ffffffffff, 0x660c, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_procs(r1, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x1ff) close(r0) socket$kcm(0x29, 0xd, 0x0) 11:50:52 executing program 0: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x95, 0x1, @perf_config_ext, 0x0, 0x0, 0xfffffffd, 0x3, 0x2000000000000000, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) [ 1484.729731][ T7292] device nr0 entered promiscuous mode 11:50:52 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 11:50:52 executing program 2: socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x0, 0xff, 0x0, 0xffffffffffffffff, 0x11700, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_procs(r1, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x1ff) close(r0) socket$kcm(0x29, 0xd, 0x0) 11:50:52 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) 11:50:52 executing program 0: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="006386dd10b074814af2139bf7f2d6fbf0580ab412cd06f6cc64957c21fa1531ec9af386f62ce5c15462c9ef14f283b36bc4132b62"], 0x90ad) 11:50:52 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) 11:50:52 executing program 2: socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x0, 0xff, 0x0, 0xffffffffffffffff, 0x11700, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_procs(r1, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x1ff) close(r0) socket$kcm(0x29, 0xd, 0x0) 11:50:52 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x2000916d) 11:50:52 executing program 0: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 11:50:52 executing program 4: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f00000002c0)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x10ad) 11:50:52 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) 11:50:52 executing program 0: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x4, 0x1, 0x1f, 0xdb, 0x0, 0x6, 0x10, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x40, 0x6, @perf_bp={&(0x7f0000000000), 0x5}, 0x0, 0xfffffffffffffff8, 0x8000, 0x9, 0xffffffffffffffff, 0x1d4, 0xfff8}, r0, 0x3, 0xffffffffffffffff, 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$tipc(r2, 0x0, 0x0) r3 = perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x5e, 0x80, 0x1, 0x0, 0x0, 0x1462, 0x28701, 0xe, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0x0, 0x9}, 0x80, 0x2, 0x6, 0x0, 0x8, 0x5, 0x7f}, 0x0, 0x7, r2, 0x75916946223c46b4) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = gettid() perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x2, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80, 0x0, @perf_config_ext={0x9, 0x5}, 0x0, 0x0, 0xffffffff, 0x0, 0x7, 0x4}, r4, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x4, 0x1, 0x4, 0x8, 0x0, 0x4, 0x2404, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x4, @perf_config_ext={0x5, 0x8001}, 0x842, 0x3, 0x1, 0x3, 0x0, 0x3, 0x6}, r4, 0xe, r3, 0xd) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) [ 1485.454043][ T7332] device nr0 entered promiscuous mode 11:50:52 executing program 2: socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0x0, 0x0, 0xffffffffffffffff, 0x11700, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_procs(r1, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x1ff) close(r0) socket$kcm(0x29, 0xd, 0x0) 11:50:53 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 11:50:53 executing program 2: socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0x0, 0x0, 0xffffffffffffffff, 0x11700, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_procs(r1, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x1ff) close(r0) socket$kcm(0x29, 0xd, 0x0) 11:50:53 executing program 0: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="00e386dd0ff2a809386b8a97352c0404f96cdb38bb1f8e26ca3623220aa6dd3e2e9db6bf9a1df2b556940e408b8a1a610980022d6c8bc005f4c451e4015f193733507debfd392aa2909f93ec19ea5ab9930ec1bec2d78b3f76effe24f29b8849f8c4621a5a361bedd59611bbe01ab417593615f1f4e4479ce0"], 0x90ad) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpu.stat\x00', 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r1, &(0x7f0000000100)="fc0e", &(0x7f0000000440)="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", 0x6}, 0x20) 11:50:53 executing program 2: socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0x0, 0x0, 0xffffffffffffffff, 0x11700, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_procs(r1, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x1ff) close(r0) socket$kcm(0x29, 0xd, 0x0) 11:50:53 executing program 4: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f00000002c0)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x10ad) 11:50:53 executing program 2: socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_procs(r1, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x1ff) close(r0) socket$kcm(0x29, 0xd, 0x0) [ 1486.145930][ T7367] device nr0 entered promiscuous mode 11:50:53 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="9a6b6df91e60ee66d25d45f260d34336d83651c7e28eb5fa65504e47ff030000000000009f7c1acd2d6f4a95393302000000000000008929179ab85e53cd1a894fb66f304cfe547b09ad015b30ca451e568ddfd3f45b286230291ef86c0a457a23079aa12074fbe7a0bf38f2a0d66d4a67d6d3770000000000"], 0x90ad) 11:50:53 executing program 0: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x7, 0x4, 0x8, 0xf1a}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r2, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={r3}, 0xc) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={r3, 0x80, 0x10}, 0xc) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r5, &(0x7f00000001c0)="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", &(0x7f0000000100)="338d19a475e187a486df71267b0f91124745fc0fc737c373b4e0817f300409fd187488f985e1d284c7b56744169ef7a9d96e9dd4"}, 0x20) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x4009}) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000340)=r4, 0x4) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="026386dd07"], 0x90ad) ioctl$TUNSETVNETBE(r1, 0x400454de, &(0x7f0000000380)=0x1) 11:50:53 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) 11:50:53 executing program 2: socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(r1, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x1ff) close(r0) socket$kcm(0x29, 0xd, 0x0) 11:50:53 executing program 2: socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x1ff) close(r0) socket$kcm(0x29, 0xd, 0x0) 11:50:53 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}, 0x1000, 0x0, 0xc4, 0x0, 0x0, 0x9}, 0x0, 0xe, r1, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0x0, r1, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ddc01f8586"], 0x90ad) 11:50:54 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) 11:50:54 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x14200, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000040)={'veth0_to_hsr\x00'}) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$tipc(r2, 0x0, 0x0) ioctl$TUNSETCARRIER(r2, 0x400454e2, &(0x7f0000000a40)) close(r1) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$tipc(r3, 0x0, 0x0) sendmsg$tipc(r3, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f00000001c0)="8902cd744ed63a2ed5a6844654fdb59a8031fd1989e98e9965677a4ce55aa11f7b7e482a95e9d2a65c23834013317272ec38d227690981efe3983d0c29d667a02b90a26255971f428d1f10e65e346523e7994e744cc9c4ff78f57d0b5217da4a72b8cfc72f8cff069f044bc44b8356a80aae52da86a04422397a86c9c4738bb12adfd1afc98ac5bcb412b776ccf99c8122d00c32e727a6", 0x97}, {&(0x7f00000002c0)="5426caafb0151296f982f1eed1dec3f395a25e0f12a33f2aad4f44dbafd59b7bae7add2906b4645a594fd011b7f3cb1ff47771ea6bc69118a02aa06d208e940597885b6b76", 0x45}, {&(0x7f0000000340)="3a5dc241263882362922d575c660ed6424d834924e365551881427ca78b61202c4ac8040a88d9329398de61c3eb30d034753938d1de226d96447b157f40b4f7f6fb0ba612d67e5e8232852e3af4096f6b734c7398042ea3be98b7cd0acd14d3812f2e50e697f4321e96e474c736a0dada9300e5e73a66a9adf7353a1f5d99d74c16d54eab0522119939c97e329c71c8b107be8cb42a5533b8fc6141fd76a879ee1db83c45049b4a72ffb1934e17892b4c438ee7f933cdb5ad215c1d0", 0xbc}, {&(0x7f0000000480)="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", 0xfb}, {&(0x7f0000000580)="0d09341619d00dc1215bec41304927f4098e49434fb715f7c53fd0e6997109758e28d35c9b85dffb3ad808296578ff802fa3ccf27f713b71c07cc90ad4c8a45ecfd6e21a3d92acabf7ce3ae50ab82c13dbd47111386dd9c82132af2518f9987657437241d0ea931326955c48d5cec2580dcaad7296d1c8fd9e9cbe7c734901076fa2cb0ca4c76f4462aa7bf55aaa4a9ae9b12d7b1c68dfa4c674602c5e4cbd65b4b48d0a736e3d1a5c62eb4895039197d4efcb41a202f847b65336c1e176b9ed936cdbed2d57e2dec90b038c19d38a47f1ffb42eb5", 0xd5}, {&(0x7f0000000100)="b322b136918a66148bf57a4a47ac844a69fdddc3b95ca6799a9afc987de0e5fd5cdab262f873a458dffcb6", 0x2b}, {&(0x7f0000000680)="4d84f755cb60fba545ebe3bbb365257743b42bbb3a5f94d13f00917d50b6983a676718dfd26c7d7d9ad1911a394f4566c7854f7667ce3d84506a07ce84a87544c2842568abc52309a91cf0849a1a08bc26e88752a150a7dbd9", 0x59}, {&(0x7f0000000700)="d85f6330ba231bfc790a544215097becaf6b21c58667cf8baf51f1adf4b7d225c47e69e558cb40dfad149520eef818da16d3f393092bc8d0e83a86ec644effc80273adb20fcdffc5c2aa14bf916adf73938acca8d1dfe002d9abf949d03197f641c15ac9061958b8e956bc3480015f504191a57eee6d6548f4c46bed2b23d4427ab0eecbb893f45725927e91865e6838a6a7612986b00c8fbd6a8eef42322003086c438f41e7ab09945e", 0xaa}, {&(0x7f00000007c0)="0e6f1fa9cd85fc8f2f4ef78881ad8f884158beddac6c6d038c021b9b6ed19d0db50c2b0a9b0d7bbe7c22b3454a63b6803f16f6d1e0b300d8664e26f20bc6c416140d6194cf8d7af8f666171c0497a4deb625259bb4ea167e47447393d199cecfe2b158ee281679278062ebe2127b5eb8a4314e494bf100c0c03fd8b415caf02d235a9f1743f0a55619470ae982dd397ebecefaf554669f3f01fa02b6f2f2b300402371da3ae0867b30ffafeadaa4ad36e9ae51b4637460bbf7743c4bae7abca1ddfb4568d79222c6a4b616355d9fbd3bf0a32a5de55815c35017e13e4f6fb68814d501be9718cd6f7f07558383de3cf63b12f642", 0xf4}], 0x9, &(0x7f0000000980)="e312f8d8526d1f871722eb44aa6f3cd6f83ae2cb75d55c1c887a4b0dd72568db593b5284a25437d67a400ded92329099b7afb3512df937b299ab8676514792c62779ff77", 0x44, 0x1}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}, 0x1000, 0x0, 0xc4, 0x0, 0x0, 0x9}, 0x0, 0xe, r4, 0x0) ioctl$TUNSETLINK(r4, 0x400454cd, 0x1fbfc) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 11:50:54 executing program 4: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f00000002c0)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x10ad) 11:50:54 executing program 2: socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x1ff) close(r0) socket$kcm(0x29, 0xd, 0x0) 11:50:54 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00'}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) 11:50:54 executing program 0: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x1ff) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0xc40bd3af1b1ee9a3, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) [ 1486.978773][ T7401] device nr0 entered promiscuous mode 11:50:54 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="006387dd07"], 0x90ad) 11:50:54 executing program 2: socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x1ff) close(r0) socket$kcm(0x29, 0xd, 0x0) 11:50:54 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(&(0x7f0000000040)={0x2, 0x270, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 11:50:54 executing program 0: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="0072f4167f6a000000000000cf214a0fed9db5ef81d66f5fb63e61133220b1f9593a63671cd50000000000"], 0x90ad) mkdir(&(0x7f0000000000)='./file0\x00', 0x40) 11:50:54 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00'}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) 11:50:54 executing program 2: socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x1ff) close(r0) socket$kcm(0x29, 0xd, 0x0) 11:50:54 executing program 4: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f00000002c0)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x10ad) 11:50:54 executing program 0: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={0x1, 0x28, &(0x7f0000000040)}, 0x10) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_sys\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000001c0)={0x3, 0x70, 0x5b, 0x8, 0x0, 0x0, 0x0, 0x1b21, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000100)}, 0x12, 0x9, 0x9, 0x4, 0x401, 0x9b88, 0x5}, r0, 0xa, r1, 0xc) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0063a528441eff811b525d0ba2"], 0x90ad) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.stat\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$tipc(r3, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000300)=r3, 0x4) 11:50:54 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00'}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) 11:50:55 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000000)=0x1) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) [ 1487.792651][ T7442] device nr0 entered promiscuous mode 11:50:55 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}, 0x1000, 0x0, 0xc4, 0x0, 0x0, 0x9}, 0x0, 0xe, r2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$tipc(r3, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}, 0x1000, 0x0, 0xc4, 0x0, 0x0, 0x9}, 0x0, 0xe, r4, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}, 0x1000, 0x0, 0xc4, 0x0, 0x0, 0x9}, 0x0, 0xe, r5, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000001880)='cgroup.controllers\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(r6, 0x400454cb, 0x0) ioctl$TUNSETTXFILTER(r4, 0x400454d1, &(0x7f0000001840)={0x3, 0x7, [@empty, @broadcast, @link_local, @broadcast, @broadcast, @random="a2dc8a7b2b3e", @local]}) ioctl$TUNSETFILTEREBPF(r2, 0x800454e1, &(0x7f0000000000)=r3) sendmsg$tipc(r1, 0x0, 0x0) sendmsg(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000016c0)=[{&(0x7f0000000100)="9e4795ecefe2146300e8cc496aeed7d7398adeaf677ce868de7dbcec86dfa96f89d6c90dbf112eb5ba6a7f38f87136441305ff94c98fcd28acd61790f3b360e133ae62b006be8d34aee303323274c840f73fc20fea8a7fc34793b15767be93cffa8affc775b577ac1e2dc6afe7d6efafdfcaf21ef1ace6f8b496697caf1726202355e3", 0x83}, {&(0x7f0000000440)="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", 0x1000}, {}, {&(0x7f00000002c0)="feb3c1fdd67d053fbef72790a02d8e1771c65bf06bde33da4920590659d292fada9ef5672f1dff76051d497b768d4b2627b4408ebba6445817eb5e41af2dd9705b60fe2ffc163028624df7051d542e235283b925624af30ddae3f7720d982fa2d6989b0db3e8e4d38d53405ac22870f128b925289ff23200261529b1fb08a8d321aad7fcb0c6f7ee03a14f44098dd1c4d356a2bb3e415cb7e47347e42ac668f1ed84f15d05feaad5279b276dd68b91eca68ff72dcb0ea2ffa19e7ec5b49830c241235e319340956f206881869c29612315df62219cb09612af70ea0cc7b61fbf520a2449a3c95259a776130e", 0xec}, {&(0x7f00000001c0)="39aed0065721cef006ae2ec5a8bc164d81b7d36beb31ee12c0d8102985df565d874011a20ac6b2b9395a95f7f47428ef22f1e3324df0b4f27eba3f27c8e60ebf75b73a3d939c5b8403", 0x49}, {&(0x7f0000001440)="8110d053db6f483044f2cdce7ec719eca503b49f004aafe6f54efdad5dda62d44560e292b0391adcd520dd539a4a692c50b93053f1b5be912e1e7d7869e7046237a45facdf67181b9ea0a75bcff89702959af4b364e24502ad130079b5b397d85c1f7038e14c5aa0290696643368d10abba29440be4a20e46381b987cf230cdc21410ba1fd4d9b6a8f", 0x89}, {&(0x7f0000001500)="c54002079b958c2e3d9606dfe8cba19bac48dc57f743bb944f99bd5c86ba16e6844fdc1efdf0e20536b6f22d7137d6b681f2ae478d05aee494ff91e16de484e34a3d407e4206c8d05fafcb6b6f44aa8a9fc8eef440129f31e7c5becbd9646680680406facedab112129438d629a9586658cff34f5525050c2f57260e0d62fd0bff1a2cb8a1902be6346bdbe7250dd3c9cc9748f1edcb90a09eb30cacbd72543c6b5401f37473eff90377950b47b353b79cbaa46f86234c2b2e8faa26c14c1df47d863180d8c4f086d494a8a6d644e40072ba56d9b1c273650fc5e074ffc34429", 0xe0}, {&(0x7f0000001600)="9df5b14d948b6405800373f9a43e1760431854d2371656e52e984c658c142364679f49b1fdc9b672c30a8173e407da69b402a43d5f50e76d0290afc38f9e4d97216184157f67a63c789bc816cecbf796c148c358d3f2bba74f326fe2acdd1c1a1b1e19969a8a24f6beac7b878484e8bc0633db378a11830dfdffb0d919aa074974906a74c347c727df688afa7830d8ee12c285fa71651db9817af2fcb10dcee30279ad6f3fbb005d7e30", 0xaa}, {&(0x7f0000000240)="ba2edf", 0x3}], 0x9, &(0x7f0000001780)=[{0xa8, 0xff, 0x3, "a1dcc1cdd1432818e1af5617736f2c8e96014bf5689d6311ebe6aae3fcfca6d172dbe26c5694e2c1e268cd3ec21cd020c9c70fb290a918ccf51cc4ec98a41362c88ca6fbdc666273afbeabd6c3fc70a1033ed7f0fed743fecea540dba0e0c793eea844b1fd49a7c3ecd5e8144c15c4cf7319859b0cfff69164e1d21164b2dc42dc9edcff4ff658a14295ea1a16902879423526"}], 0xa8}, 0x20000010) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 11:50:55 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0xffffffffffffff42, &(0x7f0000000200), 0x0, 0x0, 0xffdf}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f00000001c0)="cc6ab35a2fdf0ecdc1eb3b19de45e4012a6e40829420731f8141366b42d4007a2ae4e4303bc49b1e3f9a91fef25b4bfd79cb1aa8df7aa2070740ea9f8c66c21a4fca727847380e533ac2f955249756cc1d", 0x51}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000580)='ip_vti0\x00') perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 11:50:55 executing program 2: socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) close(r0) socket$kcm(0x29, 0xd, 0x0) 11:50:55 executing program 2: socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) close(0xffffffffffffffff) socket$kcm(0x29, 0xd, 0x0) 11:50:55 executing program 2: socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) close(0xffffffffffffffff) socket$kcm(0x29, 0x0, 0x0) 11:50:55 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) 11:50:55 executing program 0: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$tipc(r1, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'sit0\x00', 0x10}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 11:50:55 executing program 4: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f00000002c0)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x10ad) 11:50:55 executing program 0: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r1, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r1, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000004600)={r5, 0xc0, &(0x7f0000004540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000004400)=0x10ff4015, 0x0, 0x0, 0x0, &(0x7f0000004440)={0x4, 0x4}, 0x0, 0x0, &(0x7f0000004480)={0x0, 0x0, 0x80000000, 0xdc}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001880)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000004840)={0x19, 0x2, &(0x7f0000001700)=@raw=[@ldst={0x2, 0x0, 0x7, 0x8, 0x9, 0x1, 0x12}, @alu={0x4, 0x0, 0x8, 0x6, 0xb, 0x2, 0x1}], &(0x7f0000001740)='syzkaller\x00', 0xd79, 0xce, &(0x7f0000001780)=""/206, 0x40f00, 0x8, [], 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000004380)={0x9, 0x1}, 0x8, 0x10, 0x0, 0x0, r6}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x3, &(0x7f0000000280)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x6}, @ldst={0x2, 0x0, 0x6, 0x3, 0xa2c1fa458ac8eefe, 0x30}, @func={0x85, 0x0, 0x1, 0x0, 0x3}], &(0x7f00000002c0)='syzkaller\x00', 0x3c, 0xec, &(0x7f0000000480)=""/236, 0x41100, 0x1, [], r2, 0xd, r3, 0x8, &(0x7f0000000300)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x4, 0x10, 0x8001, 0xccc3}, 0x10, r6}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f0000000040)={&(0x7f0000000000)=""/63, 0x3f, r6}}, 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 11:50:56 executing program 2: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0xffffffffffffff42, &(0x7f0000000200), 0x0, 0x0, 0xffdf}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f00000001c0)="cc6ab35a2fdf0ecdc1eb3b19de45e4012a6e40829420731f8141366b42d4007a2ae4e4303bc49b1e3f9a91fef25b4bfd79cb1aa8df7aa2070740ea9f8c66c21a4fca727847380e533ac2f955249756cc1d", 0x51}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000580)='ip_vti0\x00') perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 11:50:56 executing program 0: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}, 0x1000, 0x0, 0xc4, 0x0, 0x0, 0x9}, 0x0, 0xe, r1, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003e40)={&(0x7f0000003840)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000003d80)=[{&(0x7f00000038c0)=""/41, 0x29}, {&(0x7f0000003900)=""/238, 0xee}, {&(0x7f0000003a00)=""/176, 0xb0}, {&(0x7f0000003ac0)=""/187, 0xbb}, {&(0x7f0000003b80)=""/229, 0xe5}, {&(0x7f0000003c80)=""/227, 0xe3}], 0x6, &(0x7f0000003e00)=""/52, 0x34}, 0x2000) r3 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r3, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r3, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r4, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x161) r7 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000004600)={r7, 0xc0, &(0x7f0000004540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000004400)=0x10ff4015, 0x0, 0x0, 0x0, &(0x7f0000004440)={0x4, 0x4}, 0x0, 0x0, &(0x7f0000004480)={0x0, 0x0, 0x80000000, 0xdc}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001880)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000004840)={0x19, 0x2, &(0x7f0000001700)=@raw=[@ldst={0x2, 0x0, 0x7, 0x8, 0x9, 0x1, 0x12}, @alu={0x4, 0x0, 0x8, 0x6, 0xb, 0x2, 0x1}], &(0x7f0000001740)='syzkaller\x00', 0xd79, 0xce, &(0x7f0000001780)=""/206, 0x40f00, 0x8, [], 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000004380)={0x9, 0x1}, 0x8, 0x10, 0x0, 0x0, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x3, &(0x7f0000000280)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x6}, @ldst={0x2, 0x0, 0x6, 0x3, 0xa2c1fa458ac8eefe, 0x30}, @func={0x85, 0x0, 0x1, 0x0, 0x3}], &(0x7f00000002c0)='syzkaller\x00', 0x3c, 0xec, &(0x7f0000000480)=""/236, 0x41100, 0x1, [], r4, 0xd, r5, 0x8, &(0x7f0000000300)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x4, 0x10, 0x8001, 0xccc3}, 0x10, r8}, 0x78) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$tipc(r9, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={r9, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0x8, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x5}, 0x0, 0x0, &(0x7f0000000380)={0x1, 0x1, 0x3, 0x2}, &(0x7f00000003c0)=0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=0x7f}}, 0x10) r10 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000003e80)=r8, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000003ec0)={0x3, 0x3ff, 0xffff, 0x7fff, 0x20c, r1, 0x0, [], r2, r10, 0x1, 0x3}, 0x3c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) [ 1488.791629][ T7491] device nr0 entered promiscuous mode 11:50:56 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00638608cf"], 0x90ad) 11:50:56 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x1f, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 11:50:56 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) 11:50:56 executing program 0: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x0, 0x100000001}, 0x0, 0xc82}, r0, 0x0, 0xffffffffffffffff, 0xf) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 11:50:56 executing program 4: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f00000002c0)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x10ad) 11:50:56 executing program 0: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4916, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/d\x02\x00\x00\x00\x00\x00\x00\x00un\x00', 0x2000, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$tipc(r1, 0x0, 0x0) recvmsg(r1, &(0x7f0000000100)={&(0x7f0000000000)=@l2, 0x80, &(0x7f00000000c0)}, 0x20) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}, 0x1000, 0x0, 0xc4, 0x0, 0x0, 0x9}, 0x0, 0xe, r2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$tipc(r3, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x4, r3, 0x8) write$cgroup_subtree(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0870518c5e988f4aaf000872fe6f4ab7d34b905847da8346aa80337c729b5751c6f5fc74fa1db3438d46bd25ec8b758ecc0dd8efa646c0f70b88aee4559c143ef8a2a55067debbf6281f837843ff122ecb10c5cbbefc8dcf193c21dd7e459deaf2143d6baf7e554a9c11eb6bc3c0417e5643effc88dff7955744d17bc3afd79ab04e8bb6d47dfbee600eeec93a1086ed9932c40cca30e59b189c57b91299c7ea4cda9e435b2ef9c25e8a6c8ba66ee61a1bce"], 0x90ad) 11:50:56 executing program 2: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0xffffffffffffff42, &(0x7f0000000200), 0x0, 0x0, 0xffdf}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f00000001c0)="cc6ab35a2fdf0ecdc1eb3b19de45e4012a6e40829420731f8141366b42d4007a2ae4e4303bc49b1e3f9a91fef25b4bfd79cb1aa8df7aa2070740ea9f8c66c21a4fca727847380e533ac2f955249756cc1d", 0x51}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000580)='ip_vti0\x00') perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) [ 1489.393746][ T7520] device nr0 entered promiscuous mode 11:50:56 executing program 0: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 11:50:56 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) 11:50:56 executing program 0: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x8000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 11:50:57 executing program 0: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_procs(r1, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$tipc(r2, 0x0, 0x0) write$cgroup_subtree(r2, &(0x7f0000000100)={[{0xe7ecef6630cddee, 'io'}]}, 0x4) openat$cgroup_ro(r1, &(0x7f0000000000)='memory.swap.current\x00', 0x0, 0x0) 11:50:57 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$tipc(r0, 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000000000)='rdma.max\x00', 0x2, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="0051dd21bb79c374ac1812fc3f7d7bd2dc4bbbe1566431ab500c24d4bc08e7826150e0c109ef877e43b4bf0326b88e7e9170ae2998506a39cf01552c53bbfbb9a496653661a92d97719234bb9bc8f7561b7307ff"], 0x90ad) 11:50:57 executing program 4: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f00000002c0)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x10ad) [ 1490.017270][ T7549] device nr0 entered promiscuous mode 11:50:57 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x6}}, 0x0, 0x2, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$tipc(r1, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'rose0\x00', 0x800}) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="00f14c8c0d51aada6386dd07"], 0x90ad) 11:50:57 executing program 2: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0xffffffffffffff42, &(0x7f0000000200), 0x0, 0x0, 0xffdf}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f00000001c0)="cc6ab35a2fdf0ecdc1eb3b19de45e4012a6e40829420731f8141366b42d4007a2ae4e4303bc49b1e3f9a91fef25b4bfd79cb1aa8df7aa2070740ea9f8c66c21a4fca727847380e533ac2f955249756cc1d", 0x51}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000580)='ip_vti0\x00') perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 11:50:57 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) 11:50:57 executing program 0: bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x90000, 0x1}, 0xc) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0xfffffffffffffd3c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'syzkaller0\x00', 0x4009}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 11:50:57 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}, 0x1000, 0x0, 0xc4, 0x0, 0x0, 0x9}, 0x0, 0xe, r1, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000000)) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 11:50:57 executing program 4: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f00000002c0)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x10ad) [ 1490.506832][ T7568] device nr0 entered promiscuous mode 11:50:58 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) 11:50:58 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}, 0x1000, 0x0, 0xc4, 0x0, 0x0, 0x9}, 0x0, 0xe, r1, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000000)='./file0\x00', r1}, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 11:50:58 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}, 0x1000, 0x0, 0xc4, 0x0, 0x0, 0x9}, 0x0, 0xe, r1, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f00000000c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='nr0\x01\x00'}, 0x30) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f0000000300)={0x4, 0x70, 0x5, 0x3, 0x40, 0x1, 0x0, 0x1, 0x8840, 0xe, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x800, 0x0, @perf_bp={&(0x7f00000002c0), 0x3}, 0x400, 0x6, 0x0, 0x7, 0x7ff, 0x800, 0x7}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x30d) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}, 0x1000, 0x0, 0xc4, 0x0, 0x0, 0x9}, 0x0, 0xe, r3, 0x0) ioctl$PERF_EVENT_IOC_ID(r3, 0x80082407, &(0x7f0000000100)) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="b9eb9569a54c925f4f5206000000000000009d404540d423ed8e81e9a5b13fbd87313814a10e6b7a3799689be5bae6102c674318b97652635a33a0e3c3c055af43687434a540c6f39b87b2cd5ba588467c4b094b9d4eb54fa9220556c0ca21fd3092881fb8be8282cae831a018ef14560533c18a4cbe2199e00fad4db766dc76fa226eb2530675a993cdcdd5dbfd5b374579600869532f215d6eb3cba7324edb355ddfac469ed3fddddcc8f93700027b6666a5faf31f0349c676abe29f9c08c853eec8ad0b3f514253de2d43f28ecabe7601e3"], 0x90ad) 11:50:58 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'tunl0\x00', 0x1}) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x2b, '', 0x7}]}, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$tipc(r1, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f00000001c0)='/&\':vmnet1wlan1self\x00'}, 0x30) openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0xefd52b09697d0042, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0xc0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440), 0x0, 0x0, 0x0, &(0x7f0000000480)={0x0, 0x3}, 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x2, 0x4717, 0x800}, &(0x7f0000000500), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=0x2}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000680)={r2, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000400)='\x00', r3}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, r1, 0x0, 0x11, &(0x7f0000000040)='user!systemeth1^\x00', r3}, 0x30) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$tipc(r5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0xc0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x6, 0x4, 0x8001}, &(0x7f0000000200)=0x8, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x7ff}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={r4, r5, 0x0, 0x1, &(0x7f0000000100)='\x00', r6}, 0x30) 11:50:58 executing program 4: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f00000002c0)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x10ad) 11:50:58 executing program 0: perf_event_open$cgroup(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x90ad) 11:50:58 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) [ 1491.079464][ T7588] device nr0 entered promiscuous mode 11:50:58 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}, 0x1000, 0x0, 0xc4, 0x0, 0x0, 0x9}, 0x0, 0xe, r1, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000000)='./file0\x00', r1}, 0x10) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 11:50:58 executing program 0: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}, 0x1000, 0x0, 0xc4, 0x0, 0x0, 0x9}, 0x0, 0xe, r0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={r0, 0xc0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=0x3, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x7, 0x4}, 0x0, 0x0, &(0x7f0000000100)={0x1, 0x7, 0x5, 0x6}, &(0x7f00000001c0)=0x7, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0xff}}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}, 0x1000, 0x0, 0xc4, 0x0, 0x0, 0x9}, 0x0, 0xe, r2, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000580)=0x101) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380)={r1}, 0xc) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f00000000c0)="4286f4567992416e51e74bc0299806dfb211c3aee44655", &(0x7f0000000500)=""/115}, 0x20) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r3, &(0x7f0000000480)=ANY=[@ANYBLOB="00638600277f5a6a923b2ccfbe12c47d4a8195d57fccb5fce1f0f791541505e496d3a868ce14e4a3c76c171e8a6a0a37dbbae6486caa2f0a06768d02c551243e38aa7a41690d141c75cae5a76d22d297255ccb21701298317fa95d9e5f9b6080852406179ef26d07ed3ad54f6ebe727f9c"], 0x90ad) 11:50:58 executing program 0: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.events\x00', 0x0, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000040)={0x1, 0x1, [@empty]}) 11:50:58 executing program 0: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x20000000000, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000000)=0x20e) 11:50:58 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) 11:50:58 executing program 4: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f00000002c0)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x10ad) 11:50:58 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$tipc(r1, 0x0, 0x0) ioctl$TUNSETSNDBUF(r1, 0x400454d4, &(0x7f0000000000)=0x2) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x824841, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x1f) 11:50:59 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x3ea, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x7, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 11:50:59 executing program 0: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x204000, 0x0) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000040)={0x1, 0x4, [@empty, @dev={[], 0x25}, @dev={[], 0x19}, @empty]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x0) 11:50:59 executing program 2: socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}, 0x1000, 0x0, 0xc4, 0x0, 0x0, 0x9}, 0x0, 0xe, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000d80)={&(0x7f00000004c0)=@can, 0x80, &(0x7f0000000540)=[{&(0x7f0000000740)="f5cfe6ab78b42ecce4554d3932a25cbd226c606fdc8df356b7e6a1ede8ac23c2fb9ba5f52469320e36a1796ec0fbdbb9e27fbf177c4356420e167f34cad34d3247f59f6b5210c1197a8a66148703c8c7bc949454a6b6ea97fc950eee13b7f609f917cc671b2d9dbb5c2a889468a912a86d30611dcb65a53418e7cc50d89c686bfb94220c0d3bdcfca9f1aaacb1fd734919852b08dec22d29e4273b36900d0641656c44476447d818be7caec6756b402e3dd08f705b7140fad55fc782acd489f490883c45b58589c8df6767b60e325550c2a88cff1f580b7de19a8ecf85103fc4aa97beaaff1b3a33867c906e0deb27b706eb1e71797e4e6f89c4a6505a3d3a", 0xff}], 0x1, &(0x7f0000000840)=[{0x60, 0x15, 0x0, "8aee01f532d3efdc62e799341123adb7b680ed7d6ee32c85c7a8cd46314387530505cee63c81cd26b77ed07cfc79bf45a9b7681500050f980e837ae3ffaaf95f8c146ce0f2387b7702a331"}, {0x10, 0x111}, {0x10, 0x1, 0xfffffffb}], 0x80}, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/183, 0xb7}, {&(0x7f0000000280)=""/134, 0x86}], 0x2, &(0x7f0000000380)=""/197, 0xc5}, 0x10000) r0 = bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x11700, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_procs(r1, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x1ff) close(r0) socket$kcm(0x29, 0xd, 0x0) [ 1491.863821][ T7618] device nr0 entered promiscuous mode 11:50:59 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) 11:50:59 executing program 0: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x81) 11:50:59 executing program 2: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f00000002c0)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x10ad) 11:50:59 executing program 4: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f00000002c0)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x10ad) 11:50:59 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7ff, 0xc1}, 0x0, 0x0, 0x0, 0x2b61ca42df9c8e54}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 11:50:59 executing program 5: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f0000000100)={0x0, 0x70, 0x3, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x0, 0x0, 0x0, 0x4f78b3bf39b888aa, 0x0, 0x5, 0x3}, r1, 0x0, 0xffffffffffffffff, 0x8) r2 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000000)={0xa, 0x1ff, 0x4, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r2, &(0x7f0000000340), &(0x7f0000000400)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000c88000)={r2, &(0x7f0000847f95), &(0x7f000089b000)}, 0x20) r3 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, &(0x7f0000000340), 0x0}, 0x20) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/285, @ANYPTR=&(0x7f0000000400)=ANY=[@ANYRES16=0x0, @ANYRES16=r3, @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYRESOCT=r0, @ANYRESHEX]]], 0x35) openat$cgroup_ro(r1, &(0x7f0000000440)='cpuacct.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140), 0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x1}, 0xc) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2000) perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x7f, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000400)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) 11:50:59 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) write$cgroup_subtree(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="006386dd0717e9f89c31b0cd8469b97d69a8aa92a6082432f0098f6d623c1606126459408bbdf2a8c0911d8cb7c82fff39b6f55578b738ef9d023e4c07362069483f694b056e865d58622210dce06fa5c3614f55ad0e120661f4e761dc9bb1a8a775083736bbfacfc1bab424849f875a9505fb097df753a0184e26059aa909e0078754345785d17315bff7bf7e62a5f03e32265db933e9b0ac51c8"], 0x90ad) [ 1492.559589][ T7648] device nr0 entered promiscuous mode [ 1492.628020][ T7652] device nr0 entered promiscuous mode 11:51:00 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) r1 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)={[{0x2b, 'pids'}, {0x2d, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'cpu'}]}, 0x17) 11:51:00 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) 11:51:00 executing program 0: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}, 0x1000, 0x0, 0xc4, 0x0, 0x0, 0x9}, 0x0, 0xe, r0, 0x0) openat$cgroup_int(r0, &(0x7f0000000100)='hugetlb.2MB.failcnt\x00', 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) r3 = openat$cgroup_ro(r1, 0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x1) 11:51:00 executing program 2: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f0000000100)={0x0, 0x70, 0x3, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x0, 0x0, 0x0, 0x4f78b3bf39b888aa, 0x0, 0x5, 0x3}, r1, 0x0, 0xffffffffffffffff, 0x8) r2 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000000)={0xa, 0x1ff, 0x4, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r2, &(0x7f0000000340), &(0x7f0000000400)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000c88000)={r2, &(0x7f0000847f95), &(0x7f000089b000)}, 0x20) r3 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, &(0x7f0000000340), 0x0}, 0x20) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/285, @ANYPTR=&(0x7f0000000400)=ANY=[@ANYRES16=0x0, @ANYRES16=r3, @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYRESOCT=r0, @ANYRESHEX]]], 0x35) openat$cgroup_ro(r1, &(0x7f0000000440)='cpuacct.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140), 0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x1}, 0xc) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2000) perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x7f, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000400)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) 11:51:00 executing program 0: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x90ad) 11:51:00 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) 11:51:00 executing program 4: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f00000002c0)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x10ad) 11:51:00 executing program 0: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}, 0x1000, 0x0, 0xc4, 0x0, 0x0, 0x9}, 0x0, 0xe, r0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='pids.current\x00', 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000000)=0x7fffffff, 0x12) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}, 0x1000, 0x0, 0xc4, 0x0, 0x0, 0x9}, 0x0, 0xe, r2, 0x0) ioctl$TUNSETSNDBUF(r2, 0x400454d4, &(0x7f0000000100)=0x4) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) [ 1493.670026][ T7692] device nr0 entered promiscuous mode 11:51:01 executing program 2: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f0000000100)={0x0, 0x70, 0x3, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x0, 0x0, 0x0, 0x4f78b3bf39b888aa, 0x0, 0x5, 0x3}, r1, 0x0, 0xffffffffffffffff, 0x8) r2 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000000)={0xa, 0x1ff, 0x4, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r2, &(0x7f0000000340), &(0x7f0000000400)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000c88000)={r2, &(0x7f0000847f95), &(0x7f000089b000)}, 0x20) r3 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, &(0x7f0000000340), 0x0}, 0x20) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="fc2dffe80a90f3c86a1c11c471f9426be683b7486be60000000000000101b5469d9dddfb37b6b58c5e05b8885b7dd7b701fa2acfe44b32ad2d28e7bb1fe955e4a1b05309cb95fa03940752af9929baad175ef9cfde55abfe09fd2213efe00cefd057cd89341c575dadf242513337e0197a99b099dffd8f7d976504ed0e0dd7e106fd5ba333fb41dcdd9677bc1880afd10c359eb3d5bcd0d91f9cd07e1c87486a2cfa5829f1083460b49a66893c77472614458ecb0be2cb0d3282f49420ebf7bdf5b6171267cfeb30a5156a8360fe602e6298e45f7d123325dbd0f213977d75e9942086287926bc9892b99e4b2b75ab0efa6f2b1b4edae2b1721838a397d4a00b430008baa6e01267c2e20eee9fa6d000"/285, @ANYPTR=&(0x7f0000000400)=ANY=[@ANYRES16=0x0, @ANYRES16=r3, @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYRESOCT=r0, @ANYRESHEX]]], 0x35) openat$cgroup_ro(r1, &(0x7f0000000440)='cpuacct.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140), 0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x1}, 0xc) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2000) perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x7f, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000400)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) 11:51:01 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 11:51:01 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r1, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r1, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000008000000000000000000000000000004000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x378) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000004600)={r5, 0xc0, &(0x7f0000004540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000004400)=0x10ff4015, 0x0, 0x0, 0x0, &(0x7f0000004440)={0x8, 0x4}, 0x0, 0x0, &(0x7f0000000380)={0x0, 0x0, 0x80000000, 0xdc}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001880)}}, 0xfffffffffffffcd9) socket$kcm(0x29, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000004840)={0x10, 0x11, &(0x7f0000000600)=ANY=[@ANYBLOB="e29801001200000084a60200010000005220c2263e3647313185e51198ef4f76ac51c83d23e23a3a280c54c71c634c7658825fcbed384d9dc719c8b26ea2072c595d9f58b59132411ecc9abec89e1b161ee64e663cd22442b89dd0173e2311904c0861da7ea7494781560e26dcbbc4f04454a186c8481d30fc0e7021d65709000000000000000259"], &(0x7f0000001740)='syzkaller\x00', 0xd79, 0xce, &(0x7f0000001780)=""/206, 0x40f00, 0x8, [], 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000004380)={0x9, 0x1}, 0x8, 0x10, 0x0, 0x0, r6}, 0x78) close(r4) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x3, &(0x7f0000000280)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x6}, @ldst={0x2, 0x0, 0x6, 0x3, 0xa2c1fa458ac8eefe, 0x30}, @func={0x85, 0x0, 0x1, 0x0, 0x3}], &(0x7f00000002c0)='syzkaller\x00', 0x3c, 0xec, &(0x7f0000000480)=""/236, 0x41100, 0x1, [], r2, 0xd, r3, 0x8, &(0x7f0000000300)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x4, 0x10, 0x8001, 0xccc3}, 0x10, r6}, 0x78) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x15, 0x7, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffff9, 0x0, 0x0, 0x0, 0xf03}, [@generic={0x6e, 0x8, 0x2, 0x7, 0x7fffffff}, @ldst={0x0, 0x1, 0x0, 0x4, 0x4c7e8eccdb02473d, 0xffffffffffffffc0, 0xffffffffffffffff}, @map_val={0x18, 0x5, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7}]}, &(0x7f0000000040)='syzkaller\x00', 0x4, 0x18, &(0x7f0000000080)=""/24, 0x41000, 0x2, [], r2, 0x17, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000100)={0x2, 0x2, 0xf9, 0x600}, 0x10, 0xffffffffffffffff}, 0x78) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000240)=0x1) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f00000001c0)=r7) write$cgroup_int(r5, &(0x7f00000003c0)=0x2, 0x12) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[], 0x0) 11:51:01 executing program 0: r0 = perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.events\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f0000000040)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r1, &(0x7f00000002c0)="9d6b8d50d56953c833d20f1ec45b5168faaab7a186d3f57b04a0d1df31013670a3588dfecb7c66ccae501f70bb6f8291b2ded0d44e3bef352ceca393f4b75928204e698de5f0c2f928006626cd86483279619ea28f803710d12e7539856d85300dce315253b2ca3f18f9615d78dffddabcd5fec66594809d47f87e173761e6ab3ce26d63620ea31ce00412adf09b1db429a9c5ef8ea742764e9599e0ff91bdc514f0d3356dc5ef101adb8fcf20caf031e8e2c05328424c1a4537ccc4f52735ad8849dbb657601fbdd1a29f251aebb75ab73580b056dabfb1f5b090a47078", &(0x7f00000000c0)="2f5863b11d76d4a711765a338139be4932edd499ce1d34e7b363288ccc65df90acfc52f01fa194da148cff0ffbf76a04b5fe4d5d8c4fa337533f82703d65243470fca099a1d900fa7021611768ec50ec3c06bcf29ca5c38c5e4f0de9fbb5d7239bca", 0x2}, 0x20) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x8000, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$tipc(r4, 0x0, 0x0) r5 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r5, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r5, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r6, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r8 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r8, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) r9 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000004600)={r9, 0xc0, &(0x7f0000004540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000004400)=0x10ff4015, 0x0, 0x0, 0x0, &(0x7f0000004440)={0x4, 0x4}, 0x0, 0x0, &(0x7f0000004480)={0x0, 0x0, 0x80000000, 0xdc}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001880)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000004840)={0x19, 0x2, &(0x7f0000001700)=@raw=[@ldst={0x2, 0x0, 0x7, 0x8, 0x9, 0x1, 0x12}, @alu={0x4, 0x0, 0x8, 0x6, 0xb, 0x2, 0x1}], &(0x7f0000001740)='syzkaller\x00', 0xd79, 0xce, &(0x7f0000001780)=""/206, 0x40f00, 0x8, [], 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000004380)={0x9, 0x1}, 0x8, 0x10, 0x0, 0x0, r10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x3, &(0x7f0000000280)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x6}, @ldst={0x2, 0x0, 0x6, 0x3, 0xa2c1fa458ac8eefe, 0x30}, @func={0x85, 0x0, 0x1, 0x0, 0x3}], &(0x7f00000002c0)='syzkaller\x00', 0x3c, 0xec, &(0x7f0000000480)=""/236, 0x41100, 0x1, [], r6, 0xd, r7, 0x8, &(0x7f0000000300)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x4, 0x10, 0x8001, 0xccc3}, 0x10, r10}, 0x78) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000001c80)={0x18, 0x11, &(0x7f0000001a40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x9e0}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x9}, @generic={0x8, 0x7, 0xa, 0x1f, 0x7}, @map={0x18, 0x0, 0x1, 0x0, r4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}, @jmp={0x5, 0x1, 0x6, 0x1, 0x0, 0xfffffffffffffff4, 0x4}, @map_val={0x18, 0x2, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x100}, @alu={0x7, 0x0, 0x0, 0xb, 0x6, 0x18}, @jmp={0x5, 0x1, 0xb, 0x8, 0xa, 0x80}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @ldst={0x0, 0x2, 0x0, 0xb, 0x0, 0x2, 0x4}]}, &(0x7f0000001b00)='GPL\x00', 0x0, 0xa7, &(0x7f0000001b40)=""/167, 0xbb15a93c0bb1bc47, 0x2, [], r6, 0x731ef63debc42704, r1, 0x8, &(0x7f0000001c00)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000001c40)={0x1, 0x3, 0x9, 0x2}, 0x10, 0xffffffffffffffff, r1}, 0x78) ioctl$TUNSETFILTEREBPF(r3, 0x800454e1, &(0x7f0000001d00)=r11) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r12 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r12, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r12, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="1c00a4a7f56a000079000000000000009520000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r13, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r14 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r15 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r15, 0x1, 0x3e, &(0x7f00000002c0)=r14, 0x161) r16 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$tipc(r16, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r16, 0x89e1, &(0x7f0000001680)={r12}) r17 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000004600)={r17, 0xc0, &(0x7f0000004540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000004400)=0x10ff4015, 0x0, 0x0, 0x0, &(0x7f0000004440)={0x4, 0x4}, 0x0, 0x0, &(0x7f0000004480)={0x0, 0x0, 0x80000000, 0xdc}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001880)}}, 0x10) r19 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$tipc(r19, 0x0, 0x0) r20 = openat$cgroup(r19, &(0x7f00000016c0)='syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000001980)={0x1, 0x70, 0xb9, 0x3f, 0x80, 0xa7, 0x0, 0x1, 0x41004, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x7, 0x7ff}, 0x2, 0x10b0, 0x101, 0x6, 0x2, 0x7, 0x6}, r20, 0xa, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000004840)={0x19, 0x2, &(0x7f0000001700)=@raw=[@ldst={0x2, 0x0, 0x7, 0x8, 0x9, 0x1, 0x12}, @alu={0x4, 0x0, 0x8, 0x6, 0xb, 0x2, 0x1}], &(0x7f0000001740)='syzkaller\x00', 0xd79, 0xce, &(0x7f0000001780)=""/206, 0x40f00, 0x8, [], 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000004380)={0x9, 0x1}, 0x8, 0x10, 0x0, 0x0, r18}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x3, &(0x7f0000000280)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x6}, @ldst={0x2, 0x0, 0x6, 0x3, 0xa2c1fa458ac8eefe, 0x30}, @func={0x85, 0x0, 0x1, 0x0, 0x3}], &(0x7f00000002c0)='syzkaller\x00', 0x3c, 0xec, &(0x7f0000000480)=""/236, 0x41100, 0x1, [], r13, 0xd, r14, 0x8, &(0x7f0000000300)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x4, 0x10, 0x8001, 0xccc3}, 0x10, r18}, 0x78) sendmsg$inet(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x2, 0x4e24, @multicast1}, 0x10, &(0x7f0000000240)=[{&(0x7f00000005c0)="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", 0x1000}], 0x1, &(0x7f00000018c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r13, @empty, @rand_addr=0x6b19}}}, @ip_retopts={{0x38, 0x0, 0x7, {[@end, @ra={0x94, 0x30f, 0x2}, @ssrr={0x89, 0x17, 0x0, [@rand_addr=0xffffffff, @dev={0xac, 0x14, 0x14, 0x2b}, @loopback, @empty, @remote]}, @timestamp={0x44, 0x0, 0xc0, 0x0, 0x6, [{[@dev={0xac, 0x14, 0x14, 0xd}], 0x20b}, {[], 0x8}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x5}]}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0xfffffff7}}, @ip_ttl={{0x14, 0x0, 0x2, 0x3}}], 0x4c}, 0x97f7caa5804e9286) write$cgroup_subtree(r2, &(0x7f0000001d40)=ANY=[@ANYBLOB="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"], 0x90ad) 11:51:01 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) 11:51:01 executing program 2: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f0000000100)={0x0, 0x70, 0x3, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x0, 0x0, 0x0, 0x4f78b3bf39b888aa, 0x0, 0x5, 0x3}, r1, 0x0, 0xffffffffffffffff, 0x8) r2 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000000)={0xa, 0x1ff, 0x4, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r2, &(0x7f0000000340), &(0x7f0000000400)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000c88000)={r2, &(0x7f0000847f95), &(0x7f000089b000)}, 0x20) r3 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, &(0x7f0000000340), 0x0}, 0x20) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/285, @ANYPTR=&(0x7f0000000400)=ANY=[@ANYRES16=0x0, @ANYRES16=r3, @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYRESOCT=r0, @ANYRESHEX]]], 0x35) openat$cgroup_ro(r1, &(0x7f0000000440)='cpuacct.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140), 0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x1}, 0xc) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2000) perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x7f, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000400)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) 11:51:01 executing program 4: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f00000002c0)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x10ad) 11:51:01 executing program 0: r0 = perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}, 0x1000, 0x0, 0xc4, 0x0, 0x0, 0x9}, 0x0, 0xe, r2, 0x0) write$cgroup_subtree(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="2d696f2000637075203e6d656f6f727920881e9b83e243a0d27d14f79f628af0179d62d2dc2baff8bb5366919a8941bedcd5bf8bd905f1e1db3bdbf46737f786d246c6dd3c58a4a1d45b5ff8ffcd6066ffe49a43f487fc55281ce6d23d2bc0974e0f331f75ab9c2c6301b09e082dd4d1d7e64dcb2bcc03eff1b7fb6ddf012e3e5adb9e30ba7f8b522a878a7ae9ccb282de85d638e94312e1cba40ed6fb7b0067f85378cde0f8ff92278b9cee80db033205676bc4bb0ad2495b86df3a0beab17801c378ce53b320aa7887b1002ddaccc21c4f8f2c9c2d1307c2ea62e53cdc4d1f35eec1d959b02612072291dd62"], 0xffffffffffffff9b) r3 = getpid() r4 = gettid() r5 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x2, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80, 0x0, @perf_config_ext={0x9, 0x5}, 0x0, 0x0, 0xffffffff, 0x0, 0x7, 0x4}, r4, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000280)='veth0\x00') perf_event_open(&(0x7f0000000000)={0x6, 0x70, 0x7, 0x7, 0x5, 0x40, 0x0, 0x0, 0x400, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x8, 0x9}, 0x8000, 0xfffffffffffffffb, 0x3ff, 0x1, 0x9b, 0x101, 0x4}, r3, 0x0, r5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f00000001c0)='/&\':vmnet1wlan1self\x00'}, 0x30) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0xc0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440), 0x0, 0x0, 0x0, &(0x7f0000000480)={0x0, 0x3}, 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x2, 0x4717, 0x800}, &(0x7f0000000500), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=0x2}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000680)={r6, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000400)='\x00', r7}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, r0, 0x0, 0x5, &(0x7f0000000000)='nr0\x01\x00', r7}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={r3, r8, 0x0, 0x377, &(0x7f0000000100)='@#,/-\x00'}, 0x30) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}, 0x1000, 0x0, 0xc4, 0x0, 0x0, 0x9}, 0x0, 0xe, r9, 0x0) write$cgroup_subtree(r9, &(0x7f0000000200)={[{0x50, 'io'}, {0x2b, 'pids'}, {0x0, 'rdma'}]}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r2, 0x0, 0xd3, 0x40, &(0x7f00000006c0)="6e48416e3051f6e8f95112d9aea2c327c01ffed147d5c6496381af0e5a351f88de316ad416f0e0def2cb8edab542a2d9d2f01b34727366d3d8c6a967af2d31c2bea2a4257041a101e06caf86080d788fb1c69f9af24c1e91a7bb39a471ff5098d4811d1f1fef6bfc7127d73a2fbe2e75e23f8095609f7fe23905f611ecbb3a89095b2bc87839e32648bc235bee7f21fc93998e0d4a3a0c17eab70f7eb06aa7615e707a2d2d06ac300ef7229fc05e2e1d51a1353e284034610af964cfb6ac24402cb2cb3a450be2dec3fca6e916a287a56abf8d", &(0x7f00000000c0)=""/64, 0x80000000, 0x0, 0x1000, 0x20, &(0x7f0000000d80)="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", &(0x7f0000000240)="92f96bebbe527f44069b164aa952f1a6af3bc52f754c2e1adab313bee0b23661"}, 0x40) [ 1494.515504][ T7721] device nr0 entered promiscuous mode 11:51:01 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) 11:51:01 executing program 2 (fault-call:5 fault-nth:0): socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) close(0xffffffffffffffff) socket$kcm(0x29, 0x0, 0x0) [ 1494.741902][ T7731] FAULT_INJECTION: forcing a failure. [ 1494.741902][ T7731] name failslab, interval 1, probability 0, space 0, times 0 [ 1494.764328][ T7731] CPU: 1 PID: 7731 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1494.773035][ T7731] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1494.783106][ T7731] Call Trace: [ 1494.786420][ T7731] dump_stack+0x197/0x210 [ 1494.790781][ T7731] should_fail.cold+0xa/0x15 [ 1494.795433][ T7731] ? fault_create_debugfs_attr+0x180/0x180 [ 1494.801275][ T7731] ? ___might_sleep+0x163/0x2c0 [ 1494.806154][ T7731] __should_failslab+0x121/0x190 [ 1494.811105][ T7731] should_failslab+0x9/0x14 [ 1494.815617][ T7731] kmem_cache_alloc_trace+0x2d3/0x790 [ 1494.821009][ T7731] htab_map_alloc+0xe3/0x11c0 [ 1494.825718][ T7731] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1494.831990][ T7731] ? htab_map_update_elem+0xca0/0xca0 [ 1494.837389][ T7731] __do_sys_bpf+0x478/0x3610 [ 1494.842000][ T7731] ? bpf_prog_load+0x1960/0x1960 [ 1494.846947][ T7731] ? __kasan_check_write+0x14/0x20 [ 1494.852062][ T7731] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1494.857617][ T7731] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1494.862909][ T7731] ? wait_for_completion+0x440/0x440 [ 1494.868216][ T7731] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1494.874481][ T7731] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1494.879943][ T7731] ? do_syscall_64+0x26/0x790 [ 1494.884618][ T7731] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1494.890774][ T7731] ? do_syscall_64+0x26/0x790 [ 1494.895443][ T7731] __x64_sys_bpf+0x73/0xb0 [ 1494.899921][ T7731] do_syscall_64+0xfa/0x790 [ 1494.904418][ T7731] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1494.910297][ T7731] RIP: 0033:0x45a919 [ 1494.914176][ T7731] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1494.933773][ T7731] RSP: 002b:00007fd87ec79c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1494.942179][ T7731] RAX: ffffffffffffffda RBX: 00007fd87ec79c90 RCX: 000000000045a919 [ 1494.950312][ T7731] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1494.958271][ T7731] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1494.966239][ T7731] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd87ec7a6d4 [ 1494.974210][ T7731] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 11:51:02 executing program 2 (fault-call:5 fault-nth:1): socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) close(0xffffffffffffffff) socket$kcm(0x29, 0x0, 0x0) 11:51:02 executing program 0: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x46000, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f00000001c0)=""/41) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000018c0)={&(0x7f0000001640)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000001780)=[{&(0x7f00000016c0)=""/141, 0x8d}], 0x1, &(0x7f00000017c0)=""/227, 0xe3}, 0x40010000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001900)={0x13, 0x8000, 0x5, 0x9, 0x200, r2, 0x5, [], r3, 0xffffffffffffffff, 0x4, 0x2}, 0x3c) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) [ 1495.120089][ T7735] FAULT_INJECTION: forcing a failure. [ 1495.120089][ T7735] name failslab, interval 1, probability 0, space 0, times 0 11:51:02 executing program 0: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$tipc(r0, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, &(0x7f0000000100)=[{&(0x7f00000001c0)=""/146, 0x92}, {&(0x7f00000002c0)=""/172, 0xac}], 0x2, &(0x7f0000000380)=""/110, 0x6e}, 0x2000) sendmsg$kcm(r0, &(0x7f0000000d40)={&(0x7f0000000480)=@pppol2tpv3in6={0x18, 0x1, {0x0, r1, 0x3, 0x1, 0x1, 0x4, {0xa, 0x4e20, 0x8, @loopback}}}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000500)="eebfbf35537bfb3fa814cc3797510894cfae8d9aa2e1a90bfcfa0fe29318f0a21ecd1747c9ec2cf9bab81168d5c84a7f5a54fb658d5354ff44ccd5790b2b400ff40777a021cbfaad2d2cb0ee4056cbc2aaac7c8e95208d05e3a9362c8d38df6e3905f8f3471fdc96da0bfad34721b19887e0746842cdbe6895085ac5f49e4638125fb0f06855e4de0b705a1a2fbf3798aa925961f96dea73e90511d907a4ef46ffd7ddb9aedf56b09fe875b45705307d1f696677b618e560a54052b93ad2f0128ee2af5bc03fe7e35d0fc2465a302401488b30777d2ab448f53173ed304d76b5ad582e3a06e4a9", 0xe7}, {&(0x7f0000000600)="a17a102aa0d6d8ddff66a0f0acb4086f3f446b362c0fd35b825b773a7f6490e6c6f32830890b1cebe9dbea", 0x2b}, {&(0x7f0000000640)="1559596024b786bf7b86b663bc3f97f309809614e367cb852d8a1980d6381d2b85174571fa29562d7e77a923b03293e58c4e03341aa2a5e51e40b7c1cac0b2b04453e2fa4dbd791aa73efd7048c018f34101ed6554da565c31beafcb29d6d70a51e3f5017097e3d5ba223bc4358ede5f88b5185a2ccc88e152158a93772121f008e592b979f786d078e9a9b57b1b863cc95c509e1149592c2a624e7285", 0x9d}, {&(0x7f0000000700)="15f2d7de5e2d152d3f3361752c5a4116fa0a314b29ac61cdf54b6785d908effac47ca9a6bd23ba92aa5fcfeb408bde8382e0c99a5b2760be15c95593f391a36f793a638eb3443157588c04bde893d69cad0d996b7cb6dd555d84c1fbec7b37c7ccb06c7dac69c2d4166e7e3cd696b3233e837e3cb3de126526f3912066fba5ef5beb9c2d417095d1faed817fd6572d60379165b904ccfde0e519bc7542e9dcce53c6beb547648a93a4dd760a3dc5ff5ac4108a794b565248c935d9a052f2cc15ee50e3817e447c75294905", 0xcb}, {&(0x7f0000000800)="cf92c3634ccbcabb163e2ab687c8188a8e232b5e2e24856cdc7de9cab6ab5f72cf4e1cb8d3d31045b9307df5773fd5082169e5ff89ded6f1b7923123559692616bacd610c51eff0fc69c0db39ba342eac2d61f55cf26", 0x56}], 0x5, &(0x7f0000000900)=[{0x30, 0x119, 0x0, "96d965f5bb642403c0c8592affc88993bad13e4b6d6095f383037249414257"}, {0x18, 0x111, 0x8, "bbd5cef4"}, {0xf0, 0x112, 0x81, "823ad45f95d68ff6c7aed16a0b6046e6fc678adfa854b271ae892994c0bd542e970510cb3e1bfc66ad58e1476eaff953216f820b36d076d5d0ef30dcd03b687534b0c24e6db419b9e6e6d170a77f8eb860d0796314b41e71af31d215cece7f9995dfeae6d5968465c7e94ac9aaff43c9dcb2d58155aa08d446f520e995b5d3da38fbab6f1a712e9249c72b51fabda08b806b112313a1feb321908960606f7b66c0ffedfb626ad365ddb82c4de950e1ef7f6d6a6cbc8fcc1236b5e3e580be4978d03221494b8b37affcf372513789b63ab4f0fdaeefe0fed810d0ebc6344dce"}, {0xe0, 0x112, 0x5, "1b977898c2e46608d8441457342ece4de9a91001842135301517e4ef860e4bf0809f3abfb79f93b98b2acf23128035b4ea6864156a2f322688450e61891e4ccdd6eae8a98912e82128a88045787f8a1af28a39a0fbb3b63cb4461fb94469e15287cc863955fc6362afe7891a1d21976650a9a68716fdca8ff7849da298325a248d44373bc160a0009085da41c132b1a6387f1bc39780c39f33df35b8e710c1d813f200ceaf71491c22d87ac2e130e4d9ae51bff6d833abc8466b6ce8242b78ff78e3d22996481bb9b2cc03ea"}, {0x70, 0x113, 0x3, "a6d63dfd2f20dc97dcf1cc210f374611905ac04475a9ba5b3569d0f03b023f629926c04ccaa8b4d1e855891c432ac50d8d4305484cc7adb808bdd32aa9bb187bf86a44f1eb67fa4ccd5daf461db51fc5781ad8ed034456353560"}, {0xb8, 0x107, 0x42, "599ba9a6cd89182af88b51870d97f543ef8b19444a7e9d0d155a6a6aebd834683a1efdb4dbfa5fff6f8c0aa8c1fdb90b3c1fbf5138be46357f9e370f7d5fa913e84537bbb406cefdfa321ad62cf15409e1e44e2104f590f0f7a5115cc3f63e27e0098880edcbbceba133223f16062fbce1b108efc33c3625a5f9df70452edc9a16cbab1ef93e8490947c42a980200695daaad28db1a1a82fddfba398a1996e19163e2eeadea1bafb"}, {0xe8, 0x3a, 0xc5d, "e3117f0d3cc9dbb6a33b032261bacaaddc8ec0ceab4ad3edc95bd66272b5ea8cbf90850d7b3f68b3202c8a70340abc7b8aaa98e863d60181b7793002b1432f05662eeff8996423793bf35228a8b19d9d1d9fa8606c256106391bb9298770da1b57d166dc6bb84f3271270f0a2391dc0d630316ee9f7fc1200602b623c80eb5601c952f85a3ee97480c04fbbdbef910ef5ed9ee0ac806338fdfdfc7d2ae9bd01e36002482772838b50fa0d7b7ce37cb8e077811204e91a13c76c942d293c120e97f7327567942f95a6f110f687e8f2919399a8755e1688a"}], 0x428}, 0xd7fc21670db677c2) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}, 0x1000, 0x0, 0xc4, 0x0, 0x0, 0x9}, 0x0, 0xe, r2, 0x0) ioctl$TUNSETVNETBE(r2, 0x400454de, &(0x7f0000000d80)) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) [ 1495.179329][ T7735] CPU: 0 PID: 7735 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1495.187963][ T7735] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1495.198033][ T7735] Call Trace: [ 1495.201351][ T7735] dump_stack+0x197/0x210 [ 1495.205699][ T7735] should_fail.cold+0xa/0x15 [ 1495.210303][ T7735] ? fault_create_debugfs_attr+0x180/0x180 [ 1495.216118][ T7735] ? ___might_sleep+0x163/0x2c0 [ 1495.220991][ T7735] __should_failslab+0x121/0x190 [ 1495.225950][ T7735] should_failslab+0x9/0x14 [ 1495.230511][ T7735] kmem_cache_alloc_node_trace+0x274/0x750 [ 1495.236332][ T7735] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1495.241895][ T7735] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1495.247885][ T7735] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1495.253701][ T7735] __kmalloc_node+0x3d/0x70 [ 1495.258193][ T7735] __bpf_map_area_alloc+0xbd/0xf0 [ 1495.263216][ T7735] bpf_map_area_alloc+0x20/0x30 [ 1495.268065][ T7735] htab_map_alloc+0x589/0x11c0 [ 1495.272841][ T7735] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1495.279085][ T7735] ? htab_map_update_elem+0xca0/0xca0 [ 1495.284463][ T7735] __do_sys_bpf+0x478/0x3610 [ 1495.289046][ T7735] ? bpf_prog_load+0x1960/0x1960 [ 1495.293980][ T7735] ? __kasan_check_write+0x14/0x20 [ 1495.299135][ T7735] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1495.304717][ T7735] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1495.309993][ T7735] ? wait_for_completion+0x440/0x440 [ 1495.315271][ T7735] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1495.321516][ T7735] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1495.326970][ T7735] ? do_syscall_64+0x26/0x790 [ 1495.331649][ T7735] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1495.337702][ T7735] ? do_syscall_64+0x26/0x790 [ 1495.342398][ T7735] __x64_sys_bpf+0x73/0xb0 [ 1495.346820][ T7735] do_syscall_64+0xfa/0x790 [ 1495.351328][ T7735] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1495.357214][ T7735] RIP: 0033:0x45a919 [ 1495.361107][ T7735] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1495.380700][ T7735] RSP: 002b:00007fd87ec79c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1495.389113][ T7735] RAX: ffffffffffffffda RBX: 00007fd87ec79c90 RCX: 000000000045a919 [ 1495.397086][ T7735] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1495.405043][ T7735] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1495.413013][ T7735] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd87ec7a6d4 [ 1495.420981][ T7735] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 11:51:02 executing program 0: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}, 0x1000, 0x0, 0xc4, 0x0, 0x0, 0x9}, 0x0, 0xe, r1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f00000001c0)='/&\':vmnet1wlan1self\x00'}, 0x30) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0xc0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440), 0x0, 0x0, 0x0, &(0x7f0000000480)={0x0, 0x3}, 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x2, 0x4717, 0x800}, &(0x7f0000000500), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=0x2}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000680)={r2, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000400)='\x00', r3}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, r1, 0x0, 0x6, &(0x7f0000000000)='wlan1\x00', r3}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r4}, 0xc) 11:51:02 executing program 4: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f00000002c0)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x10ad) 11:51:02 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) write$cgroup_subtree(r0, &(0x7f0000000000)={[{0x2b, 'cpu'}, {0x6, 'io'}, {0x2d, 'rdma'}]}, 0xf) 11:51:02 executing program 3 (fault-call:3 fault-nth:0): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) 11:51:02 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$tipc(r1, 0x0, 0x0) r2 = perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0xba, 0x80, 0xff, 0x0, 0x0, 0x9, 0x800, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfffffea0, 0x4, @perf_bp={&(0x7f0000000000), 0xb}, 0xbf8ebf3a0cf6a553, 0x6, 0x200, 0x0, 0x8000, 0x17c, 0xe5}, 0x0, 0xf, r1, 0xa) r3 = getpid() r4 = gettid() r5 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x2, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80, 0x0, @perf_config_ext={0x9, 0x5}, 0x0, 0x0, 0xffffffff, 0x0, 0x7, 0x4}, r4, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000280)='veth0\x00') perf_event_open(&(0x7f0000000000)={0x6, 0x70, 0x7, 0x7, 0x5, 0x40, 0x0, 0x0, 0x400, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x8, 0x9}, 0x8000, 0xfffffffffffffffb, 0x3ff, 0x1, 0x9b, 0x101, 0x4}, r3, 0x0, r5, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}, 0x1000, 0x0, 0xc4, 0x0, 0x0, 0x9}, 0x0, 0xe, r6, 0x0) r7 = perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x0, 0x2, 0x4, 0x8, 0x0, 0x1, 0x8, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xffff, 0x0, @perf_config_ext={0x5, 0x7}, 0x200, 0x8, 0xffffffe1, 0x6, 0x9, 0x1f, 0x3}, r3, 0xf, r6, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r7) write$cgroup_subtree(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="00000000005c7c081c724fa85683b86bb37ec7a9431425eddda7c4b6cc649e70d5dc20712d48218200ce630bb9d49b43a6855f5562ca518b6871b8f5ac48e7ee414098e1cf0782d282ef0221672708945b6bd586a0a626245d6bc8af6759acf7040b8e5ebb8d38bced2a76b1d8a5826342545c19289f08c00885dfb64a80137f54c57dc34f2fc71cf030b6897a61af7606953642337fa45ae43a3c3338"], 0x90ad) 11:51:02 executing program 2 (fault-call:5 fault-nth:2): socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) close(0xffffffffffffffff) socket$kcm(0x29, 0x0, 0x0) [ 1495.678396][ T7751] device nr0 entered promiscuous mode 11:51:03 executing program 0: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000040), 0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x10, 0x2, 0x5, &(0x7f0000000000)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) [ 1495.786408][ T7767] FAULT_INJECTION: forcing a failure. [ 1495.786408][ T7767] name failslab, interval 1, probability 0, space 0, times 0 [ 1495.798595][ T7766] FAULT_INJECTION: forcing a failure. [ 1495.798595][ T7766] name failslab, interval 1, probability 0, space 0, times 0 [ 1495.819412][ T7767] CPU: 1 PID: 7767 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1495.828126][ T7767] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1495.838195][ T7767] Call Trace: [ 1495.842119][ T7767] dump_stack+0x197/0x210 [ 1495.846469][ T7767] should_fail.cold+0xa/0x15 [ 1495.851083][ T7767] ? fault_create_debugfs_attr+0x180/0x180 [ 1495.857041][ T7767] ? ___might_sleep+0x163/0x2c0 [ 1495.862013][ T7767] __should_failslab+0x121/0x190 [ 1495.866980][ T7767] should_failslab+0x9/0x14 [ 1495.871500][ T7767] __kmalloc+0x2e0/0x770 [ 1495.875760][ T7767] ? mark_held_locks+0xf0/0xf0 [ 1495.880541][ T7767] ? mark_lock+0xc2/0x1220 [ 1495.884956][ T7767] ? _parse_integer+0x190/0x190 [ 1495.889813][ T7767] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1495.896072][ T7767] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 1495.901807][ T7767] tomoyo_realpath_from_path+0xcd/0x7b0 [ 1495.907358][ T7767] ? tomoyo_path_number_perm+0x193/0x520 [ 1495.912998][ T7767] tomoyo_path_number_perm+0x1dd/0x520 [ 1495.918447][ T7767] ? tomoyo_path_number_perm+0x193/0x520 [ 1495.924075][ T7767] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1495.929870][ T7767] ? __f_unlock_pos+0x19/0x20 [ 1495.934569][ T7767] ? __fget+0x37f/0x550 [ 1495.938734][ T7767] ? ksys_dup3+0x3e0/0x3e0 [ 1495.943155][ T7767] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1495.949416][ T7767] ? fput_many+0x12c/0x1a0 [ 1495.953865][ T7767] tomoyo_file_ioctl+0x23/0x30 [ 1495.958663][ T7767] security_file_ioctl+0x77/0xc0 [ 1495.963671][ T7767] ksys_ioctl+0x57/0xd0 [ 1495.967851][ T7767] __x64_sys_ioctl+0x73/0xb0 [ 1495.972457][ T7767] do_syscall_64+0xfa/0x790 [ 1495.976981][ T7767] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1495.982966][ T7767] RIP: 0033:0x45a919 [ 1495.986861][ T7767] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1496.006822][ T7767] RSP: 002b:00007fb654c79c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1496.015253][ T7767] RAX: ffffffffffffffda RBX: 00007fb654c79c90 RCX: 000000000045a919 [ 1496.023237][ T7767] RDX: 0000000000000000 RSI: 00000000000054e3 RDI: 0000000000000003 [ 1496.031653][ T7767] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1496.039728][ T7767] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb654c7a6d4 [ 1496.047716][ T7767] R13: 00000000004c5f29 R14: 00000000004dc2d8 R15: 0000000000000005 [ 1496.060258][ T7766] CPU: 0 PID: 7766 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1496.068881][ T7766] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1496.078970][ T7766] Call Trace: [ 1496.082277][ T7766] dump_stack+0x197/0x210 [ 1496.086627][ T7766] should_fail.cold+0xa/0x15 [ 1496.091229][ T7766] ? fault_create_debugfs_attr+0x180/0x180 [ 1496.097052][ T7766] ? ___might_sleep+0x163/0x2c0 [ 1496.101937][ T7766] __should_failslab+0x121/0x190 [ 1496.106893][ T7766] should_failslab+0x9/0x14 [ 1496.111405][ T7766] kmem_cache_alloc_node_trace+0x274/0x750 [ 1496.117220][ T7766] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1496.123475][ T7766] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1496.129735][ T7766] ? debug_smp_processor_id+0x33/0x18a [ 1496.135216][ T7766] __get_vm_area_node+0x12b/0x4f0 [ 1496.140922][ T7766] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1496.146500][ T7766] __vmalloc_node_range+0xd4/0x810 [ 1496.151624][ T7766] ? bpf_map_area_alloc+0x20/0x30 [ 1496.156661][ T7766] ? kasan_unpoison_shadow+0x35/0x50 [ 1496.161964][ T7766] ? bpf_map_area_alloc+0x20/0x30 [ 1496.166999][ T7766] __vmalloc_node_flags_caller+0x71/0x90 [ 1496.172645][ T7766] ? bpf_map_area_alloc+0x20/0x30 [ 1496.177686][ T7766] __bpf_map_area_alloc+0xde/0xf0 [ 1496.182726][ T7766] bpf_map_area_alloc+0x20/0x30 [ 1496.187587][ T7766] htab_map_alloc+0x8d3/0x11c0 [ 1496.192385][ T7766] ? htab_map_update_elem+0xca0/0xca0 [ 1496.197857][ T7766] __do_sys_bpf+0x478/0x3610 [ 1496.202462][ T7766] ? bpf_prog_load+0x1960/0x1960 [ 1496.207407][ T7766] ? __kasan_check_write+0x14/0x20 [ 1496.212529][ T7766] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1496.218086][ T7766] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1496.220285][ T7767] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1496.223380][ T7766] ? wait_for_completion+0x440/0x440 [ 1496.223410][ T7766] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1496.223444][ T7766] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1496.223460][ T7766] ? do_syscall_64+0x26/0x790 [ 1496.223480][ T7766] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1496.258285][ T7766] ? do_syscall_64+0x26/0x790 [ 1496.262975][ T7766] __x64_sys_bpf+0x73/0xb0 [ 1496.267398][ T7766] do_syscall_64+0xfa/0x790 [ 1496.271931][ T7766] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1496.277877][ T7766] RIP: 0033:0x45a919 [ 1496.281773][ T7766] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1496.301368][ T7766] RSP: 002b:00007fd87ec79c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1496.309819][ T7766] RAX: ffffffffffffffda RBX: 00007fd87ec79c90 RCX: 000000000045a919 [ 1496.317785][ T7766] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1496.325808][ T7766] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1496.333770][ T7766] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd87ec7a6d4 [ 1496.342275][ T7766] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 11:51:03 executing program 2 (fault-call:5 fault-nth:3): socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) close(0xffffffffffffffff) socket$kcm(0x29, 0x0, 0x0) 11:51:03 executing program 0: r0 = perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) recvmsg$kcm(r0, &(0x7f000000c700)={&(0x7f000000c5c0)=@can={0x1d, 0x0}, 0x80, &(0x7f000000c640), 0x0, &(0x7f000000c680)=""/91, 0x5b}, 0x4020) ioctl$TUNSETIFINDEX(r2, 0x400454da, &(0x7f000000c740)=r3) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) [ 1496.508104][ T7779] FAULT_INJECTION: forcing a failure. [ 1496.508104][ T7779] name failslab, interval 1, probability 0, space 0, times 0 [ 1496.538924][ T7779] CPU: 0 PID: 7779 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1496.547561][ T7779] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1496.557645][ T7779] Call Trace: [ 1496.560931][ T7779] dump_stack+0x197/0x210 [ 1496.565255][ T7779] should_fail.cold+0xa/0x15 [ 1496.569829][ T7779] ? htab_map_alloc+0x8d3/0x11c0 [ 1496.574755][ T7779] ? fault_create_debugfs_attr+0x180/0x180 [ 1496.580553][ T7779] ? ___might_sleep+0x163/0x2c0 [ 1496.585395][ T7779] __should_failslab+0x121/0x190 [ 1496.590317][ T7779] should_failslab+0x9/0x14 [ 1496.594801][ T7779] kmem_cache_alloc_node+0x268/0x740 [ 1496.600079][ T7779] ? ___might_sleep+0x163/0x2c0 [ 1496.604934][ T7779] alloc_vmap_area+0x147/0x2030 [ 1496.609779][ T7779] ? __get_vm_area_node+0x12b/0x4f0 [ 1496.614985][ T7779] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1496.620522][ T7779] ? purge_vmap_area_lazy+0x40/0x40 [ 1496.625721][ T7779] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1496.631955][ T7779] ? debug_smp_processor_id+0x33/0x18a [ 1496.637412][ T7779] __get_vm_area_node+0x179/0x4f0 [ 1496.642443][ T7779] __vmalloc_node_range+0xd4/0x810 [ 1496.647555][ T7779] ? bpf_map_area_alloc+0x20/0x30 [ 1496.652566][ T7779] ? kasan_unpoison_shadow+0x35/0x50 [ 1496.657852][ T7779] ? bpf_map_area_alloc+0x20/0x30 [ 1496.662873][ T7779] __vmalloc_node_flags_caller+0x71/0x90 [ 1496.668518][ T7779] ? bpf_map_area_alloc+0x20/0x30 [ 1496.673542][ T7779] __bpf_map_area_alloc+0xde/0xf0 [ 1496.678564][ T7779] bpf_map_area_alloc+0x20/0x30 [ 1496.683414][ T7779] htab_map_alloc+0x8d3/0x11c0 [ 1496.688176][ T7779] ? htab_map_update_elem+0xca0/0xca0 [ 1496.693545][ T7779] __do_sys_bpf+0x478/0x3610 [ 1496.698120][ T7779] ? bpf_prog_load+0x1960/0x1960 [ 1496.703077][ T7779] ? __kasan_check_write+0x14/0x20 [ 1496.708201][ T7779] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1496.713744][ T7779] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1496.719015][ T7779] ? wait_for_completion+0x440/0x440 [ 1496.724314][ T7779] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1496.730560][ T7779] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1496.736006][ T7779] ? do_syscall_64+0x26/0x790 [ 1496.740666][ T7779] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1496.746730][ T7779] ? do_syscall_64+0x26/0x790 [ 1496.751409][ T7779] __x64_sys_bpf+0x73/0xb0 [ 1496.755917][ T7779] do_syscall_64+0xfa/0x790 [ 1496.760406][ T7779] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1496.766280][ T7779] RIP: 0033:0x45a919 [ 1496.770170][ T7779] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1496.789771][ T7779] RSP: 002b:00007fd87ec79c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1496.798170][ T7779] RAX: ffffffffffffffda RBX: 00007fd87ec79c90 RCX: 000000000045a919 [ 1496.806126][ T7779] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1496.814086][ T7779] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1496.822098][ T7779] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd87ec7a6d4 [ 1496.830062][ T7779] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 11:51:04 executing program 4: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f00000002c0)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x10ad) 11:51:04 executing program 0: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$tipc(r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000000)=0x7) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 11:51:04 executing program 2 (fault-call:5 fault-nth:4): socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) close(0xffffffffffffffff) socket$kcm(0x29, 0x0, 0x0) 11:51:04 executing program 3 (fault-call:3 fault-nth:1): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) [ 1497.031922][ T7791] device nr0 entered promiscuous mode [ 1497.034609][ T7790] FAULT_INJECTION: forcing a failure. [ 1497.034609][ T7790] name failslab, interval 1, probability 0, space 0, times 0 [ 1497.085706][ T7790] CPU: 1 PID: 7790 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1497.094333][ T7790] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1497.104403][ T7790] Call Trace: [ 1497.107720][ T7790] dump_stack+0x197/0x210 [ 1497.112081][ T7790] should_fail.cold+0xa/0x15 [ 1497.116758][ T7790] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1497.123047][ T7790] ? fault_create_debugfs_attr+0x180/0x180 [ 1497.128874][ T7790] ? ___might_sleep+0x163/0x2c0 [ 1497.133749][ T7790] __should_failslab+0x121/0x190 [ 1497.138708][ T7790] should_failslab+0x9/0x14 [ 1497.143217][ T7790] kmem_cache_alloc_node+0x268/0x740 [ 1497.148509][ T7790] ? ___might_sleep+0x163/0x2c0 [ 1497.153398][ T7790] alloc_vmap_area+0xc8d/0x2030 [ 1497.158259][ T7790] ? __get_vm_area_node+0x12b/0x4f0 [ 1497.163466][ T7790] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1497.169036][ T7790] ? purge_vmap_area_lazy+0x40/0x40 [ 1497.174237][ T7790] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1497.180481][ T7790] ? debug_smp_processor_id+0x33/0x18a [ 1497.185948][ T7790] __get_vm_area_node+0x179/0x4f0 [ 1497.190972][ T7790] __vmalloc_node_range+0xd4/0x810 [ 1497.196093][ T7790] ? bpf_map_area_alloc+0x20/0x30 [ 1497.201116][ T7790] ? kasan_unpoison_shadow+0x35/0x50 [ 1497.206404][ T7790] ? bpf_map_area_alloc+0x20/0x30 [ 1497.211420][ T7790] __vmalloc_node_flags_caller+0x71/0x90 [ 1497.217042][ T7790] ? bpf_map_area_alloc+0x20/0x30 [ 1497.222073][ T7790] __bpf_map_area_alloc+0xde/0xf0 [ 1497.227090][ T7790] bpf_map_area_alloc+0x20/0x30 [ 1497.232030][ T7790] htab_map_alloc+0x8d3/0x11c0 [ 1497.236799][ T7790] ? htab_map_update_elem+0xca0/0xca0 [ 1497.242180][ T7790] __do_sys_bpf+0x478/0x3610 [ 1497.246778][ T7790] ? bpf_prog_load+0x1960/0x1960 [ 1497.251718][ T7790] ? __kasan_check_write+0x14/0x20 [ 1497.256823][ T7790] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1497.262361][ T7790] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1497.267647][ T7790] ? wait_for_completion+0x440/0x440 [ 1497.272932][ T7790] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1497.279180][ T7790] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1497.284627][ T7790] ? do_syscall_64+0x26/0x790 [ 1497.289304][ T7790] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1497.295359][ T7790] ? do_syscall_64+0x26/0x790 [ 1497.300032][ T7790] __x64_sys_bpf+0x73/0xb0 [ 1497.304445][ T7790] do_syscall_64+0xfa/0x790 [ 1497.308945][ T7790] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1497.314841][ T7790] RIP: 0033:0x45a919 [ 1497.318727][ T7790] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1497.338323][ T7790] RSP: 002b:00007fd87ec79c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1497.346724][ T7790] RAX: ffffffffffffffda RBX: 00007fd87ec79c90 RCX: 000000000045a919 [ 1497.354771][ T7790] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1497.362740][ T7790] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1497.370709][ T7790] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd87ec7a6d4 [ 1497.378672][ T7790] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 [ 1497.404241][ T7798] FAULT_INJECTION: forcing a failure. [ 1497.404241][ T7798] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 1497.417476][ T7798] CPU: 1 PID: 7798 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1497.426070][ T7798] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1497.436137][ T7798] Call Trace: [ 1497.439456][ T7798] dump_stack+0x197/0x210 [ 1497.443792][ T7798] should_fail.cold+0xa/0x15 [ 1497.448401][ T7798] ? fault_create_debugfs_attr+0x180/0x180 [ 1497.454226][ T7798] ? __kasan_check_read+0x11/0x20 [ 1497.459253][ T7798] ? mark_lock+0xc2/0x1220 [ 1497.463672][ T7798] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1497.469935][ T7798] should_fail_alloc_page+0x50/0x60 [ 1497.475157][ T7798] __alloc_pages_nodemask+0x1a1/0x910 [ 1497.480551][ T7798] ? __lockdep_free_key_range+0x120/0x120 [ 1497.486285][ T7798] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1497.492195][ T7798] ? __kasan_check_read+0x11/0x20 [ 1497.497242][ T7798] ? fault_create_debugfs_attr+0x180/0x180 [ 1497.503087][ T7798] cache_grow_begin+0x90/0xc60 [ 1497.507888][ T7798] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 1497.513627][ T7798] ? trace_hardirqs_off+0x62/0x240 [ 1497.518757][ T7798] __kmalloc+0x6b2/0x770 [ 1497.523012][ T7798] ? mark_held_locks+0xf0/0xf0 [ 1497.527788][ T7798] ? mark_lock+0xc2/0x1220 [ 1497.532221][ T7798] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1497.538474][ T7798] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 1497.544208][ T7798] tomoyo_realpath_from_path+0xcd/0x7b0 [ 1497.549763][ T7798] ? tomoyo_path_number_perm+0x193/0x520 [ 1497.555415][ T7798] tomoyo_path_number_perm+0x1dd/0x520 [ 1497.560887][ T7798] ? tomoyo_path_number_perm+0x193/0x520 [ 1497.566543][ T7798] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1497.572370][ T7798] ? __f_unlock_pos+0x19/0x20 [ 1497.577113][ T7798] ? __fget+0x37f/0x550 [ 1497.581322][ T7798] ? ksys_dup3+0x3e0/0x3e0 [ 1497.585751][ T7798] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1497.592023][ T7798] ? fput_many+0x12c/0x1a0 [ 1497.596464][ T7798] tomoyo_file_ioctl+0x23/0x30 [ 1497.601244][ T7798] security_file_ioctl+0x77/0xc0 [ 1497.606194][ T7798] ksys_ioctl+0x57/0xd0 [ 1497.610362][ T7798] __x64_sys_ioctl+0x73/0xb0 [ 1497.614961][ T7798] do_syscall_64+0xfa/0x790 [ 1497.619478][ T7798] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1497.625379][ T7798] RIP: 0033:0x45a919 [ 1497.629280][ T7798] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 11:51:04 executing program 0: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0xd0d, 0x8}, 0xc) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000040)=r0, 0x4) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$tipc(r1, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$tipc(r2, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r2, 0x0, &(0x7f00000002c0)="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", 0x7}, 0x20) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) close(r0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) [ 1497.648916][ T7798] RSP: 002b:00007fb654c79c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1497.657337][ T7798] RAX: ffffffffffffffda RBX: 00007fb654c79c90 RCX: 000000000045a919 [ 1497.665321][ T7798] RDX: 0000000000000000 RSI: 00000000000054e3 RDI: 0000000000000003 [ 1497.673297][ T7798] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1497.681282][ T7798] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb654c7a6d4 [ 1497.689267][ T7798] R13: 00000000004c5f29 R14: 00000000004dc2d8 R15: 0000000000000005 11:51:05 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\b\x00\x00\x00'], 0x90ad) 11:51:05 executing program 2 (fault-call:5 fault-nth:5): socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) close(0xffffffffffffffff) socket$kcm(0x29, 0x0, 0x0) 11:51:05 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x90ad) 11:51:05 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x7, 0x4, 0x8, 0xf1a}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={r1}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r1, 0x4, 0x8}, 0xc) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) [ 1497.909069][ T7807] FAULT_INJECTION: forcing a failure. [ 1497.909069][ T7807] name failslab, interval 1, probability 0, space 0, times 0 [ 1497.965721][ T7807] CPU: 1 PID: 7807 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1497.974357][ T7807] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1497.984422][ T7807] Call Trace: [ 1497.987737][ T7807] dump_stack+0x197/0x210 [ 1497.992092][ T7807] should_fail.cold+0xa/0x15 [ 1497.996700][ T7807] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1498.002965][ T7807] ? fault_create_debugfs_attr+0x180/0x180 [ 1498.008800][ T7807] ? ___might_sleep+0x163/0x2c0 [ 1498.013696][ T7807] __should_failslab+0x121/0x190 [ 1498.018658][ T7807] should_failslab+0x9/0x14 [ 1498.018679][ T7807] kmem_cache_alloc_node+0x268/0x740 [ 1498.028481][ T7807] ? ___might_sleep+0x163/0x2c0 [ 1498.028513][ T7807] alloc_vmap_area+0xc8d/0x2030 [ 1498.028532][ T7807] ? __get_vm_area_node+0x12b/0x4f0 [ 1498.028547][ T7807] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1498.028574][ T7807] ? purge_vmap_area_lazy+0x40/0x40 [ 1498.028592][ T7807] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1498.028607][ T7807] ? debug_smp_processor_id+0x33/0x18a [ 1498.028631][ T7807] __get_vm_area_node+0x179/0x4f0 [ 1498.028659][ T7807] __vmalloc_node_range+0xd4/0x810 [ 1498.043538][ T7807] ? bpf_map_area_alloc+0x20/0x30 [ 1498.043563][ T7807] ? kasan_unpoison_shadow+0x35/0x50 [ 1498.043585][ T7807] ? bpf_map_area_alloc+0x20/0x30 [ 1498.043609][ T7807] __vmalloc_node_flags_caller+0x71/0x90 [ 1498.054333][ T7807] ? bpf_map_area_alloc+0x20/0x30 [ 1498.054356][ T7807] __bpf_map_area_alloc+0xde/0xf0 [ 1498.054377][ T7807] bpf_map_area_alloc+0x20/0x30 [ 1498.054401][ T7807] htab_map_alloc+0x8d3/0x11c0 [ 1498.072326][ T7807] ? htab_map_update_elem+0xca0/0xca0 [ 1498.072348][ T7807] __do_sys_bpf+0x478/0x3610 [ 1498.072369][ T7807] ? bpf_prog_load+0x1960/0x1960 [ 1498.072389][ T7807] ? __kasan_check_write+0x14/0x20 [ 1498.082512][ T7807] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1498.082532][ T7807] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1498.082549][ T7807] ? wait_for_completion+0x440/0x440 [ 1498.082574][ T7807] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 11:51:05 executing program 2 (fault-call:5 fault-nth:6): socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) close(0xffffffffffffffff) socket$kcm(0x29, 0x0, 0x0) [ 1498.082606][ T7807] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1498.098508][ T7807] ? do_syscall_64+0x26/0x790 [ 1498.098528][ T7807] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1498.098545][ T7807] ? do_syscall_64+0x26/0x790 [ 1498.098569][ T7807] __x64_sys_bpf+0x73/0xb0 [ 1498.098588][ T7807] do_syscall_64+0xfa/0x790 [ 1498.098608][ T7807] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1498.098620][ T7807] RIP: 0033:0x45a919 [ 1498.098636][ T7807] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1498.098645][ T7807] RSP: 002b:00007fd87ec79c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1498.098659][ T7807] RAX: ffffffffffffffda RBX: 00007fd87ec79c90 RCX: 000000000045a919 [ 1498.098668][ T7807] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1498.098677][ T7807] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1498.098685][ T7807] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd87ec7a6d4 [ 1498.098699][ T7807] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 [ 1498.249403][ T7821] FAULT_INJECTION: forcing a failure. [ 1498.249403][ T7821] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1498.262839][ T7821] CPU: 1 PID: 7821 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1498.283665][ T7821] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1498.283672][ T7821] Call Trace: [ 1498.283696][ T7821] dump_stack+0x197/0x210 [ 1498.283719][ T7821] should_fail.cold+0xa/0x15 [ 1498.283741][ T7821] ? fault_create_debugfs_attr+0x180/0x180 [ 1498.314639][ T7821] ? ___might_sleep+0x163/0x2c0 [ 1498.314669][ T7821] should_fail_alloc_page+0x50/0x60 [ 1498.314695][ T7821] __alloc_pages_nodemask+0x1a1/0x910 [ 1498.330517][ T7821] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1498.330538][ T7821] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1498.330561][ T7821] ? kasan_unpoison_shadow+0x35/0x50 [ 1498.352443][ T7821] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1498.358764][ T7821] alloc_pages_current+0x107/0x210 [ 1498.363897][ T7821] ? ___might_sleep+0x163/0x2c0 [ 1498.368774][ T7821] __vmalloc_node_range+0x4f8/0x810 [ 1498.374002][ T7821] ? bpf_map_area_alloc+0x20/0x30 [ 1498.379035][ T7821] __vmalloc_node_flags_caller+0x71/0x90 [ 1498.384661][ T7821] ? bpf_map_area_alloc+0x20/0x30 [ 1498.389687][ T7821] __bpf_map_area_alloc+0xde/0xf0 [ 1498.394770][ T7821] bpf_map_area_alloc+0x20/0x30 [ 1498.399610][ T7821] htab_map_alloc+0x8d3/0x11c0 [ 1498.404377][ T7821] ? htab_map_update_elem+0xca0/0xca0 [ 1498.409737][ T7821] __do_sys_bpf+0x478/0x3610 [ 1498.414315][ T7821] ? bpf_prog_load+0x1960/0x1960 [ 1498.419255][ T7821] ? __kasan_check_write+0x14/0x20 [ 1498.419273][ T7821] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1498.419290][ T7821] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1498.419307][ T7821] ? wait_for_completion+0x440/0x440 [ 1498.419334][ T7821] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1498.419366][ T7821] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1498.419383][ T7821] ? do_syscall_64+0x26/0x790 [ 1498.419399][ T7821] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1498.419412][ T7821] ? do_syscall_64+0x26/0x790 [ 1498.419435][ T7821] __x64_sys_bpf+0x73/0xb0 [ 1498.430070][ T7821] do_syscall_64+0xfa/0x790 [ 1498.430095][ T7821] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1498.430107][ T7821] RIP: 0033:0x45a919 [ 1498.430129][ T7821] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1498.446888][ T7821] RSP: 002b:00007fd87ec79c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 11:51:05 executing program 2 (fault-call:5 fault-nth:7): socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) close(0xffffffffffffffff) socket$kcm(0x29, 0x0, 0x0) [ 1498.446905][ T7821] RAX: ffffffffffffffda RBX: 00007fd87ec79c90 RCX: 000000000045a919 [ 1498.446916][ T7821] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1498.446926][ T7821] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1498.446935][ T7821] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd87ec7a6d4 [ 1498.446943][ T7821] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 11:51:05 executing program 4: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f00000002c0)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x10ad) 11:51:05 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="ddff7f0009dc47645e1b58389d5b54fcf71612c9700078a3aca843659838c2c13e919ce866ece1645d08d880c5d77446b6e7f03f7a201191072cf21da354dda7f5d267f7a5f63fb7ada5e69efa05c404ed8db0c14cddbd6efbc91059de60699d9ad589d87f546d881506c6ce9454ee02c67a3e5edbd084477487dcfc"], 0x90ad) [ 1498.714477][ T7829] FAULT_INJECTION: forcing a failure. [ 1498.714477][ T7829] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1498.729999][ T7829] CPU: 1 PID: 7829 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1498.738614][ T7829] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1498.749066][ T7829] Call Trace: [ 1498.752375][ T7829] dump_stack+0x197/0x210 [ 1498.756736][ T7829] should_fail.cold+0xa/0x15 [ 1498.761350][ T7829] ? fault_create_debugfs_attr+0x180/0x180 [ 1498.767174][ T7829] ? ___might_sleep+0x163/0x2c0 [ 1498.772059][ T7829] should_fail_alloc_page+0x50/0x60 [ 1498.777274][ T7829] __alloc_pages_nodemask+0x1a1/0x910 [ 1498.782668][ T7829] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1498.788237][ T7829] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1498.793995][ T7829] ? kasan_unpoison_shadow+0x35/0x50 [ 1498.799304][ T7829] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1498.805562][ T7829] alloc_pages_current+0x107/0x210 [ 1498.810705][ T7829] ? ___might_sleep+0x163/0x2c0 [ 1498.815580][ T7829] __vmalloc_node_range+0x4f8/0x810 [ 1498.820807][ T7829] ? bpf_map_area_alloc+0x20/0x30 [ 1498.825936][ T7829] __vmalloc_node_flags_caller+0x71/0x90 [ 1498.831578][ T7829] ? bpf_map_area_alloc+0x20/0x30 [ 1498.836612][ T7829] __bpf_map_area_alloc+0xde/0xf0 [ 1498.841638][ T7829] bpf_map_area_alloc+0x20/0x30 [ 1498.846488][ T7829] htab_map_alloc+0x8d3/0x11c0 [ 1498.851361][ T7829] ? htab_map_update_elem+0xca0/0xca0 [ 1498.856749][ T7829] __do_sys_bpf+0x478/0x3610 [ 1498.861350][ T7829] ? bpf_prog_load+0x1960/0x1960 [ 1498.866303][ T7829] ? __kasan_check_write+0x14/0x20 [ 1498.871438][ T7829] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1498.876997][ T7829] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1498.882284][ T7829] ? wait_for_completion+0x440/0x440 [ 1498.887677][ T7829] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1498.893950][ T7829] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1498.899415][ T7829] ? do_syscall_64+0x26/0x790 [ 1498.904086][ T7829] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1498.910142][ T7829] ? do_syscall_64+0x26/0x790 [ 1498.914812][ T7829] __x64_sys_bpf+0x73/0xb0 [ 1498.919220][ T7829] do_syscall_64+0xfa/0x790 [ 1498.923729][ T7829] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1498.929618][ T7829] RIP: 0033:0x45a919 [ 1498.933507][ T7829] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1498.953249][ T7829] RSP: 002b:00007fd87ec79c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 11:51:06 executing program 3 (fault-call:3 fault-nth:2): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) [ 1498.961658][ T7829] RAX: ffffffffffffffda RBX: 00007fd87ec79c90 RCX: 000000000045a919 [ 1498.969626][ T7829] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1498.977612][ T7829] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1498.985594][ T7829] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd87ec7a6d4 [ 1498.993665][ T7829] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 11:51:06 executing program 4: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f00000002c0)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x10ad) [ 1499.089368][ T7840] FAULT_INJECTION: forcing a failure. [ 1499.089368][ T7840] name failslab, interval 1, probability 0, space 0, times 0 [ 1499.102978][ T7840] CPU: 1 PID: 7840 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1499.111597][ T7840] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1499.121661][ T7840] Call Trace: [ 1499.124968][ T7840] dump_stack+0x197/0x210 [ 1499.129325][ T7840] should_fail.cold+0xa/0x15 [ 1499.133936][ T7840] ? fault_create_debugfs_attr+0x180/0x180 [ 1499.139758][ T7840] ? ___might_sleep+0x163/0x2c0 [ 1499.144620][ T7840] __should_failslab+0x121/0x190 [ 1499.149577][ T7840] should_failslab+0x9/0x14 [ 1499.154110][ T7840] __kmalloc+0x2e0/0x770 [ 1499.154134][ T7840] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1499.154234][ T7840] ? d_absolute_path+0x11b/0x170 [ 1499.169591][ T7840] ? __d_path+0x140/0x140 [ 1499.173932][ T7840] ? tomoyo_encode2.part.0+0xf5/0x400 [ 1499.179312][ T7840] tomoyo_encode2.part.0+0xf5/0x400 [ 1499.179336][ T7840] tomoyo_encode+0x2b/0x50 [ 1499.179357][ T7840] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 1499.194584][ T7840] tomoyo_path_number_perm+0x1dd/0x520 [ 1499.200060][ T7840] ? tomoyo_path_number_perm+0x193/0x520 [ 1499.205801][ T7840] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1499.211622][ T7840] ? __f_unlock_pos+0x19/0x20 [ 1499.216356][ T7840] ? __fget+0x37f/0x550 [ 1499.220543][ T7840] ? ksys_dup3+0x3e0/0x3e0 [ 1499.224977][ T7840] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1499.231235][ T7840] ? fput_many+0x12c/0x1a0 [ 1499.235678][ T7840] tomoyo_file_ioctl+0x23/0x30 [ 1499.240461][ T7840] security_file_ioctl+0x77/0xc0 [ 1499.245546][ T7840] ksys_ioctl+0x57/0xd0 [ 1499.249984][ T7840] __x64_sys_ioctl+0x73/0xb0 [ 1499.254600][ T7840] do_syscall_64+0xfa/0x790 [ 1499.259131][ T7840] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1499.265033][ T7840] RIP: 0033:0x45a919 [ 1499.268942][ T7840] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 11:51:06 executing program 2 (fault-call:5 fault-nth:8): socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) close(0xffffffffffffffff) socket$kcm(0x29, 0x0, 0x0) 11:51:06 executing program 0: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_pressure\x00', 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002e40)={&(0x7f0000001940)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000002dc0)=[{&(0x7f00000019c0)=""/4096, 0x1000}, {&(0x7f00000029c0)=""/214, 0xd6}, {&(0x7f0000002ac0)=""/165, 0xa5}, {&(0x7f0000002b80)=""/53, 0x35}, {&(0x7f0000002bc0)=""/107, 0x6b}, {&(0x7f0000002c40)=""/119, 0x77}, {&(0x7f0000002cc0)=""/87, 0x57}, {&(0x7f0000002d40)=""/73, 0x49}], 0x8}, 0x40) bpf$MAP_CREATE(0x0, &(0x7f0000002e80)={0x13, 0x9, 0x8000, 0x0, 0x200, r1, 0xfff, [], r2}, 0x3c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) [ 1499.288564][ T7840] RSP: 002b:00007fb654c9ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1499.297254][ T7840] RAX: ffffffffffffffda RBX: 00007fb654c9ac90 RCX: 000000000045a919 [ 1499.305243][ T7840] RDX: 0000000000000000 RSI: 00000000000054e3 RDI: 0000000000000003 [ 1499.313409][ T7840] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1499.321384][ T7840] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb654c9b6d4 [ 1499.329353][ T7840] R13: 00000000004c5f29 R14: 00000000004dc2d8 R15: 0000000000000005 [ 1499.371508][ T7840] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1499.401116][ T7852] FAULT_INJECTION: forcing a failure. [ 1499.401116][ T7852] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1499.416301][ T7852] CPU: 1 PID: 7852 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1499.424918][ T7852] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1499.434980][ T7852] Call Trace: [ 1499.435008][ T7852] dump_stack+0x197/0x210 [ 1499.435032][ T7852] should_fail.cold+0xa/0x15 [ 1499.435051][ T7852] ? fault_create_debugfs_attr+0x180/0x180 [ 1499.435067][ T7852] ? ___might_sleep+0x163/0x2c0 [ 1499.435094][ T7852] should_fail_alloc_page+0x50/0x60 [ 1499.435109][ T7852] __alloc_pages_nodemask+0x1a1/0x910 [ 1499.435128][ T7852] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1499.435142][ T7852] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1499.435164][ T7852] ? kasan_unpoison_shadow+0x35/0x50 [ 1499.468569][ T7852] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1499.468595][ T7852] alloc_pages_current+0x107/0x210 [ 1499.468608][ T7852] ? ___might_sleep+0x163/0x2c0 [ 1499.468630][ T7852] __vmalloc_node_range+0x4f8/0x810 [ 1499.479878][ T7852] ? bpf_map_area_alloc+0x20/0x30 [ 1499.479896][ T7852] __vmalloc_node_flags_caller+0x71/0x90 [ 1499.479916][ T7852] ? bpf_map_area_alloc+0x20/0x30 [ 1499.522215][ T7852] __bpf_map_area_alloc+0xde/0xf0 [ 1499.527266][ T7852] bpf_map_area_alloc+0x20/0x30 [ 1499.532136][ T7852] htab_map_alloc+0x8d3/0x11c0 [ 1499.536941][ T7852] ? htab_map_update_elem+0xca0/0xca0 [ 1499.542336][ T7852] __do_sys_bpf+0x478/0x3610 [ 1499.546962][ T7852] ? bpf_prog_load+0x1960/0x1960 [ 1499.551945][ T7852] ? __kasan_check_write+0x14/0x20 [ 1499.557075][ T7852] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1499.562642][ T7852] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1499.567951][ T7852] ? wait_for_completion+0x440/0x440 [ 1499.573267][ T7852] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1499.579544][ T7852] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1499.585032][ T7852] ? do_syscall_64+0x26/0x790 [ 1499.589747][ T7852] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1499.595831][ T7852] ? do_syscall_64+0x26/0x790 [ 1499.600617][ T7852] __x64_sys_bpf+0x73/0xb0 [ 1499.605050][ T7852] do_syscall_64+0xfa/0x790 [ 1499.609571][ T7852] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1499.615464][ T7852] RIP: 0033:0x45a919 [ 1499.619363][ T7852] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1499.638954][ T7852] RSP: 002b:00007fd87ec79c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1499.647360][ T7852] RAX: ffffffffffffffda RBX: 00007fd87ec79c90 RCX: 000000000045a919 [ 1499.655343][ T7852] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1499.663349][ T7852] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1499.671322][ T7852] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd87ec7a6d4 [ 1499.679295][ T7852] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 11:51:07 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x54000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="bb0c97dd41"], 0x90ad) 11:51:07 executing program 4: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f00000002c0)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x10ad) 11:51:07 executing program 0: perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x70, 0x1f, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 11:51:07 executing program 5: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="d703f496f4"], 0x90ad) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x40000, 0x0) r1 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r1, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r1, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000004600)={r5, 0xc0, &(0x7f0000004540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000004400)=0x10ff4015, 0x0, 0x0, 0x0, &(0x7f0000004440)={0x4, 0x4}, 0x0, 0x0, &(0x7f0000004480)={0x0, 0x0, 0x80000000, 0xdc}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001880)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000004840)={0x19, 0x2, &(0x7f0000001700)=@raw=[@ldst={0x2, 0x0, 0x7, 0x8, 0x9, 0x1, 0x12}, @alu={0x4, 0x0, 0x8, 0x6, 0xb, 0x2, 0x1}], &(0x7f0000001740)='syzkaller\x00', 0xd79, 0xce, &(0x7f0000001780)=""/206, 0x40f00, 0x8, [], 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000004380)={0x9, 0x1}, 0x8, 0x10, 0x0, 0x0, r6}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x3, &(0x7f0000000280)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x6}, @ldst={0x2, 0x0, 0x6, 0x3, 0xa2c1fa458ac8eefe, 0x30}, @func={0x85, 0x0, 0x1, 0x0, 0x3}], &(0x7f00000002c0)='syzkaller\x00', 0x3c, 0xec, &(0x7f0000000480)=""/236, 0x41100, 0x1, [], r2, 0xd, r3, 0x8, &(0x7f0000000300)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x4, 0x10, 0x8001, 0xccc3}, 0x10, r6}, 0x78) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000040)=r2) 11:51:07 executing program 2 (fault-call:5 fault-nth:9): socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) close(0xffffffffffffffff) socket$kcm(0x29, 0x0, 0x0) [ 1499.892488][ T7866] FAULT_INJECTION: forcing a failure. [ 1499.892488][ T7866] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1499.953550][ T7866] CPU: 1 PID: 7866 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1499.962188][ T7866] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1499.972253][ T7866] Call Trace: [ 1499.975556][ T7866] dump_stack+0x197/0x210 [ 1499.979920][ T7866] should_fail.cold+0xa/0x15 [ 1499.984527][ T7866] ? fault_create_debugfs_attr+0x180/0x180 [ 1499.990348][ T7866] ? ___might_sleep+0x163/0x2c0 [ 1499.995217][ T7866] should_fail_alloc_page+0x50/0x60 [ 1499.995234][ T7866] __alloc_pages_nodemask+0x1a1/0x910 [ 1499.995252][ T7866] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1499.995270][ T7866] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1499.995293][ T7866] ? kasan_unpoison_shadow+0x35/0x50 [ 1499.995322][ T7866] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1500.005885][ T7866] alloc_pages_current+0x107/0x210 [ 1500.005901][ T7866] ? ___might_sleep+0x163/0x2c0 [ 1500.005921][ T7866] __vmalloc_node_range+0x4f8/0x810 [ 1500.005945][ T7866] ? bpf_map_area_alloc+0x20/0x30 [ 1500.005965][ T7866] __vmalloc_node_flags_caller+0x71/0x90 [ 1500.038638][ T7866] ? bpf_map_area_alloc+0x20/0x30 [ 1500.048836][ T7866] __bpf_map_area_alloc+0xde/0xf0 [ 1500.048854][ T7866] bpf_map_area_alloc+0x20/0x30 [ 1500.048870][ T7866] htab_map_alloc+0x8d3/0x11c0 [ 1500.048897][ T7866] ? htab_map_update_elem+0xca0/0xca0 [ 1500.048917][ T7866] __do_sys_bpf+0x478/0x3610 [ 1500.084086][ T7866] ? bpf_prog_load+0x1960/0x1960 [ 1500.089044][ T7866] ? __kasan_check_write+0x14/0x20 [ 1500.094168][ T7866] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1500.099727][ T7866] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1500.105032][ T7866] ? wait_for_completion+0x440/0x440 [ 1500.110344][ T7866] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1500.116606][ T7866] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1500.116625][ T7866] ? do_syscall_64+0x26/0x790 [ 1500.116640][ T7866] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1500.116655][ T7866] ? do_syscall_64+0x26/0x790 [ 1500.116678][ T7866] __x64_sys_bpf+0x73/0xb0 [ 1500.116694][ T7866] do_syscall_64+0xfa/0x790 [ 1500.116714][ T7866] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1500.146582][ T7866] RIP: 0033:0x45a919 [ 1500.146599][ T7866] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1500.146613][ T7866] RSP: 002b:00007fd87ec79c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1500.184412][ T7866] RAX: ffffffffffffffda RBX: 00007fd87ec79c90 RCX: 000000000045a919 [ 1500.192403][ T7866] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 11:51:07 executing program 4: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f00000002c0)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x10ad) 11:51:07 executing program 0: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x16, 0x0, 0x800, 0x100, 0x400, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000007c0)='cgroup.procs\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000480)=@vsock={0x28, 0x0, 0xffffffff, @hyper}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000500)="25c4a73e0237f9515306ad7ec9dbc6cd9edf6de167df549ec4797c35fa059e14513230375d2cfe3aa24daff39c5a668a62bf76b958e85bc32c1a3b7ce3835eacac13a13240c2d5beb7aad0ea624abb7e260313b1434a0a9c58acce3b7417e3cecdd41c1c69a2e4cdd0cc4eb3a951ce9622b3417a540ff531caa33ced7b6bb65b60790d2a44f718d307344be807a76e7b5b489a77903fe346b0dc8456ce4d8157935238785b9b2117d5dbc8087faf98f1af5956", 0xb3}, {&(0x7f00000005c0)="f94936a5e72e6ef41209a0b3ad08379c10ab9e9db2571af019cf75561ff7805f2bc2a75111a08f73941980b6ac0191cd424bd7904191660a75b7d8484cccf2360c830ba96a5de0444d917e12031638d191afa53ba886f64d8bc0f71610ce232ddde7a3de602418bfacddf88089b3ad25f376363d2df3dd852dae67275e19830c8db733f2f495e17f700bce839a6e5f17884195d2f4b5c23e946ed9686f369f3e5efa91527963098f05d658239ed86b931fbf8e0d09ff8c7b6c38", 0xba}], 0x2, &(0x7f0000000d80)=ANY=[@ANYBLOB="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"], 0x12f8}, 0x4000) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(r2, 0x10e, 0x2, &(0x7f0000000000)=r1, 0x279) recvmsg$kcm(0xffffffffffffffff, &(0x7f000000c680)={&(0x7f000000b500)=@can, 0x80, &(0x7f000000b640)=[{&(0x7f000000b580)=""/181, 0xb5}], 0x1, &(0x7f000000b680)=""/4096, 0x1000}, 0x54) socket$kcm(0x10, 0x2, 0x10) socket$kcm(0x29, 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$tipc(r3, 0x0, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r5, &(0x7f00000004c0), 0x12) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ae9e531df05b0dbffa8650ebb25a45cb4b1c9e47f1f5f6f4da8ad4ca", @ANYPTR, @ANYRESOCT=r3, @ANYRESDEC, @ANYRESDEC=r5, @ANYRESDEC=r0], 0x9360) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$tipc(r6, 0x0, 0x0) openat$cgroup_int(r6, &(0x7f0000000000)='cgroup.max.descendants\x00', 0x2, 0x0) 11:51:07 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000040)={0x1, 0x7, [@dev={[], 0xd}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @empty, @random="41484ed0c402", @dev={[], 0x2b}, @dev={[], 0x29}, @empty]}) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[], 0xffffffffffffffe1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x18400, 0x0) ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x0) [ 1500.200392][ T7866] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1500.208378][ T7866] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd87ec7a6d4 [ 1500.216362][ T7866] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 11:51:07 executing program 3 (fault-call:3 fault-nth:3): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) [ 1500.301359][ T7886] device nr0 entered promiscuous mode 11:51:07 executing program 0: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="8ec43973d1"], 0x90ad) 11:51:07 executing program 2 (fault-call:5 fault-nth:10): socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) close(0xffffffffffffffff) socket$kcm(0x29, 0x0, 0x0) [ 1500.578731][ T7903] FAULT_INJECTION: forcing a failure. [ 1500.578731][ T7903] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1500.592463][ T7903] CPU: 0 PID: 7903 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1500.601079][ T7903] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1500.611142][ T7903] Call Trace: [ 1500.614447][ T7903] dump_stack+0x197/0x210 [ 1500.618792][ T7903] should_fail.cold+0xa/0x15 [ 1500.623395][ T7903] ? fault_create_debugfs_attr+0x180/0x180 [ 1500.629213][ T7903] ? ___might_sleep+0x163/0x2c0 [ 1500.634076][ T7903] should_fail_alloc_page+0x50/0x60 [ 1500.639262][ T7903] __alloc_pages_nodemask+0x1a1/0x910 [ 1500.644717][ T7903] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1500.650303][ T7903] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1500.656015][ T7903] ? kasan_unpoison_shadow+0x35/0x50 [ 1500.661348][ T7903] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1500.667680][ T7903] alloc_pages_current+0x107/0x210 [ 1500.672779][ T7903] ? ___might_sleep+0x163/0x2c0 [ 1500.677630][ T7903] __vmalloc_node_range+0x4f8/0x810 [ 1500.682823][ T7903] ? bpf_map_area_alloc+0x20/0x30 [ 1500.687838][ T7903] __vmalloc_node_flags_caller+0x71/0x90 [ 1500.693463][ T7903] ? bpf_map_area_alloc+0x20/0x30 [ 1500.698494][ T7903] __bpf_map_area_alloc+0xde/0xf0 [ 1500.703519][ T7903] bpf_map_area_alloc+0x20/0x30 [ 1500.708366][ T7903] htab_map_alloc+0x8d3/0x11c0 [ 1500.713224][ T7903] ? htab_map_update_elem+0xca0/0xca0 [ 1500.718618][ T7903] __do_sys_bpf+0x478/0x3610 [ 1500.723212][ T7903] ? bpf_prog_load+0x1960/0x1960 [ 1500.728136][ T7903] ? __kasan_check_write+0x14/0x20 [ 1500.733231][ T7903] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1500.738766][ T7903] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1500.744036][ T7903] ? wait_for_completion+0x440/0x440 [ 1500.749309][ T7903] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1500.755560][ T7903] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1500.761016][ T7903] ? do_syscall_64+0x26/0x790 [ 1500.765696][ T7903] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1500.771747][ T7903] ? do_syscall_64+0x26/0x790 [ 1500.776416][ T7903] __x64_sys_bpf+0x73/0xb0 [ 1500.780933][ T7903] do_syscall_64+0xfa/0x790 [ 1500.785478][ T7903] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1500.791389][ T7903] RIP: 0033:0x45a919 [ 1500.795272][ T7903] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1500.814859][ T7903] RSP: 002b:00007fd87ec79c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1500.823258][ T7903] RAX: ffffffffffffffda RBX: 00007fd87ec79c90 RCX: 000000000045a919 [ 1500.831216][ T7903] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1500.839187][ T7903] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1500.847142][ T7903] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd87ec7a6d4 [ 1500.855111][ T7903] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 11:51:08 executing program 2 (fault-call:5 fault-nth:11): socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) close(0xffffffffffffffff) socket$kcm(0x29, 0x0, 0x0) [ 1500.882820][ T7896] FAULT_INJECTION: forcing a failure. [ 1500.882820][ T7896] name failslab, interval 1, probability 0, space 0, times 0 [ 1500.907353][ T7896] CPU: 0 PID: 7896 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1500.915987][ T7896] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1500.926151][ T7896] Call Trace: [ 1500.929479][ T7896] dump_stack+0x197/0x210 [ 1500.932702][ T7906] FAULT_INJECTION: forcing a failure. [ 1500.932702][ T7906] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1500.933840][ T7896] should_fail.cold+0xa/0x15 [ 1500.933867][ T7896] ? fault_create_debugfs_attr+0x180/0x180 [ 1500.957455][ T7896] ? ___might_sleep+0x163/0x2c0 [ 1500.962415][ T7896] __should_failslab+0x121/0x190 [ 1500.967360][ T7896] should_failslab+0x9/0x14 [ 1500.971876][ T7896] kmem_cache_alloc+0x2aa/0x710 [ 1500.976737][ T7896] ? lock_downgrade+0x920/0x920 [ 1500.981633][ T7896] alloc_inode+0x16f/0x1e0 [ 1500.986061][ T7896] new_inode_pseudo+0x19/0xf0 [ 1500.990767][ T7896] __ns_get_path.isra.0+0x137/0x760 [ 1500.995986][ T7896] ? sock_unregister+0xa0/0xa0 [ 1501.000758][ T7896] open_related_ns+0xb8/0x230 [ 1501.005440][ T7896] ? __ns_get_path.isra.0+0x760/0x760 [ 1501.010826][ T7896] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1501.017066][ T7896] ? ns_capable_common+0x93/0x100 [ 1501.022112][ T7896] __tun_chr_ioctl+0x65a/0x3fa0 [ 1501.026972][ T7896] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1501.033227][ T7896] ? tun_chr_read_iter+0x1e0/0x1e0 [ 1501.038339][ T7896] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1501.044143][ T7896] ? __f_unlock_pos+0x19/0x20 [ 1501.048844][ T7896] ? tun_chr_compat_ioctl+0x30/0x30 [ 1501.054057][ T7896] tun_chr_ioctl+0x2b/0x40 [ 1501.058479][ T7896] do_vfs_ioctl+0x977/0x14e0 [ 1501.063076][ T7896] ? compat_ioctl_preallocate+0x220/0x220 [ 1501.068790][ T7896] ? __fget+0x37f/0x550 [ 1501.072952][ T7896] ? ksys_dup3+0x3e0/0x3e0 [ 1501.077377][ T7896] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1501.083613][ T7896] ? fput_many+0x12c/0x1a0 [ 1501.088039][ T7896] ? tomoyo_file_ioctl+0x23/0x30 [ 1501.092973][ T7896] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1501.099210][ T7896] ? security_file_ioctl+0x8d/0xc0 [ 1501.104328][ T7896] ksys_ioctl+0xab/0xd0 [ 1501.108487][ T7896] __x64_sys_ioctl+0x73/0xb0 [ 1501.113077][ T7896] do_syscall_64+0xfa/0x790 [ 1501.117591][ T7896] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1501.123478][ T7896] RIP: 0033:0x45a919 [ 1501.127370][ T7896] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1501.146968][ T7896] RSP: 002b:00007fb654c9ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1501.155378][ T7896] RAX: ffffffffffffffda RBX: 00007fb654c9ac90 RCX: 000000000045a919 [ 1501.163342][ T7896] RDX: 0000000000000000 RSI: 00000000000054e3 RDI: 0000000000000003 [ 1501.171327][ T7896] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1501.179293][ T7896] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb654c9b6d4 [ 1501.187262][ T7896] R13: 00000000004c5f29 R14: 00000000004dc2d8 R15: 0000000000000005 [ 1501.195277][ T7906] CPU: 1 PID: 7906 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1501.203888][ T7906] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1501.214038][ T7906] Call Trace: [ 1501.217361][ T7906] dump_stack+0x197/0x210 [ 1501.221718][ T7906] should_fail.cold+0xa/0x15 [ 1501.226327][ T7906] ? fault_create_debugfs_attr+0x180/0x180 [ 1501.232153][ T7906] ? ___might_sleep+0x163/0x2c0 [ 1501.237034][ T7906] should_fail_alloc_page+0x50/0x60 [ 1501.242244][ T7906] __alloc_pages_nodemask+0x1a1/0x910 [ 1501.247630][ T7906] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1501.253185][ T7906] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1501.258924][ T7906] ? kasan_unpoison_shadow+0x35/0x50 [ 1501.264227][ T7906] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1501.270454][ T7906] alloc_pages_current+0x107/0x210 [ 1501.275560][ T7906] ? ___might_sleep+0x163/0x2c0 [ 1501.280432][ T7906] __vmalloc_node_range+0x4f8/0x810 [ 1501.285657][ T7906] ? bpf_map_area_alloc+0x20/0x30 [ 1501.290682][ T7906] __vmalloc_node_flags_caller+0x71/0x90 [ 1501.296318][ T7906] ? bpf_map_area_alloc+0x20/0x30 [ 1501.301347][ T7906] __bpf_map_area_alloc+0xde/0xf0 [ 1501.306382][ T7906] bpf_map_area_alloc+0x20/0x30 [ 1501.311243][ T7906] htab_map_alloc+0x8d3/0x11c0 [ 1501.316035][ T7906] ? htab_map_update_elem+0xca0/0xca0 [ 1501.321406][ T7906] __do_sys_bpf+0x478/0x3610 [ 1501.326179][ T7906] ? bpf_prog_load+0x1960/0x1960 [ 1501.331124][ T7906] ? __kasan_check_write+0x14/0x20 [ 1501.336262][ T7906] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1501.341807][ T7906] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1501.347092][ T7906] ? wait_for_completion+0x440/0x440 [ 1501.352379][ T7906] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1501.358626][ T7906] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1501.365040][ T7906] ? do_syscall_64+0x26/0x790 [ 1501.369730][ T7906] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1501.375830][ T7906] ? do_syscall_64+0x26/0x790 [ 1501.380510][ T7906] __x64_sys_bpf+0x73/0xb0 [ 1501.384958][ T7906] do_syscall_64+0xfa/0x790 [ 1501.389491][ T7906] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1501.395397][ T7906] RIP: 0033:0x45a919 [ 1501.399292][ T7906] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1501.418894][ T7906] RSP: 002b:00007fd87ec79c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1501.427316][ T7906] RAX: ffffffffffffffda RBX: 00007fd87ec79c90 RCX: 000000000045a919 [ 1501.435303][ T7906] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1501.443287][ T7906] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1501.451269][ T7906] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd87ec7a6d4 [ 1501.459242][ T7906] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 11:51:09 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$tipc(r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000000)='c\x86\xdd') sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 11:51:09 executing program 0: r0 = perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = getpid() r3 = gettid() r4 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x2, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80, 0x0, @perf_config_ext={0x9, 0x5}, 0x0, 0x0, 0xffffffff, 0x0, 0x7, 0x4}, r3, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000280)='veth0\x00') perf_event_open(&(0x7f0000000000)={0x6, 0x70, 0x7, 0x7, 0x5, 0x40, 0x0, 0x0, 0x400, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x8, 0x9}, 0x8000, 0xfffffffffffffffb, 0x3ff, 0x1, 0x9b, 0x101, 0x4}, r2, 0x0, r4, 0x0) r5 = gettid() r6 = perf_event_open(0x0, r5, 0x0, 0xffffffffffffffff, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$tipc(r7, 0x0, 0x0) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}, 0x1000, 0x0, 0xc4, 0x0, 0x0, 0x9}, 0x0, 0xe, r8, 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r10 = openat$cgroup_procs(r9, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r10, &(0x7f00000004c0), 0x12) r11 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_procs(r11, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000480)=ANY=[@ANYPTR64=&(0x7f0000000240)=ANY=[@ANYRESHEX, @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYRESHEX=r0, @ANYRES32=r6], @ANYPTR=&(0x7f0000000200)=ANY=[@ANYRESHEX=r7, @ANYPTR64]], @ANYRESOCT, @ANYPTR64=&(0x7f0000000440)=ANY=[@ANYPTR=&(0x7f0000000380)=ANY=[@ANYBLOB="d3ee365cba2ecb4d43e58bb50b263977f00aeda3451404f8bd81cf44f020b5179118052609d5f2715a74b3dc0c", @ANYRES32, @ANYBLOB="270abe409d038184f895d5ee9693789e12e7c17427c30ff858c98617f7f43d5addced3c671f6f230af0b7e4b9eefb239f8c5630bbb27fe5e38a0"], @ANYRES32=r8, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYPTR64, @ANYPTR64, @ANYRES64=r0, @ANYRESDEC=r10, @ANYRES32=r11]], @ANYRESHEX=r9], 0xfa1) 11:51:09 executing program 2 (fault-call:5 fault-nth:12): socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) close(0xffffffffffffffff) socket$kcm(0x29, 0x0, 0x0) 11:51:09 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) 11:51:09 executing program 4: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f00000002c0)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x10ad) 11:51:09 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) write$cgroup_subtree(r0, &(0x7f0000000000), 0x0) [ 1501.867962][ T7921] FAULT_INJECTION: forcing a failure. [ 1501.867962][ T7921] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1501.895988][ T7921] CPU: 0 PID: 7921 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1501.904615][ T7921] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1501.914688][ T7921] Call Trace: [ 1501.918002][ T7921] dump_stack+0x197/0x210 [ 1501.922353][ T7921] should_fail.cold+0xa/0x15 [ 1501.926951][ T7921] ? fault_create_debugfs_attr+0x180/0x180 [ 1501.932761][ T7921] ? ___might_sleep+0x163/0x2c0 [ 1501.937622][ T7921] should_fail_alloc_page+0x50/0x60 [ 1501.942809][ T7921] __alloc_pages_nodemask+0x1a1/0x910 [ 1501.948524][ T7921] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1501.954058][ T7921] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1501.959786][ T7921] ? kasan_unpoison_shadow+0x35/0x50 [ 1501.965077][ T7921] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1501.971326][ T7921] alloc_pages_current+0x107/0x210 [ 1501.976426][ T7921] ? ___might_sleep+0x163/0x2c0 [ 1501.981264][ T7921] __vmalloc_node_range+0x4f8/0x810 [ 1501.986463][ T7921] ? bpf_map_area_alloc+0x20/0x30 [ 1501.991472][ T7921] __vmalloc_node_flags_caller+0x71/0x90 [ 1501.997098][ T7921] ? bpf_map_area_alloc+0x20/0x30 [ 1502.002125][ T7921] __bpf_map_area_alloc+0xde/0xf0 [ 1502.007139][ T7921] bpf_map_area_alloc+0x20/0x30 [ 1502.011974][ T7921] htab_map_alloc+0x8d3/0x11c0 [ 1502.016734][ T7921] ? htab_map_update_elem+0xca0/0xca0 [ 1502.022141][ T7921] __do_sys_bpf+0x478/0x3610 [ 1502.026745][ T7921] ? bpf_prog_load+0x1960/0x1960 [ 1502.031678][ T7921] ? __kasan_check_write+0x14/0x20 [ 1502.036792][ T7921] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1502.042332][ T7921] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1502.047710][ T7921] ? wait_for_completion+0x440/0x440 [ 1502.053006][ T7921] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1502.059313][ T7921] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1502.064761][ T7921] ? do_syscall_64+0x26/0x790 [ 1502.069431][ T7921] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1502.075485][ T7921] ? do_syscall_64+0x26/0x790 [ 1502.080182][ T7921] __x64_sys_bpf+0x73/0xb0 [ 1502.084602][ T7921] do_syscall_64+0xfa/0x790 [ 1502.089151][ T7921] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1502.095045][ T7921] RIP: 0033:0x45a919 [ 1502.098962][ T7921] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1502.118562][ T7921] RSP: 002b:00007fd87ec79c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1502.126970][ T7921] RAX: ffffffffffffffda RBX: 00007fd87ec79c90 RCX: 000000000045a919 [ 1502.134933][ T7921] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1502.142900][ T7921] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1502.150858][ T7921] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd87ec7a6d4 [ 1502.158812][ T7921] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 11:51:09 executing program 2 (fault-call:5 fault-nth:13): socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) close(0xffffffffffffffff) socket$kcm(0x29, 0x0, 0x0) [ 1502.201660][ T7928] device nr0 entered promiscuous mode 11:51:09 executing program 0: r0 = perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) r2 = getpid() r3 = gettid() r4 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x2, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80, 0x0, @perf_config_ext={0x9, 0x5}, 0x0, 0x0, 0xffffffff, 0x0, 0x7, 0x4}, r3, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000280)='veth0\x00') perf_event_open(&(0x7f0000000000)={0x6, 0x70, 0x7, 0x7, 0x5, 0x40, 0x0, 0x0, 0x400, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x8, 0x9}, 0x8000, 0xfffffffffffffffb, 0x3ff, 0x1, 0x9b, 0x101, 0x4}, r2, 0x0, r4, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x0, 0x0, 0x9, 0x0, 0x0, 0x8, 0x4001, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x4, @perf_bp={&(0x7f0000000000), 0x4}, 0x100, 0x4, 0x7, 0x6, 0xd4f, 0x0, 0xffff}, r2, 0x7, r0, 0x1a) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000100)=0x780d) [ 1502.283677][ T7933] FAULT_INJECTION: forcing a failure. [ 1502.283677][ T7933] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1502.314864][ T7933] CPU: 1 PID: 7933 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1502.323493][ T7933] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1502.333552][ T7933] Call Trace: [ 1502.336849][ T7933] dump_stack+0x197/0x210 [ 1502.336871][ T7933] should_fail.cold+0xa/0x15 [ 1502.336891][ T7933] ? fault_create_debugfs_attr+0x180/0x180 [ 1502.336908][ T7933] ? ___might_sleep+0x163/0x2c0 [ 1502.336939][ T7933] should_fail_alloc_page+0x50/0x60 [ 1502.336958][ T7933] __alloc_pages_nodemask+0x1a1/0x910 [ 1502.367074][ T7933] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1502.372642][ T7933] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1502.378389][ T7933] ? kasan_unpoison_shadow+0x35/0x50 [ 1502.383699][ T7933] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1502.389967][ T7933] alloc_pages_current+0x107/0x210 [ 1502.395093][ T7933] ? ___might_sleep+0x163/0x2c0 [ 1502.399967][ T7933] __vmalloc_node_range+0x4f8/0x810 [ 1502.405193][ T7933] ? bpf_map_area_alloc+0x20/0x30 [ 1502.410234][ T7933] __vmalloc_node_flags_caller+0x71/0x90 [ 1502.415882][ T7933] ? bpf_map_area_alloc+0x20/0x30 [ 1502.420925][ T7933] __bpf_map_area_alloc+0xde/0xf0 [ 1502.425969][ T7933] bpf_map_area_alloc+0x20/0x30 [ 1502.430830][ T7933] htab_map_alloc+0x8d3/0x11c0 [ 1502.435633][ T7933] ? htab_map_update_elem+0xca0/0xca0 [ 1502.441022][ T7933] __do_sys_bpf+0x478/0x3610 [ 1502.445634][ T7933] ? bpf_prog_load+0x1960/0x1960 [ 1502.450590][ T7933] ? __kasan_check_write+0x14/0x20 [ 1502.455733][ T7933] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1502.461311][ T7933] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1502.466626][ T7933] ? wait_for_completion+0x440/0x440 [ 1502.471949][ T7933] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1502.478231][ T7933] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1502.483706][ T7933] ? do_syscall_64+0x26/0x790 [ 1502.488523][ T7933] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1502.494630][ T7933] ? do_syscall_64+0x26/0x790 [ 1502.499330][ T7933] __x64_sys_bpf+0x73/0xb0 [ 1502.503782][ T7933] do_syscall_64+0xfa/0x790 [ 1502.508311][ T7933] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1502.514210][ T7933] RIP: 0033:0x45a919 [ 1502.518230][ T7933] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1502.537991][ T7933] RSP: 002b:00007fd87ec79c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1502.546426][ T7933] RAX: ffffffffffffffda RBX: 00007fd87ec79c90 RCX: 000000000045a919 [ 1502.554409][ T7933] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1502.562405][ T7933] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1502.570399][ T7933] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd87ec7a6d4 11:51:09 executing program 2 (fault-call:5 fault-nth:14): socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) close(0xffffffffffffffff) socket$kcm(0x29, 0x0, 0x0) [ 1502.578509][ T7933] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 [ 1502.654095][ T7940] FAULT_INJECTION: forcing a failure. [ 1502.654095][ T7940] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1502.667667][ T7940] CPU: 1 PID: 7940 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1502.676272][ T7940] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1502.686341][ T7940] Call Trace: [ 1502.689657][ T7940] dump_stack+0x197/0x210 [ 1502.694024][ T7940] should_fail.cold+0xa/0x15 [ 1502.698645][ T7940] ? fault_create_debugfs_attr+0x180/0x180 [ 1502.704476][ T7940] ? ___might_sleep+0x163/0x2c0 [ 1502.709356][ T7940] should_fail_alloc_page+0x50/0x60 [ 1502.714571][ T7940] __alloc_pages_nodemask+0x1a1/0x910 [ 1502.719960][ T7940] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1502.725523][ T7940] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1502.731264][ T7940] ? kasan_unpoison_shadow+0x35/0x50 [ 1502.736558][ T7940] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1502.742812][ T7940] alloc_pages_current+0x107/0x210 [ 1502.747931][ T7940] ? ___might_sleep+0x163/0x2c0 [ 1502.752793][ T7940] __vmalloc_node_range+0x4f8/0x810 [ 1502.758010][ T7940] ? bpf_map_area_alloc+0x20/0x30 [ 1502.763044][ T7940] __vmalloc_node_flags_caller+0x71/0x90 [ 1502.768685][ T7940] ? bpf_map_area_alloc+0x20/0x30 [ 1502.773837][ T7940] __bpf_map_area_alloc+0xde/0xf0 [ 1502.778880][ T7940] bpf_map_area_alloc+0x20/0x30 [ 1502.783743][ T7940] htab_map_alloc+0x8d3/0x11c0 [ 1502.788643][ T7940] ? htab_map_update_elem+0xca0/0xca0 [ 1502.794067][ T7940] __do_sys_bpf+0x478/0x3610 [ 1502.798675][ T7940] ? bpf_prog_load+0x1960/0x1960 [ 1502.803610][ T7940] ? __kasan_check_write+0x14/0x20 [ 1502.808723][ T7940] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1502.814271][ T7940] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1502.819547][ T7940] ? wait_for_completion+0x440/0x440 [ 1502.824824][ T7940] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1502.831060][ T7940] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1502.836518][ T7940] ? do_syscall_64+0x26/0x790 [ 1502.841338][ T7940] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1502.847405][ T7940] ? do_syscall_64+0x26/0x790 [ 1502.852098][ T7940] __x64_sys_bpf+0x73/0xb0 [ 1502.856615][ T7940] do_syscall_64+0xfa/0x790 [ 1502.861127][ T7940] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1502.867012][ T7940] RIP: 0033:0x45a919 [ 1502.870965][ T7940] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1502.890610][ T7940] RSP: 002b:00007fd87ec79c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 11:51:10 executing program 2 (fault-call:5 fault-nth:15): socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) close(0xffffffffffffffff) socket$kcm(0x29, 0x0, 0x0) [ 1502.899083][ T7940] RAX: ffffffffffffffda RBX: 00007fd87ec79c90 RCX: 000000000045a919 [ 1502.907069][ T7940] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1502.915052][ T7940] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1502.923067][ T7940] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd87ec7a6d4 [ 1502.931042][ T7940] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 11:51:10 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x24d, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0x2}, 0x1000, 0x800000000, 0xc4, 0x9, 0x0, 0x9}, 0x0, 0xe, r0, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0xffffffffffffffff, 0x0, r0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$tipc(r2, 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000100)='memory.stat\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r3 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000000)='\x00') 11:51:10 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x2, 0x0) [ 1503.132216][ T7951] FAULT_INJECTION: forcing a failure. [ 1503.132216][ T7951] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1503.154107][ T7951] CPU: 0 PID: 7951 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1503.162742][ T7951] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1503.162751][ T7951] Call Trace: [ 1503.162778][ T7951] dump_stack+0x197/0x210 [ 1503.162801][ T7951] should_fail.cold+0xa/0x15 [ 1503.162820][ T7951] ? fault_create_debugfs_attr+0x180/0x180 [ 1503.162838][ T7951] ? ___might_sleep+0x163/0x2c0 [ 1503.162867][ T7951] should_fail_alloc_page+0x50/0x60 [ 1503.162882][ T7951] __alloc_pages_nodemask+0x1a1/0x910 [ 1503.162899][ T7951] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1503.162918][ T7951] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1503.162942][ T7951] ? kasan_unpoison_shadow+0x35/0x50 [ 1503.162966][ T7951] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1503.229056][ T7951] alloc_pages_current+0x107/0x210 [ 1503.234165][ T7951] ? ___might_sleep+0x163/0x2c0 [ 1503.239015][ T7951] __vmalloc_node_range+0x4f8/0x810 [ 1503.244209][ T7951] ? bpf_map_area_alloc+0x20/0x30 [ 1503.249223][ T7951] __vmalloc_node_flags_caller+0x71/0x90 [ 1503.254844][ T7951] ? bpf_map_area_alloc+0x20/0x30 [ 1503.259860][ T7951] __bpf_map_area_alloc+0xde/0xf0 [ 1503.264874][ T7951] bpf_map_area_alloc+0x20/0x30 [ 1503.269725][ T7951] htab_map_alloc+0x8d3/0x11c0 [ 1503.274490][ T7951] ? htab_map_update_elem+0xca0/0xca0 [ 1503.279867][ T7951] __do_sys_bpf+0x478/0x3610 [ 1503.284449][ T7951] ? bpf_prog_load+0x1960/0x1960 [ 1503.289375][ T7951] ? __kasan_check_write+0x14/0x20 [ 1503.294473][ T7951] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1503.300006][ T7951] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1503.305277][ T7951] ? wait_for_completion+0x440/0x440 [ 1503.310554][ T7951] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1503.316795][ T7951] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1503.322243][ T7951] ? do_syscall_64+0x26/0x790 [ 1503.326909][ T7951] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1503.332960][ T7951] ? do_syscall_64+0x26/0x790 [ 1503.337626][ T7951] __x64_sys_bpf+0x73/0xb0 [ 1503.342039][ T7951] do_syscall_64+0xfa/0x790 [ 1503.346558][ T7951] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1503.352458][ T7951] RIP: 0033:0x45a919 [ 1503.356350][ T7951] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1503.375950][ T7951] RSP: 002b:00007fd87ec79c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1503.384347][ T7951] RAX: ffffffffffffffda RBX: 00007fd87ec79c90 RCX: 000000000045a919 [ 1503.392315][ T7951] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1503.400280][ T7951] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1503.408235][ T7951] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd87ec7a6d4 [ 1503.416189][ T7951] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 11:51:10 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x80002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13800, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}, 0x1000, 0xffffffffffffffff, 0xc4, 0x0, 0x0, 0x9}, 0x0, 0xe, r1, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0), 0x0) 11:51:10 executing program 0: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}, 0x1000, 0x0, 0xc4, 0x0, 0x0, 0x9}, 0x0, 0xe, r1, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000000)={0x1, 0x0, [0x0]}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 11:51:10 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="db6386dd07"], 0x90ad) 11:51:10 executing program 4: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f00000002c0)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x10ad) 11:51:10 executing program 2 (fault-call:5 fault-nth:16): socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) close(0xffffffffffffffff) socket$kcm(0x29, 0x0, 0x0) [ 1503.729173][ T7972] FAULT_INJECTION: forcing a failure. [ 1503.729173][ T7972] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1503.743763][ T7972] CPU: 1 PID: 7972 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1503.752372][ T7972] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1503.752379][ T7972] Call Trace: [ 1503.752405][ T7972] dump_stack+0x197/0x210 [ 1503.752426][ T7972] should_fail.cold+0xa/0x15 [ 1503.752445][ T7972] ? fault_create_debugfs_attr+0x180/0x180 [ 1503.752461][ T7972] ? ___might_sleep+0x163/0x2c0 [ 1503.752487][ T7972] should_fail_alloc_page+0x50/0x60 [ 1503.752508][ T7972] __alloc_pages_nodemask+0x1a1/0x910 [ 1503.752524][ T7972] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1503.752540][ T7972] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1503.752563][ T7972] ? kasan_unpoison_shadow+0x35/0x50 [ 1503.752583][ T7972] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1503.752603][ T7972] alloc_pages_current+0x107/0x210 [ 1503.752617][ T7972] ? ___might_sleep+0x163/0x2c0 [ 1503.752637][ T7972] __vmalloc_node_range+0x4f8/0x810 [ 1503.752662][ T7972] ? bpf_map_area_alloc+0x20/0x30 [ 1503.752686][ T7972] __vmalloc_node_flags_caller+0x71/0x90 [ 1503.780732][ T7972] ? bpf_map_area_alloc+0x20/0x30 [ 1503.780756][ T7972] __bpf_map_area_alloc+0xde/0xf0 [ 1503.854817][ T7972] bpf_map_area_alloc+0x20/0x30 [ 1503.859662][ T7972] htab_map_alloc+0x8d3/0x11c0 [ 1503.864432][ T7972] ? htab_map_update_elem+0xca0/0xca0 [ 1503.869794][ T7972] __do_sys_bpf+0x478/0x3610 [ 1503.874382][ T7972] ? bpf_prog_load+0x1960/0x1960 [ 1503.879310][ T7972] ? __kasan_check_write+0x14/0x20 [ 1503.884412][ T7972] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1503.889949][ T7972] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1503.895316][ T7972] ? wait_for_completion+0x440/0x440 [ 1503.900700][ T7972] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1503.906949][ T7972] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1503.912396][ T7972] ? do_syscall_64+0x26/0x790 [ 1503.917063][ T7972] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1503.923127][ T7972] ? do_syscall_64+0x26/0x790 [ 1503.927801][ T7972] __x64_sys_bpf+0x73/0xb0 [ 1503.932210][ T7972] do_syscall_64+0xfa/0x790 [ 1503.936708][ T7972] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1503.942597][ T7972] RIP: 0033:0x45a919 [ 1503.946494][ T7972] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1503.966096][ T7972] RSP: 002b:00007fd87ec79c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1503.974509][ T7972] RAX: ffffffffffffffda RBX: 00007fd87ec79c90 RCX: 000000000045a919 [ 1503.982472][ T7972] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1503.990435][ T7972] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1503.998523][ T7972] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd87ec7a6d4 [ 1504.006509][ T7972] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 11:51:11 executing program 0: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}, 0x1000, 0x0, 0xc4, 0x0, 0x0, 0x9}, 0x0, 0xe, r0, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000440)=r0, 0x4) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$tipc(r2, 0x0, 0x0) recvmsg$kcm(r2, &(0x7f00000003c0)={&(0x7f0000000000)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f00000002c0)=""/221, 0xdd}], 0x1, &(0x7f00000001c0)=""/136, 0x88}, 0x10000) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 11:51:11 executing program 2 (fault-call:5 fault-nth:17): socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) close(0xffffffffffffffff) socket$kcm(0x29, 0x0, 0x0) [ 1504.042837][ T7973] device nr0 entered promiscuous mode [ 1504.177305][ T7983] FAULT_INJECTION: forcing a failure. [ 1504.177305][ T7983] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1504.190775][ T7983] CPU: 0 PID: 7983 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1504.199372][ T7983] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1504.209526][ T7983] Call Trace: [ 1504.212837][ T7983] dump_stack+0x197/0x210 [ 1504.217184][ T7983] should_fail.cold+0xa/0x15 [ 1504.221794][ T7983] ? fault_create_debugfs_attr+0x180/0x180 [ 1504.227614][ T7983] ? ___might_sleep+0x163/0x2c0 [ 1504.232485][ T7983] should_fail_alloc_page+0x50/0x60 [ 1504.237691][ T7983] __alloc_pages_nodemask+0x1a1/0x910 [ 1504.243081][ T7983] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1504.248641][ T7983] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1504.254376][ T7983] ? kasan_unpoison_shadow+0x35/0x50 [ 1504.259675][ T7983] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1504.265927][ T7983] alloc_pages_current+0x107/0x210 [ 1504.271179][ T7983] ? ___might_sleep+0x163/0x2c0 [ 1504.276066][ T7983] __vmalloc_node_range+0x4f8/0x810 [ 1504.281313][ T7983] ? bpf_map_area_alloc+0x20/0x30 [ 1504.286347][ T7983] __vmalloc_node_flags_caller+0x71/0x90 [ 1504.291990][ T7983] ? bpf_map_area_alloc+0x20/0x30 [ 1504.297023][ T7983] __bpf_map_area_alloc+0xde/0xf0 [ 1504.302057][ T7983] bpf_map_area_alloc+0x20/0x30 [ 1504.306921][ T7983] htab_map_alloc+0x8d3/0x11c0 [ 1504.311706][ T7983] ? htab_map_update_elem+0xca0/0xca0 [ 1504.317085][ T7983] __do_sys_bpf+0x478/0x3610 [ 1504.321693][ T7983] ? bpf_prog_load+0x1960/0x1960 [ 1504.326635][ T7983] ? __kasan_check_write+0x14/0x20 [ 1504.331751][ T7983] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1504.337303][ T7983] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1504.342585][ T7983] ? wait_for_completion+0x440/0x440 [ 1504.347861][ T7983] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1504.354095][ T7983] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1504.359540][ T7983] ? do_syscall_64+0x26/0x790 [ 1504.364196][ T7983] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1504.370244][ T7983] ? do_syscall_64+0x26/0x790 [ 1504.374907][ T7983] __x64_sys_bpf+0x73/0xb0 [ 1504.379313][ T7983] do_syscall_64+0xfa/0x790 [ 1504.383804][ T7983] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1504.389694][ T7983] RIP: 0033:0x45a919 [ 1504.393572][ T7983] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1504.413262][ T7983] RSP: 002b:00007fd87ec79c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 11:51:11 executing program 2 (fault-call:5 fault-nth:18): socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) close(0xffffffffffffffff) socket$kcm(0x29, 0x0, 0x0) [ 1504.421661][ T7983] RAX: ffffffffffffffda RBX: 00007fd87ec79c90 RCX: 000000000045a919 [ 1504.429625][ T7983] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1504.437586][ T7983] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1504.445544][ T7983] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd87ec7a6d4 [ 1504.453586][ T7983] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 11:51:11 executing program 0: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x1000, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x1, 0xfffffffd, 0x1ce, 0x6e82f8f0d98f9d0e, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x4}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r1, &(0x7f00000001c0)="a67b6194e913a426b51674ebc324bbbc40a5c30ae98201b6aaa46835cc621ffaa293a5e8da5e435fa322443698a19442bd4f9edf6c1a94c12690c1284d1737bbf13f941313af2478bf38a8ad5e10d8e41a6af69a2c7e816d8204ca82072ad078d94431739f3430c26ef871795982293d9e0d2832bb9d7f6edf68e99d149447e15bca02", &(0x7f00000002c0)="95dd4d171a8c3d13c4482b0cb0edc70c39b191c0923c65f6aacd65b1e16f34fd674a248835b19a876b8ed5855b14e63786a6f63fa8bb24dc28ec7d1df7d21e879ccbd0a43e", 0x9}, 0x20) write$cgroup_subtree(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="9b88fabaf7dffa88c29a95a6d6ac8b3ede839e21af1766be6c77d14eea46d827c303b0f3fb83dbb7204a5f0cf1f59907305eb422ff2b714a006f75b79ad9db244913512751fd480a448662c226a0e3e0ea9f39f236be82fa130d8265c7259b69d727815ce1a861277c04ba5309f623e91a19d1d9c4c2c589f246bddaa4c83345173fa2aedc96cada4a2241f68fe20c"], 0x90ad) [ 1504.514021][ T7988] FAULT_INJECTION: forcing a failure. [ 1504.514021][ T7988] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1504.610007][ T7988] CPU: 0 PID: 7988 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1504.618624][ T7988] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1504.618632][ T7988] Call Trace: [ 1504.618657][ T7988] dump_stack+0x197/0x210 [ 1504.618681][ T7988] should_fail.cold+0xa/0x15 [ 1504.618700][ T7988] ? fault_create_debugfs_attr+0x180/0x180 [ 1504.618717][ T7988] ? ___might_sleep+0x163/0x2c0 [ 1504.618743][ T7988] should_fail_alloc_page+0x50/0x60 [ 1504.646812][ T7988] __alloc_pages_nodemask+0x1a1/0x910 [ 1504.646830][ T7988] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1504.646853][ T7988] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1504.662251][ T7988] ? kasan_unpoison_shadow+0x35/0x50 [ 1504.662272][ T7988] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1504.662294][ T7988] alloc_pages_current+0x107/0x210 [ 1504.690136][ T7988] ? ___might_sleep+0x163/0x2c0 [ 1504.695011][ T7988] __vmalloc_node_range+0x4f8/0x810 [ 1504.700241][ T7988] ? bpf_map_area_alloc+0x20/0x30 [ 1504.705267][ T7988] __vmalloc_node_flags_caller+0x71/0x90 [ 1504.705287][ T7988] ? bpf_map_area_alloc+0x20/0x30 [ 1504.705307][ T7988] __bpf_map_area_alloc+0xde/0xf0 [ 1504.705331][ T7988] bpf_map_area_alloc+0x20/0x30 [ 1504.705348][ T7988] htab_map_alloc+0x8d3/0x11c0 [ 1504.705379][ T7988] ? htab_map_update_elem+0xca0/0xca0 [ 1504.705401][ T7988] __do_sys_bpf+0x478/0x3610 [ 1504.721059][ T7988] ? bpf_prog_load+0x1960/0x1960 [ 1504.721080][ T7988] ? __kasan_check_write+0x14/0x20 [ 1504.721097][ T7988] ? __mutex_unlock_slowpath+0xf0/0x6a0 11:51:11 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x10, 0x0) [ 1504.721115][ T7988] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1504.721135][ T7988] ? wait_for_completion+0x440/0x440 [ 1504.740696][ T7988] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1504.740734][ T7988] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1504.740751][ T7988] ? do_syscall_64+0x26/0x790 [ 1504.740774][ T7988] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1504.761617][ T7988] ? do_syscall_64+0x26/0x790 [ 1504.761644][ T7988] __x64_sys_bpf+0x73/0xb0 [ 1504.761666][ T7988] do_syscall_64+0xfa/0x790 [ 1504.761689][ T7988] entry_SYSCALL_64_after_hwframe+0x49/0xbe 11:51:12 executing program 2 (fault-call:5 fault-nth:19): socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) close(0xffffffffffffffff) socket$kcm(0x29, 0x0, 0x0) [ 1504.761703][ T7988] RIP: 0033:0x45a919 [ 1504.761720][ T7988] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1504.761728][ T7988] RSP: 002b:00007fd87ec79c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1504.773259][ T7988] RAX: ffffffffffffffda RBX: 00007fd87ec79c90 RCX: 000000000045a919 [ 1504.773272][ T7988] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1504.773282][ T7988] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1504.773292][ T7988] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd87ec7a6d4 [ 1504.773302][ T7988] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 [ 1504.884185][ T8000] FAULT_INJECTION: forcing a failure. [ 1504.884185][ T8000] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1504.913668][ T8000] CPU: 1 PID: 8000 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1504.922298][ T8000] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1504.932369][ T8000] Call Trace: [ 1504.935691][ T8000] dump_stack+0x197/0x210 [ 1504.940041][ T8000] should_fail.cold+0xa/0x15 [ 1504.944655][ T8000] ? fault_create_debugfs_attr+0x180/0x180 [ 1504.950482][ T8000] ? ___might_sleep+0x163/0x2c0 [ 1504.955376][ T8000] should_fail_alloc_page+0x50/0x60 [ 1504.960633][ T8000] __alloc_pages_nodemask+0x1a1/0x910 [ 1504.966032][ T8000] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1504.971608][ T8000] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1504.977350][ T8000] ? kasan_unpoison_shadow+0x35/0x50 [ 1504.982648][ T8000] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1504.988939][ T8000] alloc_pages_current+0x107/0x210 [ 1504.994039][ T8000] ? ___might_sleep+0x163/0x2c0 [ 1504.998900][ T8000] __vmalloc_node_range+0x4f8/0x810 [ 1505.004129][ T8000] ? bpf_map_area_alloc+0x20/0x30 [ 1505.009187][ T8000] __vmalloc_node_flags_caller+0x71/0x90 [ 1505.014837][ T8000] ? bpf_map_area_alloc+0x20/0x30 [ 1505.019863][ T8000] __bpf_map_area_alloc+0xde/0xf0 [ 1505.024891][ T8000] bpf_map_area_alloc+0x20/0x30 [ 1505.029730][ T8000] htab_map_alloc+0x8d3/0x11c0 [ 1505.034538][ T8000] ? htab_map_update_elem+0xca0/0xca0 [ 1505.039923][ T8000] __do_sys_bpf+0x478/0x3610 [ 1505.044514][ T8000] ? bpf_prog_load+0x1960/0x1960 [ 1505.049455][ T8000] ? __kasan_check_write+0x14/0x20 [ 1505.054553][ T8000] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1505.060123][ T8000] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1505.065427][ T8000] ? wait_for_completion+0x440/0x440 [ 1505.070718][ T8000] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1505.076993][ T8000] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1505.082473][ T8000] ? do_syscall_64+0x26/0x790 [ 1505.087157][ T8000] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1505.093296][ T8000] ? do_syscall_64+0x26/0x790 [ 1505.098003][ T8000] __x64_sys_bpf+0x73/0xb0 [ 1505.102443][ T8000] do_syscall_64+0xfa/0x790 [ 1505.106975][ T8000] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1505.112865][ T8000] RIP: 0033:0x45a919 [ 1505.116760][ T8000] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1505.136373][ T8000] RSP: 002b:00007fd87ec79c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1505.144805][ T8000] RAX: ffffffffffffffda RBX: 00007fd87ec79c90 RCX: 000000000045a919 [ 1505.152815][ T8000] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 11:51:12 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$tipc(r0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000380)={0x5, 0x70, 0x81, 0x8, 0xe2, 0x2, 0x0, 0x1f, 0x2000, 0x5, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000240), 0xc}, 0x20, 0x41, 0x1, 0x4, 0x1c000000000, 0x200, 0x800}, 0x0, 0x6, r0, 0x3) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, r1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) r4 = gettid() perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x2, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80, 0x0, @perf_config_ext={0x9, 0x5}, 0x0, 0x0, 0xffffffff, 0x0, 0x7, 0x4}, r4, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_pid(r3, &(0x7f0000000100)=r4, 0x12) r5 = perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x28, 0x3f, 0x5, 0x1f, 0x0, 0x3fc, 0x10002, 0x4, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9fe2, 0x0, @perf_bp={&(0x7f0000000040), 0x4}, 0x10480, 0x4, 0x9, 0x7, 0xffffffffffffffb3, 0x9, 0x7f}, 0x0, 0x5, r3, 0x1) perf_event_open$cgroup(&(0x7f00000001c0)={0x1, 0x70, 0x80, 0x7, 0x3, 0x7, 0x0, 0x81, 0x80000, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x0, 0x9}, 0x1, 0x5, 0x7f, 0x6, 0x80000001, 0x1ff, 0x3}, r3, 0x7, r5, 0x2) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}, 0x1000, 0x0, 0xc4, 0x0, 0x0, 0x9}, 0x0, 0xe, r3, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000)={[{0x2b, 'cpu'}, {0x2d, 'rdma'}]}, 0xb) write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) [ 1505.160775][ T8000] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1505.168745][ T8000] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd87ec7a6d4 [ 1505.176722][ T8000] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 11:51:12 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000000100)=0x1) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 11:51:12 executing program 4: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f00000002c0)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x10ad) 11:51:12 executing program 2 (fault-call:5 fault-nth:20): socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) close(0xffffffffffffffff) socket$kcm(0x29, 0x0, 0x0) 11:51:12 executing program 0: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$tipc(r0, 0x0, 0x0) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0xc) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$tipc(r2, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0x10, 0x5}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB="006386dd077a169139183d599304f56210e0ade1102dbbee670084a34ca53038b58c410198927ea36e0fe54dee67fe4b2aff3c82fce038613f35bd731b342c4910640e0938e125d835a36946949333796db1665e098503ae00aea6a2d8cf62780ba55d6666a63888eb8ece28a4ba928099017c78c32d40dc34c706fea2023c6bf253bcb17367f2c5c85e3ba78e0334b5ca40b0c8100f71b42fc6e21c9e49134d4f5752fd20bc53f7de674935bb92f7dd91ffd7fe54876cb4953ef6a47fd0da5810"], 0x90ad) 11:51:12 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_procs(r1, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) openat$cgroup_type(r1, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) [ 1505.551609][ T8019] FAULT_INJECTION: forcing a failure. [ 1505.551609][ T8019] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1505.568175][ T8019] CPU: 1 PID: 8019 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1505.576792][ T8019] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1505.586868][ T8019] Call Trace: [ 1505.590184][ T8019] dump_stack+0x197/0x210 [ 1505.594526][ T8019] should_fail.cold+0xa/0x15 [ 1505.599130][ T8019] ? fault_create_debugfs_attr+0x180/0x180 [ 1505.604996][ T8019] ? ___might_sleep+0x163/0x2c0 [ 1505.609888][ T8019] should_fail_alloc_page+0x50/0x60 [ 1505.615093][ T8019] __alloc_pages_nodemask+0x1a1/0x910 [ 1505.620472][ T8019] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1505.626219][ T8019] ? get_task_policy.part.0+0x97/0xb0 [ 1505.631608][ T8019] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 1505.637158][ T8019] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1505.643480][ T8019] alloc_pages_current+0x107/0x210 [ 1505.648606][ T8019] ? ___might_sleep+0x163/0x2c0 [ 1505.653481][ T8019] __vmalloc_node_range+0x4f8/0x810 [ 1505.658771][ T8019] ? bpf_map_area_alloc+0x20/0x30 [ 1505.663793][ T8019] __vmalloc_node_flags_caller+0x71/0x90 [ 1505.669440][ T8019] ? bpf_map_area_alloc+0x20/0x30 [ 1505.674472][ T8019] __bpf_map_area_alloc+0xde/0xf0 [ 1505.679520][ T8019] bpf_map_area_alloc+0x20/0x30 [ 1505.684477][ T8019] htab_map_alloc+0x8d3/0x11c0 [ 1505.689267][ T8019] ? htab_map_update_elem+0xca0/0xca0 [ 1505.694642][ T8019] __do_sys_bpf+0x478/0x3610 [ 1505.699266][ T8019] ? bpf_prog_load+0x1960/0x1960 [ 1505.705486][ T8019] ? __kasan_check_write+0x14/0x20 [ 1505.710605][ T8019] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1505.716150][ T8019] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1505.721428][ T8019] ? wait_for_completion+0x440/0x440 [ 1505.726725][ T8019] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1505.732994][ T8019] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1505.738500][ T8019] ? do_syscall_64+0x26/0x790 [ 1505.743166][ T8019] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1505.749233][ T8019] ? do_syscall_64+0x26/0x790 [ 1505.753914][ T8019] __x64_sys_bpf+0x73/0xb0 [ 1505.758342][ T8019] do_syscall_64+0xfa/0x790 [ 1505.762837][ T8019] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1505.768731][ T8019] RIP: 0033:0x45a919 [ 1505.772638][ T8019] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1505.792253][ T8019] RSP: 002b:00007fd87ec79c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1505.800672][ T8019] RAX: ffffffffffffffda RBX: 00007fd87ec79c90 RCX: 000000000045a919 [ 1505.808646][ T8019] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1505.816621][ T8019] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1505.824580][ T8019] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd87ec7a6d4 [ 1505.832589][ T8019] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 11:51:13 executing program 2 (fault-call:5 fault-nth:21): socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) close(0xffffffffffffffff) socket$kcm(0x29, 0x0, 0x0) 11:51:13 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x4c01, 0x0) 11:51:13 executing program 0: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}, 0x1000, 0x0, 0xc4, 0x0, 0x0, 0x9}, 0x0, 0xe, r1, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000000)=@can={0x1d, 0x0}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/75, 0x4b}, {&(0x7f00000002c0)=""/73, 0x49}, {&(0x7f0000000100)=""/50, 0x32}, {&(0x7f0000000440)=""/194, 0xc2}], 0x4}, 0x40002000) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0x51147691d1cfed15, 0x6, 0x9, 0x9, 0x8, r1, 0x6, [], r2, r3, 0x0, 0x1}, 0x3c) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 11:51:13 executing program 4: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f00000002c0)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x10ad) [ 1506.002700][ T8035] FAULT_INJECTION: forcing a failure. [ 1506.002700][ T8035] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1506.075811][ T8035] CPU: 0 PID: 8035 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1506.084445][ T8035] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1506.094518][ T8035] Call Trace: [ 1506.097830][ T8035] dump_stack+0x197/0x210 [ 1506.102188][ T8035] should_fail.cold+0xa/0x15 [ 1506.106803][ T8035] ? fault_create_debugfs_attr+0x180/0x180 [ 1506.112635][ T8035] ? ___might_sleep+0x163/0x2c0 [ 1506.117525][ T8035] should_fail_alloc_page+0x50/0x60 [ 1506.122748][ T8035] __alloc_pages_nodemask+0x1a1/0x910 [ 1506.128145][ T8035] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1506.133706][ T8035] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1506.139463][ T8035] ? kasan_unpoison_shadow+0x35/0x50 [ 1506.144761][ T8035] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1506.151031][ T8035] alloc_pages_current+0x107/0x210 [ 1506.156151][ T8035] ? ___might_sleep+0x163/0x2c0 [ 1506.161016][ T8035] __vmalloc_node_range+0x4f8/0x810 [ 1506.166253][ T8035] ? bpf_map_area_alloc+0x20/0x30 [ 1506.171310][ T8035] __vmalloc_node_flags_caller+0x71/0x90 [ 1506.176969][ T8035] ? bpf_map_area_alloc+0x20/0x30 [ 1506.182023][ T8035] __bpf_map_area_alloc+0xde/0xf0 [ 1506.187083][ T8035] bpf_map_area_alloc+0x20/0x30 [ 1506.191951][ T8035] htab_map_alloc+0x8d3/0x11c0 [ 1506.196719][ T8035] ? htab_map_update_elem+0xca0/0xca0 [ 1506.202266][ T8035] __do_sys_bpf+0x478/0x3610 [ 1506.206880][ T8035] ? bpf_prog_load+0x1960/0x1960 [ 1506.211844][ T8035] ? __kasan_check_write+0x14/0x20 [ 1506.217085][ T8035] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1506.222629][ T8035] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1506.227926][ T8035] ? wait_for_completion+0x440/0x440 [ 1506.233224][ T8035] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1506.239503][ T8035] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1506.244985][ T8035] ? do_syscall_64+0x26/0x790 [ 1506.249682][ T8035] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1506.255758][ T8035] ? do_syscall_64+0x26/0x790 [ 1506.260445][ T8035] __x64_sys_bpf+0x73/0xb0 [ 1506.264873][ T8035] do_syscall_64+0xfa/0x790 [ 1506.269487][ T8035] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1506.275378][ T8035] RIP: 0033:0x45a919 [ 1506.279315][ T8035] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1506.299195][ T8035] RSP: 002b:00007fd87ec79c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1506.307749][ T8035] RAX: ffffffffffffffda RBX: 00007fd87ec79c90 RCX: 000000000045a919 [ 1506.315812][ T8035] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1506.323787][ T8035] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1506.331840][ T8035] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd87ec7a6d4 [ 1506.339826][ T8035] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 11:51:13 executing program 0: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x16, 0x0, 0x800, 0x100, 0x400, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000007c0)='cgroup.procs\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000480)=@vsock={0x28, 0x0, 0xffffffff, @hyper}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000500)="25c4a73e0237f9515306ad7ec9dbc6cd9edf6de167df549ec4797c35fa059e14513230375d2cfe3aa24daff39c5a668a62bf76b958e85bc32c1a3b7ce3835eacac13a13240c2d5beb7aad0ea624abb7e260313b1434a0a9c58acce3b7417e3cecdd41c1c69a2e4cdd0cc4eb3a951ce9622b3417a540ff531caa33ced7b6bb65b60790d2a44f718d307344be807a76e7b5b489a77903fe346b0dc8456ce4d8157935238785b9b2117d5dbc8087faf98f1af5956", 0xb3}, {&(0x7f00000005c0)="f94936a5e72e6ef41209a0b3ad08379c10ab9e9db2571af019cf75561ff7805f2bc2a75111a08f73941980b6ac0191cd424bd7904191660a75b7d8484cccf2360c830ba96a5de0444d917e12031638d191afa53ba886f64d8bc0f71610ce232ddde7a3de602418bfacddf88089b3ad25f376363d2df3dd852dae67275e19830c8db733f2f495e17f700bce839a6e5f17884195d2f4b5c23e946ed9686f369f3e5efa91527963098f05d658239ed86b931fbf8e0d09ff8c7b6c38", 0xba}], 0x2, &(0x7f0000000d80)=ANY=[@ANYBLOB="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"], 0x12f8}, 0x4000) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(r2, 0x10e, 0x2, &(0x7f0000000000)=r1, 0x279) recvmsg$kcm(0xffffffffffffffff, &(0x7f000000c680)={&(0x7f000000b500)=@can, 0x80, &(0x7f000000b640)=[{&(0x7f000000b580)=""/181, 0xb5}], 0x1, &(0x7f000000b680)=""/4096, 0x1000}, 0x54) socket$kcm(0x10, 0x2, 0x10) socket$kcm(0x29, 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$tipc(r3, 0x0, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r5, &(0x7f00000004c0), 0x12) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ae9e531df05b0dbffa8650ebb25a45cb4b1c9e47f1f5f6f4da8ad4ca", @ANYPTR, @ANYRESOCT=r3, @ANYRESDEC, @ANYRESDEC=r5, @ANYRESDEC=r0], 0x9360) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$tipc(r6, 0x0, 0x0) openat$cgroup_int(r6, &(0x7f0000000000)='cgroup.max.descendants\x00', 0x2, 0x0) 11:51:13 executing program 2 (fault-call:5 fault-nth:22): socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) close(0xffffffffffffffff) socket$kcm(0x29, 0x0, 0x0) 11:51:13 executing program 4: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f00000002c0)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x10ad) [ 1506.470423][ T8051] FAULT_INJECTION: forcing a failure. [ 1506.470423][ T8051] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1506.607590][ T8051] CPU: 0 PID: 8051 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1506.616230][ T8051] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1506.616238][ T8051] Call Trace: [ 1506.616265][ T8051] dump_stack+0x197/0x210 [ 1506.616294][ T8051] should_fail.cold+0xa/0x15 [ 1506.616315][ T8051] ? fault_create_debugfs_attr+0x180/0x180 [ 1506.616331][ T8051] ? ___might_sleep+0x163/0x2c0 [ 1506.616360][ T8051] should_fail_alloc_page+0x50/0x60 [ 1506.616373][ T8051] __alloc_pages_nodemask+0x1a1/0x910 [ 1506.616394][ T8051] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1506.665367][ T8051] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1506.671124][ T8051] ? kasan_unpoison_shadow+0x35/0x50 [ 1506.676433][ T8051] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1506.682682][ T8051] alloc_pages_current+0x107/0x210 [ 1506.687793][ T8051] ? ___might_sleep+0x163/0x2c0 [ 1506.692758][ T8051] __vmalloc_node_range+0x4f8/0x810 [ 1506.697969][ T8051] ? bpf_map_area_alloc+0x20/0x30 [ 1506.702999][ T8051] __vmalloc_node_flags_caller+0x71/0x90 [ 1506.708623][ T8051] ? bpf_map_area_alloc+0x20/0x30 [ 1506.713639][ T8051] __bpf_map_area_alloc+0xde/0xf0 [ 1506.718704][ T8051] bpf_map_area_alloc+0x20/0x30 [ 1506.723571][ T8051] htab_map_alloc+0x8d3/0x11c0 [ 1506.728484][ T8051] ? htab_map_update_elem+0xca0/0xca0 [ 1506.734015][ T8051] __do_sys_bpf+0x478/0x3610 [ 1506.738616][ T8051] ? bpf_prog_load+0x1960/0x1960 [ 1506.743659][ T8051] ? __kasan_check_write+0x14/0x20 [ 1506.748777][ T8051] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1506.754336][ T8051] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1506.759642][ T8051] ? wait_for_completion+0x440/0x440 [ 1506.764941][ T8051] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1506.771216][ T8051] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1506.776798][ T8051] ? do_syscall_64+0x26/0x790 [ 1506.781495][ T8051] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1506.787555][ T8051] ? do_syscall_64+0x26/0x790 [ 1506.792229][ T8051] __x64_sys_bpf+0x73/0xb0 [ 1506.796708][ T8051] do_syscall_64+0xfa/0x790 [ 1506.801264][ T8051] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1506.807154][ T8051] RIP: 0033:0x45a919 [ 1506.811048][ T8051] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1506.830663][ T8051] RSP: 002b:00007fd87ec79c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1506.839089][ T8051] RAX: ffffffffffffffda RBX: 00007fd87ec79c90 RCX: 000000000045a919 [ 1506.847062][ T8051] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1506.855039][ T8051] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1506.863016][ T8051] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd87ec7a6d4 [ 1506.870997][ T8051] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 11:51:14 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="206386dd07fdc81d6f0e07398a91bfb4b16801000000527d30bd11f05ba6c237044f5d000100008c43b396afe90114496090ae939e66d6f8e95e7d62a06d3bdecb4894159ea95a02aff35e952152000000000000000087f0e195c4f8976f34bf1a75a96df01b21de1f92562f4e1fa664a5ddfc4b5265b218b48ed616c13bb4702572fa6620702dd3837286f7720f7cabdf97523d33e6971c1f6255420cb2a49c708513f349852d01e2cc3f3f3ab4a1d22b33944205157a13e442602943"], 0x90ad) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$tipc(r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$tipc(r2, 0x0, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f00000000c0)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r3, 0x800454cf, &(0x7f0000000200)) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x20, 0x1, 0x5, 0x9, 0x0, 0xe9, 0x204, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x429, 0x2, 0x40, 0x6, 0x40, 0x1f, 0x24}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x4) 11:51:14 executing program 0: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x16, 0x0, 0x800, 0x100, 0x400, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000007c0)='cgroup.procs\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000480)=@vsock={0x28, 0x0, 0xffffffff, @hyper}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000500)="25c4a73e0237f9515306ad7ec9dbc6cd9edf6de167df549ec4797c35fa059e14513230375d2cfe3aa24daff39c5a668a62bf76b958e85bc32c1a3b7ce3835eacac13a13240c2d5beb7aad0ea624abb7e260313b1434a0a9c58acce3b7417e3cecdd41c1c69a2e4cdd0cc4eb3a951ce9622b3417a540ff531caa33ced7b6bb65b60790d2a44f718d307344be807a76e7b5b489a77903fe346b0dc8456ce4d8157935238785b9b2117d5dbc8087faf98f1af5956", 0xb3}, {&(0x7f00000005c0)="f94936a5e72e6ef41209a0b3ad08379c10ab9e9db2571af019cf75561ff7805f2bc2a75111a08f73941980b6ac0191cd424bd7904191660a75b7d8484cccf2360c830ba96a5de0444d917e12031638d191afa53ba886f64d8bc0f71610ce232ddde7a3de602418bfacddf88089b3ad25f376363d2df3dd852dae67275e19830c8db733f2f495e17f700bce839a6e5f17884195d2f4b5c23e946ed9686f369f3e5efa91527963098f05d658239ed86b931fbf8e0d09ff8c7b6c38", 0xba}], 0x2, &(0x7f0000000d80)=ANY=[@ANYBLOB="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"], 0x12f8}, 0x4000) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(r2, 0x10e, 0x2, &(0x7f0000000000)=r1, 0x279) recvmsg$kcm(0xffffffffffffffff, &(0x7f000000c680)={&(0x7f000000b500)=@can, 0x80, &(0x7f000000b640)=[{&(0x7f000000b580)=""/181, 0xb5}], 0x1, &(0x7f000000b680)=""/4096, 0x1000}, 0x54) socket$kcm(0x10, 0x2, 0x10) socket$kcm(0x29, 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$tipc(r3, 0x0, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r5, &(0x7f00000004c0), 0x12) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ae9e531df05b0dbffa8650ebb25a45cb4b1c9e47f1f5f6f4da8ad4ca", @ANYPTR, @ANYRESOCT=r3, @ANYRESDEC, @ANYRESDEC=r5, @ANYRESDEC=r0], 0x9360) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$tipc(r6, 0x0, 0x0) openat$cgroup_int(r6, &(0x7f0000000000)='cgroup.max.descendants\x00', 0x2, 0x0) 11:51:14 executing program 2 (fault-call:5 fault-nth:23): socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) close(0xffffffffffffffff) socket$kcm(0x29, 0x0, 0x0) 11:51:14 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$tipc(r1, 0x0, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000000)=r1, 0x4) 11:51:14 executing program 4: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f00000002c0)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x10ad) 11:51:14 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x5421, 0x0) [ 1507.075369][ T8071] FAULT_INJECTION: forcing a failure. [ 1507.075369][ T8071] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1507.204280][ T8071] CPU: 1 PID: 8071 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1507.213035][ T8071] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1507.223106][ T8071] Call Trace: [ 1507.226418][ T8071] dump_stack+0x197/0x210 [ 1507.230771][ T8071] should_fail.cold+0xa/0x15 [ 1507.235384][ T8071] ? fault_create_debugfs_attr+0x180/0x180 [ 1507.241217][ T8071] ? ___might_sleep+0x163/0x2c0 [ 1507.246102][ T8071] should_fail_alloc_page+0x50/0x60 [ 1507.251319][ T8071] __alloc_pages_nodemask+0x1a1/0x910 [ 1507.256714][ T8071] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1507.262277][ T8071] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1507.268040][ T8071] ? kasan_unpoison_shadow+0x35/0x50 [ 1507.273346][ T8071] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1507.279589][ T8071] alloc_pages_current+0x107/0x210 [ 1507.284694][ T8071] ? ___might_sleep+0x163/0x2c0 [ 1507.289559][ T8071] __vmalloc_node_range+0x4f8/0x810 [ 1507.294767][ T8071] ? bpf_map_area_alloc+0x20/0x30 [ 1507.299800][ T8071] __vmalloc_node_flags_caller+0x71/0x90 [ 1507.305427][ T8071] ? bpf_map_area_alloc+0x20/0x30 [ 1507.310448][ T8071] __bpf_map_area_alloc+0xde/0xf0 [ 1507.315469][ T8071] bpf_map_area_alloc+0x20/0x30 [ 1507.320315][ T8071] htab_map_alloc+0x8d3/0x11c0 [ 1507.325088][ T8071] ? htab_map_update_elem+0xca0/0xca0 [ 1507.330454][ T8071] __do_sys_bpf+0x478/0x3610 [ 1507.335043][ T8071] ? bpf_prog_load+0x1960/0x1960 [ 1507.339992][ T8071] ? __kasan_check_write+0x14/0x20 [ 1507.345093][ T8071] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1507.350632][ T8071] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1507.355910][ T8071] ? wait_for_completion+0x440/0x440 [ 1507.361203][ T8071] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1507.367450][ T8071] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1507.372901][ T8071] ? do_syscall_64+0x26/0x790 [ 1507.377568][ T8071] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1507.383624][ T8071] ? do_syscall_64+0x26/0x790 [ 1507.388316][ T8071] __x64_sys_bpf+0x73/0xb0 [ 1507.392737][ T8071] do_syscall_64+0xfa/0x790 [ 1507.397237][ T8071] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1507.403120][ T8071] RIP: 0033:0x45a919 [ 1507.407011][ T8071] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1507.426606][ T8071] RSP: 002b:00007fd87ec79c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1507.435030][ T8071] RAX: ffffffffffffffda RBX: 00007fd87ec79c90 RCX: 000000000045a919 [ 1507.442993][ T8071] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1507.450957][ T8071] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1507.458919][ T8071] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd87ec7a6d4 [ 1507.466896][ T8071] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 11:51:14 executing program 4: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f00000002c0)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x10ad) 11:51:14 executing program 2 (fault-call:5 fault-nth:24): socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) close(0xffffffffffffffff) socket$kcm(0x29, 0x0, 0x0) 11:51:14 executing program 0: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x16, 0x0, 0x800, 0x100, 0x400, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000007c0)='cgroup.procs\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000480)=@vsock={0x28, 0x0, 0xffffffff, @hyper}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000500)="25c4a73e0237f9515306ad7ec9dbc6cd9edf6de167df549ec4797c35fa059e14513230375d2cfe3aa24daff39c5a668a62bf76b958e85bc32c1a3b7ce3835eacac13a13240c2d5beb7aad0ea624abb7e260313b1434a0a9c58acce3b7417e3cecdd41c1c69a2e4cdd0cc4eb3a951ce9622b3417a540ff531caa33ced7b6bb65b60790d2a44f718d307344be807a76e7b5b489a77903fe346b0dc8456ce4d8157935238785b9b2117d5dbc8087faf98f1af5956", 0xb3}, {&(0x7f00000005c0)="f94936a5e72e6ef41209a0b3ad08379c10ab9e9db2571af019cf75561ff7805f2bc2a75111a08f73941980b6ac0191cd424bd7904191660a75b7d8484cccf2360c830ba96a5de0444d917e12031638d191afa53ba886f64d8bc0f71610ce232ddde7a3de602418bfacddf88089b3ad25f376363d2df3dd852dae67275e19830c8db733f2f495e17f700bce839a6e5f17884195d2f4b5c23e946ed9686f369f3e5efa91527963098f05d658239ed86b931fbf8e0d09ff8c7b6c38", 0xba}], 0x2, &(0x7f0000000d80)=ANY=[@ANYBLOB="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"], 0x12f8}, 0x4000) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(r2, 0x10e, 0x2, &(0x7f0000000000)=r1, 0x279) recvmsg$kcm(0xffffffffffffffff, &(0x7f000000c680)={&(0x7f000000b500)=@can, 0x80, &(0x7f000000b640)=[{&(0x7f000000b580)=""/181, 0xb5}], 0x1, &(0x7f000000b680)=""/4096, 0x1000}, 0x54) socket$kcm(0x10, 0x2, 0x10) socket$kcm(0x29, 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$tipc(r3, 0x0, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r5, &(0x7f00000004c0), 0x12) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ae9e531df05b0dbffa8650ebb25a45cb4b1c9e47f1f5f6f4da8ad4ca", @ANYPTR, @ANYRESOCT=r3, @ANYRESDEC, @ANYRESDEC=r5, @ANYRESDEC=r0], 0x9360) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$tipc(r6, 0x0, 0x0) openat$cgroup_int(r6, &(0x7f0000000000)='cgroup.max.descendants\x00', 0x2, 0x0) [ 1507.691676][ T8095] FAULT_INJECTION: forcing a failure. [ 1507.691676][ T8095] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1507.707710][ T8095] CPU: 0 PID: 8095 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1507.716361][ T8095] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1507.716370][ T8095] Call Trace: [ 1507.716396][ T8095] dump_stack+0x197/0x210 [ 1507.716419][ T8095] should_fail.cold+0xa/0x15 [ 1507.716438][ T8095] ? fault_create_debugfs_attr+0x180/0x180 [ 1507.716456][ T8095] ? ___might_sleep+0x163/0x2c0 [ 1507.716487][ T8095] should_fail_alloc_page+0x50/0x60 [ 1507.716501][ T8095] __alloc_pages_nodemask+0x1a1/0x910 [ 1507.716520][ T8095] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1507.716538][ T8095] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1507.716562][ T8095] ? kasan_unpoison_shadow+0x35/0x50 [ 1507.716580][ T8095] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1507.716602][ T8095] alloc_pages_current+0x107/0x210 [ 1507.734282][ T8095] ? ___might_sleep+0x163/0x2c0 [ 1507.749549][ T8095] __vmalloc_node_range+0x4f8/0x810 [ 1507.776670][ T8095] ? bpf_map_area_alloc+0x20/0x30 [ 1507.776692][ T8095] __vmalloc_node_flags_caller+0x71/0x90 [ 1507.776708][ T8095] ? bpf_map_area_alloc+0x20/0x30 [ 1507.776731][ T8095] __bpf_map_area_alloc+0xde/0xf0 [ 1507.818809][ T8095] bpf_map_area_alloc+0x20/0x30 [ 1507.823687][ T8095] htab_map_alloc+0x8d3/0x11c0 [ 1507.828495][ T8095] ? htab_map_update_elem+0xca0/0xca0 [ 1507.833893][ T8095] __do_sys_bpf+0x478/0x3610 [ 1507.838517][ T8095] ? bpf_prog_load+0x1960/0x1960 [ 1507.843476][ T8095] ? __kasan_check_write+0x14/0x20 [ 1507.848605][ T8095] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1507.854180][ T8095] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1507.859495][ T8095] ? wait_for_completion+0x440/0x440 [ 1507.864816][ T8095] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1507.871102][ T8095] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1507.876598][ T8095] ? do_syscall_64+0x26/0x790 [ 1507.881275][ T8095] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1507.887436][ T8095] ? do_syscall_64+0x26/0x790 [ 1507.892109][ T8095] __x64_sys_bpf+0x73/0xb0 [ 1507.896543][ T8095] do_syscall_64+0xfa/0x790 [ 1507.901034][ T8095] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1507.906910][ T8095] RIP: 0033:0x45a919 [ 1507.910790][ T8095] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1507.930493][ T8095] RSP: 002b:00007fd87ec79c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1507.938931][ T8095] RAX: ffffffffffffffda RBX: 00007fd87ec79c90 RCX: 000000000045a919 [ 1507.946906][ T8095] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1507.954865][ T8095] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1507.962832][ T8095] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd87ec7a6d4 [ 1507.970794][ T8095] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 11:51:15 executing program 2 (fault-call:5 fault-nth:25): socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) close(0xffffffffffffffff) socket$kcm(0x29, 0x0, 0x0) 11:51:15 executing program 0 (fault-call:8 fault-nth:0): bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0x1, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r0, 0x8, 0x8}, 0xc) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 11:51:15 executing program 4: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f00000002c0)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x10ad) [ 1508.127258][ T8107] FAULT_INJECTION: forcing a failure. [ 1508.127258][ T8107] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1508.198998][ T8107] CPU: 0 PID: 8107 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1508.207504][ T8112] FAULT_INJECTION: forcing a failure. [ 1508.207504][ T8112] name failslab, interval 1, probability 0, space 0, times 0 [ 1508.207623][ T8107] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1508.230265][ T8107] Call Trace: [ 1508.233565][ T8107] dump_stack+0x197/0x210 [ 1508.237900][ T8107] should_fail.cold+0xa/0x15 [ 1508.242494][ T8107] ? fault_create_debugfs_attr+0x180/0x180 [ 1508.248303][ T8107] ? ___might_sleep+0x163/0x2c0 [ 1508.253180][ T8107] should_fail_alloc_page+0x50/0x60 [ 1508.258374][ T8107] __alloc_pages_nodemask+0x1a1/0x910 [ 1508.270519][ T8107] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1508.276245][ T8107] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1508.281806][ T8107] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1508.287791][ T8107] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1508.294036][ T8107] alloc_pages_current+0x107/0x210 [ 1508.299269][ T8107] __get_free_pages+0xc/0x40 [ 1508.303858][ T8107] kasan_populate_vmalloc_pte+0x2f/0x1c0 [ 1508.309491][ T8107] apply_to_page_range+0x445/0x700 [ 1508.314599][ T8107] ? memset+0x40/0x40 [ 1508.318592][ T8107] kasan_populate_vmalloc+0x68/0x90 [ 1508.323793][ T8107] __vmalloc_node_range+0x47e/0x810 [ 1508.328991][ T8107] ? bpf_map_area_alloc+0x20/0x30 [ 1508.334009][ T8107] __vmalloc_node_flags_caller+0x71/0x90 [ 1508.339634][ T8107] ? bpf_map_area_alloc+0x20/0x30 [ 1508.346508][ T8107] __bpf_map_area_alloc+0xde/0xf0 [ 1508.351551][ T8107] bpf_map_area_alloc+0x20/0x30 [ 1508.356393][ T8107] htab_map_alloc+0x8d3/0x11c0 [ 1508.361162][ T8107] ? htab_map_update_elem+0xca0/0xca0 [ 1508.366538][ T8107] __do_sys_bpf+0x478/0x3610 [ 1508.371136][ T8107] ? bpf_prog_load+0x1960/0x1960 [ 1508.376068][ T8107] ? __kasan_check_write+0x14/0x20 [ 1508.381171][ T8107] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1508.386706][ T8107] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1508.391985][ T8107] ? wait_for_completion+0x440/0x440 [ 1508.397267][ T8107] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1508.403513][ T8107] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1508.408962][ T8107] ? do_syscall_64+0x26/0x790 [ 1508.413629][ T8107] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1508.419689][ T8107] ? do_syscall_64+0x26/0x790 [ 1508.424364][ T8107] __x64_sys_bpf+0x73/0xb0 [ 1508.428798][ T8107] do_syscall_64+0xfa/0x790 [ 1508.433300][ T8107] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1508.439183][ T8107] RIP: 0033:0x45a919 [ 1508.443080][ T8107] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1508.462682][ T8107] RSP: 002b:00007fd87ec79c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1508.471084][ T8107] RAX: ffffffffffffffda RBX: 00007fd87ec79c90 RCX: 000000000045a919 [ 1508.479050][ T8107] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1508.487009][ T8107] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1508.494971][ T8107] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd87ec7a6d4 [ 1508.502940][ T8107] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 [ 1508.510938][ T8112] CPU: 1 PID: 8112 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 1508.519538][ T8112] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1508.529607][ T8112] Call Trace: [ 1508.532917][ T8112] dump_stack+0x197/0x210 [ 1508.537272][ T8112] should_fail.cold+0xa/0x15 [ 1508.541888][ T8112] ? fault_create_debugfs_attr+0x180/0x180 [ 1508.547722][ T8112] ? ___might_sleep+0x163/0x2c0 [ 1508.552592][ T8112] __should_failslab+0x121/0x190 [ 1508.557548][ T8112] should_failslab+0x9/0x14 [ 1508.562066][ T8112] kmem_cache_alloc_node+0x268/0x740 [ 1508.567369][ T8112] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1508.573640][ T8112] __alloc_skb+0xd5/0x5e0 [ 1508.577993][ T8112] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 1508.583550][ T8112] ? __lockdep_free_key_range+0x120/0x120 [ 1508.583566][ T8112] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1508.583586][ T8112] ? debug_smp_processor_id+0x33/0x18a [ 1508.600985][ T8112] alloc_skb_with_frags+0x93/0x590 [ 1508.601002][ T8112] ? find_held_lock+0x35/0x130 [ 1508.601022][ T8112] ? __might_fault+0x12b/0x1e0 [ 1508.601046][ T8112] sock_alloc_send_pskb+0x7ad/0x920 [ 1508.620859][ T8112] ? iov_iter_advance+0x29a/0xe20 [ 1508.625938][ T8112] ? sock_wmalloc+0x120/0x120 [ 1508.630639][ T8112] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1508.636377][ T8112] ? iov_iter_advance+0x29a/0xe20 [ 1508.641418][ T8112] ? _copy_from_iter_full+0x255/0x870 [ 1508.646820][ T8112] tun_get_user+0xb07/0x3fc0 [ 1508.651426][ T8112] ? __kasan_check_read+0x11/0x20 [ 1508.656491][ T8112] ? tun_build_skb.isra.0+0x1480/0x1480 [ 1508.662067][ T8112] ? lock_downgrade+0x920/0x920 [ 1508.666948][ T8112] ? rcu_read_lock_held+0x9c/0xb0 [ 1508.671995][ T8112] ? __kasan_check_read+0x11/0x20 [ 1508.677050][ T8112] tun_chr_write_iter+0xbd/0x156 [ 1508.682003][ T8112] new_sync_write+0x4d3/0x770 [ 1508.686683][ T8112] ? new_sync_read+0x800/0x800 [ 1508.686709][ T8112] ? __fget+0x37f/0x550 [ 1508.686733][ T8112] ? apparmor_file_permission+0x27/0x30 [ 1508.686751][ T8112] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1508.686766][ T8112] ? security_file_permission+0x8f/0x380 [ 1508.686780][ T8112] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1508.686800][ T8112] __vfs_write+0xe1/0x110 [ 1508.722859][ T8112] vfs_write+0x268/0x5d0 [ 1508.727137][ T8112] ksys_write+0x14f/0x290 [ 1508.731491][ T8112] ? __ia32_sys_read+0xb0/0xb0 [ 1508.736267][ T8112] ? do_syscall_64+0x26/0x790 [ 1508.740938][ T8112] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1508.747025][ T8112] ? do_syscall_64+0x26/0x790 [ 1508.751708][ T8112] __x64_sys_write+0x73/0xb0 [ 1508.756308][ T8112] do_syscall_64+0xfa/0x790 [ 1508.760804][ T8112] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1508.766683][ T8112] RIP: 0033:0x45a919 [ 1508.770561][ T8112] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1508.790219][ T8112] RSP: 002b:00007f9f62537c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1508.798649][ T8112] RAX: ffffffffffffffda RBX: 00007f9f62537c90 RCX: 000000000045a919 [ 1508.806621][ T8112] RDX: 00000000000090ad RSI: 00000000200000c0 RDI: 0000000000000003 [ 1508.814579][ T8112] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1508.822553][ T8112] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9f625386d4 [ 1508.830514][ T8112] R13: 00000000004cbe3f R14: 00000000004e5b00 R15: 0000000000000005 11:51:16 executing program 4: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00'}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f00000002c0)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x10ad) 11:51:16 executing program 2 (fault-call:5 fault-nth:26): socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) close(0xffffffffffffffff) socket$kcm(0x29, 0x0, 0x0) 11:51:16 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$tipc(r1, 0x0, 0x0) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x0, 0x8, 0x60, 0x8}, {0x68, 0x81, 0xa1, 0x7}]}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) write$cgroup_subtree(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0xff16) 11:51:16 executing program 0 (fault-call:8 fault-nth:1): bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0x1, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r0, 0x8, 0x8}, 0xc) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 11:51:16 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz1\x00', 0x1ff) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="f500000000"], 0x90ad) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x7) sendmsg$tipc(r2, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000000)={r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000100)={r3}) 11:51:16 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x5450, 0x0) [ 1509.049070][ T8132] FAULT_INJECTION: forcing a failure. [ 1509.049070][ T8132] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1509.094383][ T8133] FAULT_INJECTION: forcing a failure. [ 1509.094383][ T8133] name failslab, interval 1, probability 0, space 0, times 0 [ 1509.098289][ T8132] CPU: 0 PID: 8132 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1509.115638][ T8132] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1509.115646][ T8132] Call Trace: [ 1509.115672][ T8132] dump_stack+0x197/0x210 [ 1509.115696][ T8132] should_fail.cold+0xa/0x15 [ 1509.115716][ T8132] ? fault_create_debugfs_attr+0x180/0x180 [ 1509.115733][ T8132] ? ___might_sleep+0x163/0x2c0 [ 1509.115762][ T8132] should_fail_alloc_page+0x50/0x60 [ 1509.115777][ T8132] __alloc_pages_nodemask+0x1a1/0x910 [ 1509.115797][ T8132] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1509.115820][ T8132] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1509.148717][ T8132] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1509.148736][ T8132] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1509.148761][ T8132] alloc_pages_current+0x107/0x210 [ 1509.165104][ T8132] __get_free_pages+0xc/0x40 [ 1509.165122][ T8132] kasan_populate_vmalloc_pte+0x2f/0x1c0 [ 1509.165144][ T8132] apply_to_page_range+0x445/0x700 [ 1509.165168][ T8132] ? memset+0x40/0x40 [ 1509.176670][ T8132] kasan_populate_vmalloc+0x68/0x90 [ 1509.176693][ T8132] __vmalloc_node_range+0x47e/0x810 [ 1509.176720][ T8132] ? bpf_map_area_alloc+0x20/0x30 [ 1509.188039][ T8132] __vmalloc_node_flags_caller+0x71/0x90 [ 1509.198228][ T8132] ? bpf_map_area_alloc+0x20/0x30 [ 1509.212464][ T8132] __bpf_map_area_alloc+0xde/0xf0 [ 1509.212485][ T8132] bpf_map_area_alloc+0x20/0x30 [ 1509.212501][ T8132] htab_map_alloc+0x8d3/0x11c0 [ 1509.212532][ T8132] ? htab_map_update_elem+0xca0/0xca0 [ 1509.228347][ T8132] __do_sys_bpf+0x478/0x3610 [ 1509.247956][ T8132] ? bpf_prog_load+0x1960/0x1960 [ 1509.247976][ T8132] ? __kasan_check_write+0x14/0x20 [ 1509.247997][ T8132] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1509.257930][ T8132] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1509.257950][ T8132] ? wait_for_completion+0x440/0x440 [ 1509.257977][ T8132] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1509.258007][ T8132] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1509.258027][ T8132] ? do_syscall_64+0x26/0x790 [ 1509.268039][ T8132] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1509.268057][ T8132] ? do_syscall_64+0x26/0x790 [ 1509.268084][ T8132] __x64_sys_bpf+0x73/0xb0 [ 1509.268105][ T8132] do_syscall_64+0xfa/0x790 [ 1509.278903][ T8132] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1509.278917][ T8132] RIP: 0033:0x45a919 [ 1509.278938][ T8132] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1509.295855][ T8132] RSP: 002b:00007fd87ec79c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1509.295871][ T8132] RAX: ffffffffffffffda RBX: 00007fd87ec79c90 RCX: 000000000045a919 [ 1509.295880][ T8132] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1509.295888][ T8132] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1509.295896][ T8132] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd87ec7a6d4 [ 1509.295911][ T8132] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 [ 1509.324898][ T8133] CPU: 0 PID: 8133 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 1509.349876][ T8133] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1509.349884][ T8133] Call Trace: [ 1509.349908][ T8133] dump_stack+0x197/0x210 [ 1509.349932][ T8133] should_fail.cold+0xa/0x15 [ 1509.349951][ T8133] ? fault_create_debugfs_attr+0x180/0x180 [ 1509.349970][ T8133] ? ___might_sleep+0x163/0x2c0 [ 1509.349993][ T8133] __should_failslab+0x121/0x190 [ 1509.350009][ T8133] should_failslab+0x9/0x14 [ 1509.350029][ T8133] kmem_cache_alloc_node_trace+0x274/0x750 [ 1509.366445][ T8133] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1509.366463][ T8133] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1509.366488][ T8133] __kmalloc_node_track_caller+0x3d/0x70 [ 1509.366510][ T8133] __kmalloc_reserve.isra.0+0x40/0xf0 [ 1509.366531][ T8133] __alloc_skb+0x10b/0x5e0 [ 1509.366551][ T8133] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 1509.366568][ T8133] ? trace_hardirqs_on_caller+0x6a/0x240 11:51:16 executing program 2 (fault-call:5 fault-nth:27): socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) close(0xffffffffffffffff) socket$kcm(0x29, 0x0, 0x0) [ 1509.366594][ T8133] alloc_skb_with_frags+0x93/0x590 [ 1509.382522][ T8133] ? retint_kernel+0x2b/0x2b [ 1509.382544][ T8133] sock_alloc_send_pskb+0x7ad/0x920 [ 1509.382566][ T8133] ? iov_iter_advance+0x29a/0xe20 [ 1509.382588][ T8133] ? sock_wmalloc+0x120/0x120 [ 1509.382610][ T8133] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1509.382623][ T8133] ? iov_iter_advance+0x29a/0xe20 [ 1509.382633][ T8133] ? _copy_from_iter_full+0x255/0x870 [ 1509.382662][ T8133] tun_get_user+0xb07/0x3fc0 [ 1509.398587][ T8133] ? __kasan_check_read+0x11/0x20 [ 1509.398628][ T8133] ? tun_build_skb.isra.0+0x1480/0x1480 [ 1509.398653][ T8133] ? lock_downgrade+0x920/0x920 [ 1509.398672][ T8133] ? rcu_read_lock_held+0x9c/0xb0 [ 1509.398694][ T8133] ? __kasan_check_read+0x11/0x20 [ 1509.417314][ T8133] tun_chr_write_iter+0xbd/0x156 [ 1509.417335][ T8133] new_sync_write+0x4d3/0x770 [ 1509.417356][ T8133] ? new_sync_read+0x800/0x800 [ 1509.417384][ T8133] ? __fget+0x37f/0x550 [ 1509.417406][ T8133] ? apparmor_file_permission+0x27/0x30 [ 1509.417428][ T8133] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1509.425017][ T8133] ? security_file_permission+0x8f/0x380 [ 1509.425034][ T8133] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1509.425060][ T8133] __vfs_write+0xe1/0x110 [ 1509.425081][ T8133] vfs_write+0x268/0x5d0 [ 1509.425102][ T8133] ksys_write+0x14f/0x290 [ 1509.425125][ T8133] ? __ia32_sys_read+0xb0/0xb0 [ 1509.435497][ T8133] ? do_syscall_64+0x26/0x790 [ 1509.435516][ T8133] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1509.435532][ T8133] ? do_syscall_64+0x26/0x790 [ 1509.435555][ T8133] __x64_sys_write+0x73/0xb0 [ 1509.435575][ T8133] do_syscall_64+0xfa/0x790 [ 1509.435594][ T8133] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1509.435610][ T8133] RIP: 0033:0x45a919 [ 1509.445369][ T8133] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1509.445379][ T8133] RSP: 002b:00007f9f62537c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1509.445395][ T8133] RAX: ffffffffffffffda RBX: 00007f9f62537c90 RCX: 000000000045a919 [ 1509.445405][ T8133] RDX: 00000000000090ad RSI: 00000000200000c0 RDI: 0000000000000003 [ 1509.445415][ T8133] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1509.445425][ T8133] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9f625386d4 [ 1509.445434][ T8133] R13: 00000000004cbe3f R14: 00000000004e5b00 R15: 0000000000000005 [ 1509.554423][ T8148] FAULT_INJECTION: forcing a failure. [ 1509.554423][ T8148] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1509.744728][ T8148] CPU: 1 PID: 8148 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1509.753342][ T8148] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1509.763428][ T8148] Call Trace: [ 1509.766741][ T8148] dump_stack+0x197/0x210 [ 1509.771245][ T8148] should_fail.cold+0xa/0x15 [ 1509.775871][ T8148] ? fault_create_debugfs_attr+0x180/0x180 [ 1509.781686][ T8148] ? ___might_sleep+0x163/0x2c0 [ 1509.786717][ T8148] should_fail_alloc_page+0x50/0x60 [ 1509.791934][ T8148] __alloc_pages_nodemask+0x1a1/0x910 [ 1509.797322][ T8148] ? find_held_lock+0x35/0x130 [ 1509.802103][ T8148] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1509.807848][ T8148] ? lock_downgrade+0x920/0x920 [ 1509.812769][ T8148] ? rwlock_bug.part.0+0x90/0x90 [ 1509.817708][ T8148] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1509.823972][ T8148] alloc_pages_current+0x107/0x210 [ 1509.829116][ T8148] __get_free_pages+0xc/0x40 [ 1509.833706][ T8148] kasan_populate_vmalloc_pte+0x2f/0x1c0 [ 1509.839348][ T8148] apply_to_page_range+0x445/0x700 [ 1509.844461][ T8148] ? memset+0x40/0x40 [ 1509.848439][ T8148] kasan_populate_vmalloc+0x68/0x90 [ 1509.853646][ T8148] __vmalloc_node_range+0x47e/0x810 [ 1509.858869][ T8148] ? bpf_map_area_alloc+0x20/0x30 [ 1509.863907][ T8148] __vmalloc_node_flags_caller+0x71/0x90 [ 1509.869628][ T8148] ? bpf_map_area_alloc+0x20/0x30 [ 1509.874655][ T8148] __bpf_map_area_alloc+0xde/0xf0 [ 1509.879686][ T8148] bpf_map_area_alloc+0x20/0x30 [ 1509.884538][ T8148] htab_map_alloc+0x8d3/0x11c0 [ 1509.889299][ T8148] ? htab_map_update_elem+0xca0/0xca0 [ 1509.894666][ T8148] __do_sys_bpf+0x478/0x3610 [ 1509.899279][ T8148] ? bpf_prog_load+0x1960/0x1960 [ 1509.904222][ T8148] ? __kasan_check_write+0x14/0x20 [ 1509.909348][ T8148] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1509.914901][ T8148] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1509.920233][ T8148] ? wait_for_completion+0x440/0x440 [ 1509.925539][ T8148] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1509.931814][ T8148] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1509.937294][ T8148] ? do_syscall_64+0x26/0x790 [ 1509.942070][ T8148] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1509.948151][ T8148] ? do_syscall_64+0x26/0x790 [ 1509.952848][ T8148] __x64_sys_bpf+0x73/0xb0 [ 1509.957275][ T8148] do_syscall_64+0xfa/0x790 [ 1509.961780][ T8148] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1509.967673][ T8148] RIP: 0033:0x45a919 [ 1509.971579][ T8148] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1509.991197][ T8148] RSP: 002b:00007fd87ec79c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1509.999616][ T8148] RAX: ffffffffffffffda RBX: 00007fd87ec79c90 RCX: 000000000045a919 [ 1510.007596][ T8148] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1510.015582][ T8148] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1510.023619][ T8148] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd87ec7a6d4 [ 1510.031591][ T8148] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 11:51:17 executing program 0 (fault-call:8 fault-nth:2): bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0x1, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r0, 0x8, 0x8}, 0xc) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 11:51:17 executing program 4: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00'}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f00000002c0)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x10ad) 11:51:17 executing program 2 (fault-call:5 fault-nth:28): socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) close(0xffffffffffffffff) socket$kcm(0x29, 0x0, 0x0) [ 1510.212219][ T8158] FAULT_INJECTION: forcing a failure. [ 1510.212219][ T8158] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1510.233656][ T8158] CPU: 1 PID: 8158 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1510.242282][ T8158] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1510.252353][ T8158] Call Trace: [ 1510.252449][ T8158] dump_stack+0x197/0x210 [ 1510.260063][ T8158] should_fail.cold+0xa/0x15 [ 1510.264682][ T8158] ? fault_create_debugfs_attr+0x180/0x180 [ 1510.270507][ T8158] ? ___might_sleep+0x163/0x2c0 [ 1510.275385][ T8158] should_fail_alloc_page+0x50/0x60 [ 1510.280602][ T8158] __alloc_pages_nodemask+0x1a1/0x910 [ 1510.284267][ T8161] FAULT_INJECTION: forcing a failure. [ 1510.284267][ T8161] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1510.286021][ T8158] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1510.286048][ T8158] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1510.286064][ T8158] ? find_next_bit+0x107/0x130 [ 1510.286085][ T8158] pcpu_populate_chunk+0xf8/0x940 [ 1510.286107][ T8158] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1510.321009][ T8158] ? find_next_bit+0xc7/0x130 [ 1510.321036][ T8158] pcpu_alloc+0xd5b/0x1380 [ 1510.335823][ T8158] ? pcpu_alloc_area+0x820/0x820 [ 1510.340772][ T8158] ? bpf_map_area_alloc+0x20/0x30 [ 1510.345807][ T8158] __alloc_percpu_gfp+0x28/0x30 [ 1510.350665][ T8158] htab_map_alloc+0xdb9/0x11c0 [ 1510.355449][ T8158] ? htab_map_update_elem+0xca0/0xca0 [ 1510.360824][ T8158] __do_sys_bpf+0x478/0x3610 [ 1510.365411][ T8158] ? bpf_prog_load+0x1960/0x1960 [ 1510.370339][ T8158] ? __kasan_check_write+0x14/0x20 [ 1510.375447][ T8158] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1510.380998][ T8158] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1510.386285][ T8158] ? wait_for_completion+0x440/0x440 [ 1510.391582][ T8158] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1510.397829][ T8158] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1510.403366][ T8158] ? do_syscall_64+0x26/0x790 [ 1510.408047][ T8158] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1510.414120][ T8158] ? do_syscall_64+0x26/0x790 [ 1510.418840][ T8158] __x64_sys_bpf+0x73/0xb0 [ 1510.423283][ T8158] do_syscall_64+0xfa/0x790 [ 1510.427814][ T8158] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1510.433751][ T8158] RIP: 0033:0x45a919 [ 1510.437657][ T8158] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 11:51:17 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000280)={'lr\xb0\x01\x00\x00\x00\x01\xd9\xca\x00\xac|\xa8\x8c\xe4', 0x4009}) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) close(r1) close(r2) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000340)) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x5) recvmsg(r1, &(0x7f0000000140)={0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0x6f}, 0x0) close(r1) openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000006440)={&(0x7f0000003f80)=@ll, 0x80, 0x0, 0x0, &(0x7f0000006400)=""/52, 0x34}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x660c, 0x0) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x0) openat$cgroup_type(r3, &(0x7f0000000280)='cgroup.type\x00', 0x2, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.memory_pressure\x00', 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) [ 1510.457444][ T8158] RSP: 002b:00007fd87ec79c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1510.465866][ T8158] RAX: ffffffffffffffda RBX: 00007fd87ec79c90 RCX: 000000000045a919 [ 1510.473836][ T8158] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1510.481801][ T8158] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1510.489774][ T8158] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd87ec7a6d4 [ 1510.497743][ T8158] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 [ 1510.529933][ T8161] CPU: 0 PID: 8161 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 1510.538563][ T8161] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1510.548625][ T8161] Call Trace: [ 1510.551937][ T8161] dump_stack+0x197/0x210 [ 1510.556280][ T8161] should_fail.cold+0xa/0x15 [ 1510.560905][ T8161] ? fault_create_debugfs_attr+0x180/0x180 [ 1510.566728][ T8161] ? ___might_sleep+0x163/0x2c0 [ 1510.571601][ T8161] should_fail_alloc_page+0x50/0x60 [ 1510.576812][ T8161] __alloc_pages_nodemask+0x1a1/0x910 [ 1510.582198][ T8161] ? kasan_kmalloc+0x9/0x10 [ 1510.586715][ T8161] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1510.592453][ T8161] ? __alloc_skb+0x3d0/0x5e0 [ 1510.597066][ T8161] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1510.603330][ T8161] alloc_pages_current+0x107/0x210 [ 1510.608472][ T8161] alloc_skb_with_frags+0x1a5/0x590 [ 1510.613685][ T8161] ? find_held_lock+0x35/0x130 [ 1510.618465][ T8161] ? __might_fault+0x12b/0x1e0 [ 1510.623250][ T8161] sock_alloc_send_pskb+0x7ad/0x920 [ 1510.628466][ T8161] ? iov_iter_advance+0x29a/0xe20 [ 1510.633513][ T8161] ? sock_wmalloc+0x120/0x120 [ 1510.638214][ T8161] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1510.643939][ T8161] ? iov_iter_advance+0x29a/0xe20 [ 1510.648963][ T8161] ? _copy_from_iter_full+0x255/0x870 [ 1510.648993][ T8161] tun_get_user+0xb07/0x3fc0 [ 1510.649008][ T8161] ? __kasan_check_read+0x11/0x20 [ 1510.649040][ T8161] ? tun_build_skb.isra.0+0x1480/0x1480 [ 1510.649063][ T8161] ? lock_downgrade+0x920/0x920 [ 1510.674407][ T8161] ? rcu_read_lock_held+0x9c/0xb0 [ 1510.679453][ T8161] ? __kasan_check_read+0x11/0x20 [ 1510.684509][ T8161] tun_chr_write_iter+0xbd/0x156 [ 1510.689518][ T8161] new_sync_write+0x4d3/0x770 [ 1510.694204][ T8161] ? new_sync_read+0x800/0x800 [ 1510.698998][ T8161] ? __fget+0x37f/0x550 [ 1510.703180][ T8161] ? apparmor_file_permission+0x27/0x30 [ 1510.708744][ T8161] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1510.714028][ T8169] FAULT_INJECTION: forcing a failure. [ 1510.714028][ T8169] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1510.714995][ T8161] ? security_file_permission+0x8f/0x380 [ 1510.715012][ T8161] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1510.715036][ T8161] __vfs_write+0xe1/0x110 [ 1510.715055][ T8161] vfs_write+0x268/0x5d0 [ 1510.715076][ T8161] ksys_write+0x14f/0x290 [ 1510.715101][ T8161] ? __ia32_sys_read+0xb0/0xb0 [ 1510.757001][ T8161] ? do_syscall_64+0x26/0x790 [ 1510.761704][ T8161] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1510.767779][ T8161] ? do_syscall_64+0x26/0x790 [ 1510.772467][ T8161] __x64_sys_write+0x73/0xb0 [ 1510.777065][ T8161] do_syscall_64+0xfa/0x790 [ 1510.781572][ T8161] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1510.787471][ T8161] RIP: 0033:0x45a919 [ 1510.791489][ T8161] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1510.811094][ T8161] RSP: 002b:00007f9f62537c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1510.819515][ T8161] RAX: ffffffffffffffda RBX: 00007f9f62537c90 RCX: 000000000045a919 11:51:17 executing program 2 (fault-call:5 fault-nth:29): socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) close(0xffffffffffffffff) socket$kcm(0x29, 0x0, 0x0) [ 1510.827495][ T8161] RDX: 00000000000090ad RSI: 00000000200000c0 RDI: 0000000000000003 [ 1510.835467][ T8161] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1510.843447][ T8161] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9f625386d4 [ 1510.851434][ T8161] R13: 00000000004cbe3f R14: 00000000004e5b00 R15: 0000000000000005 [ 1510.859657][ T8169] CPU: 1 PID: 8169 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1510.868262][ T8169] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1510.878324][ T8169] Call Trace: [ 1510.881624][ T8169] dump_stack+0x197/0x210 [ 1510.885962][ T8169] should_fail.cold+0xa/0x15 [ 1510.890573][ T8169] ? fault_create_debugfs_attr+0x180/0x180 [ 1510.896396][ T8169] ? ___might_sleep+0x163/0x2c0 [ 1510.901280][ T8169] should_fail_alloc_page+0x50/0x60 [ 1510.906522][ T8169] __alloc_pages_nodemask+0x1a1/0x910 [ 1510.911894][ T8169] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1510.917631][ T8169] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1510.923884][ T8169] ? find_next_bit+0x107/0x130 [ 1510.928685][ T8169] pcpu_populate_chunk+0xf8/0x940 [ 1510.933719][ T8169] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1510.939446][ T8169] ? find_next_bit+0xc7/0x130 [ 1510.944135][ T8169] pcpu_alloc+0xd5b/0x1380 [ 1510.948559][ T8169] ? pcpu_alloc_area+0x820/0x820 [ 1510.953605][ T8169] ? bpf_map_area_alloc+0x20/0x30 [ 1510.958680][ T8169] __alloc_percpu_gfp+0x28/0x30 [ 1510.963553][ T8169] htab_map_alloc+0xdb9/0x11c0 [ 1510.968347][ T8169] ? htab_map_update_elem+0xca0/0xca0 [ 1510.973853][ T8169] __do_sys_bpf+0x478/0x3610 [ 1510.978452][ T8169] ? bpf_prog_load+0x1960/0x1960 [ 1510.983393][ T8169] ? __kasan_check_write+0x14/0x20 [ 1510.988494][ T8169] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1510.994031][ T8169] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1510.999359][ T8169] ? wait_for_completion+0x440/0x440 [ 1511.004661][ T8169] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1511.010905][ T8169] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1511.016367][ T8169] ? do_syscall_64+0x26/0x790 [ 1511.021128][ T8169] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1511.027186][ T8169] ? do_syscall_64+0x26/0x790 [ 1511.032009][ T8169] __x64_sys_bpf+0x73/0xb0 [ 1511.036434][ T8169] do_syscall_64+0xfa/0x790 [ 1511.040939][ T8169] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1511.046816][ T8169] RIP: 0033:0x45a919 [ 1511.050695][ T8169] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1511.070345][ T8169] RSP: 002b:00007fd87ec79c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 11:51:18 executing program 4: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00'}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f00000002c0)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x10ad) [ 1511.078742][ T8169] RAX: ffffffffffffffda RBX: 00007fd87ec79c90 RCX: 000000000045a919 [ 1511.086700][ T8169] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1511.094659][ T8169] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1511.102639][ T8169] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd87ec7a6d4 [ 1511.110601][ T8169] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 11:51:18 executing program 2 (fault-call:5 fault-nth:30): socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) close(0xffffffffffffffff) socket$kcm(0x29, 0x0, 0x0) 11:51:18 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x5, 0x6, 0xe6, 0x0, 0x0, 0x8, 0x10, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, @perf_config_ext={0x6, 0x101}, 0x483, 0x3, 0x7ff, 0x1, 0x7, 0x3ff, 0x8}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x1) 11:51:18 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x5451, 0x0) 11:51:18 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$tipc(r1, 0x0, 0x0) recvmsg(r1, &(0x7f0000004580)={&(0x7f0000004200)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000004440)=[{&(0x7f0000004280)=""/169, 0xa9}, {&(0x7f0000004340)=""/255, 0xff}], 0x2, &(0x7f0000004480)=""/218, 0xda}, 0x40000000) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000045c0)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000004600)={0xec7f700430749528, 0x8001, 0x1, 0x6, 0x120, 0xffffffffffffffff, 0x5, [], r2, r3, 0x1, 0x5}, 0x3c) 11:51:18 executing program 0 (fault-call:8 fault-nth:3): bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0x1, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r0, 0x8, 0x8}, 0xc) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) [ 1511.268726][ T8179] FAULT_INJECTION: forcing a failure. [ 1511.268726][ T8179] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1511.326862][ T8179] CPU: 1 PID: 8179 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1511.335469][ T8179] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1511.345535][ T8179] Call Trace: [ 1511.348843][ T8179] dump_stack+0x197/0x210 [ 1511.353194][ T8179] should_fail.cold+0xa/0x15 [ 1511.357804][ T8179] ? fault_create_debugfs_attr+0x180/0x180 [ 1511.363626][ T8179] ? ___might_sleep+0x163/0x2c0 [ 1511.368502][ T8179] should_fail_alloc_page+0x50/0x60 [ 1511.373714][ T8179] __alloc_pages_nodemask+0x1a1/0x910 [ 1511.379098][ T8179] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1511.384813][ T8179] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1511.391037][ T8179] ? find_next_bit+0x107/0x130 [ 1511.395790][ T8179] pcpu_populate_chunk+0xf8/0x940 [ 1511.400800][ T8179] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1511.406502][ T8179] ? find_next_bit+0xc7/0x130 [ 1511.411169][ T8179] pcpu_alloc+0xd5b/0x1380 [ 1511.415582][ T8179] ? pcpu_alloc_area+0x820/0x820 [ 1511.420507][ T8179] ? bpf_map_area_alloc+0x20/0x30 [ 1511.425525][ T8179] __alloc_percpu_gfp+0x28/0x30 [ 1511.430362][ T8179] htab_map_alloc+0xdb9/0x11c0 [ 1511.435131][ T8179] ? htab_map_update_elem+0xca0/0xca0 [ 1511.440491][ T8179] __do_sys_bpf+0x478/0x3610 [ 1511.445071][ T8179] ? bpf_prog_load+0x1960/0x1960 [ 1511.449995][ T8179] ? __kasan_check_write+0x14/0x20 [ 1511.455092][ T8179] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1511.460629][ T8179] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1511.465903][ T8179] ? wait_for_completion+0x440/0x440 [ 1511.471196][ T8179] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1511.477438][ T8179] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1511.482884][ T8179] ? do_syscall_64+0x26/0x790 [ 1511.487548][ T8179] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1511.493628][ T8179] ? do_syscall_64+0x26/0x790 [ 1511.498319][ T8179] __x64_sys_bpf+0x73/0xb0 [ 1511.502729][ T8179] do_syscall_64+0xfa/0x790 [ 1511.507227][ T8179] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1511.513124][ T8179] RIP: 0033:0x45a919 [ 1511.517025][ T8179] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1511.537136][ T8179] RSP: 002b:00007fd87ec79c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1511.545534][ T8179] RAX: ffffffffffffffda RBX: 00007fd87ec79c90 RCX: 000000000045a919 [ 1511.553490][ T8179] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1511.561621][ T8179] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1511.569580][ T8179] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd87ec7a6d4 [ 1511.577550][ T8179] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 [ 1511.590528][ T8187] FAULT_INJECTION: forcing a failure. [ 1511.590528][ T8187] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1511.642157][ T8187] CPU: 0 PID: 8187 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 1511.650791][ T8187] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1511.660857][ T8187] Call Trace: [ 1511.664260][ T8187] dump_stack+0x197/0x210 [ 1511.668613][ T8187] should_fail.cold+0xa/0x15 [ 1511.673229][ T8187] ? fault_create_debugfs_attr+0x180/0x180 [ 1511.679055][ T8187] ? ___might_sleep+0x163/0x2c0 [ 1511.683934][ T8187] should_fail_alloc_page+0x50/0x60 [ 1511.689236][ T8187] __alloc_pages_nodemask+0x1a1/0x910 [ 1511.694621][ T8187] ? kasan_kmalloc+0x9/0x10 [ 1511.694643][ T8187] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1511.694672][ T8187] ? __alloc_skb+0x3d0/0x5e0 [ 1511.704879][ T8187] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1511.704903][ T8187] alloc_pages_current+0x107/0x210 [ 1511.704928][ T8187] alloc_skb_with_frags+0x1a5/0x590 [ 1511.704941][ T8187] ? find_held_lock+0x35/0x130 [ 1511.704964][ T8187] sock_alloc_send_pskb+0x7ad/0x920 [ 1511.704983][ T8187] ? iov_iter_advance+0x29a/0xe20 [ 1511.705003][ T8187] ? sock_wmalloc+0x120/0x120 [ 1511.715812][ T8187] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1511.715829][ T8187] ? iov_iter_advance+0x29a/0xe20 [ 1511.715843][ T8187] ? _copy_from_iter_full+0x255/0x870 [ 1511.715874][ T8187] tun_get_user+0xb07/0x3fc0 [ 1511.715888][ T8187] ? __kasan_check_read+0x11/0x20 [ 1511.715918][ T8187] ? tun_build_skb.isra.0+0x1480/0x1480 [ 1511.715940][ T8187] ? lock_downgrade+0x920/0x920 [ 1511.781884][ T8187] ? rcu_read_lock_held+0x9c/0xb0 [ 1511.786905][ T8187] ? __kasan_check_read+0x11/0x20 [ 1511.791930][ T8187] tun_chr_write_iter+0xbd/0x156 [ 1511.796867][ T8187] new_sync_write+0x4d3/0x770 [ 1511.801537][ T8187] ? new_sync_read+0x800/0x800 [ 1511.806304][ T8187] ? __fget+0x37f/0x550 [ 1511.810547][ T8187] ? apparmor_file_permission+0x27/0x30 [ 1511.816084][ T8187] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1511.822328][ T8187] ? security_file_permission+0x8f/0x380 [ 1511.827954][ T8187] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1511.833239][ T8187] __vfs_write+0xe1/0x110 [ 1511.837561][ T8187] vfs_write+0x268/0x5d0 [ 1511.841805][ T8187] ksys_write+0x14f/0x290 [ 1511.846145][ T8187] ? __ia32_sys_read+0xb0/0xb0 [ 1511.850901][ T8187] ? do_syscall_64+0x26/0x790 [ 1511.855582][ T8187] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1511.861725][ T8187] ? do_syscall_64+0x26/0x790 [ 1511.866400][ T8187] __x64_sys_write+0x73/0xb0 [ 1511.870997][ T8187] do_syscall_64+0xfa/0x790 [ 1511.875507][ T8187] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1511.881397][ T8187] RIP: 0033:0x45a919 [ 1511.885286][ T8187] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1511.904882][ T8187] RSP: 002b:00007f9f62537c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1511.913301][ T8187] RAX: ffffffffffffffda RBX: 00007f9f62537c90 RCX: 000000000045a919 [ 1511.921286][ T8187] RDX: 00000000000090ad RSI: 00000000200000c0 RDI: 0000000000000003 [ 1511.929257][ T8187] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 11:51:19 executing program 4: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f00000002c0)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x10ad) [ 1511.937220][ T8187] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9f625386d4 [ 1511.945182][ T8187] R13: 00000000004cbe3f R14: 00000000004e5b00 R15: 0000000000000005 11:51:19 executing program 2 (fault-call:5 fault-nth:31): socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) close(0xffffffffffffffff) socket$kcm(0x29, 0x0, 0x0) 11:51:19 executing program 0 (fault-call:8 fault-nth:4): bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0x1, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r0, 0x8, 0x8}, 0xc) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) [ 1512.110194][ T8203] FAULT_INJECTION: forcing a failure. [ 1512.110194][ T8203] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1512.124539][ T8203] CPU: 0 PID: 8203 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1512.133162][ T8203] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1512.143244][ T8203] Call Trace: [ 1512.143282][ T8203] dump_stack+0x197/0x210 [ 1512.143307][ T8203] should_fail.cold+0xa/0x15 [ 1512.143330][ T8203] ? fault_create_debugfs_attr+0x180/0x180 [ 1512.143347][ T8203] ? ___might_sleep+0x163/0x2c0 [ 1512.143383][ T8203] should_fail_alloc_page+0x50/0x60 [ 1512.143400][ T8203] __alloc_pages_nodemask+0x1a1/0x910 [ 1512.143418][ T8203] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1512.143446][ T8203] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1512.143462][ T8203] ? find_next_bit+0x107/0x130 [ 1512.143494][ T8203] pcpu_populate_chunk+0xf8/0x940 [ 1512.143511][ T8203] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1512.143531][ T8203] ? find_next_bit+0xc7/0x130 [ 1512.143566][ T8203] pcpu_alloc+0xd5b/0x1380 [ 1512.213381][ T8203] ? pcpu_alloc_area+0x820/0x820 [ 1512.219030][ T8203] ? bpf_map_area_alloc+0x20/0x30 [ 1512.224061][ T8203] __alloc_percpu_gfp+0x28/0x30 [ 1512.228916][ T8203] htab_map_alloc+0xdb9/0x11c0 [ 1512.233683][ T8203] ? htab_map_update_elem+0xca0/0xca0 [ 1512.239062][ T8203] __do_sys_bpf+0x478/0x3610 [ 1512.243646][ T8203] ? bpf_prog_load+0x1960/0x1960 [ 1512.248590][ T8203] ? __kasan_check_write+0x14/0x20 [ 1512.253704][ T8203] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1512.259247][ T8203] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1512.264523][ T8203] ? wait_for_completion+0x440/0x440 [ 1512.269829][ T8203] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1512.276081][ T8203] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1512.281728][ T8203] ? do_syscall_64+0x26/0x790 [ 1512.286394][ T8203] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1512.292624][ T8203] ? do_syscall_64+0x26/0x790 [ 1512.297297][ T8203] __x64_sys_bpf+0x73/0xb0 [ 1512.301713][ T8203] do_syscall_64+0xfa/0x790 [ 1512.306212][ T8203] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1512.312192][ T8203] RIP: 0033:0x45a919 [ 1512.316087][ T8203] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1512.335694][ T8203] RSP: 002b:00007fd87ec79c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1512.344105][ T8203] RAX: ffffffffffffffda RBX: 00007fd87ec79c90 RCX: 000000000045a919 [ 1512.352436][ T8203] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1512.360394][ T8203] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1512.368373][ T8203] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd87ec7a6d4 [ 1512.376345][ T8203] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 11:51:19 executing program 2 (fault-call:5 fault-nth:32): socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) close(0xffffffffffffffff) socket$kcm(0x29, 0x0, 0x0) 11:51:19 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0x1, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r0, 0x8, 0x8}, 0xc) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) [ 1512.519002][ T8210] FAULT_INJECTION: forcing a failure. [ 1512.519002][ T8210] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1512.533974][ T8210] CPU: 1 PID: 8210 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1512.542590][ T8210] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1512.552659][ T8210] Call Trace: [ 1512.555971][ T8210] dump_stack+0x197/0x210 [ 1512.560333][ T8210] should_fail.cold+0xa/0x15 [ 1512.564942][ T8210] ? fault_create_debugfs_attr+0x180/0x180 [ 1512.570769][ T8210] ? ___might_sleep+0x163/0x2c0 [ 1512.575662][ T8210] should_fail_alloc_page+0x50/0x60 [ 1512.580885][ T8210] __alloc_pages_nodemask+0x1a1/0x910 [ 1512.586275][ T8210] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1512.592018][ T8210] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1512.598275][ T8210] ? find_next_bit+0x107/0x130 [ 1512.603068][ T8210] pcpu_populate_chunk+0xf8/0x940 [ 1512.608106][ T8210] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1512.613865][ T8210] ? find_next_bit+0xc7/0x130 [ 1512.618560][ T8210] pcpu_alloc+0xd5b/0x1380 [ 1512.622982][ T8210] ? pcpu_alloc_area+0x820/0x820 [ 1512.629692][ T8210] ? bpf_map_area_alloc+0x20/0x30 [ 1512.634713][ T8210] __alloc_percpu_gfp+0x28/0x30 [ 1512.639567][ T8210] htab_map_alloc+0xdb9/0x11c0 [ 1512.644356][ T8210] ? htab_map_update_elem+0xca0/0xca0 [ 1512.649804][ T8210] __do_sys_bpf+0x478/0x3610 [ 1512.654432][ T8210] ? bpf_prog_load+0x1960/0x1960 [ 1512.659370][ T8210] ? __kasan_check_write+0x14/0x20 [ 1512.664493][ T8210] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1512.670041][ T8210] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1512.675367][ T8210] ? wait_for_completion+0x440/0x440 [ 1512.680680][ T8210] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1512.686943][ T8210] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1512.692404][ T8210] ? do_syscall_64+0x26/0x790 [ 1512.697091][ T8210] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1512.703190][ T8210] ? do_syscall_64+0x26/0x790 [ 1512.707889][ T8210] __x64_sys_bpf+0x73/0xb0 [ 1512.712404][ T8210] do_syscall_64+0xfa/0x790 [ 1512.716920][ T8210] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1512.722816][ T8210] RIP: 0033:0x45a919 [ 1512.726703][ T8210] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1512.746467][ T8210] RSP: 002b:00007fd87ec79c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1512.754877][ T8210] RAX: ffffffffffffffda RBX: 00007fd87ec79c90 RCX: 000000000045a919 [ 1512.762852][ T8210] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1512.770809][ T8210] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1512.778795][ T8210] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd87ec7a6d4 [ 1512.786773][ T8210] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 11:51:20 executing program 2 (fault-call:5 fault-nth:33): socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) close(0xffffffffffffffff) socket$kcm(0x29, 0x0, 0x0) 11:51:20 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'n\xbfo\x8aFV\xe8\x1b`\x00\x00\x00\x00\x00 \x00', 0x4009}) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 11:51:20 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0x1, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r0, 0x8, 0x8}, 0xc) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x2000916d) 11:51:20 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$tipc(r1, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f00000015c0)={&(0x7f0000000100)=@caif, 0x80, &(0x7f0000001540)=[{&(0x7f0000000340)="8c8ecd8a0bea8dee6b811fe9a6c56a24bc489e712a90b40fb2ba22c52755c26680eea645", 0x24}, {&(0x7f0000000440)="6744455e4a0f642ae0902ce4bf74cf1f14ed1e6040f73ac75385b9652c6ac5bd80b99ca5f278654efd29a827ca16819b09e4f51eab03c6cb90280bea6c2171a12d5f1af7176d5b5980732cd3a93ca66edf0e8c413824bb2f99eda644d54c13d14ab9c11ade4f56c1fb021942b7a03d260a32e481ddf484de43a71159e18afe84846f645c85a202848039ac8cddf0fd29093a7e798ed20d59ab1d3621e114aa07183de39f829617a6fce461795209a795f9bdaee95f50b2d6915af30c64c37b25135530d6290f62e352529ea5852105b2fe05cd5305", 0xd5}, {&(0x7f0000000380)}, {&(0x7f0000000540)="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", 0x1000}, {&(0x7f00000003c0)="dbad1c9d9b95a1b5afcab90163c1982835f4c7116e25f06b7253d8d947d72382418f62d4077c9333954b4a1758439a0b0e", 0x31}], 0x5}, 0x2000010) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={0x1, &(0x7f00000002c0)="5bccf8fd1ccbc6c8b55274fea8d4fb66bfb9bcb0100d6f6800f3312ccf8877582f440db25cdccac83520ba9d783887e913d85ec401e7b8f2ce064318391269b15db549a63a297dbc73caeb3a8510c1a1495f8739d10b4cf202b5939dc9f4996b6c526f50e95868", &(0x7f0000000180)="60edd216e33212becfb3c9c45988c272597a73b2fe19d36e858033a17a7e813cf30383e0f310ee77be61647b77e682936a99eefe9e181464158d8358b9c030d738c10fcd27fe14572853f45696c9f0c0d49dabc35644abfbc6beb07f39a84976b515500c0b4d85ff9e7b80873962701b70ae719d7423f0774484e432f372394318f5f58a3a232238acb9b6011f63114de34f3d432446df0252af8b9467b951fdb453f0b24ab952dce5ed190127c978838e8c688a28e4745303e03421ef92dc696fb3c04b", 0x1}, 0x20) 11:51:20 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x5452, 0x0) 11:51:20 executing program 4: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f00000002c0)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x10ad) [ 1513.036434][ T8229] FAULT_INJECTION: forcing a failure. [ 1513.036434][ T8229] name fail_page_alloc, interval 1, probability 0, space 0, times 0 11:51:20 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0x1, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r0, 0x8, 0x8}, 0xc) r1 = perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r3 = socket$kcm(0x29, 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}, 0x1000, 0x0, 0xc4, 0x0, 0x0, 0x9}, 0x0, 0xe, r4, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r4) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) [ 1513.094882][ T8229] CPU: 1 PID: 8229 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1513.103519][ T8229] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1513.113586][ T8229] Call Trace: [ 1513.116902][ T8229] dump_stack+0x197/0x210 [ 1513.121255][ T8229] should_fail.cold+0xa/0x15 [ 1513.125869][ T8229] ? fault_create_debugfs_attr+0x180/0x180 [ 1513.131694][ T8229] ? ___might_sleep+0x163/0x2c0 [ 1513.136581][ T8229] should_fail_alloc_page+0x50/0x60 [ 1513.141809][ T8229] __alloc_pages_nodemask+0x1a1/0x910 [ 1513.147204][ T8229] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1513.152956][ T8229] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1513.159208][ T8229] ? find_next_bit+0x107/0x130 [ 1513.164053][ T8229] pcpu_populate_chunk+0xf8/0x940 [ 1513.169106][ T8229] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1513.174849][ T8229] ? find_next_bit+0xc7/0x130 [ 1513.179558][ T8229] pcpu_alloc+0xd5b/0x1380 [ 1513.184018][ T8229] ? pcpu_alloc_area+0x820/0x820 [ 1513.188973][ T8229] ? bpf_map_area_alloc+0x20/0x30 [ 1513.194057][ T8229] __alloc_percpu_gfp+0x28/0x30 [ 1513.198967][ T8229] htab_map_alloc+0xdb9/0x11c0 [ 1513.203781][ T8229] ? htab_map_update_elem+0xca0/0xca0 [ 1513.203800][ T8229] __do_sys_bpf+0x478/0x3610 [ 1513.203821][ T8229] ? bpf_prog_load+0x1960/0x1960 [ 1513.222196][ T8229] ? __kasan_check_write+0x14/0x20 [ 1513.222215][ T8229] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1513.222239][ T8229] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1513.222260][ T8229] ? wait_for_completion+0x440/0x440 [ 1513.248481][ T8229] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1513.254784][ T8229] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1513.260288][ T8229] ? do_syscall_64+0x26/0x790 [ 1513.264985][ T8229] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1513.271148][ T8229] ? do_syscall_64+0x26/0x790 [ 1513.275822][ T8229] __x64_sys_bpf+0x73/0xb0 [ 1513.280311][ T8229] do_syscall_64+0xfa/0x790 [ 1513.284818][ T8229] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1513.290707][ T8229] RIP: 0033:0x45a919 [ 1513.294617][ T8229] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1513.314219][ T8229] RSP: 002b:00007fd87ec79c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1513.322649][ T8229] RAX: ffffffffffffffda RBX: 00007fd87ec79c90 RCX: 000000000045a919 [ 1513.330624][ T8229] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1513.338597][ T8229] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1513.346582][ T8229] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd87ec7a6d4 [ 1513.354564][ T8229] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 11:51:20 executing program 2 (fault-call:5 fault-nth:34): socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) close(0xffffffffffffffff) socket$kcm(0x29, 0x0, 0x0) 11:51:20 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0x1, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r0, 0x8, 0x8}, 0xc) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0xffffffff}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 11:51:20 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0x1, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r0, 0x8, 0x8}, 0xc) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000440)='c\x86\xdd') write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) [ 1513.530688][ T8256] FAULT_INJECTION: forcing a failure. [ 1513.530688][ T8256] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1513.551243][ T8256] CPU: 1 PID: 8256 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1513.559864][ T8256] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1513.569918][ T8256] Call Trace: [ 1513.569945][ T8256] dump_stack+0x197/0x210 [ 1513.569966][ T8256] should_fail.cold+0xa/0x15 [ 1513.569984][ T8256] ? fault_create_debugfs_attr+0x180/0x180 [ 1513.570000][ T8256] ? ___might_sleep+0x163/0x2c0 [ 1513.570028][ T8256] should_fail_alloc_page+0x50/0x60 [ 1513.570048][ T8256] __alloc_pages_nodemask+0x1a1/0x910 [ 1513.603655][ T8256] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1513.609501][ T8256] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1513.615764][ T8256] ? find_next_bit+0x107/0x130 [ 1513.620564][ T8256] pcpu_populate_chunk+0xf8/0x940 [ 1513.625619][ T8256] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1513.631368][ T8256] ? find_next_bit+0xc7/0x130 [ 1513.636778][ T8256] pcpu_alloc+0xd5b/0x1380 [ 1513.641270][ T8256] ? pcpu_alloc_area+0x820/0x820 [ 1513.646488][ T8256] ? bpf_map_area_alloc+0x20/0x30 [ 1513.651647][ T8256] __alloc_percpu_gfp+0x28/0x30 [ 1513.656547][ T8256] htab_map_alloc+0xdb9/0x11c0 [ 1513.661331][ T8256] ? htab_map_update_elem+0xca0/0xca0 [ 1513.666702][ T8256] __do_sys_bpf+0x478/0x3610 [ 1513.671611][ T8256] ? bpf_prog_load+0x1960/0x1960 [ 1513.676563][ T8256] ? __kasan_check_write+0x14/0x20 [ 1513.681727][ T8256] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1513.687272][ T8256] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1513.692675][ T8256] ? wait_for_completion+0x440/0x440 [ 1513.697972][ T8256] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1513.704227][ T8256] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1513.709751][ T8256] ? do_syscall_64+0x26/0x790 [ 1513.714431][ T8256] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1513.720503][ T8256] ? do_syscall_64+0x26/0x790 [ 1513.725291][ T8256] __x64_sys_bpf+0x73/0xb0 [ 1513.729865][ T8256] do_syscall_64+0xfa/0x790 [ 1513.734392][ T8256] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1513.740288][ T8256] RIP: 0033:0x45a919 [ 1513.744225][ T8256] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1513.763835][ T8256] RSP: 002b:00007fd87ec79c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1513.772234][ T8256] RAX: ffffffffffffffda RBX: 00007fd87ec79c90 RCX: 000000000045a919 [ 1513.780196][ T8256] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1513.788228][ T8256] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1513.796294][ T8256] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd87ec7a6d4 [ 1513.804256][ T8256] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 11:51:21 executing program 4: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f00000002c0)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x10ad) 11:51:21 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0x1, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r0, 0x8, 0x8}, 0xc) perf_event_open$cgroup(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x0, 0x1000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}, 0x1000, 0x0, 0xc4, 0x0, 0x0, 0x9}, 0x0, 0xe, r2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='pids.events\x00', 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r1) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 11:51:21 executing program 2 (fault-call:5 fault-nth:35): socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) close(0xffffffffffffffff) socket$kcm(0x29, 0x0, 0x0) 11:51:21 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x501000, 0x0) [ 1514.050717][ T8274] FAULT_INJECTION: forcing a failure. [ 1514.050717][ T8274] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1514.084806][ T8274] CPU: 1 PID: 8274 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1514.093464][ T8274] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1514.103568][ T8274] Call Trace: [ 1514.106892][ T8274] dump_stack+0x197/0x210 [ 1514.111253][ T8274] should_fail.cold+0xa/0x15 [ 1514.117617][ T8274] ? fault_create_debugfs_attr+0x180/0x180 [ 1514.123447][ T8274] ? ___might_sleep+0x163/0x2c0 [ 1514.128324][ T8274] should_fail_alloc_page+0x50/0x60 [ 1514.133539][ T8274] __alloc_pages_nodemask+0x1a1/0x910 [ 1514.138929][ T8274] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1514.144675][ T8274] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1514.151020][ T8274] ? find_next_bit+0x107/0x130 [ 1514.156412][ T8274] pcpu_populate_chunk+0xf8/0x940 [ 1514.161430][ T8274] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1514.167145][ T8274] ? find_next_bit+0xc7/0x130 [ 1514.171970][ T8274] pcpu_alloc+0xd5b/0x1380 [ 1514.176425][ T8274] ? pcpu_alloc_area+0x820/0x820 [ 1514.181416][ T8274] ? bpf_map_area_alloc+0x20/0x30 [ 1514.186449][ T8274] __alloc_percpu_gfp+0x28/0x30 [ 1514.191293][ T8274] htab_map_alloc+0xdb9/0x11c0 [ 1514.196054][ T8274] ? htab_map_update_elem+0xca0/0xca0 [ 1514.201413][ T8274] __do_sys_bpf+0x478/0x3610 [ 1514.205997][ T8274] ? bpf_prog_load+0x1960/0x1960 [ 1514.211210][ T8274] ? __kasan_check_write+0x14/0x20 [ 1514.216321][ T8274] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1514.221855][ T8274] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1514.227145][ T8274] ? wait_for_completion+0x440/0x440 [ 1514.232424][ T8274] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1514.238778][ T8274] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1514.244236][ T8274] ? do_syscall_64+0x26/0x790 [ 1514.248914][ T8274] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1514.254994][ T8274] ? do_syscall_64+0x26/0x790 [ 1514.259697][ T8274] __x64_sys_bpf+0x73/0xb0 [ 1514.264132][ T8274] do_syscall_64+0xfa/0x790 [ 1514.268658][ T8274] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1514.274554][ T8274] RIP: 0033:0x45a919 [ 1514.278438][ T8274] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 11:51:21 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0x1, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r0, 0x8, 0x8}, 0xc) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}, 0x1000, 0x0, 0xc4, 0x0, 0x0, 0x9}, 0x0, 0xe, r1, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='cpuacct.stat\x00', 0x0, 0x0) write$cgroup_subtree(r2, &(0x7f0000000200)={[{0x2d, 'memory'}, {0x2d, 'pids'}, {0x0, 'pids'}]}, 0x14) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') [ 1514.298265][ T8274] RSP: 002b:00007fd87ec79c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1514.306672][ T8274] RAX: ffffffffffffffda RBX: 00007fd87ec79c90 RCX: 000000000045a919 [ 1514.314647][ T8274] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1514.322629][ T8274] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1514.330595][ T8274] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd87ec7a6d4 [ 1514.338558][ T8274] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 11:51:21 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x2d1d) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$tipc(r2, 0x0, 0x0) ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x0) sendmsg$tipc(r1, 0x0, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000000)={'teql0\x00', 0x200}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 11:51:21 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x5460, 0x0) 11:51:21 executing program 2 (fault-call:5 fault-nth:36): socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) close(0xffffffffffffffff) socket$kcm(0x29, 0x0, 0x0) 11:51:21 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0x1, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r0, 0x8, 0x8}, 0xc) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}, 0x1000, 0x0, 0xc4, 0x0, 0x0, 0x9}, 0x0, 0xe, r3, 0x0) sendmsg$kcm(r3, &(0x7f0000000340)={&(0x7f00000001c0)=@nfc={0x27, 0x1, 0x1, 0x7}, 0x80, &(0x7f0000000240)=[{&(0x7f00000002c0)="f85a80b91a02c2c842f2332f8fdb4d2dec9e1266fe85a7d36e529ba6da1af328267e5e97aa18ab22b41435ea28b1369cf9aaad34e2dd2c66cd09c57a61ad59152fe39dfb053077ad0b271eec465c9b", 0x4f}], 0x1, &(0x7f0000000440)=[{0x1010, 0x117, 0x9, "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"}], 0x1010}, 0x804) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 11:51:21 executing program 4: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f00000002c0)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x10ad) [ 1514.572303][ T8293] FAULT_INJECTION: forcing a failure. [ 1514.572303][ T8293] name fail_page_alloc, interval 1, probability 0, space 0, times 0 11:51:21 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x24102, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) [ 1514.665732][ T8293] CPU: 0 PID: 8293 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1514.674379][ T8293] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1514.684450][ T8293] Call Trace: [ 1514.687749][ T8293] dump_stack+0x197/0x210 [ 1514.687777][ T8293] should_fail.cold+0xa/0x15 [ 1514.687794][ T8293] ? fault_create_debugfs_attr+0x180/0x180 [ 1514.687816][ T8293] ? ___might_sleep+0x163/0x2c0 [ 1514.707379][ T8293] should_fail_alloc_page+0x50/0x60 [ 1514.712612][ T8293] __alloc_pages_nodemask+0x1a1/0x910 [ 1514.718015][ T8293] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1514.723768][ T8293] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1514.730031][ T8293] ? find_next_bit+0x107/0x130 [ 1514.734828][ T8293] pcpu_populate_chunk+0xf8/0x940 [ 1514.739874][ T8293] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1514.745606][ T8293] ? find_next_bit+0xc7/0x130 [ 1514.750308][ T8293] pcpu_alloc+0xd5b/0x1380 [ 1514.754760][ T8293] ? pcpu_alloc_area+0x820/0x820 [ 1514.759718][ T8293] ? bpf_map_area_alloc+0x20/0x30 [ 1514.764779][ T8293] __alloc_percpu_gfp+0x28/0x30 [ 1514.769652][ T8293] htab_map_alloc+0xdb9/0x11c0 [ 1514.774560][ T8293] ? htab_map_update_elem+0xca0/0xca0 [ 1514.779957][ T8293] __do_sys_bpf+0x478/0x3610 [ 1514.784577][ T8293] ? bpf_prog_load+0x1960/0x1960 [ 1514.789541][ T8293] ? __kasan_check_write+0x14/0x20 [ 1514.794684][ T8293] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1514.800255][ T8293] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1514.805573][ T8293] ? wait_for_completion+0x440/0x440 [ 1514.810872][ T8293] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1514.817124][ T8293] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1514.822568][ T8293] ? do_syscall_64+0x26/0x790 [ 1514.827250][ T8293] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1514.833320][ T8293] ? do_syscall_64+0x26/0x790 [ 1514.837987][ T8293] __x64_sys_bpf+0x73/0xb0 [ 1514.842393][ T8293] do_syscall_64+0xfa/0x790 [ 1514.846889][ T8293] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1514.852805][ T8293] RIP: 0033:0x45a919 [ 1514.856702][ T8293] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1514.876869][ T8293] RSP: 002b:00007fd87ec79c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1514.885371][ T8293] RAX: ffffffffffffffda RBX: 00007fd87ec79c90 RCX: 000000000045a919 [ 1514.893362][ T8293] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1514.901782][ T8293] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 11:51:22 executing program 2 (fault-call:5 fault-nth:37): socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) close(0xffffffffffffffff) socket$kcm(0x29, 0x0, 0x0) [ 1514.909775][ T8293] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd87ec7a6d4 [ 1514.917746][ T8293] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 [ 1514.950583][ T8310] device nr0 entered promiscuous mode 11:51:22 executing program 5: getpid() r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) [ 1515.092651][ T8319] FAULT_INJECTION: forcing a failure. [ 1515.092651][ T8319] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1515.119372][ T8319] CPU: 0 PID: 8319 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1515.128003][ T8319] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1515.138081][ T8319] Call Trace: [ 1515.141463][ T8319] dump_stack+0x197/0x210 [ 1515.145821][ T8319] should_fail.cold+0xa/0x15 [ 1515.150426][ T8319] ? fault_create_debugfs_attr+0x180/0x180 [ 1515.156247][ T8319] ? ___might_sleep+0x163/0x2c0 [ 1515.161128][ T8319] should_fail_alloc_page+0x50/0x60 [ 1515.166344][ T8319] __alloc_pages_nodemask+0x1a1/0x910 [ 1515.171743][ T8319] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1515.177498][ T8319] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1515.183750][ T8319] ? find_next_bit+0x107/0x130 [ 1515.188533][ T8319] pcpu_populate_chunk+0xf8/0x940 [ 1515.193600][ T8319] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1515.199322][ T8319] ? find_next_bit+0xc7/0x130 [ 1515.204017][ T8319] pcpu_alloc+0xd5b/0x1380 [ 1515.208454][ T8319] ? pcpu_alloc_area+0x820/0x820 [ 1515.213405][ T8319] ? bpf_map_area_alloc+0x20/0x30 [ 1515.218450][ T8319] __alloc_percpu_gfp+0x28/0x30 [ 1515.223313][ T8319] htab_map_alloc+0xdb9/0x11c0 [ 1515.228102][ T8319] ? htab_map_update_elem+0xca0/0xca0 [ 1515.233489][ T8319] __do_sys_bpf+0x478/0x3610 [ 1515.238097][ T8319] ? bpf_prog_load+0x1960/0x1960 [ 1515.243063][ T8319] ? __kasan_check_write+0x14/0x20 [ 1515.248181][ T8319] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1515.253733][ T8319] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1515.259053][ T8319] ? wait_for_completion+0x440/0x440 [ 1515.264348][ T8319] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1515.270644][ T8319] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1515.276149][ T8319] ? do_syscall_64+0x26/0x790 [ 1515.280817][ T8319] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1515.286876][ T8319] ? do_syscall_64+0x26/0x790 [ 1515.291691][ T8319] __x64_sys_bpf+0x73/0xb0 [ 1515.296121][ T8319] do_syscall_64+0xfa/0x790 [ 1515.300630][ T8319] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1515.306691][ T8319] RIP: 0033:0x45a919 [ 1515.310639][ T8319] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1515.330348][ T8319] RSP: 002b:00007fd87ec79c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 11:51:22 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0x1, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r0, 0x8, 0x8}, 0xc) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb01001800007c25007c0000007c0000530c6d17000400000000000009030000000000000000000003000002000400000003000000000000000600000000000001000000005d0048060000000006000006040000000e000000020000000e000000080000000f0000000000000007000000030000000c000000e80000000a000000050000000800000000000008020000000030e461515f5f0e000000"], &(0x7f00000002c0)=""/182, 0x9d, 0xb6, 0x4}, 0x20) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) [ 1515.338772][ T8319] RAX: ffffffffffffffda RBX: 00007fd87ec79c90 RCX: 000000000045a919 [ 1515.346736][ T8319] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1515.354699][ T8319] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1515.362667][ T8319] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd87ec7a6d4 [ 1515.370630][ T8319] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 11:51:22 executing program 2 (fault-call:5 fault-nth:38): socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) close(0xffffffffffffffff) socket$kcm(0x29, 0x0, 0x0) [ 1515.526953][ T8330] FAULT_INJECTION: forcing a failure. [ 1515.526953][ T8330] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1515.541150][ T8330] CPU: 0 PID: 8330 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1515.549774][ T8330] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1515.549782][ T8330] Call Trace: [ 1515.549810][ T8330] dump_stack+0x197/0x210 [ 1515.549833][ T8330] should_fail.cold+0xa/0x15 [ 1515.549854][ T8330] ? fault_create_debugfs_attr+0x180/0x180 [ 1515.578058][ T8330] ? ___might_sleep+0x163/0x2c0 [ 1515.582940][ T8330] should_fail_alloc_page+0x50/0x60 [ 1515.588153][ T8330] __alloc_pages_nodemask+0x1a1/0x910 [ 1515.593555][ T8330] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1515.599307][ T8330] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1515.605561][ T8330] ? find_next_bit+0x107/0x130 [ 1515.605588][ T8330] pcpu_populate_chunk+0xf8/0x940 [ 1515.605604][ T8330] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1515.605618][ T8330] ? find_next_bit+0xc7/0x130 [ 1515.605646][ T8330] pcpu_alloc+0xd5b/0x1380 [ 1515.615447][ T8330] ? pcpu_alloc_area+0x820/0x820 [ 1515.615467][ T8330] ? bpf_map_area_alloc+0x20/0x30 [ 1515.615493][ T8330] __alloc_percpu_gfp+0x28/0x30 [ 1515.625884][ T8330] htab_map_alloc+0xdb9/0x11c0 [ 1515.625916][ T8330] ? htab_map_update_elem+0xca0/0xca0 [ 1515.625935][ T8330] __do_sys_bpf+0x478/0x3610 [ 1515.625959][ T8330] ? bpf_prog_load+0x1960/0x1960 [ 1515.635311][ T8330] ? __kasan_check_write+0x14/0x20 [ 1515.670021][ T8330] ? __mutex_unlock_slowpath+0xf0/0x6a0 11:51:22 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0x1, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r0, 0x8, 0x8}, 0xc) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x1) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) [ 1515.675682][ T8330] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1515.680991][ T8330] ? wait_for_completion+0x440/0x440 [ 1515.686332][ T8330] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1515.692615][ T8330] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1515.698090][ T8330] ? do_syscall_64+0x26/0x790 [ 1515.702782][ T8330] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1515.708857][ T8330] ? do_syscall_64+0x26/0x790 [ 1515.713535][ T8330] __x64_sys_bpf+0x73/0xb0 [ 1515.717949][ T8330] do_syscall_64+0xfa/0x790 [ 1515.722455][ T8330] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1515.728350][ T8330] RIP: 0033:0x45a919 [ 1515.732242][ T8330] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1515.752733][ T8330] RSP: 002b:00007fd87ec79c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1515.761254][ T8330] RAX: ffffffffffffffda RBX: 00007fd87ec79c90 RCX: 000000000045a919 [ 1515.769224][ T8330] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 11:51:23 executing program 4: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f00000002c0)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x10ad) [ 1515.777246][ T8330] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1515.785327][ T8330] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd87ec7a6d4 [ 1515.793407][ T8330] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 [ 1515.909552][ T8339] device nr0 entered promiscuous mode 11:51:23 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0x1, 0x28}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0xffffffffffffffff, 0x8000, 0x8}, 0xc) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x7, 0x4, 0x8, 0xf1a}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x7, 0x4, 0x8, 0xf1a}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={r2}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={r2, 0x800, 0x8}, 0xc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$tipc(r3, 0x0, 0x0) r4 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r4, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r4, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1c70e3bae0737021, 0x3, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2, [], r5, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r7 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r7, 0x1, 0x3e, &(0x7f00000002c0)=r6, 0x161) r8 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000004600)={r8, 0xc0, &(0x7f0000004540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000004400)=0x10ff4015, 0x0, 0x0, 0x0, &(0x7f0000004440)={0x4, 0x4}, 0x0, 0x0, &(0x7f0000004480)={0x0, 0x0, 0x80000000, 0xdc}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001880)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000004840)={0x19, 0x2, &(0x7f0000001700)=@raw=[@ldst={0x2, 0x0, 0x7, 0x8, 0x9, 0x1, 0x12}, @alu={0x4, 0x0, 0x8, 0x6, 0xb, 0x2, 0x1}], &(0x7f0000001740)='syzkaller\x00', 0xd79, 0xce, &(0x7f0000001780)=""/206, 0x40f00, 0x8, [], 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000004380)={0x8, 0x1}, 0x8, 0x10, 0x0, 0x0, r9}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="8510000006000800c2e33000000000048510000003000000e4ec267d8a08bb9a1e6eff7591d39183ea055495777cbdfd004e1bf81756f19181968dc064f038a8735d2604b024d48be461f16852e475c3d5f015d67ce0d80c3715cba269f5fb4c75a6a2b6c5d105b0885cf63dcebe1c617b8287673dceae016813b6c3f3a4dada4bcadfb49451f720c59e4075dcff90e363bceeb98540fc09290ea76356c66fca7a99d4231a9e05a7d54dc2e9d71c11b2a23928fbb3b52cadf6b358fad95ae6e9"], &(0x7f00000002c0)='syzkaller\x00', 0x3c, 0xec, &(0x7f0000000480)=""/236, 0x41100, 0x1, [], r5, 0xd, r6, 0x8, &(0x7f0000000300)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x4, 0x10, 0x8001, 0xccc3}, 0x10, r9}, 0x78) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$tipc(r10, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xa, 0x1000007, 0x3, 0xb, 0x860, r3, 0x64dd, [], r5, r10, 0x4, 0x5}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={r11}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r11, 0x4, 0x1c}, 0xc) r12 = perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r13 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r13, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r12, 0x8914, &(0x7f00000018c0)='nr0\x01\x00') r14 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$tipc(r14, 0x0, 0x0) r15 = openat$cgroup_ro(r14, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}, 0x1000, 0x0, 0xc4, 0x0, 0x0, 0x9}, 0x0, 0xe, r15, 0x0) write$cgroup_subtree(r13, &(0x7f0000000380)=ANY=[@ANYRES64=r15], 0x8) 11:51:23 executing program 2 (fault-call:5 fault-nth:39): socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) close(0xffffffffffffffff) socket$kcm(0x29, 0x0, 0x0) 11:51:23 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000100)={0x7, &(0x7f0000000000)=[{0x0, 0x5, 0x3, 0x3}, {0x5, 0xe4, 0x6, 0x8}, {0x22, 0x38, 0x86, 0x1}, {0x6, 0x7, 0xfe, 0x6}, {0x9e, 0x0, 0x4, 0xc660}, {0x6, 0x8, 0x53, 0x1000}, {0x1, 0x1, 0x0, 0xffff}]}) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 11:51:23 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x6364, 0x0) 11:51:23 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x100002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x20}) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[], 0x0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x28}, 0x10) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000080)=r1) [ 1516.221878][ T8347] FAULT_INJECTION: forcing a failure. [ 1516.221878][ T8347] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1516.247226][ T8347] CPU: 1 PID: 8347 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1516.255849][ T8347] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1516.265917][ T8347] Call Trace: [ 1516.269233][ T8347] dump_stack+0x197/0x210 [ 1516.273588][ T8347] should_fail.cold+0xa/0x15 [ 1516.278214][ T8347] ? fault_create_debugfs_attr+0x180/0x180 [ 1516.284041][ T8347] ? ___might_sleep+0x163/0x2c0 [ 1516.288923][ T8347] should_fail_alloc_page+0x50/0x60 [ 1516.294138][ T8347] __alloc_pages_nodemask+0x1a1/0x910 [ 1516.299538][ T8347] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1516.305289][ T8347] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1516.311555][ T8347] ? find_next_bit+0x107/0x130 [ 1516.316343][ T8347] pcpu_populate_chunk+0xf8/0x940 [ 1516.321393][ T8347] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1516.327126][ T8347] ? find_next_bit+0xc7/0x130 [ 1516.331815][ T8347] pcpu_alloc+0xd5b/0x1380 [ 1516.336256][ T8347] ? pcpu_alloc_area+0x820/0x820 [ 1516.341206][ T8347] ? bpf_map_area_alloc+0x20/0x30 [ 1516.346255][ T8347] __alloc_percpu_gfp+0x28/0x30 [ 1516.351109][ T8347] htab_map_alloc+0xdb9/0x11c0 [ 1516.355869][ T8347] ? htab_map_update_elem+0xca0/0xca0 [ 1516.361229][ T8347] __do_sys_bpf+0x478/0x3610 [ 1516.365912][ T8347] ? bpf_prog_load+0x1960/0x1960 [ 1516.370857][ T8347] ? __kasan_check_write+0x14/0x20 [ 1516.375970][ T8347] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1516.381514][ T8347] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1516.386803][ T8347] ? wait_for_completion+0x440/0x440 [ 1516.392114][ T8347] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1516.398349][ T8347] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1516.403796][ T8347] ? do_syscall_64+0x26/0x790 [ 1516.408463][ T8347] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1516.414514][ T8347] ? do_syscall_64+0x26/0x790 [ 1516.419210][ T8347] __x64_sys_bpf+0x73/0xb0 [ 1516.423638][ T8347] do_syscall_64+0xfa/0x790 [ 1516.428174][ T8347] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1516.434069][ T8347] RIP: 0033:0x45a919 [ 1516.437960][ T8347] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1516.457546][ T8347] RSP: 002b:00007fd87ec79c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 11:51:23 executing program 2 (fault-call:5 fault-nth:40): socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) close(0xffffffffffffffff) socket$kcm(0x29, 0x0, 0x0) [ 1516.465939][ T8347] RAX: ffffffffffffffda RBX: 00007fd87ec79c90 RCX: 000000000045a919 [ 1516.473903][ T8347] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1516.481885][ T8347] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1516.489854][ T8347] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd87ec7a6d4 [ 1516.497832][ T8347] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 11:51:23 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000000)={'hwsim0\x00', @random="7a5800ed28d5"}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}, 0x1000, 0x0, 0xc4, 0x0, 0x0, 0x9}, 0x0, 0xe, r1, 0x0) write$cgroup_int(r1, &(0x7f0000000040)=0x7fff, 0x12) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 11:51:23 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0x1, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r0, 0x8, 0x8}, 0xc) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}, 0x1000, 0x0, 0xc4, 0x0, 0x0, 0x9}, 0x0, 0xe, r3, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_procs(r4, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) openat$cgroup_ro(r4, &(0x7f0000000200)='cpuset.effective_cpus\x00', 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f00000001c0)=0x9e) socket$kcm(0x29, 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 11:51:23 executing program 4: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f00000002c0)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x10ad) [ 1516.643700][ T8367] FAULT_INJECTION: forcing a failure. [ 1516.643700][ T8367] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1516.685112][ T8367] CPU: 0 PID: 8367 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1516.693736][ T8367] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1516.703787][ T8367] Call Trace: [ 1516.707080][ T8367] dump_stack+0x197/0x210 [ 1516.711422][ T8367] should_fail.cold+0xa/0x15 [ 1516.716007][ T8367] ? fault_create_debugfs_attr+0x180/0x180 [ 1516.721802][ T8367] ? ___might_sleep+0x163/0x2c0 [ 1516.726650][ T8367] should_fail_alloc_page+0x50/0x60 [ 1516.731853][ T8367] __alloc_pages_nodemask+0x1a1/0x910 [ 1516.737222][ T8367] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1516.742941][ T8367] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1516.749170][ T8367] ? find_next_bit+0x107/0x130 [ 1516.753942][ T8367] pcpu_populate_chunk+0xf8/0x940 [ 1516.758953][ T8367] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1516.764658][ T8367] ? find_next_bit+0xc7/0x130 [ 1516.769339][ T8367] pcpu_alloc+0xd5b/0x1380 [ 1516.773761][ T8367] ? pcpu_alloc_area+0x820/0x820 [ 1516.778694][ T8367] ? bpf_map_area_alloc+0x20/0x30 [ 1516.783734][ T8367] __alloc_percpu_gfp+0x28/0x30 [ 1516.788589][ T8367] htab_map_alloc+0xdb9/0x11c0 [ 1516.793369][ T8367] ? htab_map_update_elem+0xca0/0xca0 [ 1516.798760][ T8367] __do_sys_bpf+0x478/0x3610 [ 1516.803369][ T8367] ? bpf_prog_load+0x1960/0x1960 [ 1516.808295][ T8367] ? __kasan_check_write+0x14/0x20 [ 1516.813407][ T8367] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1516.819118][ T8367] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1516.824394][ T8367] ? wait_for_completion+0x440/0x440 [ 1516.829676][ T8367] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1516.836108][ T8367] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1516.841553][ T8367] ? do_syscall_64+0x26/0x790 [ 1516.846233][ T8367] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1516.852289][ T8367] ? do_syscall_64+0x26/0x790 [ 1516.856979][ T8367] __x64_sys_bpf+0x73/0xb0 [ 1516.861413][ T8367] do_syscall_64+0xfa/0x790 [ 1516.865922][ T8367] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1516.871807][ T8367] RIP: 0033:0x45a919 [ 1516.875692][ T8367] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1516.895288][ T8367] RSP: 002b:00007fd87ec79c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1516.903688][ T8367] RAX: ffffffffffffffda RBX: 00007fd87ec79c90 RCX: 000000000045a919 [ 1516.911647][ T8367] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1516.919605][ T8367] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1516.927562][ T8367] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd87ec7a6d4 [ 1516.935520][ T8367] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 11:51:24 executing program 2 (fault-call:5 fault-nth:41): socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) close(0xffffffffffffffff) socket$kcm(0x29, 0x0, 0x0) [ 1517.063206][ T8376] device nr0 entered promiscuous mode [ 1517.134019][ T8383] FAULT_INJECTION: forcing a failure. [ 1517.134019][ T8383] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1517.153005][ T8383] CPU: 1 PID: 8383 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1517.161640][ T8383] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1517.171719][ T8383] Call Trace: [ 1517.175022][ T8383] dump_stack+0x197/0x210 [ 1517.179366][ T8383] should_fail.cold+0xa/0x15 [ 1517.183975][ T8383] ? fault_create_debugfs_attr+0x180/0x180 [ 1517.189813][ T8383] ? ___might_sleep+0x163/0x2c0 [ 1517.194682][ T8383] should_fail_alloc_page+0x50/0x60 [ 1517.199967][ T8383] __alloc_pages_nodemask+0x1a1/0x910 [ 1517.205358][ T8383] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1517.211073][ T8383] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1517.217314][ T8383] ? find_next_bit+0x107/0x130 [ 1517.222068][ T8383] pcpu_populate_chunk+0xf8/0x940 [ 1517.227082][ T8383] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1517.232785][ T8383] ? find_next_bit+0xc7/0x130 [ 1517.237454][ T8383] pcpu_alloc+0xd5b/0x1380 [ 1517.241869][ T8383] ? pcpu_alloc_area+0x820/0x820 [ 1517.246796][ T8383] ? bpf_map_area_alloc+0x20/0x30 [ 1517.251842][ T8383] __alloc_percpu_gfp+0x28/0x30 [ 1517.256682][ T8383] htab_map_alloc+0xdb9/0x11c0 [ 1517.261446][ T8383] ? htab_map_update_elem+0xca0/0xca0 [ 1517.266806][ T8383] __do_sys_bpf+0x478/0x3610 [ 1517.271421][ T8383] ? bpf_prog_load+0x1960/0x1960 [ 1517.276381][ T8383] ? __kasan_check_write+0x14/0x20 [ 1517.281505][ T8383] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1517.287132][ T8383] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1517.292443][ T8383] ? wait_for_completion+0x440/0x440 [ 1517.297728][ T8383] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1517.303969][ T8383] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1517.309420][ T8383] ? do_syscall_64+0x26/0x790 [ 1517.314085][ T8383] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1517.320138][ T8383] ? do_syscall_64+0x26/0x790 [ 1517.324808][ T8383] __x64_sys_bpf+0x73/0xb0 [ 1517.329215][ T8383] do_syscall_64+0xfa/0x790 [ 1517.333718][ T8383] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1517.339595][ T8383] RIP: 0033:0x45a919 [ 1517.343476][ T8383] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1517.363065][ T8383] RSP: 002b:00007fd87ec79c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1517.371465][ T8383] RAX: ffffffffffffffda RBX: 00007fd87ec79c90 RCX: 000000000045a919 11:51:24 executing program 2 (fault-call:5 fault-nth:42): socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) close(0xffffffffffffffff) socket$kcm(0x29, 0x0, 0x0) [ 1517.379428][ T8383] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1517.387403][ T8383] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1517.395365][ T8383] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd87ec7a6d4 [ 1517.403322][ T8383] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 [ 1517.483352][ T8386] FAULT_INJECTION: forcing a failure. [ 1517.483352][ T8386] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1517.498248][ T8386] CPU: 0 PID: 8386 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1517.506851][ T8386] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1517.516914][ T8386] Call Trace: [ 1517.520235][ T8386] dump_stack+0x197/0x210 [ 1517.524585][ T8386] should_fail.cold+0xa/0x15 [ 1517.529194][ T8386] ? fault_create_debugfs_attr+0x180/0x180 [ 1517.535008][ T8386] ? ___might_sleep+0x163/0x2c0 [ 1517.539878][ T8386] should_fail_alloc_page+0x50/0x60 [ 1517.545087][ T8386] __alloc_pages_nodemask+0x1a1/0x910 [ 1517.550477][ T8386] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1517.556218][ T8386] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1517.562465][ T8386] ? find_next_bit+0x107/0x130 [ 1517.567251][ T8386] pcpu_populate_chunk+0xf8/0x940 [ 1517.572456][ T8386] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1517.578192][ T8386] ? find_next_bit+0xc7/0x130 [ 1517.582972][ T8386] pcpu_alloc+0xd5b/0x1380 [ 1517.587416][ T8386] ? pcpu_alloc_area+0x820/0x820 [ 1517.592365][ T8386] ? bpf_map_area_alloc+0x20/0x30 [ 1517.597417][ T8386] __alloc_percpu_gfp+0x28/0x30 [ 1517.602284][ T8386] htab_map_alloc+0xdb9/0x11c0 [ 1517.607076][ T8386] ? htab_map_update_elem+0xca0/0xca0 [ 1517.612459][ T8386] __do_sys_bpf+0x478/0x3610 [ 1517.617065][ T8386] ? bpf_prog_load+0x1960/0x1960 [ 1517.622008][ T8386] ? __kasan_check_write+0x14/0x20 [ 1517.627125][ T8386] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1517.632683][ T8386] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1517.638005][ T8386] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1517.644250][ T8386] ? debug_smp_processor_id+0x33/0x18a [ 1517.649722][ T8386] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1517.655906][ T8386] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1517.661376][ T8386] ? do_syscall_64+0x26/0x790 [ 1517.666064][ T8386] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1517.672144][ T8386] ? do_syscall_64+0x26/0x790 [ 1517.676848][ T8386] __x64_sys_bpf+0x73/0xb0 [ 1517.681275][ T8386] do_syscall_64+0xfa/0x790 [ 1517.685800][ T8386] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1517.691708][ T8386] RIP: 0033:0x45a919 [ 1517.695620][ T8386] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1517.715237][ T8386] RSP: 002b:00007fd87ec79c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1517.723666][ T8386] RAX: ffffffffffffffda RBX: 00007fd87ec79c90 RCX: 000000000045a919 11:51:25 executing program 2 (fault-call:5 fault-nth:43): socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) close(0xffffffffffffffff) socket$kcm(0x29, 0x0, 0x0) [ 1517.731651][ T8386] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1517.739629][ T8386] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1517.747866][ T8386] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd87ec7a6d4 [ 1517.755839][ T8386] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 11:51:25 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0x1, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r0, 0x8, 0x8}, 0xc) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0xd, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000002c0)='c\x86\xdd') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_procs(r3, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(r3, &(0x7f0000000240)='syz1\x00', 0x1ff) write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="006b86dd07"], 0x90ad) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuacct.usage_percpu\x00', 0x0, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200)=r4, 0x4) [ 1517.874354][ T8392] FAULT_INJECTION: forcing a failure. [ 1517.874354][ T8392] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1517.888461][ T8392] CPU: 0 PID: 8392 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1517.897065][ T8392] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1517.907136][ T8392] Call Trace: [ 1517.910467][ T8392] dump_stack+0x197/0x210 [ 1517.914830][ T8392] should_fail.cold+0xa/0x15 [ 1517.919479][ T8392] ? fault_create_debugfs_attr+0x180/0x180 [ 1517.925315][ T8392] ? ___might_sleep+0x163/0x2c0 [ 1517.930199][ T8392] should_fail_alloc_page+0x50/0x60 [ 1517.935420][ T8392] __alloc_pages_nodemask+0x1a1/0x910 [ 1517.940821][ T8392] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1517.946577][ T8392] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1517.952828][ T8392] ? find_next_bit+0x107/0x130 [ 1517.957616][ T8392] pcpu_populate_chunk+0xf8/0x940 [ 1517.962650][ T8392] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1517.968373][ T8392] ? find_next_bit+0xc7/0x130 [ 1517.973055][ T8392] pcpu_alloc+0xd5b/0x1380 [ 1517.977503][ T8392] ? pcpu_alloc_area+0x820/0x820 [ 1517.982465][ T8392] ? bpf_map_area_alloc+0x20/0x30 [ 1517.987511][ T8392] __alloc_percpu_gfp+0x28/0x30 [ 1517.992361][ T8392] htab_map_alloc+0xdb9/0x11c0 [ 1517.997182][ T8392] ? htab_map_update_elem+0xca0/0xca0 [ 1518.002542][ T8392] __do_sys_bpf+0x478/0x3610 [ 1518.007139][ T8392] ? bpf_prog_load+0x1960/0x1960 [ 1518.012077][ T8392] ? __kasan_check_write+0x14/0x20 [ 1518.017183][ T8392] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1518.022723][ T8392] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1518.028010][ T8392] ? wait_for_completion+0x440/0x440 [ 1518.033304][ T8392] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1518.039539][ T8392] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1518.044992][ T8392] ? do_syscall_64+0x26/0x790 [ 1518.049678][ T8392] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1518.055758][ T8392] ? do_syscall_64+0x26/0x790 [ 1518.060449][ T8392] __x64_sys_bpf+0x73/0xb0 [ 1518.064867][ T8392] do_syscall_64+0xfa/0x790 [ 1518.069377][ T8392] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1518.076313][ T8392] RIP: 0033:0x45a919 [ 1518.080191][ T8392] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1518.099783][ T8392] RSP: 002b:00007fd87ec79c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1518.108195][ T8392] RAX: ffffffffffffffda RBX: 00007fd87ec79c90 RCX: 000000000045a919 [ 1518.116170][ T8392] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1518.124130][ T8392] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1518.132100][ T8392] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd87ec7a6d4 [ 1518.140068][ T8392] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 11:51:25 executing program 2 (fault-call:5 fault-nth:44): socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) close(0xffffffffffffffff) socket$kcm(0x29, 0x0, 0x0) [ 1518.222965][ T8400] FAULT_INJECTION: forcing a failure. [ 1518.222965][ T8400] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1518.249959][ T8400] CPU: 0 PID: 8400 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1518.258580][ T8400] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1518.268823][ T8400] Call Trace: [ 1518.272133][ T8400] dump_stack+0x197/0x210 [ 1518.276471][ T8400] should_fail.cold+0xa/0x15 [ 1518.276492][ T8400] ? fault_create_debugfs_attr+0x180/0x180 [ 1518.276510][ T8400] ? ___might_sleep+0x163/0x2c0 [ 1518.276538][ T8400] should_fail_alloc_page+0x50/0x60 [ 1518.276558][ T8400] __alloc_pages_nodemask+0x1a1/0x910 [ 1518.302382][ T8400] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1518.308132][ T8400] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1518.314393][ T8400] ? find_next_bit+0x107/0x130 [ 1518.319183][ T8400] pcpu_populate_chunk+0xf8/0x940 [ 1518.324225][ T8400] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1518.329969][ T8400] ? find_next_bit+0xc7/0x130 [ 1518.334671][ T8400] pcpu_alloc+0xd5b/0x1380 [ 1518.339111][ T8400] ? pcpu_alloc_area+0x820/0x820 [ 1518.344152][ T8400] ? bpf_map_area_alloc+0x20/0x30 [ 1518.349211][ T8400] __alloc_percpu_gfp+0x28/0x30 [ 1518.354087][ T8400] htab_map_alloc+0xdb9/0x11c0 [ 1518.358889][ T8400] ? htab_map_update_elem+0xca0/0xca0 [ 1518.364279][ T8400] __do_sys_bpf+0x478/0x3610 [ 1518.368903][ T8400] ? bpf_prog_load+0x1960/0x1960 [ 1518.373856][ T8400] ? __kasan_check_write+0x14/0x20 [ 1518.378970][ T8400] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1518.378986][ T8400] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1518.379002][ T8400] ? wait_for_completion+0x440/0x440 [ 1518.379027][ T8400] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1518.379059][ T8400] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1518.379076][ T8400] ? do_syscall_64+0x26/0x790 [ 1518.379093][ T8400] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1518.379107][ T8400] ? do_syscall_64+0x26/0x790 [ 1518.379130][ T8400] __x64_sys_bpf+0x73/0xb0 [ 1518.401470][ T8400] do_syscall_64+0xfa/0x790 [ 1518.401493][ T8400] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1518.437137][ T8400] RIP: 0033:0x45a919 [ 1518.441041][ T8400] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1518.460656][ T8400] RSP: 002b:00007fd87ec79c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 11:51:25 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x76, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x4, 0x8}, 0x1000, 0x0, 0xc4, 0x0, 0x0, 0x5}, 0x0, 0xe, r1, 0x5daa60b5730d470f) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000000)=0x7b09) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) [ 1518.469086][ T8400] RAX: ffffffffffffffda RBX: 00007fd87ec79c90 RCX: 000000000045a919 [ 1518.477073][ T8400] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1518.485067][ T8400] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1518.493038][ T8400] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd87ec7a6d4 [ 1518.500995][ T8400] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 11:51:25 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x8912, 0x0) 11:51:25 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0x1, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r0, 0x8, 0x8}, 0xc) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$tipc(r2, 0x0, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f00000001c0)='cpuset.effective_mems\x00', 0x0, 0x0) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0x9) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000240)={'vlan0\x00', @local}) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$tipc(r5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x81) write$cgroup_subtree(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="ac6e0d0e5eae2a3ec24cb9f70c0e749d006386dd07"], 0x90ad) 11:51:25 executing program 4: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x10ad) 11:51:25 executing program 2 (fault-call:5 fault-nth:45): socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) close(0xffffffffffffffff) socket$kcm(0x29, 0x0, 0x0) 11:51:25 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$tipc(r2, 0x0, 0x0) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000017c0)) sendmsg$tipc(r1, &(0x7f0000001780)={&(0x7f0000000040)=@name={0x1e, 0x2, 0x2, {{0x0, 0x4}}}, 0x10, &(0x7f0000001640)=[{&(0x7f0000000100)="a1a0b91a3585ec2c571caed6637aec8384945125c7f8c8fe6507165d4f02c1cce302f5691c20705c969d5ec4e81af45637d4360a465d3aa5267a829845debe4c177a34f239cfb3cefc6f048fb5c4d1f5505faabc857411af158e1de23d8d00b6773cc34b15a988becc309a2698a950d3a92dc05655d723", 0x77}, {&(0x7f0000000180)="237c09fed72a81f40d7ab367deba2c9c6ed82bc879020b89be00beaf14d8878af1898a6d76672d80125ae653e7af2a07f444816e745d9c43eb66744f084387a5c5625894d6a6794d2a81cd2fb3dbe87f17a6b7f7ead9b51ede68ff25823ec9b5ccb774c4cb564be54f4b13c382f155dfefb58e4cb699817f1ba68d23948f77d9ec4cf58c1f637deb600330", 0x8b}, {&(0x7f00000002c0)="4ac8ac32b2523d1e133598508884404cd993dc5b8a99b7154d8b7ffaba484dc53f5e96be59b6909dde89b8f2d8c25c8fe1ede447bc69b8cdaedd496bf0116f788d46aa26c873cea593cb227bd56d758d5efaad2e8097046b63b883f1749b4db8bb1d633e392aea8fd8781a1bb355e599cfa06fefee66789b745918fbee2af2cd3308c0b2502ed13a6af53b173b50fa1f02d11f6731b1650bcb46656db0592a6ffa3e1f77dd19a7", 0xa7}, {&(0x7f0000000440)="d2dd3024b5498b245bde200fd05e6f8cc53dca4e5b8e44b4678015265f05191183ab8a134aac82a8c43bdf0c8b1365be9ce890009c049899ab2b4c0b039a9da45e7646f46f2d06b2b5bebb9343868b9d1589443f48cf68bad3578397c9db23b49663960923a9ed4cde7821c5696d27c8619b38a80484378017c124e7d469c48bb90c449fb7583a9ae7c0b777707791d8679f2f0a078ae0079556a24e18d090bae873b6648df4f4d83ca6fb11ea70464ce55700c199cdaa0dd110a96d1b88ffb4de4aea3c9ab3c0d27bb340fbf7cd91cde1373b23b17b372e65570ae3bcaf6fab635f58", 0xe3}, {&(0x7f0000000080)="48b6a106900f7be9b59fe874e7ee1ef78f0761d42c02a7b66b", 0x19}, {&(0x7f0000000540)="e1c10940fe17205d04ddcf1fdd092fe887b9e2817a264af48771e2798c2fe21a14ed8488196830707fed50e1fa268b371269cd7748f181ef04590e969d23be5a97a4d8248f89223598c373301aaffe44c92da39a34fbf7362c30f0dfc976038ad94c83d0752d1c2bec5a3d43284d35639349e50b2804f395700b9e1f8c063060c0bbe6ce3903378b86f03e1f4f14d7cdcfc7910d37294f760c6d11f2f6ad7ef5c3c3997e64cc538be2c1b196bcf0be19522a0cd8bda10aeff9382ffea6de9d6edc410e736186685caa608369137faf98933801d9115691d56ad198d5564ac0baf997b392691b7621c0c3b0", 0xeb}, {&(0x7f0000000640)="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", 0x1000}, {&(0x7f0000000380)="5765ae64a5c7ae8b22005d4a4565e0bbe61622211cd5767d8cbf71fd2075300d44ef181fb20a1adccd29b220bfa151a36ff4a0b1acf934ded202e8e8af1ec82cbe3b775f6680d31e07fbaadca5dac5f6519eca5c4db9323a2f8de5011c08e2ce3e8a47c57ca7911d9890b5232ac79c141415fe2957dffd20ca3068", 0x7b}, {&(0x7f0000000240)="57479d0a4dbc7910d3c20109b2ad5ca423795dd60e40632726bde15ee8818e355ffcfe9f86923c73", 0x28}], 0x9, &(0x7f0000001700)="775ac45d16002f8097b4ed1842678334f7b2a912049bb006e79d38de0c3c8e66b385a43bc719b4b99df2aecfe0047f83d0a010bdf3932578e8a3a2c9c3da931e7e6bee8cf132fe472d76397739da361d8e2c18ce9809caaac1e08e38da639245eb36848b3e57dab7598d0539a42a2c861f7f18231fdf711f9becf81b3341c4fc", 0x80, 0x8000}, 0x10811) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0xfffffffffffffd19) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$tipc(r3, 0x0, 0x0) perf_event_open(&(0x7f0000001840)={0x0, 0x70, 0x3, 0x1, 0x5, 0x20, 0x0, 0x5, 0x10000, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000001800)}, 0x10080, 0x1, 0x9, 0x1, 0x7, 0x4, 0x3ff}, 0xffffffffffffffff, 0x6, r3, 0x2) [ 1518.746768][ T8415] FAULT_INJECTION: forcing a failure. [ 1518.746768][ T8415] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1518.776246][ T8415] CPU: 0 PID: 8415 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1518.784871][ T8415] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1518.795052][ T8415] Call Trace: [ 1518.798353][ T8415] dump_stack+0x197/0x210 [ 1518.802696][ T8415] should_fail.cold+0xa/0x15 [ 1518.807325][ T8415] ? fault_create_debugfs_attr+0x180/0x180 [ 1518.813135][ T8415] ? ___might_sleep+0x163/0x2c0 [ 1518.818018][ T8415] should_fail_alloc_page+0x50/0x60 [ 1518.823219][ T8415] __alloc_pages_nodemask+0x1a1/0x910 [ 1518.828599][ T8415] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1518.834425][ T8415] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1518.840663][ T8415] ? find_next_bit+0x107/0x130 [ 1518.845443][ T8415] pcpu_populate_chunk+0xf8/0x940 [ 1518.850477][ T8415] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1518.856206][ T8415] ? find_next_bit+0xc7/0x130 [ 1518.860900][ T8415] pcpu_alloc+0xd5b/0x1380 [ 1518.865342][ T8415] ? pcpu_alloc_area+0x820/0x820 [ 1518.870378][ T8415] ? bpf_map_area_alloc+0x20/0x30 [ 1518.875443][ T8415] __alloc_percpu_gfp+0x28/0x30 [ 1518.880311][ T8415] htab_map_alloc+0xdb9/0x11c0 [ 1518.885612][ T8415] ? htab_map_update_elem+0xca0/0xca0 [ 1518.890994][ T8415] __do_sys_bpf+0x478/0x3610 [ 1518.895601][ T8415] ? bpf_prog_load+0x1960/0x1960 [ 1518.900540][ T8415] ? __kasan_check_write+0x14/0x20 [ 1518.905671][ T8415] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1518.911232][ T8415] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1518.916526][ T8415] ? wait_for_completion+0x440/0x440 [ 1518.921804][ T8415] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1518.928065][ T8415] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1518.933528][ T8415] ? do_syscall_64+0x26/0x790 [ 1518.938195][ T8415] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1518.944253][ T8415] ? do_syscall_64+0x26/0x790 [ 1518.948949][ T8415] __x64_sys_bpf+0x73/0xb0 [ 1518.953410][ T8415] do_syscall_64+0xfa/0x790 [ 1518.957905][ T8415] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1518.963916][ T8415] RIP: 0033:0x45a919 [ 1518.967822][ T8415] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1518.987435][ T8415] RSP: 002b:00007fd87ec79c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1518.995865][ T8415] RAX: ffffffffffffffda RBX: 00007fd87ec79c90 RCX: 000000000045a919 [ 1519.003842][ T8415] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1519.011923][ T8415] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1519.019982][ T8415] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd87ec7a6d4 [ 1519.027969][ T8415] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 11:51:26 executing program 2 (fault-call:5 fault-nth:46): socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) close(0xffffffffffffffff) socket$kcm(0x29, 0x0, 0x0) [ 1519.067861][ T8417] device nr0 entered promiscuous mode 11:51:26 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0x1, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r0, 0x8, 0x8}, 0xc) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0xd8878f3181fa820a, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) [ 1519.236254][ T8427] FAULT_INJECTION: forcing a failure. [ 1519.236254][ T8427] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1519.268575][ T8427] CPU: 0 PID: 8427 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1519.277200][ T8427] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1519.288426][ T8427] Call Trace: [ 1519.291717][ T8427] dump_stack+0x197/0x210 [ 1519.296041][ T8427] should_fail.cold+0xa/0x15 [ 1519.300637][ T8427] ? fault_create_debugfs_attr+0x180/0x180 [ 1519.306452][ T8427] ? ___might_sleep+0x163/0x2c0 [ 1519.311298][ T8427] should_fail_alloc_page+0x50/0x60 [ 1519.316486][ T8427] __alloc_pages_nodemask+0x1a1/0x910 [ 1519.321850][ T8427] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1519.327580][ T8427] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1519.333806][ T8427] ? find_next_bit+0x107/0x130 [ 1519.338565][ T8427] pcpu_populate_chunk+0xf8/0x940 [ 1519.343578][ T8427] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1519.349284][ T8427] ? find_next_bit+0xc7/0x130 [ 1519.353953][ T8427] pcpu_alloc+0xd5b/0x1380 [ 1519.358366][ T8427] ? pcpu_alloc_area+0x820/0x820 [ 1519.363293][ T8427] ? bpf_map_area_alloc+0x20/0x30 [ 1519.368312][ T8427] __alloc_percpu_gfp+0x28/0x30 [ 1519.373150][ T8427] htab_map_alloc+0xdb9/0x11c0 [ 1519.377917][ T8427] ? htab_map_update_elem+0xca0/0xca0 [ 1519.383292][ T8427] __do_sys_bpf+0x478/0x3610 [ 1519.387893][ T8427] ? bpf_prog_load+0x1960/0x1960 [ 1519.392817][ T8427] ? __kasan_check_write+0x14/0x20 [ 1519.397914][ T8427] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1519.403472][ T8427] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1519.408744][ T8427] ? wait_for_completion+0x440/0x440 [ 1519.414022][ T8427] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1519.420261][ T8427] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1519.425726][ T8427] ? do_syscall_64+0x26/0x790 [ 1519.430414][ T8427] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1519.436494][ T8427] ? do_syscall_64+0x26/0x790 [ 1519.441183][ T8427] __x64_sys_bpf+0x73/0xb0 [ 1519.445607][ T8427] do_syscall_64+0xfa/0x790 [ 1519.451340][ T8427] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1519.457219][ T8427] RIP: 0033:0x45a919 [ 1519.461102][ T8427] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1519.480690][ T8427] RSP: 002b:00007fd87ec79c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1519.489094][ T8427] RAX: ffffffffffffffda RBX: 00007fd87ec79c90 RCX: 000000000045a919 [ 1519.497052][ T8427] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1519.505010][ T8427] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1519.512979][ T8427] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd87ec7a6d4 [ 1519.520949][ T8427] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 11:51:26 executing program 2 (fault-call:5 fault-nth:47): socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) close(0xffffffffffffffff) socket$kcm(0x29, 0x0, 0x0) 11:51:26 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0x1, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r0, 0x8, 0x8}, 0xc) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000000c0)=r1, 0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="8112d2c41d6862005769c3da88"], 0x90ad) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}, 0x1000, 0x0, 0xc4, 0x0, 0x0, 0x9}, 0x0, 0xe, r4, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$tipc(r5, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000200)={0x5c9136387bd18456, 0x70, 0x5, 0x1, 0x9, 0xc5, 0x0, 0xfff, 0x2000, 0x1a, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x1, @perf_config_ext={0x5000000000000000, 0x238f}, 0x2000, 0x7, 0x0, 0xa10b557f892f3908, 0x8, 0x5, 0x4800}, r4, 0x6, r5, 0xd94aee5b69cbefa4) 11:51:27 executing program 4: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x10ad) [ 1519.744708][ T8438] FAULT_INJECTION: forcing a failure. [ 1519.744708][ T8438] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1519.775722][ T8438] CPU: 0 PID: 8438 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1519.784351][ T8438] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1519.794416][ T8438] Call Trace: [ 1519.797728][ T8438] dump_stack+0x197/0x210 [ 1519.802083][ T8438] should_fail.cold+0xa/0x15 [ 1519.806705][ T8438] ? fault_create_debugfs_attr+0x180/0x180 [ 1519.812564][ T8438] ? ___might_sleep+0x163/0x2c0 [ 1519.817464][ T8438] should_fail_alloc_page+0x50/0x60 [ 1519.822681][ T8438] __alloc_pages_nodemask+0x1a1/0x910 [ 1519.828068][ T8438] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1519.833813][ T8438] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1519.840054][ T8438] ? find_next_bit+0x107/0x130 [ 1519.844814][ T8438] pcpu_populate_chunk+0xf8/0x940 [ 1519.849828][ T8438] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1519.855551][ T8438] ? find_next_bit+0xc7/0x130 [ 1519.860225][ T8438] pcpu_alloc+0xd5b/0x1380 [ 1519.864641][ T8438] ? pcpu_alloc_area+0x820/0x820 [ 1519.869600][ T8438] ? bpf_map_area_alloc+0x20/0x30 [ 1519.874621][ T8438] __alloc_percpu_gfp+0x28/0x30 [ 1519.879460][ T8438] htab_map_alloc+0xdb9/0x11c0 [ 1519.884228][ T8438] ? htab_map_update_elem+0xca0/0xca0 [ 1519.889607][ T8438] __do_sys_bpf+0x478/0x3610 [ 1519.894216][ T8438] ? bpf_prog_load+0x1960/0x1960 [ 1519.899166][ T8438] ? __kasan_check_write+0x14/0x20 [ 1519.904363][ T8438] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1519.909918][ T8438] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1519.915191][ T8438] ? wait_for_completion+0x440/0x440 [ 1519.920471][ T8438] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1519.926710][ T8438] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1519.932167][ T8438] ? do_syscall_64+0x26/0x790 [ 1519.936833][ T8438] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1519.942888][ T8438] ? do_syscall_64+0x26/0x790 [ 1519.947572][ T8438] __x64_sys_bpf+0x73/0xb0 [ 1519.951994][ T8438] do_syscall_64+0xfa/0x790 [ 1519.956621][ T8438] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1519.962517][ T8438] RIP: 0033:0x45a919 [ 1519.966407][ T8438] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1519.986015][ T8438] RSP: 002b:00007fd87ec79c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1519.994412][ T8438] RAX: ffffffffffffffda RBX: 00007fd87ec79c90 RCX: 000000000045a919 [ 1520.002370][ T8438] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1520.010417][ T8438] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1520.018374][ T8438] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd87ec7a6d4 [ 1520.026336][ T8438] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 11:51:27 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0x1, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r0, 0x8, 0x8}, 0xc) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f00000001c0)) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 11:51:27 executing program 1: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x13, 0x1, 0x2, &(0x7f0000000100)}, 0x20) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="006386dd07fc08"], 0x90ad) [ 1520.148884][ T8448] device nr0 entered promiscuous mode 11:51:27 executing program 2 (fault-call:5 fault-nth:48): socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) close(0xffffffffffffffff) socket$kcm(0x29, 0x0, 0x0) 11:51:27 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$tipc(r1, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x1, 0x5}, 0x0, 0x0, &(0x7f0000000100)={0x2, 0x5, 0x3, 0x1}, &(0x7f0000000140)=0x400, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0x4}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={r1, 0x10, &(0x7f0000000300)={&(0x7f0000000000)=""/19, 0x13, r2}}, 0x10) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0x0, 0xfc, 0x14}, 0xc) r4 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r4, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r4, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r5, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r7 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r7, 0x1, 0x3e, &(0x7f00000002c0)=r6, 0x161) r8 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000004600)={r8, 0xc0, &(0x7f0000004540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000004400)=0x10ff4015, 0x0, 0x0, 0x0, &(0x7f0000004440)={0x4, 0x4}, 0x0, 0x0, &(0x7f0000004480)={0x0, 0x0, 0x80000000, 0xdc}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001880)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000004840)={0x19, 0x2, &(0x7f0000001700)=@raw=[@ldst={0x2, 0x0, 0x7, 0x8, 0x9, 0x1, 0x12}, @alu={0x4, 0x0, 0x8, 0x6, 0xb, 0x2, 0x1}], &(0x7f0000001740)='syzkaller\x00', 0xd79, 0xce, &(0x7f0000001780)=""/206, 0x40f00, 0x8, [], 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000004380)={0x9, 0x1}, 0x8, 0x10, 0x0, 0x0, r9}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x3, &(0x7f0000000280)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x6}, @ldst={0x2, 0x0, 0x6, 0x3, 0xa2c1fa458ac8eefe, 0x30}, @func={0x85, 0x0, 0x1, 0x0, 0x3}], &(0x7f00000002c0)='syzkaller\x00', 0x3c, 0xec, &(0x7f0000000480)=""/236, 0x41100, 0x1, [], r5, 0xd, r6, 0x8, &(0x7f0000000300)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x4, 0x10, 0x8001, 0xccc3}, 0x10, r9}, 0x78) r10 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}, 0x1000, 0x0, 0xc4, 0x0, 0x0, 0x9}, 0x0, 0xe, r10, 0x0) r11 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r11, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r11, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r12, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r14 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r14, 0x1, 0x3e, &(0x7f00000002c0)=r13, 0x161) r15 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000004600)={r15, 0xc0, &(0x7f0000004540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000004400)=0x10ff4015, 0x0, 0x0, 0x0, &(0x7f0000004440)={0x4, 0x4}, 0x0, 0x0, &(0x7f0000004480)={0x0, 0x0, 0x80000000, 0xdc}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001880)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000004840)={0x19, 0x2, &(0x7f0000001700)=@raw=[@ldst={0x2, 0x0, 0x7, 0x8, 0x9, 0x1, 0x12}, @alu={0x4, 0x0, 0x8, 0x6, 0xb, 0x2, 0x1}], &(0x7f0000001740)='syzkaller\x00', 0xd79, 0xce, &(0x7f0000001780)=""/206, 0x40f00, 0x8, [], 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000004380)={0x9, 0x1}, 0x8, 0x10, 0x0, 0x0, r16}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="8510000006000000c290d9e27b0ecb21a8d9f52ed49c54e33000000000008410000003000000"], &(0x7f00000002c0)='syzkaller\x00', 0x3c, 0xec, &(0x7f0000000480)=""/236, 0x41100, 0x1, [], r12, 0xd, r13, 0x8, &(0x7f0000000300)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x4, 0x10, 0x8001, 0xccc3}, 0x10, r16}, 0x78) r17 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$tipc(r17, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xf, 0x7, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0x31}, @generic={0x7, 0xf, 0xe, 0x6, 0x3f}, @map={0x18, 0x4, 0x1, 0x0, r3}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xb2}, @generic={0x17, 0x3, 0xe, 0xff, 0x101}], &(0x7f0000000440)='syzkaller\x00', 0x55e2, 0x0, 0x0, 0x40f00, 0x8, [], r5, 0x16, r10, 0x8, &(0x7f0000000480)={0x2, 0x4}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x9, 0x1000, 0x8}, 0x10, r16, r17}, 0x78) 11:51:27 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x8924, 0x0) [ 1520.338007][ T8459] FAULT_INJECTION: forcing a failure. [ 1520.338007][ T8459] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1520.408640][ T8459] CPU: 1 PID: 8459 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1520.417270][ T8459] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1520.427348][ T8459] Call Trace: [ 1520.430640][ T8459] dump_stack+0x197/0x210 [ 1520.434969][ T8459] should_fail.cold+0xa/0x15 [ 1520.439555][ T8459] ? fault_create_debugfs_attr+0x180/0x180 [ 1520.445366][ T8459] ? ___might_sleep+0x163/0x2c0 [ 1520.450215][ T8459] should_fail_alloc_page+0x50/0x60 [ 1520.455401][ T8459] __alloc_pages_nodemask+0x1a1/0x910 [ 1520.460762][ T8459] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1520.466479][ T8459] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1520.472706][ T8459] ? find_next_bit+0x107/0x130 [ 1520.477460][ T8459] pcpu_populate_chunk+0xf8/0x940 [ 1520.482492][ T8459] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1520.488230][ T8459] ? find_next_bit+0xc7/0x130 [ 1520.493871][ T8459] pcpu_alloc+0xd5b/0x1380 [ 1520.498305][ T8459] ? pcpu_alloc_area+0x820/0x820 [ 1520.503258][ T8459] ? bpf_map_area_alloc+0x20/0x30 [ 1520.508284][ T8459] __alloc_percpu_gfp+0x28/0x30 [ 1520.513131][ T8459] htab_map_alloc+0xdb9/0x11c0 [ 1520.517903][ T8459] ? htab_map_update_elem+0xca0/0xca0 [ 1520.523267][ T8459] __do_sys_bpf+0x478/0x3610 [ 1520.527846][ T8459] ? bpf_prog_load+0x1960/0x1960 [ 1520.532766][ T8459] ? __kasan_check_write+0x14/0x20 [ 1520.537869][ T8459] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1520.543411][ T8459] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1520.548684][ T8459] ? wait_for_completion+0x440/0x440 [ 1520.553959][ T8459] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1520.560286][ T8459] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1520.565730][ T8459] ? do_syscall_64+0x26/0x790 [ 1520.570394][ T8459] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1520.576459][ T8459] ? do_syscall_64+0x26/0x790 [ 1520.581131][ T8459] __x64_sys_bpf+0x73/0xb0 [ 1520.585547][ T8459] do_syscall_64+0xfa/0x790 [ 1520.590044][ T8459] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1520.595917][ T8459] RIP: 0033:0x45a919 [ 1520.599805][ T8459] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1520.619393][ T8459] RSP: 002b:00007fd87ec79c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1520.627787][ T8459] RAX: ffffffffffffffda RBX: 00007fd87ec79c90 RCX: 000000000045a919 [ 1520.635754][ T8459] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1520.643722][ T8459] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1520.651698][ T8459] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd87ec7a6d4 11:51:27 executing program 2 (fault-call:5 fault-nth:49): socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) close(0xffffffffffffffff) socket$kcm(0x29, 0x0, 0x0) [ 1520.659678][ T8459] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 [ 1520.808795][ T8474] FAULT_INJECTION: forcing a failure. [ 1520.808795][ T8474] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1520.830253][ T8474] CPU: 0 PID: 8474 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1520.838873][ T8474] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1520.848935][ T8474] Call Trace: [ 1520.852246][ T8474] dump_stack+0x197/0x210 [ 1520.856688][ T8474] should_fail.cold+0xa/0x15 [ 1520.861294][ T8474] ? fault_create_debugfs_attr+0x180/0x180 [ 1520.867115][ T8474] ? ___might_sleep+0x163/0x2c0 [ 1520.872000][ T8474] should_fail_alloc_page+0x50/0x60 [ 1520.877220][ T8474] __alloc_pages_nodemask+0x1a1/0x910 [ 1520.882585][ T8474] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1520.888331][ T8474] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1520.894561][ T8474] ? find_next_bit+0x107/0x130 [ 1520.899317][ T8474] pcpu_populate_chunk+0xf8/0x940 [ 1520.904462][ T8474] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1520.910217][ T8474] ? find_next_bit+0xc7/0x130 [ 1520.914913][ T8474] pcpu_alloc+0xd5b/0x1380 [ 1520.919348][ T8474] ? pcpu_alloc_area+0x820/0x820 [ 1520.924290][ T8474] ? bpf_map_area_alloc+0x20/0x30 [ 1520.929353][ T8474] __alloc_percpu_gfp+0x28/0x30 [ 1520.934208][ T8474] htab_map_alloc+0xdb9/0x11c0 [ 1520.938979][ T8474] ? htab_map_update_elem+0xca0/0xca0 [ 1520.944348][ T8474] __do_sys_bpf+0x478/0x3610 [ 1520.948961][ T8474] ? bpf_prog_load+0x1960/0x1960 [ 1520.953947][ T8474] ? __kasan_check_write+0x14/0x20 [ 1520.959161][ T8474] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1520.964711][ T8474] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1520.970052][ T8474] ? wait_for_completion+0x440/0x440 [ 1520.975380][ T8474] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1520.981687][ T8474] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1520.987148][ T8474] ? do_syscall_64+0x26/0x790 [ 1520.991826][ T8474] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1520.997889][ T8474] ? do_syscall_64+0x26/0x790 [ 1521.002581][ T8474] __x64_sys_bpf+0x73/0xb0 [ 1521.006990][ T8474] do_syscall_64+0xfa/0x790 [ 1521.011501][ T8474] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1521.017504][ T8474] RIP: 0033:0x45a919 [ 1521.021396][ T8474] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1521.040988][ T8474] RSP: 002b:00007fd87ec79c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1521.049444][ T8474] RAX: ffffffffffffffda RBX: 00007fd87ec79c90 RCX: 000000000045a919 [ 1521.057414][ T8474] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1521.065370][ T8474] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1521.073329][ T8474] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd87ec7a6d4 [ 1521.081285][ T8474] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 11:51:28 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0x1, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r0, 0x8, 0x8}, 0xc) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x7, 0x4, 0x8, 0xf1a}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r3, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) r5 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r5, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r5, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r6, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r8 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r8, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) r9 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000004600)={r9, 0xc0, &(0x7f0000004540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000004400)=0x10ff4015, 0x0, 0x0, 0x0, &(0x7f0000004440)={0x4, 0x4}, 0x0, 0x0, &(0x7f0000004480)={0x0, 0x0, 0x80000000, 0xdc}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001880)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000004840)={0x19, 0x2, &(0x7f0000001700)=@raw=[@ldst={0x2, 0x0, 0x7, 0x8, 0x9, 0x1, 0x12}, @alu={0x4, 0x0, 0x8, 0x6, 0xb, 0x2, 0x1}], &(0x7f0000001740)='syzkaller\x00', 0xd79, 0xce, &(0x7f0000001780)=""/206, 0x40f00, 0x8, [], 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000004380)={0x9, 0x1}, 0x8, 0x10, 0x0, 0x0, r10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x3, &(0x7f0000000280)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x6}, @ldst={0x2, 0x0, 0x6, 0x3, 0xa2c1fa458ac8eefe, 0x30}, @func={0x85, 0x0, 0x1, 0x0, 0x3}], &(0x7f00000002c0)='syzkaller\x00', 0x3c, 0xec, &(0x7f0000000480)=""/236, 0x41100, 0x1, [], r6, 0xd, r7, 0x8, &(0x7f0000000300)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x4, 0x10, 0x8001, 0xccc3}, 0x10, r10}, 0x78) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$tipc(r11, 0x0, 0x0) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x16, 0x6, &(0x7f0000000200)=@raw=[@map={0x18, 0x0, 0x1, 0x0, r1}, @ldst={0x0, 0x0, 0x2, 0x5, 0x0, 0x8, 0x12}, @alu={0x7, 0x1, 0xb, 0x9, 0x4, 0x8, 0x4}, @generic={0x8, 0x2, 0x1, 0x8, 0x400}, @call={0x85, 0x0, 0x0, 0x68}], &(0x7f00000002c0)='syzkaller\x00', 0x1ff, 0x8f, &(0x7f0000000300)=""/143, 0x40f00, 0x2, [], r6, 0xf, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000440)={0x3, 0x6, 0x4eab, 0x4}, 0x10, 0x0, r11}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r12, 0x0, 0xb0, 0x0, &(0x7f0000000540)="2deb4ef0fb9df659a4e76b7e26d6d9e4c8675ca4d04c38186eb45253a3c26aaf7d002b3e58d03bf2aba72866c3b24c33c25bada1d6463796fec89dd0389223c069405956f9af424841668b113183fee9fde95e40e601d816a81df544b80e7f3818c28a500b4efdcb2e7175da872e7df9a335af58104bad95016b1357c8f9f5142c5c388a0d2c1b9e8f9b0341d7116d5d914ad79a26f593721605d90170bd7294723f23e0d5098bba95090b474dc59d63", &(0x7f0000000600), 0x1, 0x0, 0xbf, 0x0, &(0x7f0000000640)="eebb5a10f6ec5fdf8b6b3e8b2d9940fc2be1aed500d59c4f8344750e59bbd43085ddbb902b4f5bdfcba8afba8746c4b7271b03077cc1fd8e427243318c5abbe2f70804dbab91fefe90eb94866000ae22ba9456662f3072de3b5d9f9ff6a4e5b77efaa8dd02ee2f71c7b54802187acfed99557fb97a98b56cde76d4c497b163070f49032539d3793fa7851e089e6b378cac022ed5dee55349f1ca0c5c1d24a09556b97883536c25150a65fb92e52cc05d9fd7f8082f0ae3722f3b70487a80e0", &(0x7f0000000700)}, 0x40) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={r4}, 0xc) recvmsg$kcm(r7, &(0x7f0000000700)={&(0x7f0000000780)=@can, 0x80, &(0x7f0000000600)=[{&(0x7f0000000800)=""/136, 0x88}], 0x1, &(0x7f00000008c0)=""/170, 0xaa}, 0x10001) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r4, 0x101}, 0xc) r13 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r13, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="0036c5a267"], 0x90ad) 11:51:28 executing program 2 (fault-call:5 fault-nth:50): socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) close(0xffffffffffffffff) socket$kcm(0x29, 0x0, 0x0) [ 1521.286654][ T8482] FAULT_INJECTION: forcing a failure. [ 1521.286654][ T8482] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1521.300661][ T8482] CPU: 0 PID: 8482 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1521.300674][ T8482] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1521.300681][ T8482] Call Trace: [ 1521.300706][ T8482] dump_stack+0x197/0x210 [ 1521.300730][ T8482] should_fail.cold+0xa/0x15 11:51:28 executing program 4: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x10ad) [ 1521.300752][ T8482] ? fault_create_debugfs_attr+0x180/0x180 [ 1521.300771][ T8482] ? ___might_sleep+0x163/0x2c0 [ 1521.300802][ T8482] should_fail_alloc_page+0x50/0x60 [ 1521.300817][ T8482] __alloc_pages_nodemask+0x1a1/0x910 [ 1521.300839][ T8482] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1521.300866][ T8482] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1521.300881][ T8482] ? find_next_bit+0x107/0x130 [ 1521.300906][ T8482] pcpu_populate_chunk+0xf8/0x940 [ 1521.300922][ T8482] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1521.300936][ T8482] ? find_next_bit+0xc7/0x130 [ 1521.300962][ T8482] pcpu_alloc+0xd5b/0x1380 [ 1521.300991][ T8482] ? pcpu_alloc_area+0x820/0x820 [ 1521.301010][ T8482] ? bpf_map_area_alloc+0x20/0x30 [ 1521.301039][ T8482] __alloc_percpu_gfp+0x28/0x30 [ 1521.301063][ T8482] htab_map_alloc+0xdb9/0x11c0 [ 1521.301094][ T8482] ? htab_map_update_elem+0xca0/0xca0 [ 1521.301115][ T8482] __do_sys_bpf+0x478/0x3610 [ 1521.319784][ T8482] ? bpf_prog_load+0x1960/0x1960 [ 1521.319803][ T8482] ? __kasan_check_write+0x14/0x20 [ 1521.319820][ T8482] ? __mutex_unlock_slowpath+0xf0/0x6a0 11:51:28 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="006537dd07"], 0x90ad) [ 1521.319837][ T8482] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1521.319856][ T8482] ? wait_for_completion+0x440/0x440 [ 1521.327455][ T8482] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1521.327489][ T8482] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1521.327506][ T8482] ? do_syscall_64+0x26/0x790 [ 1521.327523][ T8482] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1521.327537][ T8482] ? do_syscall_64+0x26/0x790 [ 1521.327565][ T8482] __x64_sys_bpf+0x73/0xb0 [ 1521.359023][ T8482] do_syscall_64+0xfa/0x790 [ 1521.359054][ T8482] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1521.359068][ T8482] RIP: 0033:0x45a919 [ 1521.359085][ T8482] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1521.359093][ T8482] RSP: 002b:00007fd87ec79c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1521.385464][ T8482] RAX: ffffffffffffffda RBX: 00007fd87ec79c90 RCX: 000000000045a919 [ 1521.385475][ T8482] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1521.385485][ T8482] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1521.385493][ T8482] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd87ec7a6d4 [ 1521.385501][ T8482] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 11:51:28 executing program 0: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0x7fff, 0x8}, 0xc) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$tipc(r0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0xfffffffffffffff1, &(0x7f0000000000)={0x0, 0x0}}, 0x370) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r1, 0x8, 0x8}, 0xc) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r2, &(0x7f00000000c0), 0x0) 11:51:28 executing program 2 (fault-call:5 fault-nth:51): socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) close(0xffffffffffffffff) socket$kcm(0x29, 0x0, 0x0) [ 1521.579369][ T8488] device nr0 entered promiscuous mode [ 1521.731441][ T8499] FAULT_INJECTION: forcing a failure. [ 1521.731441][ T8499] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1521.745362][ T8499] CPU: 0 PID: 8499 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1521.753964][ T8499] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1521.764143][ T8499] Call Trace: [ 1521.767473][ T8499] dump_stack+0x197/0x210 [ 1521.771821][ T8499] should_fail.cold+0xa/0x15 [ 1521.776426][ T8499] ? fault_create_debugfs_attr+0x180/0x180 [ 1521.782378][ T8499] ? ___might_sleep+0x163/0x2c0 [ 1521.787260][ T8499] should_fail_alloc_page+0x50/0x60 [ 1521.792475][ T8499] __alloc_pages_nodemask+0x1a1/0x910 [ 1521.797866][ T8499] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1521.803606][ T8499] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1521.809852][ T8499] ? find_next_bit+0x107/0x130 [ 1521.814629][ T8499] pcpu_populate_chunk+0xf8/0x940 [ 1521.819660][ T8499] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1521.825404][ T8499] ? find_next_bit+0xc7/0x130 [ 1521.830097][ T8499] pcpu_alloc+0xd5b/0x1380 [ 1521.834532][ T8499] ? pcpu_alloc_area+0x820/0x820 [ 1521.839477][ T8499] ? bpf_map_area_alloc+0x20/0x30 [ 1521.844529][ T8499] __alloc_percpu_gfp+0x28/0x30 [ 1521.849391][ T8499] htab_map_alloc+0xdb9/0x11c0 [ 1521.854186][ T8499] ? htab_map_update_elem+0xca0/0xca0 [ 1521.859569][ T8499] __do_sys_bpf+0x478/0x3610 [ 1521.864176][ T8499] ? bpf_prog_load+0x1960/0x1960 [ 1521.869118][ T8499] ? __kasan_check_write+0x14/0x20 [ 1521.874243][ T8499] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1521.879797][ T8499] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1521.885095][ T8499] ? wait_for_completion+0x440/0x440 [ 1521.890399][ T8499] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1521.896664][ T8499] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1521.902152][ T8499] ? do_syscall_64+0x26/0x790 [ 1521.906866][ T8499] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1521.912947][ T8499] ? do_syscall_64+0x26/0x790 [ 1521.917640][ T8499] __x64_sys_bpf+0x73/0xb0 [ 1521.922090][ T8499] do_syscall_64+0xfa/0x790 [ 1521.926608][ T8499] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1521.932503][ T8499] RIP: 0033:0x45a919 [ 1521.936408][ T8499] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1521.956034][ T8499] RSP: 002b:00007fd87ec79c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1521.964459][ T8499] RAX: ffffffffffffffda RBX: 00007fd87ec79c90 RCX: 000000000045a919 [ 1521.972460][ T8499] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 11:51:29 executing program 2 (fault-call:5 fault-nth:52): socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) close(0xffffffffffffffff) socket$kcm(0x29, 0x0, 0x0) [ 1521.980437][ T8499] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1521.988436][ T8499] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd87ec7a6d4 [ 1521.996424][ T8499] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 11:51:29 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0x1, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r0, 0x8, 0x8}, 0xc) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$tipc(r1, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r1, 0x28, &(0x7f00000001c0)}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 11:51:29 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) r1 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)={[{0x0, 'memory'}]}, 0x8) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}, 0x1000, 0x0, 0xc4, 0x0, 0x0, 0x9}, 0x0, 0xe, r2, 0x0) close(r2) [ 1522.172847][ T8508] FAULT_INJECTION: forcing a failure. [ 1522.172847][ T8508] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1522.205734][ T8508] CPU: 0 PID: 8508 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 11:51:29 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0x1, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r0, 0x8, 0x8}, 0xc) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000340)={r1, &(0x7f00000001c0)="b93e649e25514201183b22ff7e0438b5e1bb5278235c33c3e73f121e40b70eac4b1c44d9cfa6ca1c8fff923f1dc9920f0b51e1ca8d54cf9c69ee882f77e4bd23e6659aada517c4dd9afd95fa64014c5c1a219a44dc3268b34fb4c12767ff91dcd131f1de9bb461b213dd237e4ce2e039e459b5c184dca8886de84e2481f68ea7353e84b3aeb3ded3e0eeafd707525827d9cdd3f7381b5c3535a1e4d09d2cfd2b0f", &(0x7f00000002c0)=""/77, 0x8}, 0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000380)={0x2, 0x0, [0x0, 0x0]}) [ 1522.214372][ T8508] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1522.224431][ T8508] Call Trace: [ 1522.227754][ T8508] dump_stack+0x197/0x210 [ 1522.232109][ T8508] should_fail.cold+0xa/0x15 [ 1522.236726][ T8508] ? fault_create_debugfs_attr+0x180/0x180 [ 1522.242554][ T8508] ? ___might_sleep+0x163/0x2c0 [ 1522.247435][ T8508] should_fail_alloc_page+0x50/0x60 [ 1522.252659][ T8508] __alloc_pages_nodemask+0x1a1/0x910 [ 1522.258043][ T8508] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1522.263611][ T8508] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1522.269360][ T8508] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1522.275634][ T8508] alloc_pages_current+0x107/0x210 [ 1522.280767][ T8508] ? ___might_sleep+0x163/0x2c0 [ 1522.285641][ T8508] __vmalloc_node_range+0x4f8/0x810 [ 1522.290869][ T8508] __vmalloc+0x44/0x50 [ 1522.294957][ T8508] ? pcpu_mem_zalloc+0x8a/0xf0 [ 1522.300177][ T8508] pcpu_mem_zalloc+0x8a/0xf0 [ 1522.304791][ T8508] pcpu_create_chunk+0xe0/0x7f0 [ 1522.309670][ T8508] pcpu_alloc+0x10f3/0x1380 [ 1522.314210][ T8508] ? pcpu_alloc_area+0x820/0x820 11:51:29 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x8927, 0x0) [ 1522.319171][ T8508] ? bpf_map_area_alloc+0x20/0x30 [ 1522.324228][ T8508] __alloc_percpu_gfp+0x28/0x30 [ 1522.329102][ T8508] htab_map_alloc+0xdb9/0x11c0 [ 1522.333904][ T8508] ? htab_map_update_elem+0xca0/0xca0 [ 1522.339281][ T8508] __do_sys_bpf+0x478/0x3610 [ 1522.339304][ T8508] ? bpf_prog_load+0x1960/0x1960 [ 1522.339320][ T8508] ? __kasan_check_write+0x14/0x20 [ 1522.339334][ T8508] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1522.339350][ T8508] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1522.339367][ T8508] ? wait_for_completion+0x440/0x440 [ 1522.339391][ T8508] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1522.339427][ T8508] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1522.339445][ T8508] ? do_syscall_64+0x26/0x790 [ 1522.339458][ T8508] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1522.339483][ T8508] ? do_syscall_64+0x26/0x790 [ 1522.348997][ T8508] __x64_sys_bpf+0x73/0xb0 [ 1522.401691][ T8508] do_syscall_64+0xfa/0x790 [ 1522.406224][ T8508] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1522.412126][ T8508] RIP: 0033:0x45a919 [ 1522.416046][ T8508] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1522.435662][ T8508] RSP: 002b:00007fd87ec79c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1522.444088][ T8508] RAX: ffffffffffffffda RBX: 00007fd87ec79c90 RCX: 000000000045a919 [ 1522.452062][ T8508] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1522.460045][ T8508] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1522.468018][ T8508] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd87ec7a6d4 [ 1522.476009][ T8508] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 11:51:29 executing program 4: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x10ad) 11:51:29 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={0x1, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0xfffffffffffffe02) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r0, 0x8, 0x8}, 0xc) r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x1, 0x5, 0x3, 0x5, 0x0, 0x2, 0x2000, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x2, @perf_config_ext={0x0, 0x1ff}, 0x109a1, 0x1, 0x81, 0xb, 0x6, 0x3, 0x2}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, r1, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x7, 0x4, 0x8, 0xf1a}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r2, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={r3}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={r3, 0xb9, 0x30}, 0xc) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r5 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$tipc(r6, 0x0, 0x0) recvmsg(r6, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000002c0)=""/215, 0xd7}, {&(0x7f0000000200)=""/35, 0x23}], 0x2, &(0x7f0000000540)=""/226, 0xe2}, 0x40030000) write$cgroup_subtree(r4, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x90ad) 11:51:29 executing program 2 (fault-call:5 fault-nth:53): socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) close(0xffffffffffffffff) socket$kcm(0x29, 0x0, 0x0) 11:51:29 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$tipc(r1, 0x0, 0x0) ioctl$TUNSETVNETBE(r1, 0x400454de, &(0x7f0000000200)=0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$tipc(r2, 0x0, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f00000001c0)={'ip6gre0\x00', 0x400}) sendmsg(0xffffffffffffffff, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='cpuacct.stat\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0xce4e19555fcb1bd5) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="006386dd8d"], 0x90ad) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000100)=[{0x6, 0xbf, 0x81, 0x1}, {0x15b0, 0x20, 0x1}, {0xb1e3, 0xc0, 0x2}, {0xb33, 0x7, 0x1f, 0x8}, {0x6, 0x20, 0x4, 0x7}, {0x7f, 0x4, 0x6, 0x8}, {0x101, 0xf9, 0x80, 0x7}, {0x6bf8, 0x3f, 0x1f, 0x2}]}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000000)={'veth0_to_bridge\x00', 0x200}) [ 1522.679300][ T8531] FAULT_INJECTION: forcing a failure. [ 1522.679300][ T8531] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1522.724747][ T8531] CPU: 1 PID: 8531 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1522.733374][ T8531] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1522.743443][ T8531] Call Trace: [ 1522.746813][ T8531] dump_stack+0x197/0x210 [ 1522.751155][ T8531] should_fail.cold+0xa/0x15 [ 1522.755765][ T8531] ? fault_create_debugfs_attr+0x180/0x180 [ 1522.761574][ T8531] ? ___might_sleep+0x163/0x2c0 [ 1522.766432][ T8531] should_fail_alloc_page+0x50/0x60 [ 1522.771631][ T8531] __alloc_pages_nodemask+0x1a1/0x910 [ 1522.777009][ T8531] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1522.782733][ T8531] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1522.788295][ T8531] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1522.794289][ T8531] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1522.800538][ T8531] alloc_pages_current+0x107/0x210 [ 1522.805651][ T8531] __get_free_pages+0xc/0x40 [ 1522.810244][ T8531] kasan_populate_vmalloc_pte+0x2f/0x1c0 [ 1522.815878][ T8531] apply_to_page_range+0x445/0x700 [ 1522.821038][ T8531] ? memset+0x40/0x40 [ 1522.825026][ T8531] kasan_populate_vmalloc+0x68/0x90 [ 1522.830231][ T8531] __vmalloc_node_range+0x47e/0x810 [ 1522.835444][ T8531] __vmalloc+0x44/0x50 [ 1522.839511][ T8531] ? pcpu_mem_zalloc+0x8a/0xf0 [ 1522.844345][ T8531] pcpu_mem_zalloc+0x8a/0xf0 [ 1522.848930][ T8531] pcpu_create_chunk+0x12d/0x7f0 [ 1522.853881][ T8531] pcpu_alloc+0x10f3/0x1380 [ 1522.858434][ T8531] ? pcpu_alloc_area+0x820/0x820 [ 1522.863381][ T8531] ? bpf_map_area_alloc+0x20/0x30 [ 1522.868434][ T8531] __alloc_percpu_gfp+0x28/0x30 [ 1522.873292][ T8531] htab_map_alloc+0xdb9/0x11c0 [ 1522.878059][ T8531] ? htab_map_update_elem+0xca0/0xca0 [ 1522.883470][ T8531] __do_sys_bpf+0x478/0x3610 [ 1522.888063][ T8531] ? bpf_prog_load+0x1960/0x1960 [ 1522.893001][ T8531] ? __kasan_check_write+0x14/0x20 [ 1522.898120][ T8531] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1522.903666][ T8531] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1522.908952][ T8531] ? wait_for_completion+0x440/0x440 [ 1522.914294][ T8531] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1522.920541][ T8531] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1522.926017][ T8531] ? do_syscall_64+0x26/0x790 [ 1522.930711][ T8531] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1522.936775][ T8531] ? do_syscall_64+0x26/0x790 [ 1522.941457][ T8531] __x64_sys_bpf+0x73/0xb0 [ 1522.945883][ T8531] do_syscall_64+0xfa/0x790 [ 1522.950456][ T8531] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1522.956341][ T8531] RIP: 0033:0x45a919 [ 1522.960222][ T8531] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1522.979814][ T8531] RSP: 002b:00007fd87ec79c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1522.988212][ T8531] RAX: ffffffffffffffda RBX: 00007fd87ec79c90 RCX: 000000000045a919 [ 1522.996214][ T8531] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1523.004178][ T8531] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1523.012243][ T8531] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd87ec7a6d4 [ 1523.020200][ T8531] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 11:51:30 executing program 2 (fault-call:5 fault-nth:54): socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) close(0xffffffffffffffff) socket$kcm(0x29, 0x0, 0x0) [ 1523.077596][ T8535] device nr0 entered promiscuous mode [ 1523.152163][ T8548] FAULT_INJECTION: forcing a failure. [ 1523.152163][ T8548] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1523.185060][ T8548] CPU: 1 PID: 8548 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1523.193671][ T8548] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1523.203720][ T8548] Call Trace: [ 1523.207005][ T8548] dump_stack+0x197/0x210 [ 1523.211328][ T8548] should_fail.cold+0xa/0x15 [ 1523.215909][ T8548] ? fault_create_debugfs_attr+0x180/0x180 [ 1523.221706][ T8548] ? ___might_sleep+0x163/0x2c0 [ 1523.226574][ T8548] should_fail_alloc_page+0x50/0x60 [ 1523.231960][ T8548] __alloc_pages_nodemask+0x1a1/0x910 [ 1523.237345][ T8548] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1523.243081][ T8548] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1523.248635][ T8548] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1523.254622][ T8548] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1523.260887][ T8548] alloc_pages_current+0x107/0x210 [ 1523.266048][ T8548] __get_free_pages+0xc/0x40 [ 1523.270660][ T8548] kasan_populate_vmalloc_pte+0x2f/0x1c0 [ 1523.276319][ T8548] apply_to_page_range+0x445/0x700 [ 1523.281485][ T8548] ? memset+0x40/0x40 [ 1523.285507][ T8548] kasan_populate_vmalloc+0x68/0x90 [ 1523.290722][ T8548] __vmalloc_node_range+0x47e/0x810 [ 1523.295945][ T8548] __vmalloc+0x44/0x50 [ 1523.300023][ T8548] ? pcpu_mem_zalloc+0x8a/0xf0 [ 1523.304795][ T8548] pcpu_mem_zalloc+0x8a/0xf0 [ 1523.309667][ T8548] pcpu_create_chunk+0x12d/0x7f0 [ 1523.314616][ T8548] pcpu_alloc+0x10f3/0x1380 [ 1523.319139][ T8548] ? pcpu_alloc_area+0x820/0x820 [ 1523.324088][ T8548] ? bpf_map_area_alloc+0x20/0x30 [ 1523.329135][ T8548] __alloc_percpu_gfp+0x28/0x30 [ 1523.333995][ T8548] htab_map_alloc+0xdb9/0x11c0 [ 1523.338787][ T8548] ? htab_map_update_elem+0xca0/0xca0 [ 1523.344177][ T8548] __do_sys_bpf+0x478/0x3610 [ 1523.348783][ T8548] ? bpf_prog_load+0x1960/0x1960 [ 1523.353732][ T8548] ? __kasan_check_write+0x14/0x20 [ 1523.358874][ T8548] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1523.364428][ T8548] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1523.369725][ T8548] ? wait_for_completion+0x440/0x440 [ 1523.375032][ T8548] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1523.381279][ T8548] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1523.386724][ T8548] ? do_syscall_64+0x26/0x790 [ 1523.391437][ T8548] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1523.397503][ T8548] ? do_syscall_64+0x26/0x790 [ 1523.402173][ T8548] __x64_sys_bpf+0x73/0xb0 [ 1523.406579][ T8548] do_syscall_64+0xfa/0x790 [ 1523.411073][ T8548] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1523.416961][ T8548] RIP: 0033:0x45a919 [ 1523.420861][ T8548] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1523.441287][ T8548] RSP: 002b:00007fd87ec79c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 11:51:30 executing program 2 (fault-call:5 fault-nth:55): socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) close(0xffffffffffffffff) socket$kcm(0x29, 0x0, 0x0) [ 1523.449700][ T8548] RAX: ffffffffffffffda RBX: 00007fd87ec79c90 RCX: 000000000045a919 [ 1523.457671][ T8548] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1523.465630][ T8548] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1523.473589][ T8548] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd87ec7a6d4 [ 1523.481562][ T8548] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 11:51:30 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0x1, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r0, 0x8, 0x8}, 0xc) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x0, 0x81}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', r3}, 0x10) openat$cgroup_ro(r3, &(0x7f0000000200)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}, 0x1000, 0x0, 0xc4, 0x0, 0x0, 0x9}, 0x0, 0xe, r3, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffffd, 0x8}, 0x5000, 0x0, 0xc4, 0x0, 0x0, 0x9, 0x2}, 0x0, 0xe, r4, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f00000001c0)={r4}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='\a\x00\x00\x00\x00'], 0x90ad) 11:51:30 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x8933, 0x0) 11:51:30 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0x1, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r0, 0x8, 0x8}, 0xc) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="006386c42f5dffb9e533779763493205c88b8bed07"], 0x90ad) 11:51:30 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/n\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_procs(r1, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) r2 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000100)='cgroup.subtree_control\x00', 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$tipc(r3, 0x0, 0x0) r4 = getpid() r5 = gettid() r6 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x2, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80, 0x0, @perf_config_ext={0x9, 0x5}, 0x0, 0x0, 0xffffffff, 0x0, 0x7, 0x4}, r5, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000280)='veth0\x00') perf_event_open(&(0x7f0000000000)={0x6, 0x70, 0x7, 0x7, 0x5, 0x40, 0x0, 0x0, 0x400, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x8, 0x9}, 0x8000, 0xfffffffffffffffb, 0x3ff, 0x1, 0x9b, 0x101, 0x4}, r4, 0x0, r6, 0x0) write$cgroup_pid(r3, &(0x7f00000000c0)=r4, 0x12) write$cgroup_subtree(r2, &(0x7f00000000c0), 0xfffffff2) [ 1523.696195][ T8556] FAULT_INJECTION: forcing a failure. [ 1523.696195][ T8556] name failslab, interval 1, probability 0, space 0, times 0 [ 1523.748470][ T8556] CPU: 1 PID: 8556 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1523.757096][ T8556] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1523.767163][ T8556] Call Trace: [ 1523.770490][ T8556] dump_stack+0x197/0x210 [ 1523.774851][ T8556] should_fail.cold+0xa/0x15 [ 1523.779476][ T8556] ? fault_create_debugfs_attr+0x180/0x180 [ 1523.785316][ T8556] ? ___might_sleep+0x163/0x2c0 [ 1523.790202][ T8556] __should_failslab+0x121/0x190 [ 1523.795165][ T8556] should_failslab+0x9/0x14 [ 1523.799687][ T8556] kmem_cache_alloc_node+0x268/0x740 [ 1523.804986][ T8556] ? ___might_sleep+0x163/0x2c0 [ 1523.809870][ T8556] alloc_vmap_area+0x147/0x2030 [ 1523.814753][ T8556] ? __get_vm_area_node+0x12b/0x4f0 [ 1523.819972][ T8556] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1523.825548][ T8556] ? purge_vmap_area_lazy+0x40/0x40 [ 1523.830769][ T8556] ? apply_to_page_range+0x562/0x700 [ 1523.836086][ T8556] __get_vm_area_node+0x179/0x4f0 [ 1523.841138][ T8556] __vmalloc_node_range+0xd4/0x810 [ 1523.848785][ T8556] ? pcpu_mem_zalloc+0x8a/0xf0 [ 1523.853582][ T8556] __vmalloc+0x44/0x50 [ 1523.857676][ T8556] ? pcpu_mem_zalloc+0x8a/0xf0 [ 1523.862459][ T8556] pcpu_mem_zalloc+0x8a/0xf0 [ 1523.867067][ T8556] pcpu_create_chunk+0x196/0x7f0 [ 1523.872020][ T8556] pcpu_alloc+0x10f3/0x1380 [ 1523.876547][ T8556] ? pcpu_alloc_area+0x820/0x820 [ 1523.881503][ T8556] ? bpf_map_area_alloc+0x20/0x30 [ 1523.886556][ T8556] __alloc_percpu_gfp+0x28/0x30 [ 1523.891423][ T8556] htab_map_alloc+0xdb9/0x11c0 [ 1523.896214][ T8556] ? htab_map_update_elem+0xca0/0xca0 [ 1523.901612][ T8556] __do_sys_bpf+0x478/0x3610 [ 1523.906221][ T8556] ? bpf_prog_load+0x1960/0x1960 [ 1523.911180][ T8556] ? __kasan_check_write+0x14/0x20 [ 1523.916304][ T8556] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1523.921861][ T8556] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1523.927166][ T8556] ? wait_for_completion+0x440/0x440 [ 1523.932481][ T8556] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1523.938757][ T8556] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1523.944225][ T8556] ? do_syscall_64+0x26/0x790 11:51:31 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_mems\x00', 0x26e1, 0x0) sendmsg$tipc(r2, 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'team_slave_1\x00', 0x1000}) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) mkdirat$cgroup(r3, &(0x7f0000000080)='syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}, 0x1000, 0x0, 0xc4, 0x0, 0x0, 0x9}, 0x0, 0xe, r1, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x2}) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x0) write$cgroup_subtree(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="01af32b70a1019fdde7915b882ad0bb532395b2128db02fd0000"], 0x90ad) [ 1523.948944][ T8556] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1523.955000][ T8556] ? do_syscall_64+0x26/0x790 [ 1523.959674][ T8556] __x64_sys_bpf+0x73/0xb0 [ 1523.964103][ T8556] do_syscall_64+0xfa/0x790 [ 1523.968627][ T8556] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1523.974522][ T8556] RIP: 0033:0x45a919 [ 1523.978404][ T8556] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1523.998002][ T8556] RSP: 002b:00007fd87ec79c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1524.006403][ T8556] RAX: ffffffffffffffda RBX: 00007fd87ec79c90 RCX: 000000000045a919 [ 1524.014362][ T8556] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1524.022319][ T8556] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1524.030284][ T8556] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd87ec7a6d4 [ 1524.038276][ T8556] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 11:51:31 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/d\x00\xc8 \x01et/tun\x00', 0x200, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x2, 0x200}, 0xc) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd, 0x3}, 0x10) write$cgroup_subtree(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="006382e713421fcd94fa66936e6e31f527d6bbcedf0a4196ad5813d6e311517642ecce59e75b867450cac37a263af6fdfcae11ec1781a84c6622e2f5c89982a9a9c7eb9762c01741716e4dfc2546185f67af68f9396edbd1507e370e4ead5f2cae542f044b9a6e3d4213d0dde46ad69e180326e394b5c38ec9f320521d640aa2fe2dd037c07d455be532871d773f860fbf59ee924fac50c134e7c6fd41a87ebcc26390e5972a4a51e047040ca3aec09966b254c6c3aa2b877e56f79ae9599aca63820e08af9e80"], 0x90ad) 11:51:31 executing program 4: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x10ad) 11:51:31 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}, 0x1000, 0x0, 0xc4, 0x0, 0x0, 0x9}, 0x0, 0xe, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuacct.usage_user\x00', 0x0, 0x0) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0xffffffffffffffff, 0x3}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={r2, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r3, 0x8, 0x8}, 0xc) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, &(0x7f0000000240)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e700a0c00004ff3cd946b507d0419c09fc1fe6c128fef6f3289d0"}, 0x20) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) r5 = socket$kcm(0x29, 0x2, 0x0) getpid() bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x3, 0x0, 0x100, 0xbf, 0x20, 0xffffffffffffffff, 0xffffff7f, [], 0x0, r1, 0x4}, 0x3c) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}, 0x1000, 0x0, 0xc4, 0x0, 0x0, 0x9}, 0x0, 0xe, r6, 0x0) ioctl$TUNSETLINK(r6, 0x400454cd, 0x27) write$cgroup_subtree(r4, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 11:51:31 executing program 2 (fault-call:5 fault-nth:56): socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) close(0xffffffffffffffff) socket$kcm(0x29, 0x0, 0x0) 11:51:31 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000100)=0xffffffe1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}, 0x1000, 0x0, 0xc4, 0x0, 0x0, 0x9}, 0x0, 0xe, r1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x76, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x4008, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000140), 0x9}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xa, r2, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$tipc(r3, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000000)={r1, r3}) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) [ 1524.257707][ T8582] FAULT_INJECTION: forcing a failure. [ 1524.257707][ T8582] name failslab, interval 1, probability 0, space 0, times 0 [ 1524.315172][ T8582] CPU: 0 PID: 8582 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1524.323896][ T8582] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1524.334059][ T8582] Call Trace: [ 1524.337470][ T8582] dump_stack+0x197/0x210 [ 1524.341816][ T8582] should_fail.cold+0xa/0x15 [ 1524.346423][ T8582] ? fault_create_debugfs_attr+0x180/0x180 [ 1524.352404][ T8582] ? ___might_sleep+0x163/0x2c0 [ 1524.357258][ T8582] __should_failslab+0x121/0x190 [ 1524.362189][ T8582] should_failslab+0x9/0x14 [ 1524.366679][ T8582] kmem_cache_alloc_node+0x268/0x740 [ 1524.371963][ T8582] ? ___might_sleep+0x163/0x2c0 [ 1524.376809][ T8582] alloc_vmap_area+0x147/0x2030 [ 1524.381652][ T8582] ? __get_vm_area_node+0x12b/0x4f0 [ 1524.386842][ T8582] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1524.392398][ T8582] ? purge_vmap_area_lazy+0x40/0x40 [ 1524.397583][ T8582] ? apply_to_page_range+0x562/0x700 [ 1524.402862][ T8582] __get_vm_area_node+0x179/0x4f0 [ 1524.407882][ T8582] __vmalloc_node_range+0xd4/0x810 [ 1524.412989][ T8582] ? pcpu_mem_zalloc+0x8a/0xf0 [ 1524.417763][ T8582] __vmalloc+0x44/0x50 [ 1524.421847][ T8582] ? pcpu_mem_zalloc+0x8a/0xf0 [ 1524.426613][ T8582] pcpu_mem_zalloc+0x8a/0xf0 [ 1524.431194][ T8582] pcpu_create_chunk+0x196/0x7f0 [ 1524.436122][ T8582] pcpu_alloc+0x10f3/0x1380 [ 1524.440620][ T8582] ? pcpu_alloc_area+0x820/0x820 [ 1524.445544][ T8582] ? bpf_map_area_alloc+0x20/0x30 [ 1524.450575][ T8582] __alloc_percpu_gfp+0x28/0x30 [ 1524.455414][ T8582] htab_map_alloc+0xdb9/0x11c0 [ 1524.460188][ T8582] ? htab_map_update_elem+0xca0/0xca0 [ 1524.465551][ T8582] __do_sys_bpf+0x478/0x3610 [ 1524.470132][ T8582] ? bpf_prog_load+0x1960/0x1960 [ 1524.475060][ T8582] ? __kasan_check_write+0x14/0x20 [ 1524.480166][ T8582] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1524.485700][ T8582] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1524.490971][ T8582] ? wait_for_completion+0x440/0x440 [ 1524.496251][ T8582] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1524.502499][ T8582] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1524.507943][ T8582] ? do_syscall_64+0x26/0x790 [ 1524.512605][ T8582] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1524.518658][ T8582] ? do_syscall_64+0x26/0x790 [ 1524.523342][ T8582] __x64_sys_bpf+0x73/0xb0 [ 1524.527762][ T8582] do_syscall_64+0xfa/0x790 [ 1524.532256][ T8582] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1524.538134][ T8582] RIP: 0033:0x45a919 [ 1524.542018][ T8582] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1524.561614][ T8582] RSP: 002b:00007fd87ec79c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1524.570014][ T8582] RAX: ffffffffffffffda RBX: 00007fd87ec79c90 RCX: 000000000045a919 [ 1524.577978][ T8582] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1524.585947][ T8582] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1524.593906][ T8582] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd87ec7a6d4 [ 1524.601870][ T8582] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 11:51:31 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x8946, 0x0) 11:51:31 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0x1, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r0, 0x8, 0x8}, 0xc) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0xffffffffffffffff, 0xff, 0x20}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28, &(0x7f0000000200)}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r0, 0x3, 0x28}, 0xc) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) [ 1524.645707][ T8585] device nr0 entered promiscuous mode 11:51:32 executing program 2 (fault-call:5 fault-nth:57): socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) close(0xffffffffffffffff) socket$kcm(0x29, 0x0, 0x0) 11:51:32 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x610a}) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x1, 0x1, [@remote]}) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x5be4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$tipc(r1, 0x0, 0x0) ioctl$TUNSETSNDBUF(r1, 0x400454d4, &(0x7f0000000040)=0x1) 11:51:32 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x18000, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}, 0x1000, 0x0, 0xc4, 0x0, 0x0, 0x9}, 0x0, 0xe, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000000)='ppp0.posix_acl_accessvmnet1posix_acl_accessvboxnet1.nodev\x00') ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) [ 1524.843825][ T8605] FAULT_INJECTION: forcing a failure. [ 1524.843825][ T8605] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1524.881860][ T8605] CPU: 0 PID: 8605 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1524.890484][ T8605] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1524.900540][ T8605] Call Trace: [ 1524.903840][ T8605] dump_stack+0x197/0x210 [ 1524.908188][ T8605] should_fail.cold+0xa/0x15 [ 1524.912796][ T8605] ? fault_create_debugfs_attr+0x180/0x180 [ 1524.918622][ T8605] ? ___might_sleep+0x163/0x2c0 [ 1524.923514][ T8605] should_fail_alloc_page+0x50/0x60 [ 1524.928732][ T8605] __alloc_pages_nodemask+0x1a1/0x910 [ 1524.934114][ T8605] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1524.934133][ T8605] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1524.934157][ T8605] ? kasan_unpoison_shadow+0x35/0x50 [ 1524.950705][ T8605] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1524.956966][ T8605] alloc_pages_current+0x107/0x210 [ 1524.962102][ T8605] __vmalloc_node_range+0x4f8/0x810 [ 1524.967332][ T8605] __vmalloc+0x44/0x50 [ 1524.971422][ T8605] ? pcpu_mem_zalloc+0x8a/0xf0 [ 1524.976200][ T8605] pcpu_mem_zalloc+0x8a/0xf0 [ 1524.980802][ T8605] pcpu_create_chunk+0x196/0x7f0 [ 1524.985757][ T8605] pcpu_alloc+0x10f3/0x1380 [ 1524.990289][ T8605] ? pcpu_alloc_area+0x820/0x820 [ 1524.995241][ T8605] ? bpf_map_area_alloc+0x20/0x30 [ 1525.000289][ T8605] __alloc_percpu_gfp+0x28/0x30 [ 1525.005150][ T8605] htab_map_alloc+0xdb9/0x11c0 [ 1525.009949][ T8605] ? htab_map_update_elem+0xca0/0xca0 [ 1525.015348][ T8605] __do_sys_bpf+0x478/0x3610 [ 1525.019960][ T8605] ? bpf_prog_load+0x1960/0x1960 [ 1525.024911][ T8605] ? __kasan_check_write+0x14/0x20 [ 1525.030035][ T8605] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1525.035598][ T8605] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1525.040902][ T8605] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1525.047159][ T8605] ? debug_smp_processor_id+0x33/0x18a [ 1525.052638][ T8605] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1525.058821][ T8605] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1525.064297][ T8605] ? do_syscall_64+0x26/0x790 [ 1525.069011][ T8605] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1525.075100][ T8605] ? do_syscall_64+0x26/0x790 [ 1525.079802][ T8605] __x64_sys_bpf+0x73/0xb0 [ 1525.084237][ T8605] do_syscall_64+0xfa/0x790 [ 1525.088760][ T8605] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1525.094649][ T8605] RIP: 0033:0x45a919 [ 1525.098552][ T8605] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1525.098560][ T8605] RSP: 002b:00007fd87ec79c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1525.098574][ T8605] RAX: ffffffffffffffda RBX: 00007fd87ec79c90 RCX: 000000000045a919 [ 1525.098583][ T8605] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 11:51:32 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$tipc(r1, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000027c0)={r1}) sendmsg$kcm(r2, &(0x7f0000004f00)={&(0x7f0000002800)=@generic={0x10, "c30d3da39c62aa190a502ee6a57461762252ba690b4628a31a6a0f975c41bb4a9cb89d211acd58e5bd5d5394d9d0cd04a4a73b780fdcc276de73b5f3159b1f3c37f32c6b41509093754c7856d076bd5bd2c4739f16269b318a2b1db2710cfe78c17e9f4a4e250325542262005cdaaaef7416c18fa84c6fb6b52645ac3564"}, 0x80, &(0x7f0000003b80)=[{&(0x7f0000002880)="048e598aab24ebad1b50d64de3b33d5415f848b3f04b3d91ac0880b8c05e048ebdc5ce72729c0ce02a7f22a60e7b4e9061eb", 0x32}, {&(0x7f00000028c0)="0e00f00d850accea0ecb74c8a7dd192e39f4a993525e41920844f5358a60e50ccbe742bab9869c1662836c73af708055bb37573d95222543b87b8cd75564b05057cfb9d4a28980136e30c04a4d0bf4454f252bff290d6a7f4ab09c8ceeebf059b2d7a60774baf3e70ed06181efb1dc8b9b86dbbf523320720272558968f6f8c1a30606af8639f25f37b49c176ed4686e8feb591f189e33f412cfe3f8a9dfd470748a08", 0xa3}, {&(0x7f0000002980)="14e27609d3de20365894c188b4c123d4e86b647e463ec7be3aaa7714fb095c66d22ac49037ddd598f4ae72d645cf070f3969f84e368d988e56597a8e2bfb6843605dd578421d5fc4493cd2b5d47afab13cc2727aed2f8afb9ecac00c064dbe98ebdb43f841dc3cbe18c1df99d4a1647b64e6cc3f29b0946f770cb1bc590e98700dcd5f17b598a1a6024cb2e439b9b50cd8e9d57fe9bcc04ac9bd235f828750832946a383260bbc", 0xa7}, {&(0x7f0000002a40)="acc3b8c66c3739a41049ced4f1111a27908bab8e3c4b7e39ea805dca1d4f13d8508a87c2f01c6e9541bc12fc3fccdc1bb2ad88123bf531c96b236271ef", 0x3d}, {&(0x7f0000002a80)="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", 0x1000}, {&(0x7f0000003a80)="5a6a43f12372ee3f2e81fc1f654799966c8d905b409df3b39c05b1a7c4358d3575c50809d705d9fcb8db1b24ca7fa4645b0866e298fdca729bf9c3471a9e488600512fbb0043b89e5de0f5a8d4e86e9ee8f25c097991af7657db4a637b6df66bcd7e6a9d07412daf14b3efad836952ed061f3e3fa0db68714467e59f8019c5d90651a1c2b15c72c4e5a24903846ef60b1c9b9027a193c9b677cdd843560c9f5bbd33ce92446cd328ab7ad69263033b1cece17f6616b5e2479bf337867c3ee6523727d0c1612666449937791f2e47f06fda55cf50526d5d66fbd3536ee689a92740d216e081c2cd4952", 0xe9}], 0x6, &(0x7f0000003c00)=[{0x98, 0x10a, 0x400, "4ecd288f7f059983055250e92f58b6f21fc2c718a941026ad0b801f000850632266501f7816a877ac4f04ed607c1ee97ae557046ca120d6c37ff99ff71591958f26e0064ae2e10631e34d431529e61501836740dd5f522fcbc915abd56c628c7128a78c1549da92e5b9fce604463e89b9d2ddf78c66e05da1fdd2d9f042388b41b2066396023f3"}, {0x30, 0x116, 0x0, "ec1b7a0b621e5085b55201dc5bf54e4a9b9a5e4b57699f28a7061c89d2"}, {0x10, 0x1, 0x5c5}, {0x1010, 0xd, 0xffffff07, "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"}, {0xa8, 0x39f, 0x1a1, "a80eb61c43266f8406210b7854e56ab75263103dd7fa4f74d99bc1b2208dcd8f4ddf9931917d0fb25a547f463282b4cbd7942e7b8891ce786fd016619f9369bb7f4bf08a57f13d800010bdb64cc3225e7d50ff265737dd939f86ce04de66283f07cb237ecb84afde7d9ccc965ccdc947587c99dd9ca2663594476b4dc644804dacd06c08ae3306a51bb3c95499c8fbccc4e5f838"}, {0x70, 0x6, 0x9, "c79c5e1bc7300fbb1f6429b8c3ca00f79625dff94e36e594d68179e8b31e56ae7846a7464cc90a88439ca96df14e1e5040d088cd81c09012b0774edd65257c1dd8b06e064aee0441cf699b8c800aadd68213c2591153767944e620bad1"}, {0x40, 0x0, 0x8, "a32b7c497c59e901985a386216b993b062ddce722ed01583490f733b9bbafd797fd5121b306fd29a9101"}, {0x98, 0x10e, 0x8, "8c91e4fac8a2f695e0bdc9699148f5fd0054df40f267c1f9006b1918cf470ebe038e58926812ea0bcedf44abd4f3836e4d5698ac9cbf9b7781ee63728761b476d9e569b5a6c057ef4836e485dd8a22a0b6c9e15ee5ed09d845d892709406ae0ef1e55c61b5844a86583e7acd6cace78a9e546b76e5e74e3285d0e884c6f87c0142704cdce4"}], 0x12d8}, 0x80) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) sendmsg$sock(r3, &(0x7f00000016c0)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001700)="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", 0x1000}, {&(0x7f0000000340)="05d77720cfc96f5cf5eaee50645c9c38bf0c67f1dfbfed6bb6710724f6dc600b6f45e475101adffcecba8685978d", 0x2e}, {&(0x7f00000001c0)="005869a29a124efb7242e57f8d46a905c430265479bd7db331bf9e4f4303b3cf8f2570a5dc0c2ba31063fe2ee635b7b252ad8a88084b13174d9ed7d199bfd797a9a03183049f8b239f3d244ab39151057b99760658f117fdc35e97933573dbe51247b15c2008a91ae6e29cadb1028a1af6bdc3bf7277cee078e4457f0a44352b67d64e4c82f9218c6cc0a8dacb04a5be6d72f2be2e4deae9a88ff08532d9d0146dbd61687f7ccb3757e51c10e0", 0xad}, {&(0x7f0000000380)="3e562138ad7535e6b248c3bb7a0faed0063cd31b88e9d95439f1e37cd449f37da56bce46fa56ec1d9e53165a31321f5e9969af7c80c74c6de94352", 0x3b}, {&(0x7f00000003c0)="5769132e2c863c062f752471fdfd02a48491a69eb36114b08b934f15", 0x1c}, {&(0x7f0000001500)="453111f93fa42ffae7eb502038e50111d58cb8f05bc8793eda0894648f6f94ed480f6bfabd805acf3e87e8bd0fdf2884b48a67d0782773c0ff2be129ce770e929eb24fa14122410400dc48e1327ccfe42feb433c5cedfc00e9014d8715da11704c4a147214aa9eaf10f9e011aad0af9eceeba492291869ebe59da6508f85b7a5c42f38ae3dd848d614cabdd84ff9", 0x8e}], 0x6, &(0x7f0000001640)=[@mark={{0x14, 0x1, 0x24, 0x7ff}}, @mark={{0x14, 0x1, 0x24, 0x401}}, @mark={{0x14, 0x1, 0x24, 0x91f8}}], 0x48}, 0x10) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) [ 1525.098591][ T8605] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1525.098600][ T8605] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd87ec7a6d4 [ 1525.098609][ T8605] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 11:51:32 executing program 2 (fault-call:5 fault-nth:58): socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) close(0xffffffffffffffff) socket$kcm(0x29, 0x0, 0x0) [ 1525.332125][ T8623] FAULT_INJECTION: forcing a failure. [ 1525.332125][ T8623] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1525.353068][ T8623] CPU: 0 PID: 8623 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1525.361681][ T8623] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1525.371738][ T8623] Call Trace: [ 1525.375027][ T8623] dump_stack+0x197/0x210 [ 1525.379352][ T8623] should_fail.cold+0xa/0x15 [ 1525.383936][ T8623] ? fault_create_debugfs_attr+0x180/0x180 [ 1525.389743][ T8623] ? ___might_sleep+0x163/0x2c0 [ 1525.394681][ T8623] should_fail_alloc_page+0x50/0x60 [ 1525.399886][ T8623] __alloc_pages_nodemask+0x1a1/0x910 [ 1525.405274][ T8623] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 1525.410812][ T8623] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1525.416533][ T8623] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1525.422793][ T8623] alloc_pages_current+0x107/0x210 [ 1525.427915][ T8623] ? ___might_sleep+0x163/0x2c0 [ 1525.432775][ T8623] __vmalloc_node_range+0x4f8/0x810 [ 1525.438004][ T8623] __vmalloc+0x44/0x50 [ 1525.442403][ T8623] ? pcpu_mem_zalloc+0x8a/0xf0 [ 1525.447169][ T8623] pcpu_mem_zalloc+0x8a/0xf0 [ 1525.451807][ T8623] pcpu_create_chunk+0x196/0x7f0 [ 1525.456756][ T8623] pcpu_alloc+0x10f3/0x1380 [ 1525.461282][ T8623] ? pcpu_alloc_area+0x820/0x820 [ 1525.466220][ T8623] ? bpf_map_area_alloc+0x20/0x30 [ 1525.471236][ T8623] __alloc_percpu_gfp+0x28/0x30 [ 1525.476089][ T8623] htab_map_alloc+0xdb9/0x11c0 [ 1525.480859][ T8623] ? htab_map_update_elem+0xca0/0xca0 [ 1525.486235][ T8623] __do_sys_bpf+0x478/0x3610 [ 1525.490841][ T8623] ? bpf_prog_load+0x1960/0x1960 [ 1525.495936][ T8623] ? __kasan_check_write+0x14/0x20 [ 1525.501041][ T8623] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1525.506586][ T8623] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1525.511875][ T8623] ? wait_for_completion+0x440/0x440 [ 1525.517167][ T8623] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1525.523420][ T8623] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1525.528879][ T8623] ? do_syscall_64+0x26/0x790 [ 1525.533551][ T8623] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1525.539627][ T8623] ? do_syscall_64+0x26/0x790 [ 1525.544321][ T8623] __x64_sys_bpf+0x73/0xb0 [ 1525.548745][ T8623] do_syscall_64+0xfa/0x790 [ 1525.553248][ T8623] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1525.559123][ T8623] RIP: 0033:0x45a919 [ 1525.563018][ T8623] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1525.582628][ T8623] RSP: 002b:00007fd87ec79c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1525.591040][ T8623] RAX: ffffffffffffffda RBX: 00007fd87ec79c90 RCX: 000000000045a919 [ 1525.599001][ T8623] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1525.606958][ T8623] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1525.614926][ T8623] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd87ec7a6d4 [ 1525.622893][ T8623] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 11:51:32 executing program 2 (fault-call:5 fault-nth:59): socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) close(0xffffffffffffffff) socket$kcm(0x29, 0x0, 0x0) [ 1525.758229][ T8628] FAULT_INJECTION: forcing a failure. [ 1525.758229][ T8628] name failslab, interval 1, probability 0, space 0, times 0 [ 1525.781355][ T8628] CPU: 1 PID: 8628 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1525.789976][ T8628] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1525.800061][ T8628] Call Trace: [ 1525.803345][ T8628] dump_stack+0x197/0x210 [ 1525.807662][ T8628] should_fail.cold+0xa/0x15 [ 1525.812252][ T8628] ? fault_create_debugfs_attr+0x180/0x180 [ 1525.818048][ T8628] ? ___might_sleep+0x163/0x2c0 [ 1525.822898][ T8628] __should_failslab+0x121/0x190 [ 1525.827907][ T8628] should_failslab+0x9/0x14 [ 1525.832404][ T8628] __kmalloc+0x2e0/0x770 [ 1525.836645][ T8628] ? memset+0x40/0x40 [ 1525.840610][ T8628] ? pcpu_get_vm_areas+0x3d5/0x3ee0 [ 1525.845806][ T8628] pcpu_get_vm_areas+0x3d5/0x3ee0 [ 1525.850826][ T8628] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1525.857233][ T8628] ? __vmalloc_node_range+0x4d7/0x810 [ 1525.862609][ T8628] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1525.868836][ T8628] pcpu_create_chunk+0x24e/0x7f0 [ 1525.873765][ T8628] pcpu_alloc+0x10f3/0x1380 [ 1525.878263][ T8628] ? pcpu_alloc_area+0x820/0x820 [ 1525.883238][ T8628] ? bpf_map_area_alloc+0x20/0x30 [ 1525.888340][ T8628] __alloc_percpu_gfp+0x28/0x30 [ 1525.893173][ T8628] htab_map_alloc+0xdb9/0x11c0 [ 1525.897928][ T8628] ? htab_map_update_elem+0xca0/0xca0 [ 1525.903295][ T8628] __do_sys_bpf+0x478/0x3610 [ 1525.907871][ T8628] ? bpf_prog_load+0x1960/0x1960 [ 1525.912789][ T8628] ? __kasan_check_write+0x14/0x20 [ 1525.917881][ T8628] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1525.923420][ T8628] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1525.928704][ T8628] ? wait_for_completion+0x440/0x440 [ 1525.933992][ T8628] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1525.940286][ T8628] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1525.945734][ T8628] ? do_syscall_64+0x26/0x790 [ 1525.950406][ T8628] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1525.956478][ T8628] ? do_syscall_64+0x26/0x790 [ 1525.961151][ T8628] __x64_sys_bpf+0x73/0xb0 [ 1525.965552][ T8628] do_syscall_64+0xfa/0x790 [ 1525.970048][ T8628] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1525.975926][ T8628] RIP: 0033:0x45a919 [ 1525.979803][ T8628] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1525.999485][ T8628] RSP: 002b:00007fd87ec79c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1526.007884][ T8628] RAX: ffffffffffffffda RBX: 00007fd87ec79c90 RCX: 000000000045a919 [ 1526.015961][ T8628] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1526.023961][ T8628] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1526.031962][ T8628] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd87ec7a6d4 [ 1526.039919][ T8628] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 11:51:33 executing program 4: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x10ad) 11:51:33 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0x1, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) mkdir(&(0x7f00000001c0)='./file0\x00', 0xd0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r0, 0x8, 0x8}, 0xc) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}, 0x1000, 0x0, 0xc4, 0x0, 0x0, 0x9}, 0x0, 0xe, r3, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}, 0x1000, 0x0, 0xc4, 0x0, 0x0, 0x9}, 0x0, 0xe, r4, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000200)={r4}) 11:51:33 executing program 2 (fault-call:5 fault-nth:60): socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) close(0xffffffffffffffff) socket$kcm(0x29, 0x0, 0x0) [ 1526.169530][ T8633] FAULT_INJECTION: forcing a failure. [ 1526.169530][ T8633] name failslab, interval 1, probability 0, space 0, times 0 [ 1526.209071][ T8633] CPU: 1 PID: 8633 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1526.217701][ T8633] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1526.227764][ T8633] Call Trace: [ 1526.231074][ T8633] dump_stack+0x197/0x210 [ 1526.235430][ T8633] should_fail.cold+0xa/0x15 [ 1526.240049][ T8633] ? fault_create_debugfs_attr+0x180/0x180 [ 1526.245862][ T8633] ? ___might_sleep+0x163/0x2c0 [ 1526.245885][ T8633] __should_failslab+0x121/0x190 [ 1526.245907][ T8633] should_failslab+0x9/0x14 [ 1526.255667][ T8633] __kmalloc+0x2e0/0x770 [ 1526.255685][ T8633] ? memset+0x40/0x40 11:51:33 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x894c, 0x0) 11:51:33 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}, 0x1000, 0x0, 0xc4, 0x0, 0x0, 0x9}, 0x0, 0xe, r1, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x5) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.current\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) [ 1526.255704][ T8633] ? pcpu_get_vm_areas+0x3ec/0x3ee0 [ 1526.255725][ T8633] pcpu_get_vm_areas+0x3ec/0x3ee0 [ 1526.255739][ T8633] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1526.255759][ T8633] ? __vmalloc_node_range+0x4d7/0x810 [ 1526.290384][ T8633] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1526.296645][ T8633] pcpu_create_chunk+0x24e/0x7f0 [ 1526.301604][ T8633] pcpu_alloc+0x10f3/0x1380 [ 1526.306132][ T8633] ? pcpu_alloc_area+0x820/0x820 [ 1526.311081][ T8633] ? bpf_map_area_alloc+0x20/0x30 [ 1526.316147][ T8633] __alloc_percpu_gfp+0x28/0x30 [ 1526.321013][ T8633] htab_map_alloc+0xdb9/0x11c0 [ 1526.325796][ T8633] ? htab_map_update_elem+0xca0/0xca0 [ 1526.325813][ T8633] __do_sys_bpf+0x478/0x3610 [ 1526.325833][ T8633] ? _raw_spin_unlock_irq+0x23/0x80 [ 1526.340952][ T8633] ? bpf_prog_load+0x1960/0x1960 [ 1526.340973][ T8633] ? _raw_spin_unlock_irq+0x59/0x80 [ 1526.340992][ T8633] ? finish_task_switch+0x147/0x750 [ 1526.356299][ T8633] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1526.362549][ T8633] ? debug_smp_processor_id+0x33/0x18a 11:51:33 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0x1, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r0, 0x8, 0x8}, 0xc) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="a4b5b8"], 0x90ad) [ 1526.368028][ T8633] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1526.374217][ T8633] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1526.379693][ T8633] ? do_syscall_64+0x26/0x790 [ 1526.384387][ T8633] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1526.390465][ T8633] ? do_syscall_64+0x26/0x790 [ 1526.395162][ T8633] __x64_sys_bpf+0x73/0xb0 [ 1526.399592][ T8633] do_syscall_64+0xfa/0x790 [ 1526.404118][ T8633] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1526.410014][ T8633] RIP: 0033:0x45a919 [ 1526.413925][ T8633] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1526.433546][ T8633] RSP: 002b:00007fd87ec79c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1526.433561][ T8633] RAX: ffffffffffffffda RBX: 00007fd87ec79c90 RCX: 000000000045a919 [ 1526.433570][ T8633] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1526.433578][ T8633] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1526.433586][ T8633] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd87ec7a6d4 [ 1526.433602][ T8633] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 11:51:33 executing program 2 (fault-call:5 fault-nth:61): socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) close(0xffffffffffffffff) socket$kcm(0x29, 0x0, 0x0) 11:51:33 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$tipc(r0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r0, 0x28, &(0x7f00000001c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r1, 0x9, 0x10}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0x1, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r2, 0x8, 0x8}, 0xc) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) [ 1526.562143][ T8653] device nr0 entered promiscuous mode [ 1526.662054][ T8656] FAULT_INJECTION: forcing a failure. [ 1526.662054][ T8656] name failslab, interval 1, probability 0, space 0, times 0 [ 1526.692669][ T8656] CPU: 0 PID: 8656 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1526.701289][ T8656] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1526.711353][ T8656] Call Trace: [ 1526.714661][ T8656] dump_stack+0x197/0x210 [ 1526.718986][ T8656] should_fail.cold+0xa/0x15 [ 1526.723567][ T8656] ? fault_create_debugfs_attr+0x180/0x180 [ 1526.729386][ T8656] ? ___might_sleep+0x163/0x2c0 [ 1526.734231][ T8656] __should_failslab+0x121/0x190 [ 1526.739181][ T8656] should_failslab+0x9/0x14 [ 1526.743671][ T8656] kmem_cache_alloc+0x2aa/0x710 [ 1526.748509][ T8656] ? memset+0x40/0x40 [ 1526.752492][ T8656] ? pcpu_get_vm_areas+0x3ec/0x3ee0 [ 1526.757680][ T8656] pcpu_get_vm_areas+0x49e/0x3ee0 [ 1526.762803][ T8656] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1526.769063][ T8656] ? __vmalloc_node_range+0x4d7/0x810 [ 1526.774470][ T8656] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1526.780726][ T8656] pcpu_create_chunk+0x24e/0x7f0 [ 1526.785668][ T8656] pcpu_alloc+0x10f3/0x1380 [ 1526.790197][ T8656] ? pcpu_alloc_area+0x820/0x820 [ 1526.795130][ T8656] ? bpf_map_area_alloc+0x20/0x30 [ 1526.800178][ T8656] __alloc_percpu_gfp+0x28/0x30 [ 1526.805034][ T8656] htab_map_alloc+0xdb9/0x11c0 [ 1526.809811][ T8656] ? htab_map_update_elem+0xca0/0xca0 [ 1526.815173][ T8656] __do_sys_bpf+0x478/0x3610 [ 1526.819842][ T8656] ? bpf_prog_load+0x1960/0x1960 [ 1526.824767][ T8656] ? __kasan_check_write+0x14/0x20 [ 1526.829865][ T8656] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1526.835401][ T8656] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1526.840685][ T8656] ? wait_for_completion+0x440/0x440 [ 1526.845966][ T8656] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1526.852203][ T8656] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1526.857651][ T8656] ? do_syscall_64+0x26/0x790 [ 1526.862313][ T8656] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1526.868366][ T8656] ? do_syscall_64+0x26/0x790 [ 1526.873048][ T8656] __x64_sys_bpf+0x73/0xb0 [ 1526.877456][ T8656] do_syscall_64+0xfa/0x790 [ 1526.881951][ T8656] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1526.887829][ T8656] RIP: 0033:0x45a919 [ 1526.891715][ T8656] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1526.911324][ T8656] RSP: 002b:00007fd87ec79c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1526.919739][ T8656] RAX: ffffffffffffffda RBX: 00007fd87ec79c90 RCX: 000000000045a919 [ 1526.927796][ T8656] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1526.935772][ T8656] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1526.943735][ T8656] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd87ec7a6d4 [ 1526.951713][ T8656] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 11:51:34 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'ipddp0\x00', 0x4009}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) 11:51:34 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0x1, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r0, 0x8, 0x8}, 0xc) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={0xffffffffffffffff, &(0x7f00000001c0)="4efe89b750526167c03cfd37daa1b0df906fc2e4aaebbb5b0de636466c670b", &(0x7f0000000200)="4cf075a5656613e08aff0a01d7c1864f", 0x2}, 0x20) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000080"], 0x90ad) 11:51:34 executing program 2 (fault-call:5 fault-nth:62): socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) close(0xffffffffffffffff) socket$kcm(0x29, 0x0, 0x0) 11:51:34 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}, 0x1000, 0x0, 0xc4, 0x0, 0x0, 0x9}, 0x0, 0xe, r1, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000000)='cpuacct.usage_percpu\x00', 0x0, 0x0) r3 = gettid() perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x2, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80, 0x0, @perf_config_ext={0x9, 0x5}, 0x0, 0x0, 0xffffffff, 0x0, 0x7, 0x4}, r3, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xcd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x9}, 0x200, 0x8000, 0x800, 0x0, 0x1, 0x4}, r3, 0x0, r2, 0xba0a3b3773e28747) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) [ 1527.326566][ T8675] FAULT_INJECTION: forcing a failure. [ 1527.326566][ T8675] name failslab, interval 1, probability 0, space 0, times 0 11:51:34 executing program 4: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f00000002c0)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x10ad) 11:51:34 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0x1, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r0, 0x8, 0x8}, 0xc) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r0, 0x8, 0xd66941384330cae0}, 0xc) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) [ 1527.373314][ T8675] CPU: 0 PID: 8675 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1527.381944][ T8675] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1527.392008][ T8675] Call Trace: [ 1527.395316][ T8675] dump_stack+0x197/0x210 [ 1527.399678][ T8675] should_fail.cold+0xa/0x15 [ 1527.404289][ T8675] ? fault_create_debugfs_attr+0x180/0x180 [ 1527.410122][ T8675] ? ___might_sleep+0x163/0x2c0 [ 1527.414990][ T8675] __should_failslab+0x121/0x190 [ 1527.419948][ T8675] should_failslab+0x9/0x14 [ 1527.424464][ T8675] kmem_cache_alloc+0x2aa/0x710 [ 1527.429327][ T8675] ? memset+0x40/0x40 [ 1527.433327][ T8675] ? pcpu_get_vm_areas+0x3ec/0x3ee0 [ 1527.438552][ T8675] pcpu_get_vm_areas+0x49e/0x3ee0 [ 1527.443593][ T8675] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1527.449851][ T8675] ? __vmalloc_node_range+0x4d7/0x810 [ 1527.455957][ T8675] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1527.462735][ T8675] pcpu_create_chunk+0x24e/0x7f0 [ 1527.467694][ T8675] pcpu_alloc+0x10f3/0x1380 [ 1527.472221][ T8675] ? pcpu_alloc_area+0x820/0x820 [ 1527.477175][ T8675] ? bpf_map_area_alloc+0x20/0x30 [ 1527.482211][ T8675] __alloc_percpu_gfp+0x28/0x30 [ 1527.487066][ T8675] htab_map_alloc+0xdb9/0x11c0 [ 1527.487097][ T8675] ? htab_map_update_elem+0xca0/0xca0 [ 1527.487114][ T8675] __do_sys_bpf+0x478/0x3610 [ 1527.487135][ T8675] ? bpf_prog_load+0x1960/0x1960 [ 1527.487151][ T8675] ? __kasan_check_write+0x14/0x20 [ 1527.487167][ T8675] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1527.487182][ T8675] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1527.487201][ T8675] ? wait_for_completion+0x440/0x440 [ 1527.528009][ T8675] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1527.534285][ T8675] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1527.539766][ T8675] ? do_syscall_64+0x26/0x790 [ 1527.544463][ T8675] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1527.550554][ T8675] ? do_syscall_64+0x26/0x790 [ 1527.555263][ T8675] __x64_sys_bpf+0x73/0xb0 [ 1527.559698][ T8675] do_syscall_64+0xfa/0x790 [ 1527.564217][ T8675] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1527.570111][ T8675] RIP: 0033:0x45a919 [ 1527.574019][ T8675] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1527.593702][ T8675] RSP: 002b:00007fd87ec79c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1527.602118][ T8675] RAX: ffffffffffffffda RBX: 00007fd87ec79c90 RCX: 000000000045a919 [ 1527.610088][ T8675] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 11:51:34 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="006386dd074e18c94b6adebac688c775e9f4690ce7923ccd22be7cdaa5e00a35fc7029c14aac4eb4d3514ceebc43e8a1f2812b24d6f1d6e96ca57842da55a557ddb3536773c92717843e5578d51241368957842884bb17cfb1a54d496cd8a7723e7e0b2358c4e014d4c94cd21c1c704f89e955edd81daa4efc9560760e9d4617d432df353f45deb82b71d5628dc5ee3cb1f74336de79df05b23bffccb5646ab7dd62"], 0x90ad) [ 1527.618069][ T8675] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1527.626048][ T8675] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd87ec7a6d4 [ 1527.634023][ T8675] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 11:51:35 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x400454c8, 0x0) 11:51:35 executing program 2 (fault-call:5 fault-nth:63): socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) close(0xffffffffffffffff) socket$kcm(0x29, 0x0, 0x0) 11:51:35 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0x1, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r0, 0x8, 0x8}, 0xc) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x90ad) [ 1527.822428][ T8694] FAULT_INJECTION: forcing a failure. [ 1527.822428][ T8694] name failslab, interval 1, probability 0, space 0, times 0 [ 1527.876135][ T8694] CPU: 1 PID: 8694 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1527.884935][ T8694] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1527.894989][ T8694] Call Trace: [ 1527.898281][ T8694] dump_stack+0x197/0x210 [ 1527.902605][ T8694] should_fail.cold+0xa/0x15 [ 1527.907185][ T8694] ? fault_create_debugfs_attr+0x180/0x180 [ 1527.912988][ T8694] ? ___might_sleep+0x163/0x2c0 [ 1527.917839][ T8694] __should_failslab+0x121/0x190 [ 1527.922788][ T8694] should_failslab+0x9/0x14 [ 1527.927281][ T8694] kmem_cache_alloc_trace+0x2d3/0x790 [ 1527.932640][ T8694] ? kmem_cache_alloc+0x364/0x710 [ 1527.937676][ T8694] ? memset+0x40/0x40 [ 1527.941651][ T8694] ? pcpu_get_vm_areas+0x3ec/0x3ee0 [ 1527.946842][ T8694] pcpu_get_vm_areas+0x4d6/0x3ee0 [ 1527.951884][ T8694] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1527.958140][ T8694] ? __vmalloc_node_range+0x4d7/0x810 [ 1527.963527][ T8694] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1527.969778][ T8694] pcpu_create_chunk+0x24e/0x7f0 [ 1527.974709][ T8694] pcpu_alloc+0x10f3/0x1380 [ 1527.979228][ T8694] ? pcpu_alloc_area+0x820/0x820 [ 1527.984175][ T8694] ? bpf_map_area_alloc+0x20/0x30 [ 1527.989211][ T8694] __alloc_percpu_gfp+0x28/0x30 [ 1527.994070][ T8694] htab_map_alloc+0xdb9/0x11c0 [ 1527.998839][ T8694] ? htab_map_update_elem+0xca0/0xca0 [ 1528.004218][ T8694] __do_sys_bpf+0x478/0x3610 [ 1528.008817][ T8694] ? bpf_prog_load+0x1960/0x1960 [ 1528.013747][ T8694] ? __kasan_check_write+0x14/0x20 [ 1528.018858][ T8694] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1528.024392][ T8694] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 1528.029674][ T8694] ? wait_for_completion+0x440/0x440 [ 1528.034973][ T8694] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1528.041211][ T8694] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1528.046657][ T8694] ? do_syscall_64+0x26/0x790 [ 1528.051417][ T8694] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1528.057485][ T8694] ? do_syscall_64+0x26/0x790 [ 1528.062152][ T8694] __x64_sys_bpf+0x73/0xb0 [ 1528.066555][ T8694] do_syscall_64+0xfa/0x790 [ 1528.071059][ T8694] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1528.076936][ T8694] RIP: 0033:0x45a919 [ 1528.080817][ T8694] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1528.100418][ T8694] RSP: 002b:00007fd87ec79c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1528.108817][ T8694] RAX: ffffffffffffffda RBX: 00007fd87ec79c90 RCX: 000000000045a919 [ 1528.116778][ T8694] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 11:51:35 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}, 0x1000, 0x0, 0xc4, 0x0, 0x0, 0x9}, 0x0, 0xe, r0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000000)={'nr0\x00', 0x400}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = getpid() perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x9, 0x7, 0x5, 0x6, 0x0, 0x7c000000000000, 0x10, 0xc, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0x100, 0x4a7184d3}, 0x20020, 0x6, 0x9, 0x5, 0x8, 0x1, 0x3ff}, r2, 0x2, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) [ 1528.124752][ T8694] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1528.132748][ T8694] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd87ec7a6d4 [ 1528.140716][ T8694] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 11:51:35 executing program 2 (fault-call:5 fault-nth:64): socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x106, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x13]}, 0x3c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) close(0xffffffffffffffff) socket$kcm(0x29, 0x0, 0x0) 11:51:35 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0x1, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r0, 0x8, 0x8}, 0xc) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') r3 = getpid() r4 = gettid() r5 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x2, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80, 0x0, @perf_config_ext={0x9, 0x5}, 0x0, 0x0, 0xffffffff, 0x0, 0x7, 0x4}, r4, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000280)='veth0\x00') perf_event_open(&(0x7f0000000000)={0x6, 0x70, 0x7, 0x7, 0x5, 0x40, 0x0, 0x0, 0x400, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x8, 0x9}, 0x8000, 0xfffffffffffffffb, 0x3ff, 0x1, 0x9b, 0x101, 0x4}, r3, 0x0, r5, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x4, 0x5, 0x80, 0x43, 0x0, 0x80, 0x4, 0x5c973940bce15e9f, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x9d, 0x3, @perf_config_ext={0x10000, 0x4}, 0x10000, 0x6, 0x1, 0x5, 0x9, 0x77, 0x4}, r3, 0x0, 0xffffffffffffffff, 0x3) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 11:51:35 executing program 4: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f00000002c0)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x10ad) 11:51:35 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0x1, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r0, 0x8, 0x8}, 0xc) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) perf_event_open(&(0x7f0000000400)={0x4, 0x70, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}, 0x1000, 0x0, 0xc4, 0x0, 0x0, 0x9}, 0x0, 0xe, r1, 0x0) r2 = gettid() perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x2, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80, 0x0, @perf_config_ext={0x9, 0x5}, 0x0, 0x0, 0xffffffff, 0x0, 0x7, 0x4}, r2, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(r1, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) write$cgroup_pid(r1, &(0x7f00000000c0)=r2, 0x12) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="000840c2e8c1fb7fb4c9c86d2df5dc3ed40089"], 0x90ad) [ 1528.443570][ T8717] FAULT_INJECTION: forcing a failure. [ 1528.443570][ T8717] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1528.528468][ T8717] CPU: 0 PID: 8717 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1528.537096][ T8717] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1528.547184][ T8717] Call Trace: [ 1528.550498][ T8717] dump_stack+0x197/0x210 [ 1528.554847][ T8717] should_fail.cold+0xa/0x15 [ 1528.559457][ T8717] ? fault_create_debugfs_attr+0x180/0x180 [ 1528.565282][ T8717] ? ___might_sleep+0x163/0x2c0 [ 1528.570163][ T8717] should_fail_alloc_page+0x50/0x60 [ 1528.575377][ T8717] __alloc_pages_nodemask+0x1a1/0x910 [ 1528.580749][ T8717] ? perf_trace_lock+0xeb/0x4c0 [ 1528.585619][ T8717] ? __alloc_pages_slowpath+0x2920/0x2920 [ 1528.585637][ T8717] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1528.585656][ T8717] ? __kasan_check_read+0x11/0x20 [ 1528.585675][ T8717] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1528.585695][ T8717] alloc_pages_current+0x107/0x210 [ 1528.585716][ T8717] __get_free_pages+0xc/0x40 [ 1528.618600][ T8717] kasan_populate_vmalloc_pte+0x2f/0x1c0 [ 1528.624254][ T8717] apply_to_page_range+0x445/0x700 [ 1528.629382][ T8717] ? memset+0x40/0x40 [ 1528.633383][ T8717] kasan_populate_vmalloc+0x68/0x90 [ 1528.638595][ T8717] pcpu_get_vm_areas+0x3c5f/0x3ee0 [ 1528.643725][ T8717] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1528.650005][ T8717] pcpu_create_chunk+0x24e/0x7f0 [ 1528.654971][ T8717] pcpu_alloc+0x10f3/0x1380 [ 1528.659499][ T8717] ? pcpu_alloc_area+0x820/0x820 [ 1528.664448][ T8717] ? bpf_map_area_alloc+0x20/0x30 [ 1528.669507][ T8717] __alloc_percpu_gfp+0x28/0x30 [ 1528.674368][ T8717] htab_map_alloc+0xdb9/0x11c0 11:51:35 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x200001, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\xff\xff\x00\x00B\xf9K\x03\x89\xd3\x11\xda\x00', 0x400}) write$cgroup_subtree(r0, &(0x7f0000000000)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x5) [ 1528.679161][ T8717] ? htab_map_update_elem+0xca0/0xca0 [ 1528.684549][ T8717] __do_sys_bpf+0x478/0x3610 [ 1528.689150][ T8717] ? bpf_prog_load+0x1960/0x1960 [ 1528.694098][ T8717] ? __kasan_check_write+0x14/0x20 [ 1528.699227][ T8717] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1528.704794][ T8717] ? ___preempt_schedule+0x16/0x18 [ 1528.709921][ T8717] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1528.716204][ T8717] ? debug_smp_processor_id+0x33/0x18a [ 1528.721679][ T8717] ? rcu_lockdep_current_cpu_online+0xe3/0x130 11:51:36 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$tipc(r1, 0x0, 0x0) r2 = socket$kcm(0x2, 0x200000000000001, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x2f, &(0x7f0000000000), 0x3b7) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$tipc(r3, 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000080)={0x8, &(0x7f0000000040)=[{0x7, 0x81}, {0x1, 0x0, 0xff, 0x3d}, {0x0, 0x6, 0x7, 0x3}, {0x8, 0xff, 0x6, 0x7}, {0x9a1, 0x44, 0x5, 0x1000}, {0x0, 0x1, 0x0, 0x2}, {0x3, 0x8, 0x4, 0x5}, {0x5, 0xf, 0x40, 0x8}]}) r4 = openat$cgroup_ro(r3, &(0x7f0000000100)='cgroup.events\x00', 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) ioctl$PERF_EVENT_IOC_ID(r4, 0x80082407, &(0x7f0000000240)) recvmsg(0xffffffffffffffff, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r5, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r7 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r7, 0x1, 0x3e, &(0x7f00000002c0)=r6, 0x161) r8 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000004600)={r8, 0xc0, &(0x7f0000004540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=0x10ff4015, 0x0, 0x0, 0x0, &(0x7f0000004440)={0x4, 0x4}, 0x0, 0x0, &(0x7f0000004480)={0x0, 0x0, 0x80000000, 0xd9}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001880)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000004840)={0x19, 0x2, &(0x7f0000001700)=@raw=[@ldst={0x2, 0x0, 0x7, 0x8, 0x9, 0x1, 0x12}, @alu={0x4, 0x0, 0x8, 0x6, 0xb, 0x2, 0x1}], &(0x7f0000001740)='syzkaller\x00', 0xd79, 0xce, &(0x7f0000001780)=""/206, 0x40f00, 0x8, [], 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000004380)={0x9, 0x1}, 0x8, 0x10, 0x0, 0x0, r9}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="8510008510000003000000"], &(0x7f00000002c0)='syzkaller\x00', 0x3c, 0xec, &(0x7f0000000480)=""/236, 0x41100, 0x1, [], r5, 0xd, r6, 0x8, &(0x7f0000000300)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x4, 0x10, 0x8001, 0xccc3}, 0x10, r9}, 0x78) ioctl$TUNSETIFINDEX(r4, 0x400454da, &(0x7f0000000140)=r5) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0001802a170582"], 0x90ad) [ 1528.727865][ T8717] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1528.733326][ T8717] ? do_syscall_64+0x26/0x790 [ 1528.738031][ T8717] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1528.744107][ T8717] ? do_syscall_64+0x26/0x790 [ 1528.749064][ T8717] __x64_sys_bpf+0x73/0xb0 [ 1528.753501][ T8717] do_syscall_64+0xfa/0x790 [ 1528.758018][ T8717] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1528.763935][ T8717] RIP: 0033:0x45a919 [ 1528.767842][ T8717] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1528.787447][ T8717] RSP: 002b:00007fd87ec79c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1528.787461][ T8717] RAX: ffffffffffffffda RBX: 00007fd87ec79c90 RCX: 000000000045a919 [ 1528.787474][ T8717] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1528.787482][ T8717] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1528.787489][ T8717] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd87ec7a6d4 [ 1528.787498][ T8717] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 [ 1528.799427][ T8717] BUG: unable to handle page fault for address: fffff91ffff40000 [ 1528.824129][ T4087] kobject: 'loop5' (000000004c9b1904): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1528.828024][ T8717] #PF: supervisor read access in kernel mode [ 1528.828033][ T8717] #PF: error_code(0x0000) - not-present page [ 1528.828039][ T8717] PGD 21ffe6067 P4D 21ffe6067 PUD aa56c067 PMD aa56d067 PTE 0 [ 1528.828064][ T8717] Oops: 0000 [#1] PREEMPT SMP KASAN [ 1528.828079][ T8717] CPU: 0 PID: 8717 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0 [ 1528.828088][ T8717] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1528.828108][ T8717] RIP: 0010:check_memory_region+0x9c/0x1a0 [ 1528.828120][ T8717] Code: c9 4d 0f 49 c1 49 c1 f8 03 45 85 c0 0f 84 10 01 00 00 41 83 e8 01 4e 8d 44 c0 08 eb 0d 48 83 c0 08 4c 39 c0 0f 84 a7 00 00 00 <48> 83 38 00 74 ed 4c 8d 40 08 eb 09 48 83 c0 01 49 39 c0 74 53 80 [ 1528.828133][ T8717] RSP: 0018:ffffc90001a47a80 EFLAGS: 00010206 [ 1528.928488][ T8717] RAX: fffff91ffff40000 RBX: fffff91ffff40f10 RCX: ffffffff819e5ed9 [ 1528.936459][ T8717] RDX: 0000000000000001 RSI: 0000000000007880 RDI: ffffe8ffffa00000 [ 1528.944420][ T8717] RBP: ffffc90001a47a98 R08: fffff91ffff40f10 R09: 0000000000000f10 [ 1528.952387][ T8717] R10: fffff91ffff40f0f R11: ffffe8ffffa0787f R12: fffff91ffff40000 [ 1528.960351][ T8717] R13: 0000000000007880 R14: 0000000000000000 R15: ffff88821fffd100 [ 1528.968313][ T8717] FS: 00007fd87ec7a700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 1528.977333][ T8717] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1528.983904][ T8717] CR2: fffff91ffff40000 CR3: 00000000a82f7000 CR4: 00000000001406f0 [ 1528.991874][ T8717] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1528.999833][ T8717] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 1529.007788][ T8717] Call Trace: [ 1529.011071][ T8717] memset+0x24/0x40 [ 1529.014958][ T8717] pcpu_alloc+0x589/0x1380 [ 1529.019373][ T8717] ? pcpu_alloc_area+0x820/0x820 [ 1529.024300][ T8717] ? bpf_map_area_alloc+0x20/0x30 [ 1529.029320][ T8717] __alloc_percpu_gfp+0x28/0x30 [ 1529.034161][ T8717] htab_map_alloc+0xdb9/0x11c0 [ 1529.038927][ T8717] ? htab_map_update_elem+0xca0/0xca0 [ 1529.044300][ T8717] __do_sys_bpf+0x478/0x3610 [ 1529.048907][ T8717] ? bpf_prog_load+0x1960/0x1960 [ 1529.053866][ T8717] ? __kasan_check_write+0x14/0x20 [ 1529.058994][ T8717] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 1529.066106][ T8717] ? ___preempt_schedule+0x16/0x18 [ 1529.071226][ T8717] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1529.077462][ T8717] ? debug_smp_processor_id+0x33/0x18a [ 1529.082927][ T8717] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1529.089096][ T8717] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1529.094541][ T8717] ? do_syscall_64+0x26/0x790 [ 1529.099206][ T8717] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1529.105274][ T8717] ? do_syscall_64+0x26/0x790 [ 1529.109948][ T8717] __x64_sys_bpf+0x73/0xb0 [ 1529.114359][ T8717] do_syscall_64+0xfa/0x790 [ 1529.118853][ T8717] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1529.124935][ T8717] RIP: 0033:0x45a919 [ 1529.128849][ T8717] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1529.148461][ T8717] RSP: 002b:00007fd87ec79c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1529.156873][ T8717] RAX: ffffffffffffffda RBX: 00007fd87ec79c90 RCX: 000000000045a919 [ 1529.164832][ T8717] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 1529.172809][ T8717] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1529.180768][ T8717] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd87ec7a6d4 [ 1529.188726][ T8717] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 [ 1529.196710][ T8717] Modules linked in: [ 1529.200598][ T8717] CR2: fffff91ffff40000 [ 1529.204766][ T8717] ---[ end trace 5229ee266855745e ]--- [ 1529.210237][ T8717] RIP: 0010:check_memory_region+0x9c/0x1a0 [ 1529.216036][ T8717] Code: c9 4d 0f 49 c1 49 c1 f8 03 45 85 c0 0f 84 10 01 00 00 41 83 e8 01 4e 8d 44 c0 08 eb 0d 48 83 c0 08 4c 39 c0 0f 84 a7 00 00 00 <48> 83 38 00 74 ed 4c 8d 40 08 eb 09 48 83 c0 01 49 39 c0 74 53 80 [ 1529.235637][ T8717] RSP: 0018:ffffc90001a47a80 EFLAGS: 00010206 [ 1529.241703][ T8717] RAX: fffff91ffff40000 RBX: fffff91ffff40f10 RCX: ffffffff819e5ed9 [ 1529.249682][ T8717] RDX: 0000000000000001 RSI: 0000000000007880 RDI: ffffe8ffffa00000 [ 1529.257641][ T8717] RBP: ffffc90001a47a98 R08: fffff91ffff40f10 R09: 0000000000000f10 [ 1529.265603][ T8717] R10: fffff91ffff40f0f R11: ffffe8ffffa0787f R12: fffff91ffff40000 [ 1529.273560][ T8717] R13: 0000000000007880 R14: 0000000000000000 R15: ffff88821fffd100 [ 1529.281523][ T8717] FS: 00007fd87ec7a700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 1529.290449][ T8717] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1529.297017][ T8717] CR2: fffff91ffff40000 CR3: 00000000a82f7000 CR4: 00000000001406f0 [ 1529.305412][ T8717] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1529.313368][ T8717] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 1529.321328][ T8717] Kernel panic - not syncing: Fatal exception [ 1529.328180][ T8717] Kernel Offset: disabled [ 1529.332627][ T8717] Rebooting in 86400 seconds..