696] ? vfree+0x6d/0x100 [ 1010.382023] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1010.387062] ? bpf_patch_insn_data+0x2a2/0x320 [ 1010.391692] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1010.396730] ? fixup_bpf_calls+0xd50/0x1fb0 [ 1010.401067] ? bpf_prog_load+0x1141/0x1c90 [ 1010.405327] ? lock_acquire+0x1e4/0x540 [ 1010.409323] ? fs_reclaim_acquire+0x20/0x20 [ 1010.413756] ? lock_downgrade+0x8f0/0x8f0 13:50:03 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 1010.417944] ? check_same_owner+0x340/0x340 [ 1010.422283] ? rcu_note_context_switch+0x730/0x730 [ 1010.427236] __should_failslab+0x124/0x180 [ 1010.431493] should_failslab+0x9/0x14 [ 1010.435328] __kmalloc+0x2c8/0x760 [ 1010.438884] ? find_subprog+0xbb/0x100 [ 1010.442780] ? find_good_pkt_pointers+0x630/0x630 [ 1010.447680] ? bpf_check+0x3947/0x5e60 [ 1010.451584] ? trace_hardirqs_on+0xd/0x10 [ 1010.455759] bpf_check+0x3947/0x5e60 [ 1010.459508] ? pvclock_read_flags+0x160/0x160 [ 1010.464033] ? fixup_bpf_calls+0x1fb0/0x1fb0 13:50:03 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 1010.468482] ? ktime_get_with_offset+0x32e/0x4b0 [ 1010.473282] ? ktime_get+0x440/0x440 [ 1010.477028] ? memset+0x31/0x40 [ 1010.480329] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1010.485887] ? bpf_obj_name_cpy+0x17c/0x1c0 [ 1010.490252] bpf_prog_load+0x1141/0x1c90 [ 1010.494330] ? bpf_prog_new_fd+0x60/0x60 [ 1010.498409] ? lock_acquire+0x1e4/0x540 [ 1010.503397] ? __might_fault+0x12b/0x1e0 [ 1010.507483] ? lock_downgrade+0x8f0/0x8f0 [ 1010.511668] ? lock_release+0xa30/0xa30 [ 1010.515665] ? check_same_owner+0x340/0x340 13:50:03 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff0f000000000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 1010.520024] ? __check_object_size+0x9d/0x5f2 [ 1010.524541] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1010.530097] __x64_sys_bpf+0x36c/0x510 [ 1010.533995] ? bpf_prog_get+0x20/0x20 [ 1010.537824] do_syscall_64+0x1b9/0x820 [ 1010.541720] ? finish_task_switch+0x1d3/0x890 [ 1010.546229] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1010.551173] ? syscall_return_slowpath+0x31d/0x5e0 [ 1010.557520] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1010.562563] ? prepare_exit_to_usermode+0x291/0x3b0 13:50:03 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 1010.567651] ? perf_trace_sys_enter+0xb10/0xb10 [ 1010.572508] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1010.577372] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1010.582565] RIP: 0033:0x455ab9 [ 1010.586046] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1010.605295] RSP: 002b:00007f8952c98c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1010.613014] RAX: ffffffffffffffda RBX: 00007f8952c996d4 RCX: 0000000000455ab9 13:50:03 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) 13:50:03 executing program 1: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000000180), 0x0, &(0x7f00000000c0)=ANY=[]}, 0x20000006) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe800000]}, 0xa}, 0x80, &(0x7f0000000b00), 0x0, &(0x7f0000000000)}, 0x20004040) [ 1010.620293] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000005 [ 1010.627598] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 1010.634899] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 1010.642264] R13: 00000000004bb7f3 R14: 00000000004c8c08 R15: 000000000000003b [ 1010.649693] ------------[ cut here ]------------ [ 1010.654513] verifier bug. No program starts at insn 3 [ 1010.659843] WARNING: CPU: 0 PID: 2863 at kernel/bpf/verifier.c:1613 bpf_check+0x5239/0x5e60 [ 1010.668339] Kernel panic - not syncing: panic_on_warn set ... [ 1010.668339] [ 1010.675720] CPU: 0 PID: 2863 Comm: syz-executor5 Not tainted 4.18.0-rc3+ #58 [ 1010.682911] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1010.692270] Call Trace: [ 1010.694881] dump_stack+0x1c9/0x2b4 [ 1010.698572] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1010.703784] panic+0x238/0x4e7 [ 1010.706993] ? add_taint.cold.5+0x16/0x16 [ 1010.711158] ? __warn.cold.8+0x148/0x1ba [ 1010.715228] ? bpf_check+0x5239/0x5e60 [ 1010.719213] __warn.cold.8+0x163/0x1ba [ 1010.723202] ? bpf_check+0x5239/0x5e60 [ 1010.727108] report_bug+0x252/0x2d0 [ 1010.730749] do_error_trap+0x1fc/0x4d0 [ 1010.734652] ? math_error+0x3e0/0x3e0 [ 1010.738443] ? vprintk_default+0x28/0x30 [ 1010.742495] ? vprintk_func+0x81/0xe7 [ 1010.746280] ? printk+0xa7/0xcf [ 1010.749550] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1010.754380] do_invalid_op+0x1b/0x20 [ 1010.758091] invalid_op+0x14/0x20 [ 1010.761531] RIP: 0010:bpf_check+0x5239/0x5e60 [ 1010.766090] Code: ff 48 89 df e8 c8 58 2e 00 e9 d8 d7 ff ff e8 6e 2f f0 ff 8b 74 24 58 48 c7 c7 20 8d ef 87 c6 05 f2 fe 0d 08 01 e8 37 52 bb ff <0f> 0b 48 8b 54 24 08 b8 ff ff 37 00 48 c1 e0 2a 48 c1 ea 03 0f b6 [ 1010.785374] RSP: 0018:ffff8801ad8bf980 EFLAGS: 00010286 [ 1010.790736] RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffc90007045000 [ 1010.798000] RDX: 0000000000040000 RSI: ffffffff81631851 RDI: ffff8801ad8bf658 [ 1010.805269] RBP: ffff8801ad8bfb30 R08: ffff8801c1b66600 R09: fffffbfff11f1220 [ 1010.813056] R10: fffffbfff11f1220 R11: ffffffff88f89103 R12: dffffc0000000000 [ 1010.820424] R13: ffffc90001a70040 R14: 00000000fffffffe R15: ffff88019b292940 [ 1010.827704] ? vprintk_func+0x81/0xe7 [ 1010.831512] ? pvclock_read_flags+0x160/0x160 [ 1010.836006] ? fixup_bpf_calls+0x1fb0/0x1fb0 [ 1010.840414] ? ktime_get_with_offset+0x32e/0x4b0 [ 1010.845175] ? ktime_get+0x440/0x440 [ 1010.848888] ? memset+0x31/0x40 [ 1010.852177] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1010.857716] ? bpf_obj_name_cpy+0x17c/0x1c0 [ 1010.862045] bpf_prog_load+0x1141/0x1c90 [ 1010.866112] ? bpf_prog_new_fd+0x60/0x60 [ 1010.870160] ? lock_acquire+0x1e4/0x540 [ 1010.874130] ? __might_fault+0x12b/0x1e0 [ 1010.878187] ? lock_downgrade+0x8f0/0x8f0 [ 1010.882330] ? lock_release+0xa30/0xa30 [ 1010.886319] ? check_same_owner+0x340/0x340 [ 1010.890649] ? __check_object_size+0x9d/0x5f2 [ 1010.895152] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1010.900689] __x64_sys_bpf+0x36c/0x510 [ 1010.904576] ? bpf_prog_get+0x20/0x20 [ 1010.908398] do_syscall_64+0x1b9/0x820 [ 1010.912279] ? finish_task_switch+0x1d3/0x890 [ 1010.916767] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1010.921697] ? syscall_return_slowpath+0x31d/0x5e0 [ 1010.926633] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1010.931657] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1010.936678] ? perf_trace_sys_enter+0xb10/0xb10 [ 1010.941350] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1010.946192] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1010.951370] RIP: 0033:0x455ab9 [ 1010.954542] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1010.973712] RSP: 002b:00007f8952c98c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1010.981413] RAX: ffffffffffffffda RBX: 00007f8952c996d4 RCX: 0000000000455ab9 [ 1010.988685] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 0000000000000005 [ 1010.995952] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 1011.003217] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 1011.010521] R13: 00000000004bb7f3 R14: 00000000004c8c08 R15: 000000000000003b [ 1011.018260] Dumping ftrace buffer: [ 1011.021793] --------------------------------- [ 1011.026295] syz-exec-18313 0...3 167324945us : 0: }D [ 1011.026299] --------------------------------- [ 1011.036017] Kernel Offset: disabled [ 1011.039625] Rebooting in 86400 seconds..