=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) 03:34:34 executing program 1: bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) 03:34:34 executing program 1: bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) 03:34:34 executing program 1: bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) 03:34:34 executing program 1: bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) 03:34:34 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x29, 0xbab4da9152499843, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) 03:34:40 executing program 5: r0 = socket$kcm(0xa, 0x1, 0x0) socket$kcm(0x29, 0x6, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000dc0)=@in6={0xa, 0x0, 0x0, @local, 0x6}, 0x80, 0x0}, 0x20004040) socket$kcm(0x29, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci={0x1f, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) write$cgroup_subtree(r3, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0xb, 0x6, 0x9, 0x4, 0x401, r1, 0x5, [], r2, r3, 0x5}, 0x3c) perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x9, 0xc1, 0x1, 0x80, 0x0, 0x8, 0x2001, 0x4, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xa8c0, 0x2, @perf_config_ext={0x4, 0x9}, 0x1000, 0x1d, 0x5, 0x8, 0x7, 0x800, 0x9}, r1, 0x8, 0xffffffffffffffff, 0xa) r4 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r4, &(0x7f0000000140)={0x0, 0x1f5, &(0x7f0000000040)=[{&(0x7f0000000600)="4c000000120081ae08060c0f006b10007f03e3f700004882000000ca1b4e0906a6bd7c493872f750375ed08a56331dbf64700169381ad6e74703c48f93b8446b9bbc7a461eb886a5e54e8ff5", 0x4c}], 0x1}, 0x44000) 03:34:40 executing program 1: bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) 03:34:45 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_type(r0, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000380)='cpuset.mems\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x30863, 0x0) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0xfffffc61) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000240)={'hwsim0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f00000000c0)={'hwsim0\x00', @random="0894f53e01dc"}) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)={0xffff}, 0xc) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup\x00\f\x7f\xd9\xfa;\x8b\x88gb\xefi\x16\x91\xbb\xc4\xd5Jk\tU~ \xa4\vR\\\x8a\xdb\xcel\xe0\xa3[\xae\x9d\xac\x84\x9f\v\x9e\x9f\r\x10\x1f\xd3\x80\xc1\xccq\xab\x01y\xed\xfc\x96)\xf6_>+\xa03\xf4\xcc0\xbbE\xb0\xc3\x94\xd53\x87\xd6\xc4\\\xc7\x82\xe9\xaf\xb5\xb6\x15\xf4K2\x17\f\x98\x1c\xebq/\xf5\x81#\x85\xc5\xa0\xfd\xfac\xd9\xf2c`\xe9[c\a\x12\x1bb\x82\x83\x86d\xf0k\xa8\x90\x06\xa8\x1cK\xea\x19\x91\a1z)\xde_r`\xee\xb6\x9e\xcb\x05\x00\x00\x82\xa1\t\xc9\x05\xcc^', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000200)='memory.high\x00\x90\x80\xa4\x96\xbb\xe4\xb2\xa2\x01\xc0\xb8*Z\xef\xf8\x0e\x1f]\xf7\x10\xdb\xfe\xe4\x1d\xc6\x92\x7f\xeeK_p\t\x8c\x9f5\xd0\xef)\xd8\x04\xbf\xc2N\x1c\xf0R\xdc\r\xb1Gf\xba\xd11#<\xaf^,s\x85\x10R\x99\xc2D\xee\n\"\xf9c\x15{\xc1[\xef\x06\x8a\xcd\x9d\xc8\x90#\xd0\xe7\xe3\xe0\xa9\xf3\xc0n\x1f\xd1\x11P\xe20\xcd\x1c\xfa\xfd\xa3\xcf\x9c\xc6\xb7]\x16\xc7\xd7\xb4/\x82\xd1\xae\xd9TM\x05a\xe5\xc5U\x91\xbe\x81\xac4\x9d\x02`\xe7\xa6q\x1f@\x1f\x1f?tm\x9c\xd1\x8c\xa1\xb5\xe0`H)\x97r\xc0?y\x9cc=c`A^\x9f\xcd\xbc\xf4m>I\xae\xdf\x946\xe7M`\xeb\x9fm\xbe+n\x00\x18k\x98\xab\xd5\xeet\"d\x81\x94\x04\xf5\xeb', 0x2, 0x0) write$cgroup_int(r4, 0x0, 0x0) 03:34:45 executing program 1: bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) 03:34:51 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_type(r0, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000380)='cpuset.mems\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x30863, 0x0) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0xfffffc61) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000240)={'hwsim0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f00000000c0)={'hwsim0\x00', @random="0894f53e01dc"}) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)={0xffff, 0x5}, 0xc) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup\x00\f\x7f\xd9\xfa;\x8b\x88gb\xefi\x16\x91\xbb\xc4\xd5Jk\tU~ \xa4\vR\\\x8a\xdb\xcel\xe0\xa3[\xae\x9d\xac\x84\x9f\v\x9e\x9f\r\x10\x1f\xd3\x80\xc1\xccq\xab\x01y\xed\xfc\x96)\xf6_>+\xa03\xf4\xcc0\xbbE\xb0\xc3\x94\xd53\x87\xd6\xc4\\\xc7\x82\xe9\xaf\xb5\xb6\x15\xf4K2\x17\f\x98\x1c\xebq/\xf5\x81#\x85\xc5\xa0\xfd\xfac\xd9\xf2c`\xe9[c\a\x12\x1bb\x82\x83\x86d\xf0k\xa8\x90\x06\xa8\x1cK\xea\x19\x91\a1z)\xde_r`\xee\xb6\x9e\xcb\x05\x00\x00\x82\xa1\t\xc9\x05\xcc^', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000200)='memory.high\x00\x90\x80\xa4\x96\xbb\xe4\xb2\xa2\x01\xc0\xb8*Z\xef\xf8\x0e\x1f]\xf7\x10\xdb\xfe\xe4\x1d\xc6\x92\x7f\xeeK_p\t\x8c\x9f5\xd0\xef)\xd8\x04\xbf\xc2N\x1c\xf0R\xdc\r\xb1Gf\xba\xd11#<\xaf^,s\x85\x10R\x99\xc2D\xee\n\"\xf9c\x15{\xc1[\xef\x06\x8a\xcd\x9d\xc8\x90#\xd0\xe7\xe3\xe0\xa9\xf3\xc0n\x1f\xd1\x11P\xe20\xcd\x1c\xfa\xfd\xa3\xcf\x9c\xc6\xb7]\x16\xc7\xd7\xb4/\x82\xd1\xae\xd9TM\x05a\xe5\xc5U\x91\xbe\x81\xac4\x9d\x02`\xe7\xa6q\x1f@\x1f\x1f?tm\x9c\xd1\x8c\xa1\xb5\xe0`H)\x97r\xc0?y\x9cc=c`A^\x9f\xcd\xbc\xf4m>I\xae\xdf\x946\xe7M`\xeb\x9fm\xbe+n\x00\x18k\x98\xab\xd5\xeet\"d\x81\x94\x04\xf5\xeb', 0x2, 0x0) write$cgroup_int(r4, 0x0, 0x0) 03:34:51 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000280)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x2, 0x2, 0x0, 0x0, 0x3, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="214e017c6f767920"], 0xda00) r3 = getpid() r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r4, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci={0x1f, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40086602, 0x400007) write$cgroup_subtree(r6, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0xb, 0x6, 0x9, 0x4, 0x401, r4, 0x5, [], r5, r6, 0x5}, 0x3c) perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x1, 0x9, 0x3, 0x7, 0x0, 0x8000, 0x1000, 0x4, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x4e5, 0x80000000, 0x3ff, 0x8, 0x81, 0x0, 0x5}, r3, 0xa, r4, 0x2) r7 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x2}, r7, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x2, 0x0, 0x5, 0x0, 0x0, 0x400, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x4, 0xf95, 0x0, 0xffff}, r7, 0x0, 0xffffffffffffffff, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci={0x1f, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r10, 0x40086602, 0x400007) write$cgroup_subtree(r10, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0xb, 0x6, 0x9, 0x4, 0x401, r8, 0x5, [], r9, r10, 0x5}, 0x3c) r11 = perf_event_open(&(0x7f0000000380)={0x3, 0x70, 0x0, 0x7, 0x4, 0x40, 0x0, 0x5, 0x80000, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100)}, 0x4000, 0xffffffff, 0x73, 0x4, 0x0, 0x5, 0x8}, r7, 0x7, r10, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r11, 0x40082406, &(0x7f0000000240)='\x00') write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x0) r12 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r12, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) 03:34:51 executing program 1: bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) 03:34:52 executing program 1: bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x0) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) 03:34:52 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x3c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x83630, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) socket$kcm(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000380)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={0x0, 0x4}, 0x4280, 0x2, 0x8a8, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x19) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000001380)={&(0x7f0000000440)=@tipc=@id={0x1e, 0x3, 0x0, {0x4e23, 0x1}}, 0x80, &(0x7f0000000d40)=[{&(0x7f00000004c0)="41da867f7b8499b15a381a5cf9f25c1c06ebd84de54df8da4647dfae2bb1af1b0bfae2fd5993144809aec01486de2ce8ba582409", 0x34}, {0x0}, {&(0x7f0000000940)="04ceffd1a073a4f89337f60d19583d5aff2cc1f4603315590e479845f790ad1e43fde29e52e3e4fc329eb38b425fe11b83bbe5a59cd39f76001b41a6d57bee61b4fd9925db5f2430a3430d7f412a4aacb4c28fc95150278af95447541b48234b043e856d3e1e1acffcd34ae2da45aa06f2c94c1999b724e7808134897f099b4c303dd07d58b58af5dc35992070f6a304d475cb", 0x93}, {&(0x7f0000000b00)="c0baee269e4ebd49e03fb4353845e3c29c0e5b4a1bc7db94cf48f4411c856e81e26048610fed9ff8e2243d7b82ee10e0d40bef2a28f3c3a4147f2d4d1c223fdd8ed53143500552b422d1f9a3aec2c693ab1539c05f0f32d481e466b6381700c9146f6b56c5d34befa28b5427bc734ca02033035fc463311cf2eaebaaed726b2483979e2f8dd9897be23b9c86291a566508f9b799ee8692c7c4af71247c51afd22022ba3af14840edf9a0a8d2c2289b2a34846b6456ba0f878f8464b56a795b9028a0ad3391a14d2fc81738c2a770d27b35275e776565a5", 0xd7}, {&(0x7f0000000c00)="54396fb4b6ba55835f4f3d16e91e14d825265f310fe475e138ae1afb0a21a5a51fd8ab82735f2d7d9cbc48ba694b2b59fb24f27651c88a9a7a30531900b1eaa1ba9ebc42b93a2e1ddd4e7d2e2761817eb4f3193111383ff65d687467ea664c8919f279849b3dc86363ba8e4a668dbd8349f3d1af4e7fb181d399f50da0bc29235e76d1180034a98e7aa7b27ee35e148b540d46e4", 0x94}, {&(0x7f0000000700)="105ce5837d86b4cfc3c2e9c738d835615feaf6102c02ce9c7584c3f703a9396a2a452c5cfce157f79bac806538fc61e4c0c9be28c43006141b945363870aed0088bcd8a441abf98b89c844f9b607a4e8d4436ff7bd5df5538516384dba1b205ab628fb4ef9891536b4dfa4f7483c4e19a7b9", 0x72}, {&(0x7f0000000a00)="7b8515f7093609da92197ab303924b962b495e84dae9eefb61349c6b320361502669c8f0231631ef", 0x28}, {&(0x7f0000000cc0)}], 0x8, &(0x7f0000000dc0)=[{0xc0, 0x100, 0x100, "0b489cf2530610147d996ad2da72a702280b825b6307db271d47419f3589cf3ad6a1bc659889fe6ce17799ab551f5fd74f80dc3afc0f04724dd9959cf12f47d1fa82efd33cd9859c8218c329838cf64cf9ff063e40d5f32f709827eb667ecb26dcc6264e6d130c6cade28cdd5d7d4f24b902f73bb49e6aed417d7063ed973a760fd75cb1661fe366839e121e3dc5380215995bbfa1833522421b613724ece35a1276bc9c905fcedc6ac4c9a969c6f5"}, {0x58, 0x1, 0x1, "f1dcebbf72918eba091a39794b7c5792c9160fbf5e9f92471595500851d06d35626f7d4be2ba77c96db466aecb4898345b4cce06744f9b10f7fb9d21ba796ef63e9b1db0beb486b7"}, {0xf8, 0x108, 0x7, "6faa04dfab8e352df1cc1698f93cf326b61c25b36c9b46d28585bca9899cd65953c91a4000d55261d09c06e412e3dde22143528b897bc18645e6cfa33cae586a2f715408d37182131629ca420ce1a082a10646ebda8b64653fcc7daa68ec329aea9eb0ee8646496ecc98d99c095f4bec9a3ec6ef3f5dd7d41886a9cd5fceee3212bb57c2ea6281c8274c5c3be36dcb4d1da9ecbe46ac7036abfef30678cfe66fe4dabab6529803b6b1ae33c066c6bc4812543ca8fbfb8ec0229da037015f5e2891cb6369d9ca0922c2f26056a4d318de0d18f6677924619049539a9c66987ec1f457"}, {0x50, 0xd, 0x7fffffff, "4c8f3f4936b14d16b28614fb0b9ffd4470376cd97575bdd87a716cd05a86919fbd7fee41ab502ee7909418a93f840aaa40c94684d113cf5f304c042221f1cb"}, {0x40, 0x88, 0x6, "0569ad5f7741bf467c556861e1d59d7d6264b2cb63a80ee385ffac80fba5b4b4e3c98e2361a9f2b6b381"}, {0xd0, 0x113, 0xfffff3f7, "c44c24e82c933adbe0ced3e9598443f6c2360a2928c95f05b1993d8b903db6eb764b0a8ff04765e9cf3e93008dce3cd66dffee7cca89bd318cc0d4119d1bddd62d7768d797ebaf47a3abab8abf894af39037b1f4c63184b568cee9421af48d4cdb289733fc13a5b803e4313e8795088f72d36d9d2db74d8b71e625f1cd50a290802c2ef918d9b553cff6927cbe634a0011648bf9fcd418f430f54f19ac03bb7d1a0a96718cdc017a73da8e0a10a734ef221a6b14fef87d9ef619"}, {0x58, 0xff, 0xb0d, "1177ccc319f5e2a7da9ae5b3d7cd4539893806692bf54e0a917ad256e7031ecae684c7ec4a5512994a58ddbf01023dbfca150b7e515f495510cf5a090a62051e83162cab"}, {0x108, 0x10a, 0x7fffffff, "9f1bad4b7e5145b6dee060e6f8b06f13ced24972da94f088a385b411f9ce4e1f3a0156e8605f5cbd6fe82957b1672d0a8658d91d0ff40be72af3d764271e435be5f3a29eb1038e6fb9d76bf267475e353b671702a9a9e0b0d55e2f64402ef7a266daa0846840e6f330203d37d776f7c1704d63477b96a068819d982296723d3a459d23912fe257e20bf569995dafd5d22214c9a67db16ba1e0b90d273cb0d96b40c3a98bdb21c22d49ea2eb968586f30ea776c8e5c6f56fdef302c95484accb63252231cf1008676bf83d96abd820d0f800d091a388b269a0eb39cc322f282f583ba14699d40a91703f8b85500c149b9153277ed54efddac"}, {0x90, 0x20c, 0x1, "6b794c9d19fdb2896cbf1a8764307035223eb4388da197fd282310fc2dd4f7121e44e9af79835d05fca624eab8eb4dd72c0d66444ffcd7cdc5ac7718bf90bb581f3cb3c68bf836468531efe1941a31a664e6d4a4a293e760cb262069be558894e072a46da112367dbc61300eba016034284e312274e5977376"}], 0x560}, 0x20084840) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0), 0x28e) perf_event_open(&(0x7f0000000380)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000340), 0x4}, 0x4280, 0x0, 0x8a8}, 0x0, 0x0, 0xffffffffffffffff, 0x19) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r3 = gettid() r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r7 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r7, 0x1, 0x3e, &(0x7f00000002c0)=r6, 0x28e) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000013c0)=ANY=[@ANYBLOB="b70200000200001fbfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b70000000000000095000700000000002174a31cd51f5d0b0e7445145c72df8cfe483659ef60b59f7d6f993cf921d2cee43483a0432db24c2038a59c0d69"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r8, 0x0, 0xcc0, 0x0, &(0x7f0000000040)="b20408788949f63a7499", 0x0, 0x3f, 0x0, 0xfed0}, 0x28) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r8) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r3, r4, 0x0, 0xd1, &(0x7f0000000080)='memory.high\x00\x90\x80\xa4\x96\xbb\xe4\xb2\xa2\x01\xc0\xb8*Z\xef\xf8\x0e\x1f]\xf7\x10\xdb\xfe\xe4\x1d\xc6\x92\x7f\xeeK_p\t\x8c\x9f5\xd0\xef)\xd8\x04\xbf\xc2N\x1c\xf0R\xdc\r\xb1Gf\xba\xd11#<\xaf^,s\x85\x10R\x99\xc2D\xee\n\"\xf9c\x15{\xc1[\xef\x06\x8a\xcd\x9d\xc8\x90#\xd0\xe7\xe3\xe0\xa9\xf3\xc0n\x1f\xd1\x11P\xe20\xcd\x1c\xfa\xfd\xa3\xcf\x9c\xc6\xb7]\x16\xc7\xd7\xb4/\x82\xd1\xae\xd9TM\x05a\xe5\xc5U\x91\xbe\x81\xac4\x9d\x02`\xe7\xa6q\x1f@\x1f\x1f?tm\x9c\xd1\x8c\xa1\xb5\xe0`H)\x97r\xc0?y\x9cc=c`A^\x9f\xcd\xbc\xf4m>I\xae\xdf\x946\xe7M`\xeb\x9fm\xbe+n\x00\x18k\x98\xab\xd5\xeet\"d\x81\x94\x04\xf5\xeb'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000a40)={0x0, r2, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000080)='\x00'}, 0x30) close(0xffffffffffffffff) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820004, 0x0, 0x0, [0x0, 0xeca7020000000000, 0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}, 0x2c) 03:34:52 executing program 1: bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x0) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) 03:34:52 executing program 1: bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x0) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) 03:34:54 executing program 4: socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') r1 = socket$kcm(0xa, 0x1, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x8916, &(0x7f0000000000)={r2}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000004c0)='lo\x00\x96o8\x14d\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\'m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1') r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0xc0185879, 0x20000000) write$cgroup_int(r3, &(0x7f0000000080), 0xfffffec7) openat$cgroup_ro(r3, &(0x7f0000000080)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) 03:34:54 executing program 1: bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) 03:34:54 executing program 1: bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) 03:34:57 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_type(r0, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000380)='cpuset.mems\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x30863, 0x0) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0xfffffc61) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000240)={'hwsim0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f00000000c0)={'hwsim0\x00', @random="0894f53e01dc"}) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)={0xffff, 0x5}, 0xc) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup\x00\f\x7f\xd9\xfa;\x8b\x88gb\xefi\x16\x91\xbb\xc4\xd5Jk\tU~ \xa4\vR\\\x8a\xdb\xcel\xe0\xa3[\xae\x9d\xac\x84\x9f\v\x9e\x9f\r\x10\x1f\xd3\x80\xc1\xccq\xab\x01y\xed\xfc\x96)\xf6_>+\xa03\xf4\xcc0\xbbE\xb0\xc3\x94\xd53\x87\xd6\xc4\\\xc7\x82\xe9\xaf\xb5\xb6\x15\xf4K2\x17\f\x98\x1c\xebq/\xf5\x81#\x85\xc5\xa0\xfd\xfac\xd9\xf2c`\xe9[c\a\x12\x1bb\x82\x83\x86d\xf0k\xa8\x90\x06\xa8\x1cK\xea\x19\x91\a1z)\xde_r`\xee\xb6\x9e\xcb\x05\x00\x00\x82\xa1\t\xc9\x05\xcc^', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000200)='memory.high\x00\x90\x80\xa4\x96\xbb\xe4\xb2\xa2\x01\xc0\xb8*Z\xef\xf8\x0e\x1f]\xf7\x10\xdb\xfe\xe4\x1d\xc6\x92\x7f\xeeK_p\t\x8c\x9f5\xd0\xef)\xd8\x04\xbf\xc2N\x1c\xf0R\xdc\r\xb1Gf\xba\xd11#<\xaf^,s\x85\x10R\x99\xc2D\xee\n\"\xf9c\x15{\xc1[\xef\x06\x8a\xcd\x9d\xc8\x90#\xd0\xe7\xe3\xe0\xa9\xf3\xc0n\x1f\xd1\x11P\xe20\xcd\x1c\xfa\xfd\xa3\xcf\x9c\xc6\xb7]\x16\xc7\xd7\xb4/\x82\xd1\xae\xd9TM\x05a\xe5\xc5U\x91\xbe\x81\xac4\x9d\x02`\xe7\xa6q\x1f@\x1f\x1f?tm\x9c\xd1\x8c\xa1\xb5\xe0`H)\x97r\xc0?y\x9cc=c`A^\x9f\xcd\xbc\xf4m>I\xae\xdf\x946\xe7M`\xeb\x9fm\xbe+n\x00\x18k\x98\xab\xd5\xeet\"d\x81\x94\x04\xf5\xeb', 0x2, 0x0) write$cgroup_int(r4, 0x0, 0x0) 03:34:57 executing program 1: bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) 03:35:15 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_type(r0, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000380)='cpuset.mems\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x30863, 0x0) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0xfffffc61) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000240)={'hwsim0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f00000000c0)={'hwsim0\x00', @random="0894f53e01dc"}) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)={0xffff, 0x5}, 0xc) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup\x00\f\x7f\xd9\xfa;\x8b\x88gb\xefi\x16\x91\xbb\xc4\xd5Jk\tU~ \xa4\vR\\\x8a\xdb\xcel\xe0\xa3[\xae\x9d\xac\x84\x9f\v\x9e\x9f\r\x10\x1f\xd3\x80\xc1\xccq\xab\x01y\xed\xfc\x96)\xf6_>+\xa03\xf4\xcc0\xbbE\xb0\xc3\x94\xd53\x87\xd6\xc4\\\xc7\x82\xe9\xaf\xb5\xb6\x15\xf4K2\x17\f\x98\x1c\xebq/\xf5\x81#\x85\xc5\xa0\xfd\xfac\xd9\xf2c`\xe9[c\a\x12\x1bb\x82\x83\x86d\xf0k\xa8\x90\x06\xa8\x1cK\xea\x19\x91\a1z)\xde_r`\xee\xb6\x9e\xcb\x05\x00\x00\x82\xa1\t\xc9\x05\xcc^', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000200)='memory.high\x00\x90\x80\xa4\x96\xbb\xe4\xb2\xa2\x01\xc0\xb8*Z\xef\xf8\x0e\x1f]\xf7\x10\xdb\xfe\xe4\x1d\xc6\x92\x7f\xeeK_p\t\x8c\x9f5\xd0\xef)\xd8\x04\xbf\xc2N\x1c\xf0R\xdc\r\xb1Gf\xba\xd11#<\xaf^,s\x85\x10R\x99\xc2D\xee\n\"\xf9c\x15{\xc1[\xef\x06\x8a\xcd\x9d\xc8\x90#\xd0\xe7\xe3\xe0\xa9\xf3\xc0n\x1f\xd1\x11P\xe20\xcd\x1c\xfa\xfd\xa3\xcf\x9c\xc6\xb7]\x16\xc7\xd7\xb4/\x82\xd1\xae\xd9TM\x05a\xe5\xc5U\x91\xbe\x81\xac4\x9d\x02`\xe7\xa6q\x1f@\x1f\x1f?tm\x9c\xd1\x8c\xa1\xb5\xe0`H)\x97r\xc0?y\x9cc=c`A^\x9f\xcd\xbc\xf4m>I\xae\xdf\x946\xe7M`\xeb\x9fm\xbe+n\x00\x18k\x98\xab\xd5\xeet\"d\x81\x94\x04\xf5\xeb', 0x2, 0x0) write$cgroup_int(r4, 0x0, 0x0) 03:35:15 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000003c0)=ANY=[@ANYBLOB="b702000005000000bf230000000000002703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000feffffff2d6405000000000065040400010000000404000001007d60b7030000000020006a0a00fe800000008500000026000000b7000000000000009500000000000000acaa8e5374bf16d94ef0987b00a749a8e55da870f7778d3e77ad85319f0113fe7699162334343befce832c02075c5f08e30cde221371f0fe1e2067e4b75da95370ae6fd2b99ac18f98403494d4a94e95fb8dcd813487b2bdb006c6465ccd417bdc68af2b4ca5467a97184c8e9d34b3e382b25e9614634e8e09194f2d89dd6a0bfe10ddba2e3797a2f6dcb45d5ff81603ddbd17ffe1db3560c01cdf1eaa3fc7a2fb4f1689dfd5b688e68cea45850913c70f26174770e4dfd1c82a694efc62e1ef9c8c0ea1efa5b949ef865a32b9839d39fd74aa0529a360c6b8ac86a38ff949c064358a673c4e933e25f422eb77eb9d6242066f525afecee5ba37d6c1adb779da45a29af7b85efc7882684c3c6c7eeb4e4e684fd07e0cc0b84fac7549692f54c5b2183ad0bb3eaf6066b3fba9510700"/427], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffffe3}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci={0x1f, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) write$cgroup_subtree(r3, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0xb, 0x6, 0x9, 0x4, 0x401, r1, 0x5, [], r2, r3, 0x5}, 0x3c) r4 = openat$cgroup_ro(r3, &(0x7f0000000040)='cpuacct.usage_all\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETPERSIST(r4, 0x400454cb, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci={0x1f, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r8, 0x40086602, 0x400007) write$cgroup_subtree(r8, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0xb, 0x6, 0x9, 0x4, 0x401, r6, 0x5, [], r7, r8, 0x5}, 0x3c) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x40082406, &(0x7f0000000080)='cpu') bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xcc0, 0x0, &(0x7f0000000280)="7b5515ccc8bca12641e65d58fd1a12f639", 0x0, 0xfff}, 0x28) 03:35:15 executing program 1: bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) 03:35:15 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000032000535d25a80648c63940d0124fc60100002400a000200053582c137153e370400018003001700d1bd", 0x33fe0}], 0x1}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci={0x1f, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0xb, 0x6, 0x9, 0x4, 0x401, r2, 0x5, [], r3, r4, 0x5}, 0x3c) openat$cgroup_ro(r2, &(0x7f0000000180)='cpu.stat\x00', 0x0, 0x0) recvmsg$kcm(r1, &(0x7f0000000740)={&(0x7f0000000100)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000cc0)=""/4096, 0x1000}, 0x40010080) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuset.effective_cpus\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f00000000c0)={r0, r5}) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0400001c008102e00f80ecdb4cb9f207c804a00d00000088000afb0a0002006a0ada1b40d805000300c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) 03:35:15 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_type(r0, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000380)='cpuset.mems\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x30863, 0x0) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0xfffffc61) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000240)={'hwsim0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f00000000c0)={'hwsim0\x00', @random="0894f53e01dc"}) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)={0xffff, 0x5}, 0xc) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup\x00\f\x7f\xd9\xfa;\x8b\x88gb\xefi\x16\x91\xbb\xc4\xd5Jk\tU~ \xa4\vR\\\x8a\xdb\xcel\xe0\xa3[\xae\x9d\xac\x84\x9f\v\x9e\x9f\r\x10\x1f\xd3\x80\xc1\xccq\xab\x01y\xed\xfc\x96)\xf6_>+\xa03\xf4\xcc0\xbbE\xb0\xc3\x94\xd53\x87\xd6\xc4\\\xc7\x82\xe9\xaf\xb5\xb6\x15\xf4K2\x17\f\x98\x1c\xebq/\xf5\x81#\x85\xc5\xa0\xfd\xfac\xd9\xf2c`\xe9[c\a\x12\x1bb\x82\x83\x86d\xf0k\xa8\x90\x06\xa8\x1cK\xea\x19\x91\a1z)\xde_r`\xee\xb6\x9e\xcb\x05\x00\x00\x82\xa1\t\xc9\x05\xcc^', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000200)='memory.high\x00\x90\x80\xa4\x96\xbb\xe4\xb2\xa2\x01\xc0\xb8*Z\xef\xf8\x0e\x1f]\xf7\x10\xdb\xfe\xe4\x1d\xc6\x92\x7f\xeeK_p\t\x8c\x9f5\xd0\xef)\xd8\x04\xbf\xc2N\x1c\xf0R\xdc\r\xb1Gf\xba\xd11#<\xaf^,s\x85\x10R\x99\xc2D\xee\n\"\xf9c\x15{\xc1[\xef\x06\x8a\xcd\x9d\xc8\x90#\xd0\xe7\xe3\xe0\xa9\xf3\xc0n\x1f\xd1\x11P\xe20\xcd\x1c\xfa\xfd\xa3\xcf\x9c\xc6\xb7]\x16\xc7\xd7\xb4/\x82\xd1\xae\xd9TM\x05a\xe5\xc5U\x91\xbe\x81\xac4\x9d\x02`\xe7\xa6q\x1f@\x1f\x1f?tm\x9c\xd1\x8c\xa1\xb5\xe0`H)\x97r\xc0?y\x9cc=c`A^\x9f\xcd\xbc\xf4m>I\xae\xdf\x946\xe7M`\xeb\x9fm\xbe+n\x00\x18k\x98\xab\xd5\xeet\"d\x81\x94\x04\xf5\xeb', 0x2, 0x0) write$cgroup_int(r4, 0x0, 0x0) 03:35:15 executing program 1: bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) 03:35:16 executing program 1: bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) 03:35:22 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x4, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x100000005, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x0) close(r0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000240)) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000280)='cpuset.mems\x00\r\xf2\xb42\xa8\xff[XO\xf1\xa9', 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) openat$cgroup_ro(r3, 0x0, 0x0, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000680)={0x7, 0x70, 0x9, 0x6, 0x0, 0xe5, 0x0, 0xb2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x67, 0x2, @perf_bp={0x0, 0x8}, 0x94, 0x6, 0x5, 0xd2ba530871f6b113, 0x7, 0x800, 0x6}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x6) perf_event_open$cgroup(&(0x7f0000000580)={0x0, 0x70, 0x3f, 0x0, 0x9, 0xd, 0x0, 0x40, 0x8000, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x211c, 0x2, @perf_bp={&(0x7f0000000540)}, 0x80, 0x7, 0x0, 0x61ae32ed045b1a83, 0x7, 0x0, 0x2}, 0xffffffffffffffff, 0x7, r4, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x5, 0x2}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000200)={0xffffffffffffffff, r2}, 0x10) r5 = gettid() r6 = gettid() r7 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000700)=ANY=[@ANYBLOB="850000000f00000025000000000000009500000000000000c7945faaaca77df7b091c97554bb677c101e46008000000000075900001943449fc1dcf86e0008d70000000000b1b5af027400005822e8f98b2b4077445b2fef3efdd4547d08d3f4215a73e8d9ffcd60ac4807eafef8a0e0a79ec8a27ce46fb7c53db16b29aa6d36090007b9cf2a89a797cd5c578f0000000000000000000000000000009a46226d42d6da7b032d2b33417030fe3f705d4a48a7109b437d69489124fa8db55fa65e9b81450d8403155556c5939e9b3629b700f2fdabcfe011dcda5cf6b5368578248a36982ec9382048306e2b962a84c831d0ce130c7332"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r6, r7, 0x0, 0x0, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0xa, &(0x7f0000000800)=ANY=[@ANYBLOB="850000000f100000250000da1d07664cefec700c0000000100945faaaca77d7fb091087554bb677c101e46008000000000075900001943449fc1dcf86e0008d70000000000b1b5af027400005822e8f98b2b4065d2534773335b100ed4898841c44ae1c8330169040d013d849567ae1fba157214f717ece8d14ac7d63312fe06a56d389735e9586134262e1412198d4f1bedc4db4b5d4936231fb75de8a26d7b9d608d92092155027125a9e76b559169aaf885a4b0cc18d6752841ac"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r5, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf78c, 0x4, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7b, 0x0, @perf_bp={&(0x7f0000000300), 0x1}, 0x80, 0xac8, 0x80000001, 0x0, 0x5, 0x7f, 0xa82}, r5, 0x7, 0xffffffffffffffff, 0x4) 03:35:22 executing program 1: bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}]}, 0x5) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) 03:35:22 executing program 1: bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}]}, 0x5) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) 03:35:22 executing program 1: bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}]}, 0x5) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) 03:35:22 executing program 1: bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x0, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) 03:35:37 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_type(r0, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000380)='cpuset.mems\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x30863, 0x0) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0xfffffc61) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000240)={'hwsim0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f00000000c0)={'hwsim0\x00', @random="0894f53e01dc"}) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)={0xffff, 0x5}, 0xc) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup\x00\f\x7f\xd9\xfa;\x8b\x88gb\xefi\x16\x91\xbb\xc4\xd5Jk\tU~ \xa4\vR\\\x8a\xdb\xcel\xe0\xa3[\xae\x9d\xac\x84\x9f\v\x9e\x9f\r\x10\x1f\xd3\x80\xc1\xccq\xab\x01y\xed\xfc\x96)\xf6_>+\xa03\xf4\xcc0\xbbE\xb0\xc3\x94\xd53\x87\xd6\xc4\\\xc7\x82\xe9\xaf\xb5\xb6\x15\xf4K2\x17\f\x98\x1c\xebq/\xf5\x81#\x85\xc5\xa0\xfd\xfac\xd9\xf2c`\xe9[c\a\x12\x1bb\x82\x83\x86d\xf0k\xa8\x90\x06\xa8\x1cK\xea\x19\x91\a1z)\xde_r`\xee\xb6\x9e\xcb\x05\x00\x00\x82\xa1\t\xc9\x05\xcc^', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000200)='memory.high\x00\x90\x80\xa4\x96\xbb\xe4\xb2\xa2\x01\xc0\xb8*Z\xef\xf8\x0e\x1f]\xf7\x10\xdb\xfe\xe4\x1d\xc6\x92\x7f\xeeK_p\t\x8c\x9f5\xd0\xef)\xd8\x04\xbf\xc2N\x1c\xf0R\xdc\r\xb1Gf\xba\xd11#<\xaf^,s\x85\x10R\x99\xc2D\xee\n\"\xf9c\x15{\xc1[\xef\x06\x8a\xcd\x9d\xc8\x90#\xd0\xe7\xe3\xe0\xa9\xf3\xc0n\x1f\xd1\x11P\xe20\xcd\x1c\xfa\xfd\xa3\xcf\x9c\xc6\xb7]\x16\xc7\xd7\xb4/\x82\xd1\xae\xd9TM\x05a\xe5\xc5U\x91\xbe\x81\xac4\x9d\x02`\xe7\xa6q\x1f@\x1f\x1f?tm\x9c\xd1\x8c\xa1\xb5\xe0`H)\x97r\xc0?y\x9cc=c`A^\x9f\xcd\xbc\xf4m>I\xae\xdf\x946\xe7M`\xeb\x9fm\xbe+n\x00\x18k\x98\xab\xd5\xeet\"d\x81\x94\x04\xf5\xeb', 0x2, 0x0) write$cgroup_int(r4, 0x0, 0x0) 03:35:37 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_type(r0, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000380)='cpuset.mems\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x30863, 0x0) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0xfffffc61) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000240)={'hwsim0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f00000000c0)={'hwsim0\x00', @random="0894f53e01dc"}) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)={0xffff, 0x5}, 0xc) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup\x00\f\x7f\xd9\xfa;\x8b\x88gb\xefi\x16\x91\xbb\xc4\xd5Jk\tU~ \xa4\vR\\\x8a\xdb\xcel\xe0\xa3[\xae\x9d\xac\x84\x9f\v\x9e\x9f\r\x10\x1f\xd3\x80\xc1\xccq\xab\x01y\xed\xfc\x96)\xf6_>+\xa03\xf4\xcc0\xbbE\xb0\xc3\x94\xd53\x87\xd6\xc4\\\xc7\x82\xe9\xaf\xb5\xb6\x15\xf4K2\x17\f\x98\x1c\xebq/\xf5\x81#\x85\xc5\xa0\xfd\xfac\xd9\xf2c`\xe9[c\a\x12\x1bb\x82\x83\x86d\xf0k\xa8\x90\x06\xa8\x1cK\xea\x19\x91\a1z)\xde_r`\xee\xb6\x9e\xcb\x05\x00\x00\x82\xa1\t\xc9\x05\xcc^', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000200)='memory.high\x00\x90\x80\xa4\x96\xbb\xe4\xb2\xa2\x01\xc0\xb8*Z\xef\xf8\x0e\x1f]\xf7\x10\xdb\xfe\xe4\x1d\xc6\x92\x7f\xeeK_p\t\x8c\x9f5\xd0\xef)\xd8\x04\xbf\xc2N\x1c\xf0R\xdc\r\xb1Gf\xba\xd11#<\xaf^,s\x85\x10R\x99\xc2D\xee\n\"\xf9c\x15{\xc1[\xef\x06\x8a\xcd\x9d\xc8\x90#\xd0\xe7\xe3\xe0\xa9\xf3\xc0n\x1f\xd1\x11P\xe20\xcd\x1c\xfa\xfd\xa3\xcf\x9c\xc6\xb7]\x16\xc7\xd7\xb4/\x82\xd1\xae\xd9TM\x05a\xe5\xc5U\x91\xbe\x81\xac4\x9d\x02`\xe7\xa6q\x1f@\x1f\x1f?tm\x9c\xd1\x8c\xa1\xb5\xe0`H)\x97r\xc0?y\x9cc=c`A^\x9f\xcd\xbc\xf4m>I\xae\xdf\x946\xe7M`\xeb\x9fm\xbe+n\x00\x18k\x98\xab\xd5\xeet\"d\x81\x94\x04\xf5\xeb', 0x2, 0x0) write$cgroup_int(r4, 0x0, 0x0) 03:35:37 executing program 2: write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'pids'}]}, 0xb) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000000)="24000000140081563e060804000f000010ff0100000060003f03546fabca1b4e7906a6bd", 0x24}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xc0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=0x401, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x4, 0x1}, 0x0, 0x0, &(0x7f0000000140)={0x1, 0xc, 0x8a}, &(0x7f0000000200)=0x4, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x400}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380)={r1}, 0xc) recvmsg(0xffffffffffffffff, 0x0, 0x0) 03:35:37 executing program 1: bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x0, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) 03:35:37 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000300)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000240)={'eql\x00', 0x400}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x7) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(r0, &(0x7f0000000540)='cpuset.effective_cpus\x00', 0x0, 0x0) recvmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{0x0}, {&(0x7f0000000240)=""/245, 0xf5}, {&(0x7f0000000340)=""/224, 0xe0}], 0x3}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x9, 0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000018000000000000005000000d944", @ANYRES32=r0, @ANYBLOB='\x00'/11], &(0x7f0000000140)='syzkaller\x00', 0x3, 0x1d, &(0x7f0000000200)=""/29, 0x41000, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x5, 0x9663, 0x504}, 0x10}, 0x78) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) sendmsg$kcm(r2, &(0x7f0000001800)={&(0x7f0000000440)=@nl=@kern={0x10, 0x0, 0x0, 0x40000000}, 0x80, &(0x7f00000017c0)=[{&(0x7f00000004c0)="ee6a", 0x2}, {&(0x7f0000000700)="940d331e57dbbba751d1c59184753fac62c18c03b647d2eb6e6f3673d8dc3d0e90a915c67c7c04faa1a3f24f5fb2646086c888e8867efbfd0cba0f7ca2d1614db884fde65da51406bf20e550c8f7c3f14558a2da131bab873dac0707adb0ea998a2ed432bbb65b3c8bf9f1b256d29752bbb042f8d38d86ad0a217967d280a3ada35ac85144090b6aeb06286192d49bbb59495836819214864e05739780b538126e286612cc5d906d68f05e93c9ecea565b", 0xb1}, {&(0x7f00000007c0)="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", 0x1000}], 0x3}, 0xc801) close(r1) close(r2) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x5460, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(r1, &(0x7f0000000140)={0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0x6f}, 0x0) close(r1) close(r3) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) 03:35:37 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci={0x1f, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0xb, 0x6, 0x9, 0x4, 0x401, r2, 0x5, [], r3, r4, 0x5}, 0x3c) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r2) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e000000130081c5e4050cecdb4cb9040a485e431c00000000ffffffe08ef9000600b0ebb06ac40006001400e04e", 0x2e}], 0x1, 0x0, 0x0, 0xe00}, 0x0) 03:35:37 executing program 1: bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x0, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) 03:35:37 executing program 1: bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2b, 'io'}]}, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) 03:35:37 executing program 1: bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2b, 'io'}]}, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) 03:35:37 executing program 1: bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2b, 'io'}]}, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) 03:35:38 executing program 1: bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x0, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) 03:35:38 executing program 1: bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x0, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) 03:35:58 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_type(r0, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000380)='cpuset.mems\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x30863, 0x0) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0xfffffc61) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000240)={'hwsim0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f00000000c0)={'hwsim0\x00', @random="0894f53e01dc"}) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)={0xffff, 0x5}, 0xc) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup\x00\f\x7f\xd9\xfa;\x8b\x88gb\xefi\x16\x91\xbb\xc4\xd5Jk\tU~ \xa4\vR\\\x8a\xdb\xcel\xe0\xa3[\xae\x9d\xac\x84\x9f\v\x9e\x9f\r\x10\x1f\xd3\x80\xc1\xccq\xab\x01y\xed\xfc\x96)\xf6_>+\xa03\xf4\xcc0\xbbE\xb0\xc3\x94\xd53\x87\xd6\xc4\\\xc7\x82\xe9\xaf\xb5\xb6\x15\xf4K2\x17\f\x98\x1c\xebq/\xf5\x81#\x85\xc5\xa0\xfd\xfac\xd9\xf2c`\xe9[c\a\x12\x1bb\x82\x83\x86d\xf0k\xa8\x90\x06\xa8\x1cK\xea\x19\x91\a1z)\xde_r`\xee\xb6\x9e\xcb\x05\x00\x00\x82\xa1\t\xc9\x05\xcc^', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000200)='memory.high\x00\x90\x80\xa4\x96\xbb\xe4\xb2\xa2\x01\xc0\xb8*Z\xef\xf8\x0e\x1f]\xf7\x10\xdb\xfe\xe4\x1d\xc6\x92\x7f\xeeK_p\t\x8c\x9f5\xd0\xef)\xd8\x04\xbf\xc2N\x1c\xf0R\xdc\r\xb1Gf\xba\xd11#<\xaf^,s\x85\x10R\x99\xc2D\xee\n\"\xf9c\x15{\xc1[\xef\x06\x8a\xcd\x9d\xc8\x90#\xd0\xe7\xe3\xe0\xa9\xf3\xc0n\x1f\xd1\x11P\xe20\xcd\x1c\xfa\xfd\xa3\xcf\x9c\xc6\xb7]\x16\xc7\xd7\xb4/\x82\xd1\xae\xd9TM\x05a\xe5\xc5U\x91\xbe\x81\xac4\x9d\x02`\xe7\xa6q\x1f@\x1f\x1f?tm\x9c\xd1\x8c\xa1\xb5\xe0`H)\x97r\xc0?y\x9cc=c`A^\x9f\xcd\xbc\xf4m>I\xae\xdf\x946\xe7M`\xeb\x9fm\xbe+n\x00\x18k\x98\xab\xd5\xeet\"d\x81\x94\x04\xf5\xeb', 0x2, 0x0) write$cgroup_int(r4, 0x0, 0x0) 03:35:58 executing program 1: bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x0, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) 03:35:58 executing program 5: r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000001580)={&(0x7f0000000000)=@pppoe={0x18, 0x0, {0x4, @remote, 'bridge_slave_0\x00'}}, 0x80, &(0x7f0000001440)=[{&(0x7f0000000080)="a2735fdeb59b969aac7db4356a4adfecbf4e7e7465e5c95de3275523f7bbb1ff7974f65f86303c69b0255c0f5756eafbca91febece149c8c118165d276e87b5f2d192c0cc4", 0x45}, {&(0x7f0000000100)="57c92edbaf6e421a279c83b23cde0d225d7088255b4d64157d63c9dda7784e79272771fb972692ed017e8e76c52a19d9c997e35a11eb2ed91216e2f55b165d3696268ddb9706b80c7edde8c995a519d97a495c08bb3a941dfc3c55a6706875aaf7b1e81717a9ebc67258b0b299f7f4fca1a36ea093a4bbac6a5acc16e0820a70676d5f167482341182322ca7051e8faa6acda9bf3eb488304028fa48e385d3f1c88ad0850b019904cd2e723dc44cf84992f70f5e9bfcee73e382b14c95dc74", 0xbf}, {&(0x7f00000002c0)="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", 0x1000}, {&(0x7f00000001c0)="c3992cca3a9551671f68ad107e934f97cd55ea810601ff31eb7175b1011878e7f964d22c88d8bb488ba309f0da54c3f26cb40e6691f1dc7b78200b0886316fa3facb10e8f22f749cc74da19b8f99ab8031d13675356fdf17eff429a98d9d5cae0a7e6ee6fa91f8b6cffdadb15f8ace9de481e0d668a12eedb69a068e7b7b04dd119efc", 0x83}, {&(0x7f00000012c0)="e2c805f63937773b7b35d5ec7efd05991006ff6a35f45c305e74d6adf40794b6d1a61f4b9cdd44371f51b688c9d8106799df6ff379f0537f1b3b762548bcd431ca545dee638be7a8193955ee7f7307b03f9f22c3df535875", 0x58}, {&(0x7f0000001340)="9f0bebe2264fc607ef5496ead95567513233b5e5a6ba7a57f6ab6d3f980df972b21591286eb9aebd0fcbc1da6f5a8d76f2b855d0e3a7f48c7e3a21b5c9ede1", 0x3f}, {&(0x7f0000001380)="6a17a5d71e199bc21244d8337339ab2fcf31cea41bfb222c0bea961073451642de794e05f737e3b4cd184df1dc5b5f884f58496f3f81423fca6193f3877cc97a2897dca4a9b3833e8b1928d717948cb90229786f19a2cbaf08b1c6cbac3ebb9f38e3e37365612706a71f4258c8db149949c2cfff90f0b28e14fbba2254b052d2493ddef5", 0x84}], 0x7, &(0x7f00000014c0)=[{0xb8, 0x3a, 0x4, "2b6fb58941b2b53a8c28cb0058b681a6cd291ded349f944e9a1be08ec54c97f5c0cb1624196977a79611aa5c7fc404017219cf5c9e9e8087677e863139c804f52094c755016b4b5b0032722cdddeba8609704add12fedd83d29c0a1cfb68dafdcf4156dbd78e46eb1dd5b3dfb8afc120da192170d2e8e346d9f2f7a9f48e484ceca7b5a8683df121bfb5f5361cd861b7705766e51f1967a920a32290b3e318b9b60bd0"}], 0xb8}, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x10, &(0x7f0000000280), 0x272) 03:35:58 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_type(r0, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000380)='cpuset.mems\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x30863, 0x0) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0xfffffc61) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000240)={'hwsim0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f00000000c0)={'hwsim0\x00', @random="0894f53e01dc"}) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)={0xffff, 0x5}, 0xc) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup\x00\f\x7f\xd9\xfa;\x8b\x88gb\xefi\x16\x91\xbb\xc4\xd5Jk\tU~ \xa4\vR\\\x8a\xdb\xcel\xe0\xa3[\xae\x9d\xac\x84\x9f\v\x9e\x9f\r\x10\x1f\xd3\x80\xc1\xccq\xab\x01y\xed\xfc\x96)\xf6_>+\xa03\xf4\xcc0\xbbE\xb0\xc3\x94\xd53\x87\xd6\xc4\\\xc7\x82\xe9\xaf\xb5\xb6\x15\xf4K2\x17\f\x98\x1c\xebq/\xf5\x81#\x85\xc5\xa0\xfd\xfac\xd9\xf2c`\xe9[c\a\x12\x1bb\x82\x83\x86d\xf0k\xa8\x90\x06\xa8\x1cK\xea\x19\x91\a1z)\xde_r`\xee\xb6\x9e\xcb\x05\x00\x00\x82\xa1\t\xc9\x05\xcc^', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000200)='memory.high\x00\x90\x80\xa4\x96\xbb\xe4\xb2\xa2\x01\xc0\xb8*Z\xef\xf8\x0e\x1f]\xf7\x10\xdb\xfe\xe4\x1d\xc6\x92\x7f\xeeK_p\t\x8c\x9f5\xd0\xef)\xd8\x04\xbf\xc2N\x1c\xf0R\xdc\r\xb1Gf\xba\xd11#<\xaf^,s\x85\x10R\x99\xc2D\xee\n\"\xf9c\x15{\xc1[\xef\x06\x8a\xcd\x9d\xc8\x90#\xd0\xe7\xe3\xe0\xa9\xf3\xc0n\x1f\xd1\x11P\xe20\xcd\x1c\xfa\xfd\xa3\xcf\x9c\xc6\xb7]\x16\xc7\xd7\xb4/\x82\xd1\xae\xd9TM\x05a\xe5\xc5U\x91\xbe\x81\xac4\x9d\x02`\xe7\xa6q\x1f@\x1f\x1f?tm\x9c\xd1\x8c\xa1\xb5\xe0`H)\x97r\xc0?y\x9cc=c`A^\x9f\xcd\xbc\xf4m>I\xae\xdf\x946\xe7M`\xeb\x9fm\xbe+n\x00\x18k\x98\xab\xd5\xeet\"d\x81\x94\x04\xf5\xeb', 0x2, 0x0) write$cgroup_int(r4, 0x0, 0x0) 03:35:58 executing program 2: close(0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0xfe, 0xfe, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x80}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000000000000000950000000000"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000000280)={0xffffffffffffffff, 0x0, 0x0}, 0x20) 03:35:58 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x71, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='cpuset.sched_load_balance\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000300)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000240)={'eql\x00', 0x400}) socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x7) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0xfffffffffffffea5) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) close(r0) close(r1) close(0xffffffffffffffff) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x5460, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001e00)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0x6f}, 0x0) close(r0) close(r2) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) 03:35:59 executing program 1: bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40086602, 0x400007) write$cgroup_subtree(r6, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, 0x0, 0x0) 03:35:59 executing program 1: bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40086602, 0x400007) write$cgroup_subtree(r6, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, 0x0, 0x0) 03:35:59 executing program 1: bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40086602, 0x400007) write$cgroup_subtree(r6, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, 0x0, 0x0) 03:35:59 executing program 1: bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) 03:35:59 executing program 1: bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) 03:36:00 executing program 1: bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) 03:36:18 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_type(r0, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000380)='cpuset.mems\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x30863, 0x0) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0xfffffc61) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000240)={'hwsim0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f00000000c0)={'hwsim0\x00', @random="0894f53e01dc"}) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)={0xffff, 0x5}, 0xc) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup\x00\f\x7f\xd9\xfa;\x8b\x88gb\xefi\x16\x91\xbb\xc4\xd5Jk\tU~ \xa4\vR\\\x8a\xdb\xcel\xe0\xa3[\xae\x9d\xac\x84\x9f\v\x9e\x9f\r\x10\x1f\xd3\x80\xc1\xccq\xab\x01y\xed\xfc\x96)\xf6_>+\xa03\xf4\xcc0\xbbE\xb0\xc3\x94\xd53\x87\xd6\xc4\\\xc7\x82\xe9\xaf\xb5\xb6\x15\xf4K2\x17\f\x98\x1c\xebq/\xf5\x81#\x85\xc5\xa0\xfd\xfac\xd9\xf2c`\xe9[c\a\x12\x1bb\x82\x83\x86d\xf0k\xa8\x90\x06\xa8\x1cK\xea\x19\x91\a1z)\xde_r`\xee\xb6\x9e\xcb\x05\x00\x00\x82\xa1\t\xc9\x05\xcc^', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000200)='memory.high\x00\x90\x80\xa4\x96\xbb\xe4\xb2\xa2\x01\xc0\xb8*Z\xef\xf8\x0e\x1f]\xf7\x10\xdb\xfe\xe4\x1d\xc6\x92\x7f\xeeK_p\t\x8c\x9f5\xd0\xef)\xd8\x04\xbf\xc2N\x1c\xf0R\xdc\r\xb1Gf\xba\xd11#<\xaf^,s\x85\x10R\x99\xc2D\xee\n\"\xf9c\x15{\xc1[\xef\x06\x8a\xcd\x9d\xc8\x90#\xd0\xe7\xe3\xe0\xa9\xf3\xc0n\x1f\xd1\x11P\xe20\xcd\x1c\xfa\xfd\xa3\xcf\x9c\xc6\xb7]\x16\xc7\xd7\xb4/\x82\xd1\xae\xd9TM\x05a\xe5\xc5U\x91\xbe\x81\xac4\x9d\x02`\xe7\xa6q\x1f@\x1f\x1f?tm\x9c\xd1\x8c\xa1\xb5\xe0`H)\x97r\xc0?y\x9cc=c`A^\x9f\xcd\xbc\xf4m>I\xae\xdf\x946\xe7M`\xeb\x9fm\xbe+n\x00\x18k\x98\xab\xd5\xeet\"d\x81\x94\x04\xf5\xeb', 0x2, 0x0) write$cgroup_int(r4, 0x0, 0x0) 03:36:18 executing program 1: bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x0, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) 03:36:18 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_type(r0, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000380)='cpuset.mems\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x30863, 0x0) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0xfffffc61) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000240)={'hwsim0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f00000000c0)={'hwsim0\x00', @random="0894f53e01dc"}) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)={0xffff, 0x5}, 0xc) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup\x00\f\x7f\xd9\xfa;\x8b\x88gb\xefi\x16\x91\xbb\xc4\xd5Jk\tU~ \xa4\vR\\\x8a\xdb\xcel\xe0\xa3[\xae\x9d\xac\x84\x9f\v\x9e\x9f\r\x10\x1f\xd3\x80\xc1\xccq\xab\x01y\xed\xfc\x96)\xf6_>+\xa03\xf4\xcc0\xbbE\xb0\xc3\x94\xd53\x87\xd6\xc4\\\xc7\x82\xe9\xaf\xb5\xb6\x15\xf4K2\x17\f\x98\x1c\xebq/\xf5\x81#\x85\xc5\xa0\xfd\xfac\xd9\xf2c`\xe9[c\a\x12\x1bb\x82\x83\x86d\xf0k\xa8\x90\x06\xa8\x1cK\xea\x19\x91\a1z)\xde_r`\xee\xb6\x9e\xcb\x05\x00\x00\x82\xa1\t\xc9\x05\xcc^', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000200)='memory.high\x00\x90\x80\xa4\x96\xbb\xe4\xb2\xa2\x01\xc0\xb8*Z\xef\xf8\x0e\x1f]\xf7\x10\xdb\xfe\xe4\x1d\xc6\x92\x7f\xeeK_p\t\x8c\x9f5\xd0\xef)\xd8\x04\xbf\xc2N\x1c\xf0R\xdc\r\xb1Gf\xba\xd11#<\xaf^,s\x85\x10R\x99\xc2D\xee\n\"\xf9c\x15{\xc1[\xef\x06\x8a\xcd\x9d\xc8\x90#\xd0\xe7\xe3\xe0\xa9\xf3\xc0n\x1f\xd1\x11P\xe20\xcd\x1c\xfa\xfd\xa3\xcf\x9c\xc6\xb7]\x16\xc7\xd7\xb4/\x82\xd1\xae\xd9TM\x05a\xe5\xc5U\x91\xbe\x81\xac4\x9d\x02`\xe7\xa6q\x1f@\x1f\x1f?tm\x9c\xd1\x8c\xa1\xb5\xe0`H)\x97r\xc0?y\x9cc=c`A^\x9f\xcd\xbc\xf4m>I\xae\xdf\x946\xe7M`\xeb\x9fm\xbe+n\x00\x18k\x98\xab\xd5\xeet\"d\x81\x94\x04\xf5\xeb', 0x2, 0x0) write$cgroup_int(r4, 0x0, 0x0) 03:36:18 executing program 5: r0 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x2, 0x0, 0x5, 0x0, 0x0, 0x400, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x4, 0xf95, 0x0, 0xffff}, r0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000400), 0x5}, 0x244a0, 0x0, 0x200, 0x0, 0x0, 0x6}, r0, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x8000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x0, 0x11) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x5, 0x0, 0x0, 0x400, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x44, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x120, 0x0, 0x0, 0x4, 0xf95, 0x0, 0xffff}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci={0x1f, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)=ANY=[@ANYBLOB='-cpu +io '], 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0xb, 0x6, 0x9, 0x4, 0x401, r2, 0x5, [], r3, r4, 0x5}, 0x3c) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={r1, r2, 0x0, 0x4, &(0x7f00000000c0)='&@[\x00'}, 0x30) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci={0x1f, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r8, 0x40086602, 0x400007) write$cgroup_subtree(r8, &(0x7f00000004c0)=ANY=[@ANYBLOB], 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0xb, 0x6, 0x9, 0x4, 0x401, r6, 0x5, [], r7, r8, 0x5}, 0x3c) perf_event_open(&(0x7f0000000340)={0x3, 0x70, 0x5, 0x0, 0x3, 0x3, 0x0, 0x1, 0x80, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x4, @perf_bp={&(0x7f0000000040), 0x5}, 0x18004, 0x0, 0x0, 0x2, 0x8, 0x10001, 0x1000}, r5, 0xa, r8, 0xa) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) socket$kcm(0x29, 0x1, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x10000) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x8) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000100)=@ethernet={0x1, @random="06e5596b0f8a"}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000280)="aa1e9dc48a1f3f5b6f2fa5794a6e81b59756da7aabbe771e06f77f6f4336dae92d2a0d464bf4534439450877ddae1aeffdf19bea9622b2def3777963059704dd40aa6eb88231f4fa7a75b2bd522f6a720497489095fa5c73cd46e7f3d4a3762564e986b3488a4d29d254be04ce4fc186bdde0bfe1140c0da998156fc79dda33e7b716979f3b809366ddc4a3f5976328887a1a7adf4621d0f8f66ed44cddb3b1e18a8", 0xe3}, {0x0}, {&(0x7f0000000400)}, {&(0x7f0000000500)="157ff14cc109adbda2b036bff40a92349081e4e24dbeba58a0918a94f36c4f0e9129f2d9a24c48b01e71ed9f58fcc2e090ddd70a4a03fe105d6912d9e20242e9312a3c7b38aee7a368e5a8d45aa3b3ce3907c90089ae80aedc6aa18d3f9a09339040b3b719621eee44fc97e6d2df648e800f47c57596d5abfcccafac6a80759d389c988dfd84853258a6c703c20d5d75f9", 0x91}, {0x0}, {0x0, 0x3b2}, {&(0x7f00000006c0)="4c85b7051fb3a5a656425b22897fcb31386eb5a9b5ef3868d1ae2bdce2b5b28e28257bbab728f765c82b3749b0054f92fffbe42a4080df451dc4a1dcf92e25d1c688925322848bc4995b9479749e82cbaa920de35418ebf03b362c106ca2c253195e1d72623fdeaad9fbf1", 0x6b}], 0x1000000000000129}, 0x20008040) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) r9 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r9) socket$kcm(0xa, 0x8000000001, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x89a0, &(0x7f0000000000)='&@[\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x89a1, &(0x7f0000000680)='&@[\x00') write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) 03:36:18 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x98b0142a5b0a83f7, &(0x7f0000000080), 0x1, 0x0, 0x0, 0x10}, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) gettid() write$cgroup_int(r2, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci={0x1f, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x10, 0x6, 0x8, 0x6, 0x401, r2, 0x9, [], r3, r4, 0x3}, 0xfffffffffffffc53) ioctl$TUNSETVNETBE(r4, 0x400454de, &(0x7f0000000100)=0x1) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x3b, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e0000002e00815be00f80ecdb4cb904044865160b000f0010000000000004140e000a001500cd5edc2976d153b4", 0x235}], 0x1}, 0x0) 03:36:18 executing program 1: bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x0, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) 03:36:18 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(r0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x12}) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0xc0185879, 0x20000000) write$cgroup_int(r4, &(0x7f0000000080), 0xfffffec7) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci={0x1f, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0xb, 0x6, 0x9, 0x4, 0x401, r5, 0x5, [], r6, r7, 0x5}, 0x3c) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci={0x1f, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r10, 0x40086602, 0x400007) write$cgroup_subtree(r10, &(0x7f0000000180)=ANY=[@ANYBLOB="6d630375202b696f20"], 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0xb, 0x6, 0x9, 0x4, 0x401, r8, 0x5, [], r9, r10, 0x5}, 0x3c) openat$cgroup(r1, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r11 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='cpuset.effective_cpus\x00', 0x0, 0x0) close(r3) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r12 = socket$kcm(0x2, 0x2000000000003, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8916, &(0x7f0000000200)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\x02\x00UM\xbf\xef\xa9\xac\x03x\xf4D3A}?\x00\x8b\x9c[\xdd\x14\xa4\n\xf4\x94\xa8>\xb1\xb1\xa2_&') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) r13 = gettid() bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={r11, 0x0, 0x0, 0x7f, 0x0}, 0x20) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={r13, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000280)='./cgroup/syz0\x00'}, 0x30) r14 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r14, 0x161) r15 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r15, 0xc0c0583b, 0x20000001) r16 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x10, 0x7, &(0x7f0000000700)=ANY=[@ANYBLOB="85100000022ce77fc0a28a2093a14100000020655000000000001800000008000000000000001f000000950000000000000018000000a00e0000000000000300020071ff46fcec51be6e2e82d1c20170e587a970be49cf02500911102f60781d05e028740a31a71ecfe913dafacc90df8b6f8486f35328af584d33d554f92e7bd2fa0224758cb8dd4896b6acd036a811925727a688a7a4db70ea56bb681c5a1e074f3e038cb51fff1cbc9f355dd5d94b1e0f531bf660689c7e7d00d4557c13ef11d7b65dc8959f6992e9e942990b87d71b62f6f5325c402d1614cae81f48794f911b17a33b4ac21b614e2670de933ad894a6caccaa388a452896dd39ba1a92c7afabd1c0870000000000"], &(0x7f0000000380)='syzkaller\x00', 0x3, 0x9c, &(0x7f00000003c0)=""/156, 0x41100, 0x8, [], 0x0, 0x17, r15, 0x8, &(0x7f00000004c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000580)={0x2, 0xe, 0x0, 0xa5a6}, 0x10, 0xffffffffffffffff}, 0x78) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000005c0)={r14, r16, 0xf, 0x1}, 0x10) close(r12) recvmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{0x0}, {&(0x7f0000000240)=""/245, 0xf5}], 0x2}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) close(r2) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f000000c280)={&(0x7f0000000000), 0x10, 0x0, 0x0, &(0x7f000000d480)=[@ip_tos_int={{0x14}}], 0x18}, 0x0) 03:36:19 executing program 1: bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x0, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) 03:36:19 executing program 1: bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x0, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) 03:36:19 executing program 1: bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x0, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) 03:36:19 executing program 1: bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x0, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) 03:36:19 executing program 1: bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x0, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) 03:36:31 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_type(r0, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000380)='cpuset.mems\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x30863, 0x0) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0xfffffc61) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000240)={'hwsim0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f00000000c0)={'hwsim0\x00', @random="0894f53e01dc"}) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)={0xffff, 0x5}, 0xc) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup\x00\f\x7f\xd9\xfa;\x8b\x88gb\xefi\x16\x91\xbb\xc4\xd5Jk\tU~ \xa4\vR\\\x8a\xdb\xcel\xe0\xa3[\xae\x9d\xac\x84\x9f\v\x9e\x9f\r\x10\x1f\xd3\x80\xc1\xccq\xab\x01y\xed\xfc\x96)\xf6_>+\xa03\xf4\xcc0\xbbE\xb0\xc3\x94\xd53\x87\xd6\xc4\\\xc7\x82\xe9\xaf\xb5\xb6\x15\xf4K2\x17\f\x98\x1c\xebq/\xf5\x81#\x85\xc5\xa0\xfd\xfac\xd9\xf2c`\xe9[c\a\x12\x1bb\x82\x83\x86d\xf0k\xa8\x90\x06\xa8\x1cK\xea\x19\x91\a1z)\xde_r`\xee\xb6\x9e\xcb\x05\x00\x00\x82\xa1\t\xc9\x05\xcc^', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000200)='memory.high\x00\x90\x80\xa4\x96\xbb\xe4\xb2\xa2\x01\xc0\xb8*Z\xef\xf8\x0e\x1f]\xf7\x10\xdb\xfe\xe4\x1d\xc6\x92\x7f\xeeK_p\t\x8c\x9f5\xd0\xef)\xd8\x04\xbf\xc2N\x1c\xf0R\xdc\r\xb1Gf\xba\xd11#<\xaf^,s\x85\x10R\x99\xc2D\xee\n\"\xf9c\x15{\xc1[\xef\x06\x8a\xcd\x9d\xc8\x90#\xd0\xe7\xe3\xe0\xa9\xf3\xc0n\x1f\xd1\x11P\xe20\xcd\x1c\xfa\xfd\xa3\xcf\x9c\xc6\xb7]\x16\xc7\xd7\xb4/\x82\xd1\xae\xd9TM\x05a\xe5\xc5U\x91\xbe\x81\xac4\x9d\x02`\xe7\xa6q\x1f@\x1f\x1f?tm\x9c\xd1\x8c\xa1\xb5\xe0`H)\x97r\xc0?y\x9cc=c`A^\x9f\xcd\xbc\xf4m>I\xae\xdf\x946\xe7M`\xeb\x9fm\xbe+n\x00\x18k\x98\xab\xd5\xeet\"d\x81\x94\x04\xf5\xeb', 0x2, 0x0) write$cgroup_int(r4, 0x0, 0x0) 03:36:31 executing program 1: bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x0, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) 03:36:31 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_type(r0, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000380)='cpuset.mems\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x30863, 0x0) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0xfffffc61) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000240)={'hwsim0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f00000000c0)={'hwsim0\x00', @random="0894f53e01dc"}) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)={0xffff, 0x5}, 0xc) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup\x00\f\x7f\xd9\xfa;\x8b\x88gb\xefi\x16\x91\xbb\xc4\xd5Jk\tU~ \xa4\vR\\\x8a\xdb\xcel\xe0\xa3[\xae\x9d\xac\x84\x9f\v\x9e\x9f\r\x10\x1f\xd3\x80\xc1\xccq\xab\x01y\xed\xfc\x96)\xf6_>+\xa03\xf4\xcc0\xbbE\xb0\xc3\x94\xd53\x87\xd6\xc4\\\xc7\x82\xe9\xaf\xb5\xb6\x15\xf4K2\x17\f\x98\x1c\xebq/\xf5\x81#\x85\xc5\xa0\xfd\xfac\xd9\xf2c`\xe9[c\a\x12\x1bb\x82\x83\x86d\xf0k\xa8\x90\x06\xa8\x1cK\xea\x19\x91\a1z)\xde_r`\xee\xb6\x9e\xcb\x05\x00\x00\x82\xa1\t\xc9\x05\xcc^', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000200)='memory.high\x00\x90\x80\xa4\x96\xbb\xe4\xb2\xa2\x01\xc0\xb8*Z\xef\xf8\x0e\x1f]\xf7\x10\xdb\xfe\xe4\x1d\xc6\x92\x7f\xeeK_p\t\x8c\x9f5\xd0\xef)\xd8\x04\xbf\xc2N\x1c\xf0R\xdc\r\xb1Gf\xba\xd11#<\xaf^,s\x85\x10R\x99\xc2D\xee\n\"\xf9c\x15{\xc1[\xef\x06\x8a\xcd\x9d\xc8\x90#\xd0\xe7\xe3\xe0\xa9\xf3\xc0n\x1f\xd1\x11P\xe20\xcd\x1c\xfa\xfd\xa3\xcf\x9c\xc6\xb7]\x16\xc7\xd7\xb4/\x82\xd1\xae\xd9TM\x05a\xe5\xc5U\x91\xbe\x81\xac4\x9d\x02`\xe7\xa6q\x1f@\x1f\x1f?tm\x9c\xd1\x8c\xa1\xb5\xe0`H)\x97r\xc0?y\x9cc=c`A^\x9f\xcd\xbc\xf4m>I\xae\xdf\x946\xe7M`\xeb\x9fm\xbe+n\x00\x18k\x98\xab\xd5\xeet\"d\x81\x94\x04\xf5\xeb', 0x2, 0x0) write$cgroup_int(r4, 0x0, 0x0) 03:36:31 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0xfffffffffffffd49) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0xc0185879, 0x20000000) write$cgroup_int(r1, &(0x7f0000000080), 0xfffffec7) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, 0xffffffffffffffff) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dRA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x88\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G\x8d;\xfa+\xa2%(}`\xc5L\xbb\xeb~}%\xddr\xbb\xe7\xf4|\xa7b\xeb\xd3\nW\x16\x10:\x0e%\x83\x01KfPXIu\xe5\x7f\x88q%\xaeLcx\x9b\xbc~,\xd1\x94g\xe3\xd8\xfefh\x82\xa0\xe5@', 0x2761, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xfffffffffffffcf6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa}, 0x0, 0x0, &(0x7f0000000800)={0x0, 0xfffffffc, 0x63}, &(0x7f0000000380)=0x7, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=0x10000}}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f000000c200)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000580)='\',^+$,system%proc\\/\x00') bpf$PROG_LOAD(0x5, &(0x7f000000c240)={0x0, 0xa, &(0x7f0000000340)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001}, [@map={0x18, 0x3}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xd2b}, @alu={0x7, 0x1, 0x1, 0x7, 0x9, 0x20, 0xffffffffffffffff}, @map={0x18, 0x3, 0x1, 0x0, r2}]}, 0x0, 0x6, 0x3e, &(0x7f0000000400)=""/62, 0x41100, 0x1, [], 0x0, 0x3, r3, 0x8, &(0x7f000000c180)={0x5, 0x5}, 0x8, 0x10, &(0x7f000000c1c0)={0x0, 0x0, 0x4, 0xe1}, 0x10, r4, r5}, 0x78) r6 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dRA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x88\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G\x8d;\xfa+\xa2%(}`\xc5L\xbb\xeb~}%\xddr\xbb\xe7\xf4|\xa7b\xeb\xd3\nW\x16\x10:\x0e%\x83\x01KfPXIu\xe5\x7f\x88q%\xaeLcx\x9b\xbc~,\xd1\x94g\xe3\xd8\xfefh\x82\xa0\xe5@', 0x2761, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, 0x0) r8 = openat$cgroup_subtree(r5, &(0x7f0000001b80)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r8, &(0x7f0000001bc0)={[{0x2d, 'cpu'}]}, 0x5) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0x3}, 0x0, 0x0, &(0x7f0000000800), &(0x7f0000000380)=0x7, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=0x10000}}, 0x10) r10 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f000000c200)='cpuacct.usage_all\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000c240)={0x0, 0xa, &(0x7f0000000340)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001}, [@map={0x18, 0x3}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xd2b}, @alu={0x7, 0x1, 0x1, 0x7, 0x9, 0x20, 0xffffffffffffffff}, @map={0x18, 0x3, 0x1, 0x0, r6}]}, 0x0, 0x6, 0x3e, &(0x7f0000000400)=""/62, 0x41100, 0x1, [], 0x0, 0x3, r7, 0x8, &(0x7f000000c180)={0x5, 0x5}, 0x8, 0x10, &(0x7f000000c1c0)={0x0, 0x0, 0x4, 0xe1}, 0x10, r9, r10}, 0x78) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x3896909557bc2b02, 0x5, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9773}, [@map={0x18, 0x0, 0x1, 0x0, r3}]}, &(0x7f0000000600)='GPL\x00', 0x7, 0xa3, &(0x7f0000000640)=""/163, 0x41100, 0x0, [], 0x0, 0xf, r3, 0x8, &(0x7f0000000700)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000740)={0x4, 0xa, 0x4, 0x1}, 0x10, r9}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001b40)={r11, 0x0, 0x6a, 0x6, &(0x7f0000000a40)="06928582daabddb0aebf231ba9c34fe1c7f7fa1996f8d548fd1ca64c9a17386760092532d04aa0bac1f22808caf4eecddd225c83439587b6a89a9a904ae39556ede240f15d541629959549fe92fce250e596e2ad1596ca87aed2749af41e0cf1c7941a362d985b78581d", &(0x7f0000000ac0)=""/6, 0x1f, 0x0, 0x2d, 0x1000, &(0x7f0000000b00)="d21016adc2a6627c60b64fb82120537191d06ea04fc82961fa01bdec78a50d5ce1635a34bbcc61f961ab9be117", &(0x7f0000000b40)="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"}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0xb, 0x6, &(0x7f0000000180)=@raw=[@exit, @alu={0x0, 0x0, 0x5, 0x1, 0xb, 0xffffffffffffffc0, 0x7ffffffffffffff8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x861}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5e9, 0x0, 0x0, 0x0, 0x400}], &(0x7f00000001c0)='syzkaller\x00', 0x7, 0x4b, &(0x7f0000000280)=""/75, 0x41100, 0x2, [], 0x0, 0x19, r1, 0x8, &(0x7f0000000300)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x1, 0x0, 0x5}, 0x10, r4}, 0x78) r12 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088471fffffff00004000632977fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0xff, 0x60000000, 0x0, 0xfffffffffffffe09, &(0x7f00000000c0)="602eecafebe9c4c84bf48e86b60dbe4a5826f24e743f1cfd2fdd8ed529da3d5aa0f92073ad2e3e874183cca13e7cdb77e6f62e3d9d32a98163af456f1bc316ed155420aecce828ce273947564827b9b323ec84b72a7bddf5273339515aae15bf50363babeae22ddbff0c0bed3c08c08bf4307e81419fe48c5c6cd1fb8797bd3073b9f79332aec04b1690e888998192731aa553e4a365c8858bbf979a678cd6580ff43144756e16bb4595e0217a86d0"}, 0xffffffffffffffd5) 03:36:31 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x255b1c7eca9328c3) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r1, &(0x7f0000000200)}, 0x20) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f00000002c0)=ANY=[@ANYBLOB="00ffffffff17588e62b0b91d9024095e105b72f593a254d796bd374f9a46c86ea33caf9b1bcac0a0bb95644872c54f713575b846d48c62d8e441b55605ef6856b181ae78a5808501e0745809c3cf7e12aa41f9b37a3e87a680cadff4a224ccda6ff62b26f28eeb5ec1d975489a6249327a9ad9649d936a3dc764d869cd05c399068bdf2fff386eeded840af810970922c4970256c4cc39c115a059f7b5e896"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0xc0c0583b, 0x20000001) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r3, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci={0x1f, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40086602, 0x400007) write$cgroup_subtree(r5, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0xb, 0x6, 0x9, 0x4, 0x401, r3, 0x5, [], r4, r5, 0x5}, 0x3c) sendmsg$kcm(r1, 0x0, 0x4004481) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYBLOB="a71026de462dfd4195a2962c7b568846afda82f4791a147852e5d449a8465896f9a37f7f82b0f8cde4b11a406406220df4b7daf973b114645a28dfedb8f9edfcd1ceaea038851b5a87322659c41485152102b90a43ceeedb3986e4476ae750c23671b4c691c986e161a440a5be443a665151650ab623ffd2c370a2044485a30fe95928f6ee5e2dc71b9464b5f8db9d96fbeb2119b1198d5b2cac1887b0ff18034e1d3b9873a2fe53"], 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000040), 0x4) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0xc0185879, 0x20000000) write$cgroup_int(r7, &(0x7f0000000080), 0xfffffec7) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci={0x1f, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r10, 0x40086602, 0x400007) write$cgroup_subtree(r10, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0xb, 0x6, 0x9, 0x4, 0x401, r8, 0x5, [], r9, r10, 0x5}, 0x3c) r11 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r11, 0xc0185879, 0x20000000) write$cgroup_int(r11, &(0x7f0000000080), 0xfffffec7) r12 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r12, 0xc0185879, 0x20000000) write$cgroup_int(r12, &(0x7f0000000080), 0xfffffec7) r13 = gettid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2000000000401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)={0x2, 0x2, 0x4, 0x5}, &(0x7f0000000380)=0x7, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=0x10000}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={r13, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='/dev/net/tun\x00', r14}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r14}, 0xc) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) openat$tun(0xffffffffffffff9c, 0x0, 0x100, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, 0x0) r15 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\xff\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/Z\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xc6\xa8\xffe\xb2\xcb\x17\x86\x96\xa2\xb8O2\xec\xe3#\x01\xf6\x9b\xf3vIh\x9ec\xa9T\xf9\xbe\r\x94\x92\xb3\xf7)\xc63u\x91n\"\n\xc0\xa72c\xb1\a\xfb\xdd\x96\x9f\x8d\xfd\xffO\x89\xe1A\xb3\xc4(\xd2m1L!z\x02X\x9a\xd3\neC[\xb7\x92\xc0\xa2\x9c\xb3\xc7\n\x972\x99\x11\x03.\xdd\xe7\xdc\rD2\v\xb9\x8b/\xe4\xe9\x99\xba\xbd\xff\xdb\x89>:\xb9\\\x15\xbc\xc9\x9am\xef\xdf\x1a\x8b\x9a\x84b\xa0\x19\xe4\x01\x9b', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000000)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000700)={r15, 0x0, 0x0, 0x54, &(0x7f00000002c0), &(0x7f0000000380)=""/84, 0x3, 0x0, 0x27, 0x0, &(0x7f0000000240)="5c9d09940eb31ea0a79d1496bc0b51fe82902ad957838c9846e8bf1e4ea41c1f7304cc93ec4a2e", 0x0}, 0x40) r16 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r16, 0x4030582a, &(0x7f0000000040)) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140)={0xffffffffffffffff, r16, 0x0, 0x2}, 0x10) r17 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) write$cgroup_type(r17, 0x0, 0x0) 03:36:32 executing program 1: bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x0, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) 03:36:36 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e000000100081759d2ea7ecdb4cb92e0a480515c5444b500e000d000000e8bd6efb250009000e000100400000ff0500050012014b292a39f11ec4c65093d224fe2aa0d29b8c2bca8384be022d124c97d0b7208fef4c3ada34f2bb77a8d0927d3588ebdc30ddaa86e23e86295170067541307cb3846cc8951216e9f62a8984a417a3396e055d", 0x86}], 0x1}, 0x0) 03:36:36 executing program 1: bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x0, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) 03:36:36 executing program 1: bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x0, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) 03:36:36 executing program 1: bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x0, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) 03:36:36 executing program 1: bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, 0xffffffffffffffff, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) 03:36:37 executing program 1: bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, 0xffffffffffffffff, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) 03:36:49 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_type(r0, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000380)='cpuset.mems\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x30863, 0x0) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0xfffffc61) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000240)={'hwsim0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f00000000c0)={'hwsim0\x00', @random="0894f53e01dc"}) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)={0xffff, 0x5}, 0xc) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup\x00\f\x7f\xd9\xfa;\x8b\x88gb\xefi\x16\x91\xbb\xc4\xd5Jk\tU~ \xa4\vR\\\x8a\xdb\xcel\xe0\xa3[\xae\x9d\xac\x84\x9f\v\x9e\x9f\r\x10\x1f\xd3\x80\xc1\xccq\xab\x01y\xed\xfc\x96)\xf6_>+\xa03\xf4\xcc0\xbbE\xb0\xc3\x94\xd53\x87\xd6\xc4\\\xc7\x82\xe9\xaf\xb5\xb6\x15\xf4K2\x17\f\x98\x1c\xebq/\xf5\x81#\x85\xc5\xa0\xfd\xfac\xd9\xf2c`\xe9[c\a\x12\x1bb\x82\x83\x86d\xf0k\xa8\x90\x06\xa8\x1cK\xea\x19\x91\a1z)\xde_r`\xee\xb6\x9e\xcb\x05\x00\x00\x82\xa1\t\xc9\x05\xcc^', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000200)='memory.high\x00\x90\x80\xa4\x96\xbb\xe4\xb2\xa2\x01\xc0\xb8*Z\xef\xf8\x0e\x1f]\xf7\x10\xdb\xfe\xe4\x1d\xc6\x92\x7f\xeeK_p\t\x8c\x9f5\xd0\xef)\xd8\x04\xbf\xc2N\x1c\xf0R\xdc\r\xb1Gf\xba\xd11#<\xaf^,s\x85\x10R\x99\xc2D\xee\n\"\xf9c\x15{\xc1[\xef\x06\x8a\xcd\x9d\xc8\x90#\xd0\xe7\xe3\xe0\xa9\xf3\xc0n\x1f\xd1\x11P\xe20\xcd\x1c\xfa\xfd\xa3\xcf\x9c\xc6\xb7]\x16\xc7\xd7\xb4/\x82\xd1\xae\xd9TM\x05a\xe5\xc5U\x91\xbe\x81\xac4\x9d\x02`\xe7\xa6q\x1f@\x1f\x1f?tm\x9c\xd1\x8c\xa1\xb5\xe0`H)\x97r\xc0?y\x9cc=c`A^\x9f\xcd\xbc\xf4m>I\xae\xdf\x946\xe7M`\xeb\x9fm\xbe+n\x00\x18k\x98\xab\xd5\xeet\"d\x81\x94\x04\xf5\xeb', 0x2, 0x0) write$cgroup_int(r4, 0x0, 0x0) 03:36:49 executing program 1: bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, 0xffffffffffffffff, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) 03:36:49 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_type(r0, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000380)='cpuset.mems\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x30863, 0x0) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0xfffffc61) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000240)={'hwsim0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f00000000c0)={'hwsim0\x00', @random="0894f53e01dc"}) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)={0xffff, 0x5}, 0xc) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup\x00\f\x7f\xd9\xfa;\x8b\x88gb\xefi\x16\x91\xbb\xc4\xd5Jk\tU~ \xa4\vR\\\x8a\xdb\xcel\xe0\xa3[\xae\x9d\xac\x84\x9f\v\x9e\x9f\r\x10\x1f\xd3\x80\xc1\xccq\xab\x01y\xed\xfc\x96)\xf6_>+\xa03\xf4\xcc0\xbbE\xb0\xc3\x94\xd53\x87\xd6\xc4\\\xc7\x82\xe9\xaf\xb5\xb6\x15\xf4K2\x17\f\x98\x1c\xebq/\xf5\x81#\x85\xc5\xa0\xfd\xfac\xd9\xf2c`\xe9[c\a\x12\x1bb\x82\x83\x86d\xf0k\xa8\x90\x06\xa8\x1cK\xea\x19\x91\a1z)\xde_r`\xee\xb6\x9e\xcb\x05\x00\x00\x82\xa1\t\xc9\x05\xcc^', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000200)='memory.high\x00\x90\x80\xa4\x96\xbb\xe4\xb2\xa2\x01\xc0\xb8*Z\xef\xf8\x0e\x1f]\xf7\x10\xdb\xfe\xe4\x1d\xc6\x92\x7f\xeeK_p\t\x8c\x9f5\xd0\xef)\xd8\x04\xbf\xc2N\x1c\xf0R\xdc\r\xb1Gf\xba\xd11#<\xaf^,s\x85\x10R\x99\xc2D\xee\n\"\xf9c\x15{\xc1[\xef\x06\x8a\xcd\x9d\xc8\x90#\xd0\xe7\xe3\xe0\xa9\xf3\xc0n\x1f\xd1\x11P\xe20\xcd\x1c\xfa\xfd\xa3\xcf\x9c\xc6\xb7]\x16\xc7\xd7\xb4/\x82\xd1\xae\xd9TM\x05a\xe5\xc5U\x91\xbe\x81\xac4\x9d\x02`\xe7\xa6q\x1f@\x1f\x1f?tm\x9c\xd1\x8c\xa1\xb5\xe0`H)\x97r\xc0?y\x9cc=c`A^\x9f\xcd\xbc\xf4m>I\xae\xdf\x946\xe7M`\xeb\x9fm\xbe+n\x00\x18k\x98\xab\xd5\xeet\"d\x81\x94\x04\xf5\xeb', 0x2, 0x0) write$cgroup_int(r4, 0x0, 0x0) 03:36:49 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) recvmsg(0xffffffffffffffff, &(0x7f000000a540)={&(0x7f0000008180)=@hci={0x1f, 0x0}, 0x80, &(0x7f000000a400)=[{&(0x7f0000008200)=""/4096, 0x1000}, {&(0x7f0000009200)=""/4096, 0xfffffdd3}, {&(0x7f000000a200)=""/207, 0xcf}, {&(0x7f000000a300)=""/193, 0xd0}], 0x4, &(0x7f000000a440)=""/239, 0xef}, 0x2) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="4c000000150081f87059ae08060c04000aff0f020000000000000187015467abca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a03000000461eb886a5e54e8ff5314461", 0x4c}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000002a00)={&(0x7f00000001c0)=@ethernet={0x6, @random="aab2ef52d6d9"}, 0xffffffffffffffa7, &(0x7f0000000280)=[{&(0x7f0000000540)="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", 0x1000}, {&(0x7f0000000240)="c4fdd065661cdd6ebdd9c23b1d456ca65b8b1fb1538066f8", 0x18}, {&(0x7f0000001540)="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", 0x1000}, {&(0x7f0000002540)="59b62415f77eecb31cf601d6bc1353a499ab291ce3bdbc49d12b4bade9794162c19bcfe1ff871c283a72cdfd9ba3ffd93705e2b540f9fd3e83fb011ad21d15ad5390c05aa9bee3a8afbd13e1c0354990783a13e0157a49bf358c55ef7216807732549eeb58e4472d018cbdae17402f6fb4ba53e4bd7fe5ac3cba171c83c45b61e8d6e287ed8670f20c4ac8beb9216f3ca8", 0x91}], 0x4, &(0x7f0000002600)=[{0x37, 0x6, 0x8, "01dfe47458a83c1b1758497bd7ba2a676331a7fd00ec3082e2808f715ea41063051af7cb209a83c5616954236105f90905d162e878501efce500981965c13ad6398b8617c0f6322d9c68a2a07c6d48439c0b168905d87a53ac6169a6e64674381f6a8f3b20cf12342284084692f0a8010804ea6b141ac7ac690f93af4e14706cc360d96a2a96625371ce8669cead9d86e0473073c18a7e7614f6f582bee554b172bb243594d4fba5970e1769b4fa458e835117154ba8afeccb32a26852645831a10e0a557303a162f95bdd7da608babbf799ff6fe1acc65b567e3dcd6fc48c6cbfaed6d591d3ccbd755f26ad5d6e1cd5f2a3d469"}, {0x68, 0x10e, 0x6, "f03bd56f2bce66028f492f76d0149b291144b0988a9cf9045d6e75378bc4093993eeb02092aacebfbf06004c35b82ffb7711de206e9b6c4a1f7fca4e007efde0815e30fc3638dc7fcd51052a3ff46ae97382155126f4"}, {0x58, 0x112, 0x9, "52b76a8b66976a5b89f5bdb139eccc540336cd4cc33f9b20b1c010caa931d8bdd5465a2911d7ef7c618656489d05722fcdf964e71421c975651851736e75900612126fcccce19e53"}, {0x110, 0x29, 0x44379861, "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"}, {0x68, 0x104, 0x6, "c600b56e3a299f3e6e960edbb3045ec856910cb100ac0b471c57f2ef90aa339777b8ae7b3b0cb0a5e4cad4ab322d323455d7c81762444f2cf659cf5747d87a13b0f01fbdda47692b488d867763d913620e220dbe0f839a5b"}, {0x10, 0x119, 0x1}, {0x48, 0x10c, 0x7fff, "e6e2a92ebfc9372bbb52cfd44dae3f23d944330dff8d397134396db95b49b404d9ea64bbf088b17646308033e8297ec7bd9dee20"}, {0x28, 0xe49d62c6d8a50516, 0x8001, "3f7466828e0dec96bf83fac7d22e323d1c48b21ee5cd1509"}, {0x20, 0x10b, 0x6, "540d0e7a8cc904b77d412b"}], 0x3e0}, 0x4001) sendmsg$kcm(r2, &(0x7f0000002ec0)={&(0x7f0000000400)=@sco={0x1f, {0x10, 0x0, 0x1, 0x2, 0x7f, 0x7}}, 0x80, &(0x7f0000002e80)=[{&(0x7f0000000480)="3e758bd33025edc43f852645ad5e01", 0xf}, {&(0x7f00000004c0)="220af7aadbf4b4d292a3dabd1c4403ac67bd2508055726df920d10015b1d4db4f93e72fa151e116ba06349f17cb13cc3757c4aa9fb98c18ab7812a918c1112ca2880d471ddeb5e", 0x47}, {&(0x7f0000002cc0)="0269e5d0e70d2024eb043e0bdb9db7adf430ed68187547265980ff11f146e1489ebd153f27f2d193ea7435e158293def6ced665c41c3afd6d3a0e3c0406a39dbb0f8fbb62510128aa19e777e16f836b79557a130dd3251d5f51c9cce1ba452077e75907b67b980f752c9e3c06a87acb979517e350a5545096c1b03c737c9d10a2baff244d3701a60e933a82e79b1f4baf3ea7d77b1d176b8cc0fe6d3ea2035dcbb7510e7d6511200381d56e574084f09ade4c5", 0xb3}, {&(0x7f0000002d80)="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", 0xfb}], 0x4}, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000140)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f000000a580)={0xc, 0x0, &(0x7f0000000400)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x4, 0xfffffffffffffe0d, &(0x7f0000000300)=""/235, 0x41100, 0x0, [], r1, 0x1f, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) recvmsg$kcm(r0, &(0x7f0000002c80)={&(0x7f0000002a40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000002b80)=[{&(0x7f0000002ac0)=""/37, 0x25}, {&(0x7f0000002b00)=""/32, 0x20}, {&(0x7f0000002b40)=""/36, 0x24}], 0x3, &(0x7f0000002bc0)=""/168, 0xa8}, 0x8006) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNSETLINK(r4, 0x400454cd, 0x10f) 03:36:53 executing program 1: bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x0, [], r5, r6, 0x1, 0x5}, 0x3c) 03:36:53 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x3, 0x2) recvmsg(r1, &(0x7f0000000280)={&(0x7f0000000200)=@rc, 0xfffffe34, 0x0, 0xffffffffffffffc4, &(0x7f0000000540)=""/54, 0xfffffffffffffea0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f00000000c0)) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) perf_event_open(&(0x7f0000000740)={0x2a801d16e5fb10d, 0x70, 0x0, 0xff, 0x0, 0x4, 0x0, 0x7, 0x2024, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x12}, 0x2, 0x84, 0x52, 0x4, 0x0, 0x942, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$sock(r0, &(0x7f00000006c0)={&(0x7f0000000480)=@caif=@dgm={0x25, 0x8}, 0x80, 0x0, 0x0, &(0x7f0000000640)=[@txtime={{0x18, 0x1, 0x3d, 0x1000}}, @txtime={{0x18}}, @mark={{0x14}}], 0x48}, 0x817) close(r3) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r5 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r5, &(0x7f0000000240)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @loopback={0x0, 0x7ffff000}}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000080)='r', 0x1}], 0x1}, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r6, &(0x7f00000002c0)=ANY=[@ANYBLOB="3900254d99b5282587d4ab1e98ef95ffe400001eec000000c90400000000000000438ac000"], 0xda00) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci={0x1f, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r10, 0x40086602, 0x400007) write$cgroup_subtree(r10, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0xb, 0x6, 0x9, 0x4, 0x401, r8, 0x5, [], r9, r10, 0x5}, 0x3c) sendmsg$kcm(r10, &(0x7f0000000840)={0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000340)="98d926c9257130c7fe3e195d0b8d26ace1c0a7e9db0589b4d0f9cb0030385fce7aad0abb4241dfff4bb600627782649fac05a16dacaddb1b5fe6c36e9cc27323158e9e9a7f52ded6e085841682403f7c618ec97c00e6868a6f8df4ff8713d4d92840df5b9e024295807391450e6db27329b691408f5616dfeb807c2a5632a5ce", 0x80}, {&(0x7f0000000d80)="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", 0x1000}, {&(0x7f00000003c0)="49e859567cdf054648f4fb97869ee416e1f31fc9e55fdbd5220214924538b0de349905f532784a22eb20d21356f3611b3f8e904d2b05348e768c14d60a802e52a761f370096b1b73c16ae4336b32a6d942e16a660c4daf1e2279f01591503032889a36db963c71527d3c0712f033ee66e87fb593fe0804571cdde12d2510dc0d8754dc5318600a6437e52a6df9a6e009fa9a313cc8acdbe15c1f63e7fa9cc3598f5331730d70374a76d0d2386d7a6cbde508", 0xb2}, {&(0x7f0000000580)="76c5fa19dc065de2fda5e02837332da2d83e87e14cab3c70c8a8cfd8286b4522f9b0690237d87d4ef6fcb681dfd70cd9d47c6f9efa855e2a523cef28d7e527a577e682ceb3fa7ca15d522e12803f11374d20f1793d5bd46e914049e97a63733513d65f1c0abc036e4965f085131c2df37c658a031108a7484fd0b913e947c884eedbefd4fac7ecacc56dbf64697daf074317011e8ab8a2ff829762f75c3b00e1e86c67e6eb176030af2f7b1cd843bbe7c1965c20c0974836f1c169f08b90", 0xbe}, {&(0x7f0000000500)}], 0x5, &(0x7f0000001d80)=[{0x68, 0xb4efbf87b180c994, 0x10000, "036d0bc94eb4a3d00f299dd57f07c51fd1689d48d244313a1680d00e838aa2bac2fe2482f6ce362b0f4b84b55732f4cdcb694bed91f31421a84735026c0c264bb6ee0aca9fbf3cb2304fbed8e5d7634359aa57587446b219"}, {0x1010, 0x105, 0xfff, "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"}], 0x1078}, 0x80) write$cgroup_int(r7, &(0x7f0000000200), 0x32000) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000300)={0x0, r7, 0x6}, 0x10) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000040)=r6, 0x4) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x2008, 0x3}, 0x0, 0x0, r4, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 03:36:55 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x10, &(0x7f00000000c0), 0x4) recvmsg(r0, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000100)="b6bb185b1c858497f98144c98f06df8079ef805dd41a58ee50c71bf50a588d5ce8bbbc722a0bed46a5a3efb78f17c0d40bbc89872e046192b5f2db9f81b75dec950518268e291021c8d493abd13adad845ab6fff426a58b0581709c110fa4f27f534c5f22150f4aa2f33b90ab4933b8922789009fe337560ac87ff2b0072a943717dd387842e12e426e87ba53e29cd839863e0c01d656bd5a4a28e85ab0bacf8a7398c6807a166bff3fbb37c6b5cba48f3486e539c11285ec048cc19e520ec3c088b2d61d095bf93404f15762eafb847580289bc81d263e0a44f8ce2ce5b19a5fa08cf95", 0xe4}, {&(0x7f0000000200)="ad979802f59506100891705cd2a159ee7cafc09a45cb1f23dea257683fc562bcbb1a2570f15a096b367b1e0fefa59a8f4696689958a448017acacb4fb52d232eda35c3d1b362e9e35eabcedaa365f272714e9baf19d7c0d0bb6e97dbc5bf44ae97d40867d6574cc3e7bd337a94849d3f50d2022f7eb14286af2b288e2c538bed8be9a3603bc3ca2736c6b43d551888e3f83967ab296adf3092dd1fa0602bd42cae933ff90cd51f11974c8985eb1d2c4fd61866f3a85cc4c375f1ca4e459eecf9d4c7c7bae9fbb38373a2d5b5fd4c7ed79b2f5c8685ff99e05d283e87f3f78585f24d645f33d4578ef950dfe9e81a6c67d18ae0dda4ec50b4", 0xf8}, {&(0x7f0000000300)="4dd9dd2d382a75a97d8f7b1a8443dfeb26945b3f0ccbd295c2a3c831923bd214f41bd4ce6b3b137f77bbd4ba6c59b8d64924b66d334e384fae5cce8ae716bd5d5d9519f60a95bcd799150c29b4ca5305e6e6ec6e073e9ccbd6e89d58146de350e57dddd4f7cf1fd6d6d2d7686a2a46fab6a9575f85e6479535803d503079a2d68e9619083539d116ccbe8590c2ff9fac856247ab793e5204996b9450", 0x9c}, {&(0x7f00000003c0)="8226686005ce899b291e3a402bb43c4f66a6ce648c67e2a06fde7bc3330ca79d64af13142e4e18aaab11c5e2369d092060ca90aff69d52ecd089cae34bda79a867c7d64d412807cee9673a183a2302d5b84886266ce6317a4c905fa57d9bff7624676e162c518db905851bcdb9d44d30ee5d6b3f4802dccc042f299b28122c7d6b542d36c2ffffc685122eff827986844168912cfd2d2c83e0995ddbc1f674e4e6371aba7500749d4dc5dc0b86d23f194619df687cd7afe548b9677125ceafd2239ad55fe51b9fd69fc06ceead60a5dd3f2386d6cb50a790ba1ba1f1fb470c81ae397c0c141a9f0cb7878f8aa986ac98b1", 0xf1}, {&(0x7f0000000000)="a94ecca16a6f7006870b8ccbef61b3867686af0223b8fb5477afd2decb258c5ad2771d254b42f5fb11e623d32b2c6613", 0x30}, {&(0x7f0000000500)="eb084536c7861ac9da17f833b1547e201ad92ac20769e6c831af8d1d1c9d8187f64d0c4c940b81a12de6bde05e3039626e7912d21a48cd0021751973", 0x3c}], 0x6}, 0x10) 03:36:55 executing program 1: bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x0, [], r5, r6, 0x1, 0x5}, 0x3c) 03:36:56 executing program 1: bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x0, [], r5, r6, 0x1, 0x5}, 0x3c) 03:36:56 executing program 1: bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40086602, 0x400007) write$cgroup_subtree(r6, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], 0x0, r5, 0x1, 0x5}, 0x3c) 03:36:56 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0185879, 0x20000000) write$cgroup_int(r0, &(0x7f0000000080), 0xfffffec7) sendmsg$sock(r0, &(0x7f0000000280)={&(0x7f0000000000)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000080)="65674c7f6b1ca32d2608212fe56c5bdcd3515e80f6206e9facb0d339c8a3612787a2aef2b59b21cbbbc22934a344c242a849d9d380188ed7ea90a55cac2704b3e9e712b2f797fc31234eb8b259bb1ae5931214c66af84cdde5a56a2a13b922e2497b85b807b1dbfedf1852865f2c37586a679849aa5a83eca676dd2941200c5b525d405e70dfd5762ae4de72b9c02b44cb69f07761f441d8001c3ca1", 0x9c}, {&(0x7f0000000140)="109b2be8927cd68dd28b18575085dd101d5dd031779fe2ae04ae88a4bbcc478d7d0c15103f2b584910ac289cd4a570d0ee832cb6ed8f4013959fca180ea5df9b8a33f8bb1a2940c6858ef936fcefb62af1e6c7d61e4ef0b59a16c26d4b7ab573e3dcbd65813b01ace044d375158e02746f394968", 0x74}], 0x2, &(0x7f0000000200)=[@txtime={{0x18, 0x1, 0x3d, 0x6}}, @timestamping={{0x14, 0x1, 0x25, 0x799a}}, @mark={{0x14, 0x1, 0x24, 0x1}}], 0x48}, 0x26040004) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) 03:36:56 executing program 1: bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40086602, 0x400007) write$cgroup_subtree(r6, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], 0x0, r5, 0x1, 0x5}, 0x3c) 03:37:04 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_type(r0, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000380)='cpuset.mems\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x30863, 0x0) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0xfffffc61) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000240)={'hwsim0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f00000000c0)={'hwsim0\x00', @random="0894f53e01dc"}) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)={0xffff, 0x5}, 0xc) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup\x00\f\x7f\xd9\xfa;\x8b\x88gb\xefi\x16\x91\xbb\xc4\xd5Jk\tU~ \xa4\vR\\\x8a\xdb\xcel\xe0\xa3[\xae\x9d\xac\x84\x9f\v\x9e\x9f\r\x10\x1f\xd3\x80\xc1\xccq\xab\x01y\xed\xfc\x96)\xf6_>+\xa03\xf4\xcc0\xbbE\xb0\xc3\x94\xd53\x87\xd6\xc4\\\xc7\x82\xe9\xaf\xb5\xb6\x15\xf4K2\x17\f\x98\x1c\xebq/\xf5\x81#\x85\xc5\xa0\xfd\xfac\xd9\xf2c`\xe9[c\a\x12\x1bb\x82\x83\x86d\xf0k\xa8\x90\x06\xa8\x1cK\xea\x19\x91\a1z)\xde_r`\xee\xb6\x9e\xcb\x05\x00\x00\x82\xa1\t\xc9\x05\xcc^', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000200)='memory.high\x00\x90\x80\xa4\x96\xbb\xe4\xb2\xa2\x01\xc0\xb8*Z\xef\xf8\x0e\x1f]\xf7\x10\xdb\xfe\xe4\x1d\xc6\x92\x7f\xeeK_p\t\x8c\x9f5\xd0\xef)\xd8\x04\xbf\xc2N\x1c\xf0R\xdc\r\xb1Gf\xba\xd11#<\xaf^,s\x85\x10R\x99\xc2D\xee\n\"\xf9c\x15{\xc1[\xef\x06\x8a\xcd\x9d\xc8\x90#\xd0\xe7\xe3\xe0\xa9\xf3\xc0n\x1f\xd1\x11P\xe20\xcd\x1c\xfa\xfd\xa3\xcf\x9c\xc6\xb7]\x16\xc7\xd7\xb4/\x82\xd1\xae\xd9TM\x05a\xe5\xc5U\x91\xbe\x81\xac4\x9d\x02`\xe7\xa6q\x1f@\x1f\x1f?tm\x9c\xd1\x8c\xa1\xb5\xe0`H)\x97r\xc0?y\x9cc=c`A^\x9f\xcd\xbc\xf4m>I\xae\xdf\x946\xe7M`\xeb\x9fm\xbe+n\x00\x18k\x98\xab\xd5\xeet\"d\x81\x94\x04\xf5\xeb', 0x2, 0x0) write$cgroup_int(r4, 0x0, 0x0) 03:37:04 executing program 1: bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40086602, 0x400007) write$cgroup_subtree(r6, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], 0x0, r5, 0x1, 0x5}, 0x3c) 03:37:04 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_type(r0, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000380)='cpuset.mems\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x30863, 0x0) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0xfffffc61) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000240)={'hwsim0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f00000000c0)={'hwsim0\x00', @random="0894f53e01dc"}) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)={0xffff, 0x5}, 0xc) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup\x00\f\x7f\xd9\xfa;\x8b\x88gb\xefi\x16\x91\xbb\xc4\xd5Jk\tU~ \xa4\vR\\\x8a\xdb\xcel\xe0\xa3[\xae\x9d\xac\x84\x9f\v\x9e\x9f\r\x10\x1f\xd3\x80\xc1\xccq\xab\x01y\xed\xfc\x96)\xf6_>+\xa03\xf4\xcc0\xbbE\xb0\xc3\x94\xd53\x87\xd6\xc4\\\xc7\x82\xe9\xaf\xb5\xb6\x15\xf4K2\x17\f\x98\x1c\xebq/\xf5\x81#\x85\xc5\xa0\xfd\xfac\xd9\xf2c`\xe9[c\a\x12\x1bb\x82\x83\x86d\xf0k\xa8\x90\x06\xa8\x1cK\xea\x19\x91\a1z)\xde_r`\xee\xb6\x9e\xcb\x05\x00\x00\x82\xa1\t\xc9\x05\xcc^', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000200)='memory.high\x00\x90\x80\xa4\x96\xbb\xe4\xb2\xa2\x01\xc0\xb8*Z\xef\xf8\x0e\x1f]\xf7\x10\xdb\xfe\xe4\x1d\xc6\x92\x7f\xeeK_p\t\x8c\x9f5\xd0\xef)\xd8\x04\xbf\xc2N\x1c\xf0R\xdc\r\xb1Gf\xba\xd11#<\xaf^,s\x85\x10R\x99\xc2D\xee\n\"\xf9c\x15{\xc1[\xef\x06\x8a\xcd\x9d\xc8\x90#\xd0\xe7\xe3\xe0\xa9\xf3\xc0n\x1f\xd1\x11P\xe20\xcd\x1c\xfa\xfd\xa3\xcf\x9c\xc6\xb7]\x16\xc7\xd7\xb4/\x82\xd1\xae\xd9TM\x05a\xe5\xc5U\x91\xbe\x81\xac4\x9d\x02`\xe7\xa6q\x1f@\x1f\x1f?tm\x9c\xd1\x8c\xa1\xb5\xe0`H)\x97r\xc0?y\x9cc=c`A^\x9f\xcd\xbc\xf4m>I\xae\xdf\x946\xe7M`\xeb\x9fm\xbe+n\x00\x18k\x98\xab\xd5\xeet\"d\x81\x94\x04\xf5\xeb', 0x2, 0x0) write$cgroup_int(r4, 0x0, 0x0) 03:37:05 executing program 1: bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, 0xffffffffffffffff, 0x1, 0x5}, 0x3c) 03:37:05 executing program 1: bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, 0xffffffffffffffff, 0x1, 0x5}, 0x3c) 03:37:07 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x80, 0x70ff3ca6b855515, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000680)}, 0x10b0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x1}, 0x0, 0x0, r1, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000280)={0x5, 0xa, 0x1f, 0x1, 0x3f, 0x7f, 0x0, 0x5, 0x90, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x9, 0x5, @perf_config_ext={0x4, 0x1ff}, 0x124, 0x2, 0x0, 0x0, 0x6, 0x8dc, 0xf3}, 0xffffffffffffffff, 0xd, r1, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x1f) openat$cgroup_ro(r0, &(0x7f0000000000)='cpuacct.usage_user\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="214e09723f14230fae03ba1c941629b7017c6f7679201171f953a6748f9a5964e0c746d525c9f7e7"], 0xda00) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[], 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0x43400) 03:37:17 executing program 1: bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, 0xffffffffffffffff, 0x1, 0x5}, 0x3c) 03:37:17 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_type(r0, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000380)='cpuset.mems\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x30863, 0x0) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0xfffffc61) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000240)={'hwsim0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f00000000c0)={'hwsim0\x00', @random="0894f53e01dc"}) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)={0xffff, 0x5}, 0xc) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup\x00\f\x7f\xd9\xfa;\x8b\x88gb\xefi\x16\x91\xbb\xc4\xd5Jk\tU~ \xa4\vR\\\x8a\xdb\xcel\xe0\xa3[\xae\x9d\xac\x84\x9f\v\x9e\x9f\r\x10\x1f\xd3\x80\xc1\xccq\xab\x01y\xed\xfc\x96)\xf6_>+\xa03\xf4\xcc0\xbbE\xb0\xc3\x94\xd53\x87\xd6\xc4\\\xc7\x82\xe9\xaf\xb5\xb6\x15\xf4K2\x17\f\x98\x1c\xebq/\xf5\x81#\x85\xc5\xa0\xfd\xfac\xd9\xf2c`\xe9[c\a\x12\x1bb\x82\x83\x86d\xf0k\xa8\x90\x06\xa8\x1cK\xea\x19\x91\a1z)\xde_r`\xee\xb6\x9e\xcb\x05\x00\x00\x82\xa1\t\xc9\x05\xcc^', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000200)='memory.high\x00\x90\x80\xa4\x96\xbb\xe4\xb2\xa2\x01\xc0\xb8*Z\xef\xf8\x0e\x1f]\xf7\x10\xdb\xfe\xe4\x1d\xc6\x92\x7f\xeeK_p\t\x8c\x9f5\xd0\xef)\xd8\x04\xbf\xc2N\x1c\xf0R\xdc\r\xb1Gf\xba\xd11#<\xaf^,s\x85\x10R\x99\xc2D\xee\n\"\xf9c\x15{\xc1[\xef\x06\x8a\xcd\x9d\xc8\x90#\xd0\xe7\xe3\xe0\xa9\xf3\xc0n\x1f\xd1\x11P\xe20\xcd\x1c\xfa\xfd\xa3\xcf\x9c\xc6\xb7]\x16\xc7\xd7\xb4/\x82\xd1\xae\xd9TM\x05a\xe5\xc5U\x91\xbe\x81\xac4\x9d\x02`\xe7\xa6q\x1f@\x1f\x1f?tm\x9c\xd1\x8c\xa1\xb5\xe0`H)\x97r\xc0?y\x9cc=c`A^\x9f\xcd\xbc\xf4m>I\xae\xdf\x946\xe7M`\xeb\x9fm\xbe+n\x00\x18k\x98\xab\xd5\xeet\"d\x81\x94\x04\xf5\xeb', 0x2, 0x0) write$cgroup_int(r4, 0x0, 0x0) 03:37:17 executing program 4: socket$kcm(0x29, 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) socket$kcm(0x11, 0x2, 0x300) perf_event_open$cgroup(&(0x7f0000000080)={0xe73290ed53360c9c, 0x70, 0x0, 0x0, 0x7f, 0x8, 0x0, 0xb952, 0x0, 0xc, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_config_ext={0x9}, 0x0, 0xe82a, 0x0, 0x7, 0x3, 0x0, 0x7}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x70, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101, 0x140}}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(r0, &(0x7f0000000000)='rdma.current\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f0000000040)=0x1) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f00000002c0)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r4, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci={0x1f, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40086602, 0x400007) write$cgroup_subtree(r6, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0xb, 0x6, 0x9, 0x4, 0x401, r4, 0x5, [], r5, r6, 0x5}, 0x3c) r7 = openat$cgroup_ro(r6, &(0x7f0000000300)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r8, 0xc0185879, 0x20000000) write$cgroup_int(r8, &(0x7f0000000080), 0xfffffec7) recvmsg$kcm(r8, &(0x7f0000004380)={&(0x7f0000004180)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000004300)=[{&(0x7f0000004200)=""/13, 0xd}, {&(0x7f0000004240)=""/182, 0xb6}], 0x2, &(0x7f0000004340)=""/42, 0x2a}, 0x20) r10 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004600)={&(0x7f00000043c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x160, 0x160, 0x7, [@ptr={0x7, 0x0, 0x0, 0x2, 0x3}, @func={0x10, 0x0, 0x0, 0xc, 0x3}, @struct={0x5, 0x6, 0x0, 0x4, 0x0, 0x101, [{0x10, 0x0, 0x6}, {0x8, 0x4, 0xfffffbff}, {0x3, 0x4, 0x9}, {0xe, 0x0, 0x3}, {0x5, 0x1, 0x6}, {0xf, 0x0, 0x7f2d}]}, @union={0x6, 0x6, 0x0, 0x5, 0x1, 0x7, [{0x3, 0x0, 0x1ff}, {0x1, 0x0, 0x9}, {0x10, 0x0, 0x9}, {0x4, 0x1, 0xfffffae3}, {0xd, 0x2}, {0x1, 0x1, 0x7}]}, @union={0x6, 0x2, 0x0, 0x5, 0x1, 0x7d0, [{0xf, 0x0, 0x1}, {0xe, 0x4, 0x6}]}, @typedef={0x5, 0x0, 0x0, 0x8, 0x2}, @struct={0x2, 0x3, 0x0, 0x4, 0x1, 0x8001, [{0x7, 0x4, 0x40}, {0x9, 0x5, 0x430}, {0x4, 0x4, 0xb9b}]}, @enum={0x7, 0x3, 0x0, 0x6, 0x4, [{0x4, 0x630}, {0x0, 0xffffffff}, {0xd, 0x6}]}, @int={0xb, 0x0, 0x0, 0x1, 0x0, 0x50, 0x0, 0x25, 0x4}, @ptr={0xc, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x0, 0x18, 0x5f, 0x5f, 0x61]}}, &(0x7f0000004540)=""/152, 0x17f, 0x98, 0x1}, 0x20) r11 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r12 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dRA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x88\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G\x8d;\xfa+\xa2%(}`\xc5L\xbb\xeb~}%\xddr\xbb\xe7\xf4|\xa7b\xeb\xd3\nW\x16\x10:\x0e%\x83\x01KfPXIu\xe5\x7f\x88q%\xaeLcx\x9b\xbc~,\xd1\x94g\xe3\xd8\xfefh\x82\xa0\xe5@', 0x2761, 0x0) ioctl$TUNSETIFF(r12, 0x400454ca, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0x3}, 0x0, 0x0, &(0x7f0000000800), &(0x7f0000000380)=0x7, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=0x10000}}, 0x10) r14 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f000000c200)='cpuacct.usage_all\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000c240)={0x0, 0xa, &(0x7f0000000340)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001}, [@map={0x18, 0x3}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xd2b}, @alu={0x7, 0x1, 0x1, 0x7, 0x9, 0x20, 0xffffffffffffffff}, @map={0x18, 0x3, 0x1, 0x0, r11}]}, 0x0, 0x6, 0x3e, &(0x7f0000000400)=""/62, 0x41100, 0x1, [], 0x0, 0x3, r12, 0x8, &(0x7f000000c180)={0x5, 0x5}, 0x8, 0x10, &(0x7f000000c1c0)={0x0, 0x0, 0x4, 0xe1}, 0x10, r13, r14}, 0x78) r15 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r15, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci={0x1f, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r17 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r17, 0x40086602, 0x400007) write$cgroup_subtree(r17, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0xb, 0x6, 0x9, 0x4, 0x401, r15, 0x5, [], r16, r17, 0x5}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f00000046c0)={0xf1f3fd7ea3ba45b, 0x8, &(0x7f0000000500)=@raw=[@map={0x18, 0x5, 0x1, 0x0, r7}, @alu={0x7, 0x0, 0x2, 0xb, 0x8, 0x2, 0x8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x22}, @call={0x85, 0x0, 0x0, 0x3e}, @alu={0x4, 0x1, 0x5, 0x7, 0x0, 0x40, 0x4}, @exit], &(0x7f0000000380)='GPL\x00', 0x0, 0x74, &(0x7f0000000440)=""/116, 0x41000, 0x1, [], r9, 0x2, r10, 0x8, &(0x7f0000004640)={0x8, 0x5}, 0x8, 0x10, &(0x7f0000004680)={0x3, 0x8, 0x401, 0x3}, 0x10, r13, r15}, 0x78) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x10, 'c\x86\xdd', 0x7}]}, 0x90ad) 03:37:17 executing program 1: bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x0, 0x5}, 0x3c) 03:37:18 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpu.stat\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x4009}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x308) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-0\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r3, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci={0x1f, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40086602, 0x400007) write$cgroup_subtree(r5, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0xb, 0x6, 0x9, 0x4, 0x401, r3, 0x5, [], r4, r5, 0x5}, 0x3c) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8922, &(0x7f0000000000)='nr0\x01:\xf2%\xa3\'>\xf8]\x81\n?\xfa\xff\x04\x00\x00\xbf\xef\xa9\xac\x03x\xf4D3A}?\a\x8b\x9c[\xdd\x06\xa4\n\xf4\x94\xa8>\xb1\xb1\xa2_&') 03:37:18 executing program 1: bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x0, 0x5}, 0x3c) 03:37:24 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_type(r0, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000380)='cpuset.mems\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x30863, 0x0) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0xfffffc61) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000240)={'hwsim0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f00000000c0)={'hwsim0\x00', @random="0894f53e01dc"}) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)={0xffff, 0x5}, 0xc) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup\x00\f\x7f\xd9\xfa;\x8b\x88gb\xefi\x16\x91\xbb\xc4\xd5Jk\tU~ \xa4\vR\\\x8a\xdb\xcel\xe0\xa3[\xae\x9d\xac\x84\x9f\v\x9e\x9f\r\x10\x1f\xd3\x80\xc1\xccq\xab\x01y\xed\xfc\x96)\xf6_>+\xa03\xf4\xcc0\xbbE\xb0\xc3\x94\xd53\x87\xd6\xc4\\\xc7\x82\xe9\xaf\xb5\xb6\x15\xf4K2\x17\f\x98\x1c\xebq/\xf5\x81#\x85\xc5\xa0\xfd\xfac\xd9\xf2c`\xe9[c\a\x12\x1bb\x82\x83\x86d\xf0k\xa8\x90\x06\xa8\x1cK\xea\x19\x91\a1z)\xde_r`\xee\xb6\x9e\xcb\x05\x00\x00\x82\xa1\t\xc9\x05\xcc^', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000200)='memory.high\x00\x90\x80\xa4\x96\xbb\xe4\xb2\xa2\x01\xc0\xb8*Z\xef\xf8\x0e\x1f]\xf7\x10\xdb\xfe\xe4\x1d\xc6\x92\x7f\xeeK_p\t\x8c\x9f5\xd0\xef)\xd8\x04\xbf\xc2N\x1c\xf0R\xdc\r\xb1Gf\xba\xd11#<\xaf^,s\x85\x10R\x99\xc2D\xee\n\"\xf9c\x15{\xc1[\xef\x06\x8a\xcd\x9d\xc8\x90#\xd0\xe7\xe3\xe0\xa9\xf3\xc0n\x1f\xd1\x11P\xe20\xcd\x1c\xfa\xfd\xa3\xcf\x9c\xc6\xb7]\x16\xc7\xd7\xb4/\x82\xd1\xae\xd9TM\x05a\xe5\xc5U\x91\xbe\x81\xac4\x9d\x02`\xe7\xa6q\x1f@\x1f\x1f?tm\x9c\xd1\x8c\xa1\xb5\xe0`H)\x97r\xc0?y\x9cc=c`A^\x9f\xcd\xbc\xf4m>I\xae\xdf\x946\xe7M`\xeb\x9fm\xbe+n\x00\x18k\x98\xab\xd5\xeet\"d\x81\x94\x04\xf5\xeb', 0x2, 0x0) write$cgroup_int(r4, 0x0, 0x0) 03:37:24 executing program 1: bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x0, 0x5}, 0x3c) 03:37:24 executing program 1: bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1}, 0x3c) 03:37:24 executing program 1: bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1}, 0x3c) 03:37:24 executing program 1: bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1}, 0x3c) 03:37:32 executing program 1 (fault-call:17 fault-nth:0): bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) 03:37:32 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xe, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0xc}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci={0x1f, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) write$cgroup_subtree(r3, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0xb, 0x6, 0x9, 0x4, 0x401, r1, 0x5, [], r2, r3, 0x5}, 0x3c) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000001480)={0xffffffffffffffff}) sendmsg$tipc(r4, &(0x7f0000001a80)={&(0x7f00000014c0)=@nameseq={0x1e, 0x1, 0x3, {0x1, 0x3, 0x1}}, 0x10, &(0x7f0000001900)=[{&(0x7f0000001500)="82267a6cb9d2bd016bcad463a6cd5efab29e44389fe36c22a3887328cc8bd68d09e85693f28539dd15d89a24be555972cc76904fe2e480758471735db5969565817759dab299a080d551bdc19e9e4b6b01a681d7ce1ad27505f11e0e722f797fc69ae0feba649abbf0aaeb9f9ea48a74b14ef4e6b02728518941578aea47c047ea5643dd432e149dae01f72476d4d897374a3168082d5669fe0be6f79904f97859b9102d6a62cd92e752e9fcdcf1514010", 0xb1}, {&(0x7f00000015c0)="4d48174b438c8b1c469b13733f2335e69838e04aa1da4999324defa8cb69956155eaf0b783dab8543c874d7e32ec76c81e55fbec892aef32a208ecb5f6511ca91680db6d51ad49592cbccaf2f41d0683378ef73d77cc0f3edd9a53f0caf69729f1677c03476975edb0a58747ed5e9f0f5652504873d516709221b10d86638f135c3313eb7fb089a51d0a4e83a299108a89b7f4c432067affc5fa892fcec1b6e0678184248543a9a6b301501e18d69cf589f1ad2595e02bde145e067be9007bbec49b984e427fc492c69bc3b28e7bc9befcc1b02e", 0xd4}, {&(0x7f00000016c0)="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", 0xfb}, {&(0x7f00000017c0)="dca482e81f0e8f291ecaaca27c36359f379bb0f2caccabd2184e2ab29dc58efe5c4ec8ba57c4", 0x26}, {&(0x7f0000001800)="d7f7875c7f3fdf4b789ec37ff0625c3964307f4af52a0eab0beec386b057cad5c10ed50ed0fe23b6b7a4a0098ec3033b112e145ef18f39a4bef8a70dba5918f5dfcf762e961bcd90acadf28906aa7ded2498d8b761120fd2cfbe65266de8425d6b7b3330a74267f67f4ecfa71ba9a707fc8dfbce4bbf5039c45d69936e8da910685982aa90f04461c28aac0d76ea80b4a2748e1ff7da1ed55ff026ee037c0fc70b2123379b464dbd30afce2f14234eef89b5849978952bd4d6615c22d67602ed7220d72f28ca5a634757f5fb59e9615d6c668e293e8726c47a9b191bf97373f352", 0xe1}], 0x5, &(0x7f0000001980)="f95eb082c28c36a3b12939a854639641683b193661ab7cfa9b6d89f8b5ac37c24bd1a70202c90b76dde7a8d760e83582151f0b2a8dfdc9fad962d7f728cc179937aad23dd18a87383ed39493becf853c933c1e12ed0bca644d387a540e73cd0b901d63c0ca51b6731a58416269d9b01cc385fa25b21e8d4a5e11f308d4d1131b217e5ff2cbf90ba24ec3a00b51faa8120670224fc895a95413dc92ec45e1dc07f759d20cfa818b613104705a4086a06d3ba6584f5217fdd153e1ad2a8c44badce0ad0148351efd2f4d133db2247c221305a955f1c45738b3e63843b177b5a20f68c056f07a271f6251", 0xe9, 0x40}, 0x8080) 03:37:32 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_type(r0, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000380)='cpuset.mems\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x30863, 0x0) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0xfffffc61) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000240)={'hwsim0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f00000000c0)={'hwsim0\x00', @random="0894f53e01dc"}) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)={0xffff, 0x5}, 0xc) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup\x00\f\x7f\xd9\xfa;\x8b\x88gb\xefi\x16\x91\xbb\xc4\xd5Jk\tU~ \xa4\vR\\\x8a\xdb\xcel\xe0\xa3[\xae\x9d\xac\x84\x9f\v\x9e\x9f\r\x10\x1f\xd3\x80\xc1\xccq\xab\x01y\xed\xfc\x96)\xf6_>+\xa03\xf4\xcc0\xbbE\xb0\xc3\x94\xd53\x87\xd6\xc4\\\xc7\x82\xe9\xaf\xb5\xb6\x15\xf4K2\x17\f\x98\x1c\xebq/\xf5\x81#\x85\xc5\xa0\xfd\xfac\xd9\xf2c`\xe9[c\a\x12\x1bb\x82\x83\x86d\xf0k\xa8\x90\x06\xa8\x1cK\xea\x19\x91\a1z)\xde_r`\xee\xb6\x9e\xcb\x05\x00\x00\x82\xa1\t\xc9\x05\xcc^', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000200)='memory.high\x00\x90\x80\xa4\x96\xbb\xe4\xb2\xa2\x01\xc0\xb8*Z\xef\xf8\x0e\x1f]\xf7\x10\xdb\xfe\xe4\x1d\xc6\x92\x7f\xeeK_p\t\x8c\x9f5\xd0\xef)\xd8\x04\xbf\xc2N\x1c\xf0R\xdc\r\xb1Gf\xba\xd11#<\xaf^,s\x85\x10R\x99\xc2D\xee\n\"\xf9c\x15{\xc1[\xef\x06\x8a\xcd\x9d\xc8\x90#\xd0\xe7\xe3\xe0\xa9\xf3\xc0n\x1f\xd1\x11P\xe20\xcd\x1c\xfa\xfd\xa3\xcf\x9c\xc6\xb7]\x16\xc7\xd7\xb4/\x82\xd1\xae\xd9TM\x05a\xe5\xc5U\x91\xbe\x81\xac4\x9d\x02`\xe7\xa6q\x1f@\x1f\x1f?tm\x9c\xd1\x8c\xa1\xb5\xe0`H)\x97r\xc0?y\x9cc=c`A^\x9f\xcd\xbc\xf4m>I\xae\xdf\x946\xe7M`\xeb\x9fm\xbe+n\x00\x18k\x98\xab\xd5\xeet\"d\x81\x94\x04\xf5\xeb', 0x2, 0x0) write$cgroup_int(r4, 0x0, 0x0) [ 2297.334179][T14364] FAULT_INJECTION: forcing a failure. [ 2297.334179][T14364] name failslab, interval 1, probability 0, space 0, times 0 [ 2297.347021][T14364] CPU: 0 PID: 14364 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2297.355697][T14364] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2297.365747][T14364] Call Trace: [ 2297.369044][T14364] dump_stack+0x197/0x210 [ 2297.373397][T14364] should_fail.cold+0xa/0x15 [ 2297.378003][T14364] ? fault_create_debugfs_attr+0x180/0x180 [ 2297.383816][T14364] ? ___might_sleep+0x163/0x2c0 [ 2297.388656][T14364] __should_failslab+0x121/0x190 [ 2297.393594][T14364] should_failslab+0x9/0x14 [ 2297.398104][T14364] kmem_cache_alloc_trace+0x2d3/0x790 [ 2297.403542][T14364] htab_map_alloc+0xe3/0x11c0 [ 2297.408220][T14364] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2297.414470][T14364] ? htab_map_update_elem+0xca0/0xca0 [ 2297.419870][T14364] __do_sys_bpf+0x478/0x3810 [ 2297.424481][T14364] ? bpf_prog_load+0x18f0/0x18f0 [ 2297.429396][T14364] ? __kasan_check_write+0x14/0x20 [ 2297.434500][T14364] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2297.440039][T14364] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2297.445323][T14364] ? wait_for_completion+0x440/0x440 [ 2297.450603][T14364] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2297.456858][T14364] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2297.462333][T14364] ? do_syscall_64+0x26/0x790 [ 2297.467008][T14364] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2297.474705][T14364] ? do_syscall_64+0x26/0x790 [ 2297.479393][T14364] __x64_sys_bpf+0x73/0xb0 [ 2297.483794][T14364] do_syscall_64+0xfa/0x790 [ 2297.488283][T14364] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2297.494167][T14364] RIP: 0033:0x45a909 [ 2297.498063][T14364] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2297.517867][T14364] RSP: 002b:00007f5b93d6ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2297.526283][T14364] RAX: ffffffffffffffda RBX: 00007f5b93d6ac90 RCX: 000000000045a909 [ 2297.534257][T14364] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2297.542249][T14364] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2297.550207][T14364] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d6b6d4 [ 2297.558170][T14364] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 03:37:35 executing program 4: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8f533b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x7, 0x3}, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400012) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x0, 0x0, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r1, r2, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r4, &(0x7f0000000200), 0x400c00) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='memory.events\x00', 0x26e1, 0x0) ioctl$TUNGETIFF(r5, 0x800454d2, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='memory.events\x00', 0x26e1, 0x0) ioctl$TUNGETIFF(r6, 0x800454d2, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r7, &(0x7f0000000200), 0x400c00) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='memory.events\x00', 0x26e1, 0x0) ioctl$TUNGETIFF(r8, 0x800454d2, 0x0) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='memory.events\x00', 0x26e1, 0x0) ioctl$TUNGETIFF(r9, 0x800454d2, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r10, &(0x7f0000000200), 0x400c00) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) r11 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x9, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x3, 0x0, 0x3, 0xf4653a5129181f1}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) 03:37:35 executing program 1 (fault-call:17 fault-nth:1): bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) [ 2299.642836][T14369] FAULT_INJECTION: forcing a failure. [ 2299.642836][T14369] name failslab, interval 1, probability 0, space 0, times 0 [ 2299.655779][T14369] CPU: 0 PID: 14369 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2299.664467][T14369] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2299.674533][T14369] Call Trace: [ 2299.677824][T14369] dump_stack+0x197/0x210 [ 2299.682170][T14369] should_fail.cold+0xa/0x15 [ 2299.686814][T14369] ? fault_create_debugfs_attr+0x180/0x180 [ 2299.692625][T14369] ? ___might_sleep+0x163/0x2c0 [ 2299.697475][T14369] __should_failslab+0x121/0x190 [ 2299.702407][T14369] should_failslab+0x9/0x14 [ 2299.706895][T14369] kmem_cache_alloc_node_trace+0x274/0x750 [ 2299.712682][T14369] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2299.718212][T14369] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 2299.724186][T14369] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2299.730009][T14369] __kmalloc_node+0x3d/0x70 [ 2299.734507][T14369] __bpf_map_area_alloc+0xbd/0xf0 [ 2299.739522][T14369] bpf_map_area_alloc+0x20/0x30 [ 2299.744361][T14369] htab_map_alloc+0x589/0x11c0 [ 2299.749124][T14369] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2299.755350][T14369] ? htab_map_update_elem+0xca0/0xca0 [ 2299.760717][T14369] __do_sys_bpf+0x478/0x3810 [ 2299.765298][T14369] ? bpf_prog_load+0x18f0/0x18f0 [ 2299.770241][T14369] ? __kasan_check_write+0x14/0x20 [ 2299.775341][T14369] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2299.780899][T14369] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2299.786190][T14369] ? wait_for_completion+0x440/0x440 [ 2299.791471][T14369] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2299.797716][T14369] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2299.803183][T14369] ? do_syscall_64+0x26/0x790 [ 2299.807850][T14369] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2299.813900][T14369] ? do_syscall_64+0x26/0x790 [ 2299.818571][T14369] __x64_sys_bpf+0x73/0xb0 [ 2299.822980][T14369] do_syscall_64+0xfa/0x790 [ 2299.827490][T14369] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2299.833367][T14369] RIP: 0033:0x45a909 [ 2299.837250][T14369] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2299.856836][T14369] RSP: 002b:00007f5b93d6ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2299.865242][T14369] RAX: ffffffffffffffda RBX: 00007f5b93d6ac90 RCX: 000000000045a909 [ 2299.873205][T14369] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2299.881168][T14369] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2299.889125][T14369] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d6b6d4 [ 2299.897076][T14369] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 03:37:35 executing program 1 (fault-call:17 fault-nth:2): bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) 03:37:35 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x2c, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0185879, 0x20000000) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci={0x1f, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) write$cgroup_subtree(r3, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0xb, 0x6, 0x9, 0x4, 0x401, r1, 0x5, [], r2, r3, 0x5}, 0x3c) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) write$cgroup_int(r0, &(0x7f0000000080), 0xfffffec7) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x9) gettid() r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0xa000a000, &(0x7f0000000040)=[{&(0x7f0000000300)="1400000013000507ed008064d200100041000080", 0x14}], 0x1}, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci={0x1f, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)=ANY=[@ANYBLOB='-cPu +io '], 0x9) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r8, 0x18000000000002a0, 0xe80, 0x0, &(0x7f0000000500)="b9ff0300000d698cb89e14f088a8000fffff0000ab00638877fbac141421e9", 0x0, 0x100}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0xb, 0x6, 0x9, 0x4, 0x401, r5, 0x5, [], r6, r7, 0x5}, 0x3c) r9 = openat$cgroup_ro(r5, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000100)=r9, 0x4) [ 2300.179965][T14375] FAULT_INJECTION: forcing a failure. [ 2300.179965][T14375] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2300.193314][T14375] CPU: 0 PID: 14375 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2300.201977][T14375] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2300.212033][T14375] Call Trace: [ 2300.215307][T14375] dump_stack+0x197/0x210 [ 2300.219643][T14375] should_fail.cold+0xa/0x15 [ 2300.224292][T14375] ? perf_trace_run_bpf_submit+0x138/0x190 [ 2300.230115][T14375] ? fault_create_debugfs_attr+0x180/0x180 [ 2300.235954][T14375] ? perf_trace_lock+0x315/0x4c0 [ 2300.240879][T14375] ? __lock_acquire+0x16f2/0x4a00 [ 2300.245907][T14375] ? kmem_cache_alloc_trace+0x158/0x790 [ 2300.251450][T14375] should_fail_alloc_page+0x50/0x60 [ 2300.256644][T14375] __alloc_pages_nodemask+0x1a1/0x910 [ 2300.262029][T14375] ? fs_reclaim_release+0xf/0x30 [ 2300.266958][T14375] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2300.272670][T14375] ? fs_reclaim_release+0xf/0x30 [ 2300.277624][T14375] ? fault_create_debugfs_attr+0x180/0x180 [ 2300.283424][T14375] cache_grow_begin+0x90/0xc60 [ 2300.288179][T14375] ? __kmalloc_node+0x3d/0x70 [ 2300.292882][T14375] ? trace_hardirqs_off+0x62/0x240 [ 2300.297987][T14375] kmem_cache_alloc_node_trace+0x689/0x750 [ 2300.303784][T14375] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2300.309324][T14375] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 2300.315310][T14375] __kmalloc_node+0x3d/0x70 [ 2300.319806][T14375] __bpf_map_area_alloc+0xbd/0xf0 [ 2300.324819][T14375] bpf_map_area_alloc+0x20/0x30 [ 2300.329661][T14375] htab_map_alloc+0x589/0x11c0 [ 2300.334432][T14375] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2300.340663][T14375] ? htab_map_update_elem+0xca0/0xca0 [ 2300.346027][T14375] __do_sys_bpf+0x478/0x3810 [ 2300.350613][T14375] ? bpf_prog_load+0x18f0/0x18f0 [ 2300.355538][T14375] ? __kasan_check_write+0x14/0x20 [ 2300.360641][T14375] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2300.366188][T14375] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2300.371571][T14375] ? wait_for_completion+0x440/0x440 [ 2300.376867][T14375] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2300.383122][T14375] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2300.388569][T14375] ? do_syscall_64+0x26/0x790 [ 2300.393242][T14375] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2300.399303][T14375] ? do_syscall_64+0x26/0x790 [ 2300.404063][T14375] __x64_sys_bpf+0x73/0xb0 [ 2300.408511][T14375] do_syscall_64+0xfa/0x790 [ 2300.413017][T14375] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2300.418987][T14375] RIP: 0033:0x45a909 [ 2300.422869][T14375] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2300.442459][T14375] RSP: 002b:00007f5b93d6ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2300.450855][T14375] RAX: ffffffffffffffda RBX: 00007f5b93d6ac90 RCX: 000000000045a909 [ 2300.458820][T14375] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2300.466781][T14375] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2300.474825][T14375] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d6b6d4 [ 2300.482780][T14375] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 03:37:39 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_type(r0, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000380)='cpuset.mems\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x30863, 0x0) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0xfffffc61) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000240)={'hwsim0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f00000000c0)={'hwsim0\x00', @random="0894f53e01dc"}) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)={0xffff, 0x5}, 0xc) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup\x00\f\x7f\xd9\xfa;\x8b\x88gb\xefi\x16\x91\xbb\xc4\xd5Jk\tU~ \xa4\vR\\\x8a\xdb\xcel\xe0\xa3[\xae\x9d\xac\x84\x9f\v\x9e\x9f\r\x10\x1f\xd3\x80\xc1\xccq\xab\x01y\xed\xfc\x96)\xf6_>+\xa03\xf4\xcc0\xbbE\xb0\xc3\x94\xd53\x87\xd6\xc4\\\xc7\x82\xe9\xaf\xb5\xb6\x15\xf4K2\x17\f\x98\x1c\xebq/\xf5\x81#\x85\xc5\xa0\xfd\xfac\xd9\xf2c`\xe9[c\a\x12\x1bb\x82\x83\x86d\xf0k\xa8\x90\x06\xa8\x1cK\xea\x19\x91\a1z)\xde_r`\xee\xb6\x9e\xcb\x05\x00\x00\x82\xa1\t\xc9\x05\xcc^', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000200)='memory.high\x00\x90\x80\xa4\x96\xbb\xe4\xb2\xa2\x01\xc0\xb8*Z\xef\xf8\x0e\x1f]\xf7\x10\xdb\xfe\xe4\x1d\xc6\x92\x7f\xeeK_p\t\x8c\x9f5\xd0\xef)\xd8\x04\xbf\xc2N\x1c\xf0R\xdc\r\xb1Gf\xba\xd11#<\xaf^,s\x85\x10R\x99\xc2D\xee\n\"\xf9c\x15{\xc1[\xef\x06\x8a\xcd\x9d\xc8\x90#\xd0\xe7\xe3\xe0\xa9\xf3\xc0n\x1f\xd1\x11P\xe20\xcd\x1c\xfa\xfd\xa3\xcf\x9c\xc6\xb7]\x16\xc7\xd7\xb4/\x82\xd1\xae\xd9TM\x05a\xe5\xc5U\x91\xbe\x81\xac4\x9d\x02`\xe7\xa6q\x1f@\x1f\x1f?tm\x9c\xd1\x8c\xa1\xb5\xe0`H)\x97r\xc0?y\x9cc=c`A^\x9f\xcd\xbc\xf4m>I\xae\xdf\x946\xe7M`\xeb\x9fm\xbe+n\x00\x18k\x98\xab\xd5\xeet\"d\x81\x94\x04\xf5\xeb', 0x2, 0x0) write$cgroup_int(r4, 0x0, 0x0) 03:37:39 executing program 1 (fault-call:17 fault-nth:3): bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) [ 2304.382708][T14382] FAULT_INJECTION: forcing a failure. [ 2304.382708][T14382] name failslab, interval 1, probability 0, space 0, times 0 [ 2304.395393][T14382] CPU: 1 PID: 14382 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2304.404062][T14382] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2304.414236][T14382] Call Trace: [ 2304.417515][T14382] dump_stack+0x197/0x210 [ 2304.421838][T14382] should_fail.cold+0xa/0x15 [ 2304.426407][T14382] ? htab_map_alloc+0x8d3/0x11c0 [ 2304.431331][T14382] ? fault_create_debugfs_attr+0x180/0x180 [ 2304.437121][T14382] ? ___might_sleep+0x163/0x2c0 [ 2304.441968][T14382] __should_failslab+0x121/0x190 [ 2304.446887][T14382] should_failslab+0x9/0x14 [ 2304.451389][T14382] kmem_cache_alloc_node+0x268/0x740 [ 2304.456674][T14382] ? ___might_sleep+0x163/0x2c0 [ 2304.461526][T14382] alloc_vmap_area+0x147/0x2030 [ 2304.466365][T14382] ? __get_vm_area_node+0x12b/0x4f0 [ 2304.471628][T14382] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2304.477162][T14382] ? purge_vmap_area_lazy+0x40/0x40 [ 2304.482336][T14382] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2304.488550][T14382] ? debug_smp_processor_id+0x33/0x18a [ 2304.493989][T14382] __get_vm_area_node+0x179/0x4f0 [ 2304.498995][T14382] __vmalloc_node_range+0xd4/0x810 [ 2304.504082][T14382] ? bpf_map_area_alloc+0x20/0x30 [ 2304.509083][T14382] ? kasan_unpoison_shadow+0x35/0x50 [ 2304.514343][T14382] ? bpf_map_area_alloc+0x20/0x30 [ 2304.519355][T14382] __vmalloc_node_flags_caller+0x71/0x90 [ 2304.524983][T14382] ? bpf_map_area_alloc+0x20/0x30 [ 2304.529986][T14382] __bpf_map_area_alloc+0xde/0xf0 [ 2304.534994][T14382] bpf_map_area_alloc+0x20/0x30 [ 2304.539821][T14382] htab_map_alloc+0x8d3/0x11c0 [ 2304.544568][T14382] ? htab_map_update_elem+0xca0/0xca0 [ 2304.549913][T14382] __do_sys_bpf+0x478/0x3810 [ 2304.554478][T14382] ? bpf_prog_load+0x18f0/0x18f0 [ 2304.559387][T14382] ? __kasan_check_write+0x14/0x20 [ 2304.564473][T14382] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2304.570020][T14382] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2304.575508][T14382] ? wait_for_completion+0x440/0x440 [ 2304.580772][T14382] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2304.587122][T14382] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2304.592663][T14382] ? do_syscall_64+0x26/0x790 [ 2304.597329][T14382] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2304.603369][T14382] ? do_syscall_64+0x26/0x790 [ 2304.608028][T14382] __x64_sys_bpf+0x73/0xb0 [ 2304.612422][T14382] do_syscall_64+0xfa/0x790 [ 2304.616931][T14382] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2304.622817][T14382] RIP: 0033:0x45a909 [ 2304.626700][T14382] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2304.646290][T14382] RSP: 002b:00007f5b93d49c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2304.654688][T14382] RAX: ffffffffffffffda RBX: 00007f5b93d49c90 RCX: 000000000045a909 [ 2304.662637][T14382] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2304.670585][T14382] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2304.678531][T14382] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d4a6d4 [ 2304.686485][T14382] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 03:37:40 executing program 1 (fault-call:17 fault-nth:4): bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) [ 2304.858670][T14385] FAULT_INJECTION: forcing a failure. [ 2304.858670][T14385] name failslab, interval 1, probability 0, space 0, times 0 [ 2304.871409][T14385] CPU: 0 PID: 14385 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2304.880075][T14385] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2304.890131][T14385] Call Trace: [ 2304.893407][T14385] dump_stack+0x197/0x210 [ 2304.897754][T14385] should_fail.cold+0xa/0x15 [ 2304.902351][T14385] ? fault_create_debugfs_attr+0x180/0x180 [ 2304.908167][T14385] ? ___might_sleep+0x163/0x2c0 [ 2304.913053][T14385] __should_failslab+0x121/0x190 [ 2304.917992][T14385] should_failslab+0x9/0x14 [ 2304.922490][T14385] kmem_cache_alloc_node_trace+0x274/0x750 [ 2304.928354][T14385] ? do_raw_spin_unlock+0x178/0x270 [ 2304.933543][T14385] __kmalloc_node+0x3d/0x70 [ 2304.938028][T14385] __vmalloc_node_range+0x1db/0x810 [ 2304.943239][T14385] ? bpf_map_area_alloc+0x20/0x30 [ 2304.948272][T14385] __vmalloc_node_flags_caller+0x71/0x90 [ 2304.953887][T14385] ? bpf_map_area_alloc+0x20/0x30 [ 2304.958894][T14385] __bpf_map_area_alloc+0xde/0xf0 [ 2304.963928][T14385] bpf_map_area_alloc+0x20/0x30 [ 2304.968863][T14385] htab_map_alloc+0x8d3/0x11c0 [ 2304.973625][T14385] ? htab_map_update_elem+0xca0/0xca0 [ 2304.979082][T14385] __do_sys_bpf+0x478/0x3810 [ 2304.983691][T14385] ? bpf_prog_load+0x18f0/0x18f0 [ 2304.988631][T14385] ? __kasan_check_write+0x14/0x20 [ 2304.993736][T14385] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2304.999263][T14385] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2305.004566][T14385] ? wait_for_completion+0x440/0x440 [ 2305.009861][T14385] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2305.016099][T14385] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2305.021553][T14385] ? do_syscall_64+0x26/0x790 [ 2305.026237][T14385] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2305.032336][T14385] ? do_syscall_64+0x26/0x790 [ 2305.037034][T14385] __x64_sys_bpf+0x73/0xb0 [ 2305.041434][T14385] do_syscall_64+0xfa/0x790 [ 2305.045939][T14385] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2305.051899][T14385] RIP: 0033:0x45a909 [ 2305.055888][T14385] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2305.075471][T14385] RSP: 002b:00007f5b93d6ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2305.083875][T14385] RAX: ffffffffffffffda RBX: 00007f5b93d6ac90 RCX: 000000000045a909 [ 2305.091865][T14385] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2305.099816][T14385] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2305.107769][T14385] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d6b6d4 [ 2305.115725][T14385] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 03:37:40 executing program 1 (fault-call:17 fault-nth:5): bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) [ 2305.259570][T14390] FAULT_INJECTION: forcing a failure. [ 2305.259570][T14390] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2305.273292][T14390] CPU: 1 PID: 14390 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2305.281965][T14390] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2305.292010][T14390] Call Trace: [ 2305.295295][T14390] dump_stack+0x197/0x210 [ 2305.299618][T14390] should_fail.cold+0xa/0x15 [ 2305.304203][T14390] ? fault_create_debugfs_attr+0x180/0x180 [ 2305.310005][T14390] ? ___might_sleep+0x163/0x2c0 [ 2305.314844][T14390] should_fail_alloc_page+0x50/0x60 [ 2305.320018][T14390] __alloc_pages_nodemask+0x1a1/0x910 [ 2305.325485][T14390] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2305.331006][T14390] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2305.336706][T14390] ? kasan_unpoison_shadow+0x35/0x50 [ 2305.341966][T14390] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2305.348184][T14390] alloc_pages_current+0x107/0x210 [ 2305.353279][T14390] __vmalloc_node_range+0x4f8/0x810 [ 2305.358466][T14390] ? bpf_map_area_alloc+0x20/0x30 [ 2305.363470][T14390] __vmalloc_node_flags_caller+0x71/0x90 [ 2305.369079][T14390] ? bpf_map_area_alloc+0x20/0x30 [ 2305.374081][T14390] __bpf_map_area_alloc+0xde/0xf0 [ 2305.379092][T14390] bpf_map_area_alloc+0x20/0x30 [ 2305.383925][T14390] htab_map_alloc+0x8d3/0x11c0 [ 2305.388674][T14390] ? htab_map_update_elem+0xca0/0xca0 [ 2305.394043][T14390] __do_sys_bpf+0x478/0x3810 [ 2305.398620][T14390] ? bpf_prog_load+0x18f0/0x18f0 [ 2305.403547][T14390] ? __kasan_check_write+0x14/0x20 [ 2305.408649][T14390] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2305.414176][T14390] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2305.419548][T14390] ? wait_for_completion+0x440/0x440 [ 2305.424816][T14390] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2305.431039][T14390] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2305.436473][T14390] ? do_syscall_64+0x26/0x790 [ 2305.441125][T14390] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2305.447169][T14390] ? do_syscall_64+0x26/0x790 [ 2305.451836][T14390] __x64_sys_bpf+0x73/0xb0 [ 2305.456235][T14390] do_syscall_64+0xfa/0x790 [ 2305.460721][T14390] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2305.466589][T14390] RIP: 0033:0x45a909 [ 2305.470462][T14390] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2305.490044][T14390] RSP: 002b:00007f5b93d6ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2305.498435][T14390] RAX: ffffffffffffffda RBX: 00007f5b93d6ac90 RCX: 000000000045a909 [ 2305.506412][T14390] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2305.514379][T14390] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2305.522336][T14390] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d6b6d4 [ 2305.530287][T14390] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 03:37:41 executing program 1 (fault-call:17 fault-nth:6): bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) [ 2305.692797][T14396] FAULT_INJECTION: forcing a failure. [ 2305.692797][T14396] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2305.706221][T14396] CPU: 0 PID: 14396 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2305.714909][T14396] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2305.724976][T14396] Call Trace: [ 2305.728262][T14396] dump_stack+0x197/0x210 [ 2305.732622][T14396] should_fail.cold+0xa/0x15 [ 2305.737253][T14396] ? fault_create_debugfs_attr+0x180/0x180 [ 2305.743085][T14396] ? ___might_sleep+0x163/0x2c0 [ 2305.747932][T14396] should_fail_alloc_page+0x50/0x60 [ 2305.753120][T14396] __alloc_pages_nodemask+0x1a1/0x910 [ 2305.758476][T14396] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2305.764008][T14396] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2305.769719][T14396] ? kasan_unpoison_shadow+0x35/0x50 [ 2305.774988][T14396] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2305.781215][T14396] alloc_pages_current+0x107/0x210 [ 2305.786317][T14396] __vmalloc_node_range+0x4f8/0x810 [ 2305.791608][T14396] ? bpf_map_area_alloc+0x20/0x30 [ 2305.796619][T14396] __vmalloc_node_flags_caller+0x71/0x90 [ 2305.802450][T14396] ? bpf_map_area_alloc+0x20/0x30 [ 2305.807466][T14396] __bpf_map_area_alloc+0xde/0xf0 [ 2305.812490][T14396] bpf_map_area_alloc+0x20/0x30 [ 2305.817325][T14396] htab_map_alloc+0x8d3/0x11c0 [ 2305.822103][T14396] ? htab_map_update_elem+0xca0/0xca0 [ 2305.827459][T14396] __do_sys_bpf+0x478/0x3810 [ 2305.832045][T14396] ? bpf_prog_load+0x18f0/0x18f0 [ 2305.836978][T14396] ? __kasan_check_write+0x14/0x20 [ 2305.842102][T14396] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2305.847636][T14396] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2305.852909][T14396] ? wait_for_completion+0x440/0x440 [ 2305.858212][T14396] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2305.864475][T14396] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2305.869927][T14396] ? do_syscall_64+0x26/0x790 [ 2305.874588][T14396] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2305.880638][T14396] ? do_syscall_64+0x26/0x790 [ 2305.885312][T14396] __x64_sys_bpf+0x73/0xb0 [ 2305.889719][T14396] do_syscall_64+0xfa/0x790 [ 2305.894216][T14396] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2305.900089][T14396] RIP: 0033:0x45a909 [ 2305.903971][T14396] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2305.923560][T14396] RSP: 002b:00007f5b93d6ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2305.931952][T14396] RAX: ffffffffffffffda RBX: 00007f5b93d6ac90 RCX: 000000000045a909 [ 2305.939908][T14396] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2305.947858][T14396] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2305.955807][T14396] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d6b6d4 [ 2305.963758][T14396] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 03:37:41 executing program 1 (fault-call:17 fault-nth:7): bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) [ 2306.117918][T14400] FAULT_INJECTION: forcing a failure. [ 2306.117918][T14400] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2306.131288][T14400] CPU: 0 PID: 14400 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2306.139946][T14400] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2306.149994][T14400] Call Trace: [ 2306.153298][T14400] dump_stack+0x197/0x210 [ 2306.157633][T14400] should_fail.cold+0xa/0x15 [ 2306.162252][T14400] ? fault_create_debugfs_attr+0x180/0x180 [ 2306.168054][T14400] ? ___might_sleep+0x163/0x2c0 [ 2306.172921][T14400] should_fail_alloc_page+0x50/0x60 [ 2306.178106][T14400] __alloc_pages_nodemask+0x1a1/0x910 [ 2306.183475][T14400] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2306.189027][T14400] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2306.194754][T14400] ? kasan_unpoison_shadow+0x35/0x50 [ 2306.200042][T14400] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2306.206277][T14400] alloc_pages_current+0x107/0x210 [ 2306.211400][T14400] ? ___might_sleep+0x163/0x2c0 [ 2306.216233][T14400] __vmalloc_node_range+0x4f8/0x810 [ 2306.221415][T14400] ? bpf_map_area_alloc+0x20/0x30 [ 2306.226442][T14400] __vmalloc_node_flags_caller+0x71/0x90 [ 2306.232174][T14400] ? bpf_map_area_alloc+0x20/0x30 [ 2306.237186][T14400] __bpf_map_area_alloc+0xde/0xf0 [ 2306.242224][T14400] bpf_map_area_alloc+0x20/0x30 [ 2306.247065][T14400] htab_map_alloc+0x8d3/0x11c0 [ 2306.251844][T14400] ? htab_map_update_elem+0xca0/0xca0 [ 2306.257215][T14400] __do_sys_bpf+0x478/0x3810 [ 2306.261814][T14400] ? bpf_prog_load+0x18f0/0x18f0 [ 2306.266751][T14400] ? __kasan_check_write+0x14/0x20 [ 2306.271860][T14400] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2306.277401][T14400] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2306.282679][T14400] ? wait_for_completion+0x440/0x440 [ 2306.287963][T14400] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2306.294237][T14400] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2306.299688][T14400] ? do_syscall_64+0x26/0x790 [ 2306.304374][T14400] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2306.310451][T14400] ? do_syscall_64+0x26/0x790 [ 2306.315119][T14400] __x64_sys_bpf+0x73/0xb0 [ 2306.319519][T14400] do_syscall_64+0xfa/0x790 [ 2306.324010][T14400] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2306.329917][T14400] RIP: 0033:0x45a909 [ 2306.333804][T14400] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2306.353419][T14400] RSP: 002b:00007f5b93d6ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2306.353437][T14400] RAX: ffffffffffffffda RBX: 00007f5b93d6ac90 RCX: 000000000045a909 [ 2306.353447][T14400] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2306.353458][T14400] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2306.353467][T14400] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d6b6d4 [ 2306.353477][T14400] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 03:37:56 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="67637860f93393422404ff92732eee69a58bf1e2022ac7ac6bc0a5d74291678c02aa0d0e50b3758b0d604e449f32ba6d032a1f80246d76ca1cbffd78d42923e5791487e81335a1a6b97c00000064d5c12df9ac71d05c48edf81de32a8e0cbd84347d6bcb9f3f383786db307104e1b6b3caaf156bf7ccbdb10c2d3db67170acc893897694a14fa49095b10b589afb1677ebccf1f96ab7fa9a80837f22e19013ab515af2f00c2e171650813391e7be46d75aab054fd9be871278eb55e11e88662d9485a8fe10"], 0x200600) socketpair(0x2be5bbb09611288e, 0x3, 0x0, &(0x7f0000000580)={0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f00000019c0)={&(0x7f00000005c0)={0x2, 0x4e20, @multicast2}, 0x10, &(0x7f0000001900)=[{&(0x7f0000000600)="453c2646c5bf144f5425f19816615c9d40353a06badccad7cf05b7d876376686a506ac385c0aec6c2b7b2216c780fc2f38eac559effc0efe98e8310fefa7977624881fc73e2acd8a4db651a9626c2485afe05fcaa636bd28c6efd2246c574feec100a4d36c409c17cbb4083be47a27e33fd06e1dbc3bcc520641db1da84f4105460344a6cdecb37dbfae5b8ce571aa7fb8e65423657afb28a4c06c72e15bed35d0ad45006160a185b3590d96ac0c62e76008d78a34dd32fb333415c5980f4d662d25af69ba3bf91465086beb1be86ae09fbae7b9dd451cff908f16f9dfb57b405bb3e4091621dbd62138271dce8a3e57bbd1da02fa81", 0xf6}, {&(0x7f0000000700)="ec716eaf7090a75d72d99483abf599c31db0715c4c516ce6e695103f23709611e15c944a3f9b05f2a4cc7c6ff6f600387a81b273e3c05e3c513d6e832db2ee6ef48698f4ae29d390201f486e0f08398b96b22be9527e8f9ef1a0b8fee8fc0a5bd73d8ae73500b7437f659c5ee354d015d1ba3771a5d2a3fc34ceaf6389a45ce21d6a7c563dbb894d18808ae14235f10424ce267bb94349d9181660c74b4ca548b9b9fddba912b6d0b38e662ad59c4af03a69c086beeeda7bb2894cf8ba33ad7f34e56fc8b07cbc27e7a944c5db36814e", 0xd0}, {&(0x7f0000000800)="1979bd77f371df8c4a673c424984059b392f251c041cddfabe869b0ec3e7c8cadf18f82db71055f371d677cb5048578a6e4c90c483b51574d3342a9df51f9a010673282737cf52f6b83820d715acbc891531cbe71b047d8d6e0e04327ef69dc42001e6ca4f8225c28370b6d1067fd20903577eba0a1681641f29a6aa6483ba94cc2ea50d83e71da5798d370ccd047f8b8a0249c3cbc5376578123851304c7054ec44d341ed7e86207928ba24d5cca9316ed72b77a9a96c2aba4ff5cfd8053432fc526df47413717087f040ced93633becd132f68d2f8df548a95d5995c9a631c6aff2ec196307d", 0xe7}, {&(0x7f0000000900)="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", 0x1000}], 0x4, &(0x7f0000001940)=[@ip_retopts={{0x10}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x2000000}}, @ip_retopts={{0x38, 0x0, 0x7, {[@ssrr={0x89, 0x7, 0xe0, [@multicast1]}, @end, @lsrr={0x83, 0x13, 0x8, [@local, @multicast2, @dev={0xac, 0x14, 0x14, 0x19}, @dev={0xac, 0x14, 0x14, 0x1f}]}, @ssrr={0x89, 0xb, 0x2, [@multicast1, @remote]}]}}}], 0x60}, 0x20000000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000062000, 0x500001c) write$cgroup_type(r1, &(0x7f0000000040)='threaded\x00', 0x9) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000032000535d25a80648c63940d0124fc60100002400a000200053582c137153e370400018003001700d1bd", 0x33fe0}], 0x1}, 0x0) recvmsg$kcm(r3, &(0x7f0000000740)={&(0x7f00000003c0)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000cc0)=""/4096, 0x1000}, 0x40010080) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000180)=@rc={0x1f, {0x6, 0x80, 0x2, 0x40, 0x6, 0x81}, 0x3}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000000)="237de9ce1f400276698772ce", 0xc}, {&(0x7f0000000080)="64f713501a5e4695446f", 0xa}], 0x2, &(0x7f0000000280)=ANY=[@ANYBLOB="8800000000000000180100008100000008f546693e3174d54087ab9de7c4e927232a9cb4afedccfbc6e42b9b1eafe29c2e2c7267e4978e63490c4e0010080409f33781e74eb4fc7313fff5551a86a3c3b66dcbb4798286de3acbccc7f0d23b559e7633a7ccbe3065a1713f1b138f2b24d4447a561bf6b3992a46b0f524241d9d272ee2b6091c3eda096211cf825d50a88000000000001800000000000000fc01"], 0xa0}, 0x80) 03:37:56 executing program 1 (fault-call:17 fault-nth:8): bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) [ 2321.102912][T14414] FAULT_INJECTION: forcing a failure. [ 2321.102912][T14414] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2321.116315][T14414] CPU: 1 PID: 14414 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2321.124987][T14414] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2321.135047][T14414] Call Trace: [ 2321.138387][T14414] dump_stack+0x197/0x210 [ 2321.142716][T14414] should_fail.cold+0xa/0x15 [ 2321.147300][T14414] ? fault_create_debugfs_attr+0x180/0x180 [ 2321.153104][T14414] ? ___might_sleep+0x163/0x2c0 [ 2321.157961][T14414] should_fail_alloc_page+0x50/0x60 [ 2321.163141][T14414] __alloc_pages_nodemask+0x1a1/0x910 [ 2321.168495][T14414] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2321.174044][T14414] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2321.179752][T14414] ? kasan_unpoison_shadow+0x35/0x50 [ 2321.185021][T14414] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2321.191248][T14414] alloc_pages_current+0x107/0x210 [ 2321.196339][T14414] ? ___might_sleep+0x163/0x2c0 [ 2321.201170][T14414] __vmalloc_node_range+0x4f8/0x810 [ 2321.206363][T14414] ? bpf_map_area_alloc+0x20/0x30 [ 2321.211378][T14414] __vmalloc_node_flags_caller+0x71/0x90 [ 2321.216994][T14414] ? bpf_map_area_alloc+0x20/0x30 [ 2321.222000][T14414] __bpf_map_area_alloc+0xde/0xf0 [ 2321.227010][T14414] bpf_map_area_alloc+0x20/0x30 [ 2321.231841][T14414] htab_map_alloc+0x8d3/0x11c0 [ 2321.236600][T14414] ? htab_map_update_elem+0xca0/0xca0 [ 2321.241967][T14414] __do_sys_bpf+0x478/0x3810 [ 2321.246539][T14414] ? bpf_prog_load+0x18f0/0x18f0 [ 2321.251464][T14414] ? __kasan_check_write+0x14/0x20 [ 2321.256572][T14414] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2321.262096][T14414] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2321.267363][T14414] ? wait_for_completion+0x440/0x440 [ 2321.272631][T14414] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2321.278863][T14414] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2321.284302][T14414] ? do_syscall_64+0x26/0x790 [ 2321.288969][T14414] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2321.295015][T14414] ? do_syscall_64+0x26/0x790 [ 2321.299677][T14414] __x64_sys_bpf+0x73/0xb0 [ 2321.304077][T14414] do_syscall_64+0xfa/0x790 [ 2321.308564][T14414] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2321.314435][T14414] RIP: 0033:0x45a909 [ 2321.318313][T14414] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2321.337902][T14414] RSP: 002b:00007f5b93d6ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2321.346292][T14414] RAX: ffffffffffffffda RBX: 00007f5b93d6ac90 RCX: 000000000045a909 [ 2321.354263][T14414] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2321.362212][T14414] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2321.370163][T14414] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d6b6d4 [ 2321.378117][T14414] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 03:38:01 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="0ad6a14d77d9ab73584e6c76ac1e88a8b4a5d9b99cb860753d3df26db096c626c8a8874f43c126ec9572cbfc2d683fe2eab03129655cc2088e914140253dc39bca7264e6ba94e32f8101e2156c442084166f6e487aa69061e21bdfb508aa90a8e7bb2bce09cd26229c137dc15b5f7b49b53110545ab733adfb3d725d99e16d6398b618b0e3402c8f0a2dd72b0ee6670802c59cd85a3d66a7fe88fe25e5e1d0061544f19056a0fc5d1963bda279df08f762c4254167d63525b1a554a00bd3f226b52e026edc1a37944079c56088dccc9ca0564602194f628be3ec7dcd87601fbaadbfae2a6b309a"}, {&(0x7f0000000300)="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"}, {&(0x7f0000001300)="36dea1fdcc8db5f462dcfe6a663d2bb8d73b622fca63feff4f7fb59fa5bc699b63eeb1c54ebbab8a01dfa3078b14ba6934561901b634685388f90b2ff232ad653c3e900f3668b67b49354ad9337b99403481fb455b9a6e345bdc1fdef32856", 0xffffffffffffff0c}], 0x1}, 0x20004041) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000001480)='syz1\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f00000014c0)='syz1\x00', 0x200002, 0x0) recvmsg(r0, &(0x7f00000002c0)={&(0x7f00000001c0)=@ax25={{0x3, @bcast}, [@bcast, @null, @remote, @remote, @netrom, @netrom, @remote, @default]}, 0x80, &(0x7f0000000080)=[{&(0x7f0000001380)=""/221, 0xdd}], 0x1, &(0x7f0000000240)=""/76, 0x4c}, 0x2020) 03:38:01 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_type(r0, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000380)='cpuset.mems\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x30863, 0x0) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0xfffffc61) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000240)={'hwsim0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f00000000c0)={'hwsim0\x00', @random="0894f53e01dc"}) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)={0xffff, 0x5}, 0xc) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup\x00\f\x7f\xd9\xfa;\x8b\x88gb\xefi\x16\x91\xbb\xc4\xd5Jk\tU~ \xa4\vR\\\x8a\xdb\xcel\xe0\xa3[\xae\x9d\xac\x84\x9f\v\x9e\x9f\r\x10\x1f\xd3\x80\xc1\xccq\xab\x01y\xed\xfc\x96)\xf6_>+\xa03\xf4\xcc0\xbbE\xb0\xc3\x94\xd53\x87\xd6\xc4\\\xc7\x82\xe9\xaf\xb5\xb6\x15\xf4K2\x17\f\x98\x1c\xebq/\xf5\x81#\x85\xc5\xa0\xfd\xfac\xd9\xf2c`\xe9[c\a\x12\x1bb\x82\x83\x86d\xf0k\xa8\x90\x06\xa8\x1cK\xea\x19\x91\a1z)\xde_r`\xee\xb6\x9e\xcb\x05\x00\x00\x82\xa1\t\xc9\x05\xcc^', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000200)='memory.high\x00\x90\x80\xa4\x96\xbb\xe4\xb2\xa2\x01\xc0\xb8*Z\xef\xf8\x0e\x1f]\xf7\x10\xdb\xfe\xe4\x1d\xc6\x92\x7f\xeeK_p\t\x8c\x9f5\xd0\xef)\xd8\x04\xbf\xc2N\x1c\xf0R\xdc\r\xb1Gf\xba\xd11#<\xaf^,s\x85\x10R\x99\xc2D\xee\n\"\xf9c\x15{\xc1[\xef\x06\x8a\xcd\x9d\xc8\x90#\xd0\xe7\xe3\xe0\xa9\xf3\xc0n\x1f\xd1\x11P\xe20\xcd\x1c\xfa\xfd\xa3\xcf\x9c\xc6\xb7]\x16\xc7\xd7\xb4/\x82\xd1\xae\xd9TM\x05a\xe5\xc5U\x91\xbe\x81\xac4\x9d\x02`\xe7\xa6q\x1f@\x1f\x1f?tm\x9c\xd1\x8c\xa1\xb5\xe0`H)\x97r\xc0?y\x9cc=c`A^\x9f\xcd\xbc\xf4m>I\xae\xdf\x946\xe7M`\xeb\x9fm\xbe+n\x00\x18k\x98\xab\xd5\xeet\"d\x81\x94\x04\xf5\xeb', 0x2, 0x0) write$cgroup_int(r4, 0x0, 0x0) 03:38:01 executing program 1 (fault-call:17 fault-nth:9): bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) 03:38:01 executing program 5: socketpair(0xf, 0x3, 0x2, &(0x7f0000000080)) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000032000535d25a80648c63940d0124fc60100002400a000200053582c137153e370400018003001700d1bd", 0x33fe0}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000740)={&(0x7f00000003c0)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000cc0)=""/4096, 0x1000}, 0x40010080) sendmsg$kcm(r0, &(0x7f0000000440)={&(0x7f0000000000)=@ax25={{0x3, @null, 0x7}, [@default, @bcast, @bcast, @bcast, @default, @null, @default, @default]}, 0x80, &(0x7f00000003c0)=[{&(0x7f00000000c0)="56880afc9db105b84af8950e9794aadd6dfb0d3d0b067be0e6049b7faac5e906", 0x20}, {&(0x7f0000000100)="67e4e5ce78902d5dbc47a217a1352c86a205989c38e5dcdb686d1b21d301e8f900d5333cc56e7d3c870a3177cc828e01becc9d4676a9641fc8325e969a97f402bec91a855855a9ae0e22f6148f0542f107", 0x51}, {&(0x7f0000000180)="c538c686fb07175724b008", 0xb}, {&(0x7f00000001c0)="7cbe11f5d9e51b3174ae597944e9443d7d347106c44ab68102364f65029ce9a9bd3c46101378eee0a7cfc2a2ce6ae724452485b7766440c5b36cfa96d9fb7462bd2b4e9c1baa83f4a52cf43d0519", 0x4e}, {&(0x7f0000000240)="c349a1f385f327603f02a62e5a8ad34aea82d301fd94cf80d7abc7f457fc3e3656e17ae35d0537e6225ada3dc1b6404d92267b5a9ea308bf6403c7340935ff3d24d2468f379df533323e2dc905488900f96769abb1c2067f3520b8f4614d18bf3f433e6e07aa5ebdea15de9e5328f164c3abccf2a3d9ccdec62d4c43f3ba945edee3c4b59aad251a3d865946b599998e3b66d8833e5aedbf013cfa1bf74050d565cf722e9610f1e191ce8c0ba835d6fb6730c4012fe1f98a505b8cadc4cb799dda30e4d917c2d573aa98a20c9b", 0xcd}, {&(0x7f0000000340)="f5e12c0572558069f2c09ff377b7b78879ac9321ccacbb44f9176b0c657a640a226588d56608b3a345f13cfa742b6fb6b5c21ad70ee3612e255029df4079cb8eecdb231a32672454abd87f50d309c7672d3b1a06409090a003c36e5f832300f2bf4e197fd98412eb8980409c6dcd789617c4d504a903ab", 0x77}], 0x6}, 0x8000) [ 2325.664173][T14425] FAULT_INJECTION: forcing a failure. [ 2325.664173][T14425] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2325.677450][T14425] CPU: 0 PID: 14425 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2325.686113][T14425] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2325.696169][T14425] Call Trace: [ 2325.699446][T14425] dump_stack+0x197/0x210 [ 2325.703777][T14425] should_fail.cold+0xa/0x15 [ 2325.708389][T14425] ? fault_create_debugfs_attr+0x180/0x180 [ 2325.714194][T14425] ? ___might_sleep+0x163/0x2c0 [ 2325.719032][T14425] should_fail_alloc_page+0x50/0x60 [ 2325.724213][T14425] __alloc_pages_nodemask+0x1a1/0x910 [ 2325.729571][T14425] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2325.735092][T14425] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2325.740790][T14425] ? kasan_unpoison_shadow+0x35/0x50 [ 2325.746081][T14425] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2325.752317][T14425] alloc_pages_current+0x107/0x210 [ 2325.757441][T14425] ? ___might_sleep+0x163/0x2c0 [ 2325.762283][T14425] __vmalloc_node_range+0x4f8/0x810 [ 2325.767488][T14425] ? bpf_map_area_alloc+0x20/0x30 [ 2325.772500][T14425] __vmalloc_node_flags_caller+0x71/0x90 [ 2325.778111][T14425] ? bpf_map_area_alloc+0x20/0x30 [ 2325.783124][T14425] __bpf_map_area_alloc+0xde/0xf0 [ 2325.788153][T14425] bpf_map_area_alloc+0x20/0x30 [ 2325.792994][T14425] htab_map_alloc+0x8d3/0x11c0 [ 2325.797744][T14425] ? htab_map_update_elem+0xca0/0xca0 [ 2325.803110][T14425] __do_sys_bpf+0x478/0x3810 [ 2325.807688][T14425] ? bpf_prog_load+0x18f0/0x18f0 [ 2325.812615][T14425] ? __kasan_check_write+0x14/0x20 [ 2325.817725][T14425] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2325.823259][T14425] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2325.828531][T14425] ? wait_for_completion+0x440/0x440 [ 2325.833798][T14425] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2325.840138][T14425] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2325.845589][T14425] ? do_syscall_64+0x26/0x790 [ 2325.850255][T14425] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2325.856300][T14425] ? do_syscall_64+0x26/0x790 [ 2325.860960][T14425] __x64_sys_bpf+0x73/0xb0 [ 2325.865369][T14425] do_syscall_64+0xfa/0x790 [ 2325.869865][T14425] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2325.875775][T14425] RIP: 0033:0x45a909 [ 2325.879661][T14425] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2325.899244][T14425] RSP: 002b:00007f5b93d49c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 03:38:01 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_type(r0, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000380)='cpuset.mems\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x30863, 0x0) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0xfffffc61) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000240)={'hwsim0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f00000000c0)={'hwsim0\x00', @random="0894f53e01dc"}) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)={0xffff, 0x5}, 0xc) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000200)='memory.high\x00\x90\x80\xa4\x96\xbb\xe4\xb2\xa2\x01\xc0\xb8*Z\xef\xf8\x0e\x1f]\xf7\x10\xdb\xfe\xe4\x1d\xc6\x92\x7f\xeeK_p\t\x8c\x9f5\xd0\xef)\xd8\x04\xbf\xc2N\x1c\xf0R\xdc\r\xb1Gf\xba\xd11#<\xaf^,s\x85\x10R\x99\xc2D\xee\n\"\xf9c\x15{\xc1[\xef\x06\x8a\xcd\x9d\xc8\x90#\xd0\xe7\xe3\xe0\xa9\xf3\xc0n\x1f\xd1\x11P\xe20\xcd\x1c\xfa\xfd\xa3\xcf\x9c\xc6\xb7]\x16\xc7\xd7\xb4/\x82\xd1\xae\xd9TM\x05a\xe5\xc5U\x91\xbe\x81\xac4\x9d\x02`\xe7\xa6q\x1f@\x1f\x1f?tm\x9c\xd1\x8c\xa1\xb5\xe0`H)\x97r\xc0?y\x9cc=c`A^\x9f\xcd\xbc\xf4m>I\xae\xdf\x946\xe7M`\xeb\x9fm\xbe+n\x00\x18k\x98\xab\xd5\xeet\"d\x81\x94\x04\xf5\xeb', 0x2, 0x0) write$cgroup_int(r4, 0x0, 0x0) [ 2325.907639][T14425] RAX: ffffffffffffffda RBX: 00007f5b93d49c90 RCX: 000000000045a909 [ 2325.915588][T14425] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2325.923547][T14425] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2325.931649][T14425] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d4a6d4 [ 2325.939626][T14425] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 03:38:01 executing program 1 (fault-call:17 fault-nth:10): bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) [ 2326.090531][T14428] FAULT_INJECTION: forcing a failure. [ 2326.090531][T14428] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2326.104102][T14428] CPU: 0 PID: 14428 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2326.112786][T14428] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2326.122853][T14428] Call Trace: [ 2326.126161][T14428] dump_stack+0x197/0x210 [ 2326.130501][T14428] should_fail.cold+0xa/0x15 [ 2326.135102][T14428] ? fault_create_debugfs_attr+0x180/0x180 [ 2326.140916][T14428] ? ___might_sleep+0x163/0x2c0 [ 2326.145774][T14428] should_fail_alloc_page+0x50/0x60 [ 2326.150959][T14428] __alloc_pages_nodemask+0x1a1/0x910 [ 2326.156331][T14428] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2326.161878][T14428] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2326.167593][T14428] ? kasan_unpoison_shadow+0x35/0x50 [ 2326.172866][T14428] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2326.179105][T14428] alloc_pages_current+0x107/0x210 [ 2326.184223][T14428] ? ___might_sleep+0x163/0x2c0 [ 2326.189086][T14428] __vmalloc_node_range+0x4f8/0x810 [ 2326.194310][T14428] ? bpf_map_area_alloc+0x20/0x30 [ 2326.199326][T14428] __vmalloc_node_flags_caller+0x71/0x90 [ 2326.204953][T14428] ? bpf_map_area_alloc+0x20/0x30 [ 2326.209968][T14428] __bpf_map_area_alloc+0xde/0xf0 [ 2326.214985][T14428] bpf_map_area_alloc+0x20/0x30 [ 2326.219826][T14428] htab_map_alloc+0x8d3/0x11c0 [ 2326.224599][T14428] ? htab_map_update_elem+0xca0/0xca0 [ 2326.229975][T14428] __do_sys_bpf+0x478/0x3810 [ 2326.234568][T14428] ? bpf_prog_load+0x18f0/0x18f0 [ 2326.239497][T14428] ? __kasan_check_write+0x14/0x20 [ 2326.244601][T14428] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2326.250150][T14428] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2326.255432][T14428] ? wait_for_completion+0x440/0x440 [ 2326.260732][T14428] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2326.267498][T14428] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2326.272948][T14428] ? do_syscall_64+0x26/0x790 [ 2326.277632][T14428] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2326.283704][T14428] ? do_syscall_64+0x26/0x790 [ 2326.288384][T14428] __x64_sys_bpf+0x73/0xb0 [ 2326.292794][T14428] do_syscall_64+0xfa/0x790 [ 2326.297294][T14428] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2326.303204][T14428] RIP: 0033:0x45a909 [ 2326.307118][T14428] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2326.326723][T14428] RSP: 002b:00007f5b93d6ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2326.335154][T14428] RAX: ffffffffffffffda RBX: 00007f5b93d6ac90 RCX: 000000000045a909 [ 2326.343124][T14428] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2326.351581][T14428] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2326.359539][T14428] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d6b6d4 [ 2326.367583][T14428] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 03:38:02 executing program 1 (fault-call:17 fault-nth:11): bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) [ 2326.546768][T14433] FAULT_INJECTION: forcing a failure. [ 2326.546768][T14433] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2326.560686][T14433] CPU: 1 PID: 14433 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2326.569347][T14433] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2326.579416][T14433] Call Trace: [ 2326.582696][T14433] dump_stack+0x197/0x210 [ 2326.587023][T14433] should_fail.cold+0xa/0x15 [ 2326.591614][T14433] ? fault_create_debugfs_attr+0x180/0x180 [ 2326.597417][T14433] ? ___might_sleep+0x163/0x2c0 [ 2326.602261][T14433] should_fail_alloc_page+0x50/0x60 [ 2326.607439][T14433] __alloc_pages_nodemask+0x1a1/0x910 [ 2326.612794][T14433] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2326.618323][T14433] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2326.624030][T14433] ? kasan_unpoison_shadow+0x35/0x50 [ 2326.629300][T14433] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2326.635536][T14433] alloc_pages_current+0x107/0x210 [ 2326.640628][T14433] ? ___might_sleep+0x163/0x2c0 [ 2326.645558][T14433] __vmalloc_node_range+0x4f8/0x810 [ 2326.650745][T14433] ? bpf_map_area_alloc+0x20/0x30 [ 2326.655752][T14433] __vmalloc_node_flags_caller+0x71/0x90 [ 2326.661451][T14433] ? bpf_map_area_alloc+0x20/0x30 [ 2326.666458][T14433] __bpf_map_area_alloc+0xde/0xf0 [ 2326.671471][T14433] bpf_map_area_alloc+0x20/0x30 [ 2326.676314][T14433] htab_map_alloc+0x8d3/0x11c0 [ 2326.681067][T14433] ? htab_map_update_elem+0xca0/0xca0 [ 2326.686420][T14433] __do_sys_bpf+0x478/0x3810 [ 2326.691006][T14433] ? bpf_prog_load+0x18f0/0x18f0 [ 2326.695925][T14433] ? __kasan_check_write+0x14/0x20 [ 2326.701015][T14433] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2326.706562][T14433] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2326.711849][T14433] ? wait_for_completion+0x440/0x440 [ 2326.717124][T14433] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2326.723359][T14433] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2326.728807][T14433] ? do_syscall_64+0x26/0x790 [ 2326.733556][T14433] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2326.739611][T14433] ? do_syscall_64+0x26/0x790 [ 2326.744279][T14433] __x64_sys_bpf+0x73/0xb0 [ 2326.748690][T14433] do_syscall_64+0xfa/0x790 [ 2326.753519][T14433] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2326.759393][T14433] RIP: 0033:0x45a909 [ 2326.763273][T14433] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2326.782946][T14433] RSP: 002b:00007f5b93d6ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2326.791341][T14433] RAX: ffffffffffffffda RBX: 00007f5b93d6ac90 RCX: 000000000045a909 [ 2326.799294][T14433] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2326.807243][T14433] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2326.815196][T14433] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d6b6d4 [ 2326.823148][T14433] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 03:38:02 executing program 1 (fault-call:17 fault-nth:12): bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) [ 2327.014726][T14438] FAULT_INJECTION: forcing a failure. [ 2327.014726][T14438] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2327.028183][T14438] CPU: 1 PID: 14438 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2327.036849][T14438] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2327.046895][T14438] Call Trace: [ 2327.050168][T14438] dump_stack+0x197/0x210 [ 2327.054484][T14438] should_fail.cold+0xa/0x15 [ 2327.059055][T14438] ? fault_create_debugfs_attr+0x180/0x180 [ 2327.064856][T14438] ? ___might_sleep+0x163/0x2c0 [ 2327.069697][T14438] should_fail_alloc_page+0x50/0x60 [ 2327.074874][T14438] __alloc_pages_nodemask+0x1a1/0x910 [ 2327.080228][T14438] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2327.085756][T14438] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2327.091460][T14438] ? kasan_unpoison_shadow+0x35/0x50 [ 2327.096732][T14438] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2327.102951][T14438] alloc_pages_current+0x107/0x210 [ 2327.108038][T14438] ? ___might_sleep+0x163/0x2c0 [ 2327.112871][T14438] __vmalloc_node_range+0x4f8/0x810 [ 2327.118093][T14438] ? bpf_map_area_alloc+0x20/0x30 [ 2327.123109][T14438] __vmalloc_node_flags_caller+0x71/0x90 [ 2327.128721][T14438] ? bpf_map_area_alloc+0x20/0x30 [ 2327.133733][T14438] __bpf_map_area_alloc+0xde/0xf0 [ 2327.138739][T14438] bpf_map_area_alloc+0x20/0x30 [ 2327.143571][T14438] htab_map_alloc+0x8d3/0x11c0 [ 2327.148324][T14438] ? htab_map_update_elem+0xca0/0xca0 [ 2327.153764][T14438] __do_sys_bpf+0x478/0x3810 [ 2327.158341][T14438] ? bpf_prog_load+0x18f0/0x18f0 [ 2327.163260][T14438] ? __kasan_check_write+0x14/0x20 [ 2327.168354][T14438] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2327.173877][T14438] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2327.179153][T14438] ? wait_for_completion+0x440/0x440 [ 2327.184422][T14438] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2327.190654][T14438] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2327.196101][T14438] ? do_syscall_64+0x26/0x790 [ 2327.200759][T14438] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2327.206822][T14438] ? do_syscall_64+0x26/0x790 [ 2327.211573][T14438] __x64_sys_bpf+0x73/0xb0 [ 2327.215971][T14438] do_syscall_64+0xfa/0x790 [ 2327.220456][T14438] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2327.226329][T14438] RIP: 0033:0x45a909 [ 2327.230200][T14438] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2327.249893][T14438] RSP: 002b:00007f5b93d6ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2327.258296][T14438] RAX: ffffffffffffffda RBX: 00007f5b93d6ac90 RCX: 000000000045a909 [ 2327.266266][T14438] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2327.274222][T14438] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2327.282175][T14438] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d6b6d4 [ 2327.290134][T14438] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 03:38:03 executing program 1 (fault-call:17 fault-nth:13): bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) [ 2327.497043][T14443] FAULT_INJECTION: forcing a failure. [ 2327.497043][T14443] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2327.510962][T14443] CPU: 1 PID: 14443 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2327.519613][T14443] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2327.529644][T14443] Call Trace: [ 2327.532913][T14443] dump_stack+0x197/0x210 [ 2327.537225][T14443] should_fail.cold+0xa/0x15 [ 2327.541804][T14443] ? fault_create_debugfs_attr+0x180/0x180 [ 2327.547622][T14443] ? ___might_sleep+0x163/0x2c0 [ 2327.552469][T14443] should_fail_alloc_page+0x50/0x60 [ 2327.557642][T14443] __alloc_pages_nodemask+0x1a1/0x910 [ 2327.563023][T14443] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2327.568565][T14443] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2327.574272][T14443] ? kasan_unpoison_shadow+0x35/0x50 [ 2327.579533][T14443] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2327.585748][T14443] alloc_pages_current+0x107/0x210 [ 2327.590845][T14443] ? ___might_sleep+0x163/0x2c0 [ 2327.595681][T14443] __vmalloc_node_range+0x4f8/0x810 [ 2327.600869][T14443] ? bpf_map_area_alloc+0x20/0x30 [ 2327.605875][T14443] __vmalloc_node_flags_caller+0x71/0x90 [ 2327.611490][T14443] ? bpf_map_area_alloc+0x20/0x30 [ 2327.616518][T14443] __bpf_map_area_alloc+0xde/0xf0 [ 2327.621522][T14443] bpf_map_area_alloc+0x20/0x30 [ 2327.626369][T14443] htab_map_alloc+0x8d3/0x11c0 [ 2327.631212][T14443] ? htab_map_update_elem+0xca0/0xca0 [ 2327.636571][T14443] __do_sys_bpf+0x478/0x3810 [ 2327.641151][T14443] ? bpf_prog_load+0x18f0/0x18f0 [ 2327.646066][T14443] ? __kasan_check_write+0x14/0x20 [ 2327.651167][T14443] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2327.656707][T14443] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2327.661979][T14443] ? wait_for_completion+0x440/0x440 [ 2327.667251][T14443] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2327.673492][T14443] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2327.678930][T14443] ? do_syscall_64+0x26/0x790 [ 2327.683587][T14443] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2327.689637][T14443] ? do_syscall_64+0x26/0x790 [ 2327.694295][T14443] __x64_sys_bpf+0x73/0xb0 [ 2327.698696][T14443] do_syscall_64+0xfa/0x790 [ 2327.703185][T14443] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2327.709054][T14443] RIP: 0033:0x45a909 [ 2327.713019][T14443] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2327.732691][T14443] RSP: 002b:00007f5b93d6ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2327.741082][T14443] RAX: ffffffffffffffda RBX: 00007f5b93d6ac90 RCX: 000000000045a909 [ 2327.749034][T14443] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2327.756985][T14443] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2327.764949][T14443] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d6b6d4 [ 2327.772905][T14443] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 03:38:03 executing program 1 (fault-call:17 fault-nth:14): bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) [ 2327.947897][T14448] FAULT_INJECTION: forcing a failure. [ 2327.947897][T14448] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2327.961398][T14448] CPU: 0 PID: 14448 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2327.970075][T14448] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2327.980117][T14448] Call Trace: [ 2327.983419][T14448] dump_stack+0x197/0x210 [ 2327.987770][T14448] should_fail.cold+0xa/0x15 [ 2327.992368][T14448] ? fault_create_debugfs_attr+0x180/0x180 [ 2327.998163][T14448] ? ___might_sleep+0x163/0x2c0 [ 2328.003132][T14448] should_fail_alloc_page+0x50/0x60 [ 2328.008430][T14448] __alloc_pages_nodemask+0x1a1/0x910 [ 2328.013802][T14448] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2328.019450][T14448] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2328.025391][T14448] ? kasan_unpoison_shadow+0x35/0x50 [ 2328.030694][T14448] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2328.036943][T14448] alloc_pages_current+0x107/0x210 [ 2328.042134][T14448] ? ___might_sleep+0x163/0x2c0 [ 2328.047003][T14448] __vmalloc_node_range+0x4f8/0x810 [ 2328.052205][T14448] ? bpf_map_area_alloc+0x20/0x30 [ 2328.057238][T14448] __vmalloc_node_flags_caller+0x71/0x90 [ 2328.062864][T14448] ? bpf_map_area_alloc+0x20/0x30 [ 2328.067898][T14448] __bpf_map_area_alloc+0xde/0xf0 [ 2328.072919][T14448] bpf_map_area_alloc+0x20/0x30 [ 2328.077755][T14448] htab_map_alloc+0x8d3/0x11c0 [ 2328.082545][T14448] ? htab_map_update_elem+0xca0/0xca0 [ 2328.087932][T14448] __do_sys_bpf+0x478/0x3810 [ 2328.092524][T14448] ? bpf_prog_load+0x18f0/0x18f0 [ 2328.097453][T14448] ? __kasan_check_write+0x14/0x20 [ 2328.102566][T14448] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2328.108119][T14448] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2328.113403][T14448] ? wait_for_completion+0x440/0x440 [ 2328.118685][T14448] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2328.124968][T14448] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2328.130445][T14448] ? do_syscall_64+0x26/0x790 [ 2328.135101][T14448] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2328.141155][T14448] ? do_syscall_64+0x26/0x790 [ 2328.145841][T14448] __x64_sys_bpf+0x73/0xb0 [ 2328.150257][T14448] do_syscall_64+0xfa/0x790 [ 2328.154748][T14448] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2328.160629][T14448] RIP: 0033:0x45a909 [ 2328.164528][T14448] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2328.184348][T14448] RSP: 002b:00007f5b93d6ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2328.192754][T14448] RAX: ffffffffffffffda RBX: 00007f5b93d6ac90 RCX: 000000000045a909 [ 2328.200704][T14448] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2328.208653][T14448] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2328.216607][T14448] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d6b6d4 [ 2328.224572][T14448] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 03:38:10 executing program 2: 03:38:10 executing program 1 (fault-call:17 fault-nth:15): bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) [ 2334.543159][T14458] FAULT_INJECTION: forcing a failure. [ 2334.543159][T14458] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2334.556466][T14458] CPU: 0 PID: 14458 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2334.565116][T14458] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2334.575274][T14458] Call Trace: [ 2334.578546][T14458] dump_stack+0x197/0x210 [ 2334.582872][T14458] should_fail.cold+0xa/0x15 [ 2334.587470][T14458] ? fault_create_debugfs_attr+0x180/0x180 [ 2334.593269][T14458] ? ___might_sleep+0x163/0x2c0 [ 2334.598114][T14458] should_fail_alloc_page+0x50/0x60 [ 2334.603316][T14458] __alloc_pages_nodemask+0x1a1/0x910 [ 2334.608665][T14458] ? preempt_schedule_irq+0xf3/0x160 [ 2334.613927][T14458] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2334.619629][T14458] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2334.625862][T14458] alloc_pages_current+0x107/0x210 [ 2334.630947][T14458] ? ___might_sleep+0x163/0x2c0 [ 2334.635782][T14458] __vmalloc_node_range+0x4f8/0x810 [ 2334.640982][T14458] ? bpf_map_area_alloc+0x20/0x30 [ 2334.645994][T14458] __vmalloc_node_flags_caller+0x71/0x90 [ 2334.651602][T14458] ? bpf_map_area_alloc+0x20/0x30 [ 2334.656602][T14458] __bpf_map_area_alloc+0xde/0xf0 [ 2334.661684][T14458] bpf_map_area_alloc+0x20/0x30 [ 2334.666515][T14458] htab_map_alloc+0x8d3/0x11c0 [ 2334.671286][T14458] ? htab_map_update_elem+0xca0/0xca0 [ 2334.676649][T14458] __do_sys_bpf+0x478/0x3810 [ 2334.681216][T14458] ? bpf_prog_load+0x18f0/0x18f0 [ 2334.686130][T14458] ? __kasan_check_write+0x14/0x20 [ 2334.691224][T14458] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2334.696747][T14458] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2334.702010][T14458] ? wait_for_completion+0x440/0x440 [ 2334.707274][T14458] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2334.713500][T14458] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2334.718945][T14458] ? do_syscall_64+0x26/0x790 [ 2334.723599][T14458] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2334.729642][T14458] ? do_syscall_64+0x26/0x790 [ 2334.734316][T14458] __x64_sys_bpf+0x73/0xb0 [ 2334.738707][T14458] do_syscall_64+0xfa/0x790 [ 2334.743188][T14458] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2334.749060][T14458] RIP: 0033:0x45a909 [ 2334.753305][T14458] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2334.772885][T14458] RSP: 002b:00007f5b93d49c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2334.781272][T14458] RAX: ffffffffffffffda RBX: 00007f5b93d49c90 RCX: 000000000045a909 [ 2334.789261][T14458] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2334.797206][T14458] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2334.805154][T14458] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d4a6d4 [ 2334.813104][T14458] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 03:38:20 executing program 4: 03:38:20 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_type(r0, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000380)='cpuset.mems\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x30863, 0x0) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0xfffffc61) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000240)={'hwsim0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f00000000c0)={'hwsim0\x00', @random="0894f53e01dc"}) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)={0xffff, 0x5}, 0xc) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup\x00\f\x7f\xd9\xfa;\x8b\x88gb\xefi\x16\x91\xbb\xc4\xd5Jk\tU~ \xa4\vR\\\x8a\xdb\xcel\xe0\xa3[\xae\x9d\xac\x84\x9f\v\x9e\x9f\r\x10\x1f\xd3\x80\xc1\xccq\xab\x01y\xed\xfc\x96)\xf6_>+\xa03\xf4\xcc0\xbbE\xb0\xc3\x94\xd53\x87\xd6\xc4\\\xc7\x82\xe9\xaf\xb5\xb6\x15\xf4K2\x17\f\x98\x1c\xebq/\xf5\x81#\x85\xc5\xa0\xfd\xfac\xd9\xf2c`\xe9[c\a\x12\x1bb\x82\x83\x86d\xf0k\xa8\x90\x06\xa8\x1cK\xea\x19\x91\a1z)\xde_r`\xee\xb6\x9e\xcb\x05\x00\x00\x82\xa1\t\xc9\x05\xcc^', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000200)='memory.high\x00\x90\x80\xa4\x96\xbb\xe4\xb2\xa2\x01\xc0\xb8*Z\xef\xf8\x0e\x1f]\xf7\x10\xdb\xfe\xe4\x1d\xc6\x92\x7f\xeeK_p\t\x8c\x9f5\xd0\xef)\xd8\x04\xbf\xc2N\x1c\xf0R\xdc\r\xb1Gf\xba\xd11#<\xaf^,s\x85\x10R\x99\xc2D\xee\n\"\xf9c\x15{\xc1[\xef\x06\x8a\xcd\x9d\xc8\x90#\xd0\xe7\xe3\xe0\xa9\xf3\xc0n\x1f\xd1\x11P\xe20\xcd\x1c\xfa\xfd\xa3\xcf\x9c\xc6\xb7]\x16\xc7\xd7\xb4/\x82\xd1\xae\xd9TM\x05a\xe5\xc5U\x91\xbe\x81\xac4\x9d\x02`\xe7\xa6q\x1f@\x1f\x1f?tm\x9c\xd1\x8c\xa1\xb5\xe0`H)\x97r\xc0?y\x9cc=c`A^\x9f\xcd\xbc\xf4m>I\xae\xdf\x946\xe7M`\xeb\x9fm\xbe+n\x00\x18k\x98\xab\xd5\xeet\"d\x81\x94\x04\xf5\xeb', 0x2, 0x0) write$cgroup_int(r4, 0x0, 0x0) 03:38:20 executing program 1 (fault-call:17 fault-nth:16): bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) 03:38:20 executing program 5: [ 2345.431707][T14470] FAULT_INJECTION: forcing a failure. [ 2345.431707][T14470] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2345.445533][T14470] CPU: 0 PID: 14470 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2345.454373][T14470] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2345.464407][T14470] Call Trace: [ 2345.467688][T14470] dump_stack+0x197/0x210 [ 2345.472010][T14470] should_fail.cold+0xa/0x15 [ 2345.476613][T14470] ? fault_create_debugfs_attr+0x180/0x180 [ 2345.482414][T14470] ? ___might_sleep+0x163/0x2c0 [ 2345.487252][T14470] should_fail_alloc_page+0x50/0x60 [ 2345.492444][T14470] __alloc_pages_nodemask+0x1a1/0x910 [ 2345.497803][T14470] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2345.503338][T14470] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2345.509050][T14470] ? kasan_unpoison_shadow+0x35/0x50 [ 2345.514328][T14470] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2345.520547][T14470] alloc_pages_current+0x107/0x210 [ 2345.525633][T14470] ? ___might_sleep+0x163/0x2c0 [ 2345.530496][T14470] __vmalloc_node_range+0x4f8/0x810 [ 2345.535703][T14470] ? bpf_map_area_alloc+0x20/0x30 [ 2345.540719][T14470] __vmalloc_node_flags_caller+0x71/0x90 [ 2345.546351][T14470] ? bpf_map_area_alloc+0x20/0x30 [ 2345.551355][T14470] __bpf_map_area_alloc+0xde/0xf0 [ 2345.556358][T14470] bpf_map_area_alloc+0x20/0x30 [ 2345.561359][T14470] htab_map_alloc+0x8d3/0x11c0 [ 2345.566118][T14470] ? htab_map_update_elem+0xca0/0xca0 [ 2345.571486][T14470] __do_sys_bpf+0x478/0x3810 [ 2345.576077][T14470] ? bpf_prog_load+0x18f0/0x18f0 03:38:21 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_type(r0, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000380)='cpuset.mems\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x30863, 0x0) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0xfffffc61) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000240)={'hwsim0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f00000000c0)={'hwsim0\x00', @random="0894f53e01dc"}) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)={0xffff, 0x5}, 0xc) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000200)='memory.high\x00\x90\x80\xa4\x96\xbb\xe4\xb2\xa2\x01\xc0\xb8*Z\xef\xf8\x0e\x1f]\xf7\x10\xdb\xfe\xe4\x1d\xc6\x92\x7f\xeeK_p\t\x8c\x9f5\xd0\xef)\xd8\x04\xbf\xc2N\x1c\xf0R\xdc\r\xb1Gf\xba\xd11#<\xaf^,s\x85\x10R\x99\xc2D\xee\n\"\xf9c\x15{\xc1[\xef\x06\x8a\xcd\x9d\xc8\x90#\xd0\xe7\xe3\xe0\xa9\xf3\xc0n\x1f\xd1\x11P\xe20\xcd\x1c\xfa\xfd\xa3\xcf\x9c\xc6\xb7]\x16\xc7\xd7\xb4/\x82\xd1\xae\xd9TM\x05a\xe5\xc5U\x91\xbe\x81\xac4\x9d\x02`\xe7\xa6q\x1f@\x1f\x1f?tm\x9c\xd1\x8c\xa1\xb5\xe0`H)\x97r\xc0?y\x9cc=c`A^\x9f\xcd\xbc\xf4m>I\xae\xdf\x946\xe7M`\xeb\x9fm\xbe+n\x00\x18k\x98\xab\xd5\xeet\"d\x81\x94\x04\xf5\xeb', 0x2, 0x0) write$cgroup_int(r4, 0x0, 0x0) [ 2345.581000][T14470] ? __kasan_check_write+0x14/0x20 [ 2345.586104][T14470] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2345.591654][T14470] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2345.596950][T14470] ? wait_for_completion+0x440/0x440 [ 2345.602261][T14470] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2345.608491][T14470] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2345.613940][T14470] ? do_syscall_64+0x26/0x790 [ 2345.618608][T14470] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2345.624650][T14470] ? do_syscall_64+0x26/0x790 [ 2345.629311][T14470] __x64_sys_bpf+0x73/0xb0 [ 2345.633731][T14470] do_syscall_64+0xfa/0x790 [ 2345.638225][T14470] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2345.644097][T14470] RIP: 0033:0x45a909 [ 2345.647973][T14470] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2345.667555][T14470] RSP: 002b:00007f5b93d49c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2345.675942][T14470] RAX: ffffffffffffffda RBX: 00007f5b93d49c90 RCX: 000000000045a909 [ 2345.683892][T14470] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2345.691956][T14470] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2345.699912][T14470] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d4a6d4 [ 2345.707872][T14470] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 03:38:21 executing program 1 (fault-call:17 fault-nth:17): bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) [ 2345.876725][T14473] FAULT_INJECTION: forcing a failure. [ 2345.876725][T14473] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2345.890377][T14473] CPU: 0 PID: 14473 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2345.899054][T14473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2345.909094][T14473] Call Trace: [ 2345.912377][T14473] dump_stack+0x197/0x210 [ 2345.916702][T14473] should_fail.cold+0xa/0x15 [ 2345.921302][T14473] ? fault_create_debugfs_attr+0x180/0x180 [ 2345.927117][T14473] ? ___might_sleep+0x163/0x2c0 [ 2345.931974][T14473] should_fail_alloc_page+0x50/0x60 [ 2345.937161][T14473] __alloc_pages_nodemask+0x1a1/0x910 [ 2345.942518][T14473] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2345.948054][T14473] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2345.953770][T14473] ? kasan_unpoison_shadow+0x35/0x50 [ 2345.959042][T14473] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2345.965275][T14473] alloc_pages_current+0x107/0x210 [ 2345.970369][T14473] ? ___might_sleep+0x163/0x2c0 [ 2345.975216][T14473] __vmalloc_node_range+0x4f8/0x810 [ 2345.980421][T14473] ? bpf_map_area_alloc+0x20/0x30 [ 2345.985431][T14473] __vmalloc_node_flags_caller+0x71/0x90 [ 2345.991051][T14473] ? bpf_map_area_alloc+0x20/0x30 [ 2345.996066][T14473] __bpf_map_area_alloc+0xde/0xf0 [ 2346.001083][T14473] bpf_map_area_alloc+0x20/0x30 [ 2346.005936][T14473] htab_map_alloc+0x8d3/0x11c0 [ 2346.010706][T14473] ? htab_map_update_elem+0xca0/0xca0 [ 2346.016070][T14473] __do_sys_bpf+0x478/0x3810 [ 2346.020656][T14473] ? bpf_prog_load+0x18f0/0x18f0 [ 2346.025579][T14473] ? __kasan_check_write+0x14/0x20 [ 2346.030678][T14473] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2346.036213][T14473] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2346.041495][T14473] ? wait_for_completion+0x440/0x440 [ 2346.046770][T14473] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2346.053029][T14473] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2346.058483][T14473] ? do_syscall_64+0x26/0x790 [ 2346.063149][T14473] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2346.069285][T14473] ? do_syscall_64+0x26/0x790 [ 2346.073955][T14473] __x64_sys_bpf+0x73/0xb0 [ 2346.078358][T14473] do_syscall_64+0xfa/0x790 [ 2346.082853][T14473] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2346.088739][T14473] RIP: 0033:0x45a909 [ 2346.092623][T14473] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2346.112213][T14473] RSP: 002b:00007f5b93d6ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2346.120608][T14473] RAX: ffffffffffffffda RBX: 00007f5b93d6ac90 RCX: 000000000045a909 [ 2346.128562][T14473] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2346.136516][T14473] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2346.144472][T14473] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d6b6d4 [ 2346.152431][T14473] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 03:38:21 executing program 1 (fault-call:17 fault-nth:18): bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) [ 2346.334280][T14478] FAULT_INJECTION: forcing a failure. [ 2346.334280][T14478] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2346.347726][T14478] CPU: 1 PID: 14478 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2346.356541][T14478] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2346.366797][T14478] Call Trace: [ 2346.370085][T14478] dump_stack+0x197/0x210 [ 2346.374401][T14478] should_fail.cold+0xa/0x15 [ 2346.378996][T14478] ? fault_create_debugfs_attr+0x180/0x180 [ 2346.384797][T14478] ? ___might_sleep+0x163/0x2c0 [ 2346.389641][T14478] should_fail_alloc_page+0x50/0x60 [ 2346.394824][T14478] __alloc_pages_nodemask+0x1a1/0x910 [ 2346.400194][T14478] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2346.405736][T14478] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2346.411445][T14478] ? kasan_unpoison_shadow+0x35/0x50 [ 2346.416719][T14478] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2346.422942][T14478] alloc_pages_current+0x107/0x210 [ 2346.428033][T14478] ? ___might_sleep+0x163/0x2c0 [ 2346.432895][T14478] __vmalloc_node_range+0x4f8/0x810 [ 2346.438092][T14478] ? bpf_map_area_alloc+0x20/0x30 [ 2346.443101][T14478] __vmalloc_node_flags_caller+0x71/0x90 [ 2346.448720][T14478] ? bpf_map_area_alloc+0x20/0x30 [ 2346.453732][T14478] __bpf_map_area_alloc+0xde/0xf0 [ 2346.458765][T14478] bpf_map_area_alloc+0x20/0x30 [ 2346.463598][T14478] htab_map_alloc+0x8d3/0x11c0 [ 2346.468353][T14478] ? htab_map_update_elem+0xca0/0xca0 [ 2346.473716][T14478] __do_sys_bpf+0x478/0x3810 [ 2346.478285][T14478] ? bpf_prog_load+0x18f0/0x18f0 [ 2346.483199][T14478] ? __kasan_check_write+0x14/0x20 [ 2346.488290][T14478] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2346.493816][T14478] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2346.499086][T14478] ? wait_for_completion+0x440/0x440 [ 2346.504357][T14478] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2346.510590][T14478] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2346.516044][T14478] ? do_syscall_64+0x26/0x790 [ 2346.520712][T14478] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2346.526758][T14478] ? do_syscall_64+0x26/0x790 [ 2346.531420][T14478] __x64_sys_bpf+0x73/0xb0 [ 2346.535823][T14478] do_syscall_64+0xfa/0x790 [ 2346.540313][T14478] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2346.546184][T14478] RIP: 0033:0x45a909 [ 2346.550068][T14478] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2346.569660][T14478] RSP: 002b:00007f5b93d6ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2346.578053][T14478] RAX: ffffffffffffffda RBX: 00007f5b93d6ac90 RCX: 000000000045a909 [ 2346.586005][T14478] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2346.593965][T14478] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2346.601923][T14478] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d6b6d4 [ 2346.609872][T14478] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 03:38:22 executing program 1 (fault-call:17 fault-nth:19): bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) [ 2346.799130][T14483] FAULT_INJECTION: forcing a failure. [ 2346.799130][T14483] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2346.812699][T14483] CPU: 1 PID: 14483 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2346.821373][T14483] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2346.831420][T14483] Call Trace: [ 2346.834695][T14483] dump_stack+0x197/0x210 [ 2346.839016][T14483] should_fail.cold+0xa/0x15 [ 2346.843703][T14483] ? fault_create_debugfs_attr+0x180/0x180 [ 2346.849515][T14483] ? ___might_sleep+0x163/0x2c0 [ 2346.854363][T14483] should_fail_alloc_page+0x50/0x60 [ 2346.859543][T14483] __alloc_pages_nodemask+0x1a1/0x910 [ 2346.864898][T14483] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2346.870428][T14483] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2346.876134][T14483] ? kasan_unpoison_shadow+0x35/0x50 [ 2346.881420][T14483] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2346.887648][T14483] alloc_pages_current+0x107/0x210 [ 2346.892741][T14483] ? ___might_sleep+0x163/0x2c0 [ 2346.897574][T14483] __vmalloc_node_range+0x4f8/0x810 [ 2346.902764][T14483] ? bpf_map_area_alloc+0x20/0x30 [ 2346.907779][T14483] __vmalloc_node_flags_caller+0x71/0x90 [ 2346.913396][T14483] ? bpf_map_area_alloc+0x20/0x30 [ 2346.918403][T14483] __bpf_map_area_alloc+0xde/0xf0 [ 2346.923412][T14483] bpf_map_area_alloc+0x20/0x30 [ 2346.928256][T14483] htab_map_alloc+0x8d3/0x11c0 [ 2346.933044][T14483] ? htab_map_update_elem+0xca0/0xca0 [ 2346.938399][T14483] __do_sys_bpf+0x478/0x3810 [ 2346.942975][T14483] ? bpf_prog_load+0x18f0/0x18f0 [ 2346.947889][T14483] ? __kasan_check_write+0x14/0x20 [ 2346.952982][T14483] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2346.958502][T14483] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2346.963770][T14483] ? wait_for_completion+0x440/0x440 [ 2346.969046][T14483] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2346.975281][T14483] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2346.980720][T14483] ? do_syscall_64+0x26/0x790 [ 2346.985396][T14483] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2346.991439][T14483] ? do_syscall_64+0x26/0x790 [ 2346.996096][T14483] __x64_sys_bpf+0x73/0xb0 [ 2347.000488][T14483] do_syscall_64+0xfa/0x790 [ 2347.004968][T14483] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2347.010832][T14483] RIP: 0033:0x45a909 [ 2347.014704][T14483] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2347.034292][T14483] RSP: 002b:00007f5b93d6ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2347.042684][T14483] RAX: ffffffffffffffda RBX: 00007f5b93d6ac90 RCX: 000000000045a909 [ 2347.050631][T14483] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2347.058580][T14483] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2347.066534][T14483] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d6b6d4 [ 2347.074484][T14483] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 03:38:22 executing program 1 (fault-call:17 fault-nth:20): bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) [ 2347.266237][T14488] FAULT_INJECTION: forcing a failure. [ 2347.266237][T14488] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2347.279580][T14488] CPU: 1 PID: 14488 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2347.288340][T14488] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2347.298458][T14488] Call Trace: [ 2347.301741][T14488] dump_stack+0x197/0x210 [ 2347.306061][T14488] should_fail.cold+0xa/0x15 [ 2347.310647][T14488] ? fault_create_debugfs_attr+0x180/0x180 [ 2347.316448][T14488] ? ___might_sleep+0x163/0x2c0 [ 2347.321294][T14488] should_fail_alloc_page+0x50/0x60 [ 2347.326475][T14488] __alloc_pages_nodemask+0x1a1/0x910 [ 2347.331833][T14488] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2347.337362][T14488] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2347.343091][T14488] ? kasan_unpoison_shadow+0x35/0x50 [ 2347.348384][T14488] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2347.354630][T14488] alloc_pages_current+0x107/0x210 [ 2347.359731][T14488] ? ___might_sleep+0x163/0x2c0 [ 2347.364603][T14488] __vmalloc_node_range+0x4f8/0x810 [ 2347.369804][T14488] ? bpf_map_area_alloc+0x20/0x30 [ 2347.374829][T14488] __vmalloc_node_flags_caller+0x71/0x90 [ 2347.380458][T14488] ? bpf_map_area_alloc+0x20/0x30 [ 2347.385471][T14488] __bpf_map_area_alloc+0xde/0xf0 [ 2347.390479][T14488] bpf_map_area_alloc+0x20/0x30 [ 2347.395313][T14488] htab_map_alloc+0x8d3/0x11c0 [ 2347.400071][T14488] ? htab_map_update_elem+0xca0/0xca0 [ 2347.405429][T14488] __do_sys_bpf+0x478/0x3810 [ 2347.410012][T14488] ? bpf_prog_load+0x18f0/0x18f0 [ 2347.414932][T14488] ? __kasan_check_write+0x14/0x20 [ 2347.420028][T14488] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2347.425559][T14488] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2347.430831][T14488] ? wait_for_completion+0x440/0x440 [ 2347.436103][T14488] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2347.442340][T14488] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2347.447786][T14488] ? do_syscall_64+0x26/0x790 [ 2347.452452][T14488] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2347.458500][T14488] ? do_syscall_64+0x26/0x790 [ 2347.463167][T14488] __x64_sys_bpf+0x73/0xb0 [ 2347.467567][T14488] do_syscall_64+0xfa/0x790 [ 2347.472057][T14488] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2347.477925][T14488] RIP: 0033:0x45a909 [ 2347.481800][T14488] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2347.501385][T14488] RSP: 002b:00007f5b93d6ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2347.509778][T14488] RAX: ffffffffffffffda RBX: 00007f5b93d6ac90 RCX: 000000000045a909 [ 2347.517731][T14488] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2347.525681][T14488] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2347.533636][T14488] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d6b6d4 [ 2347.541587][T14488] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 03:38:23 executing program 1 (fault-call:17 fault-nth:21): bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) [ 2347.732977][T14494] FAULT_INJECTION: forcing a failure. [ 2347.732977][T14494] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2347.746401][T14494] CPU: 1 PID: 14494 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2347.755069][T14494] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2347.765114][T14494] Call Trace: [ 2347.768388][T14494] dump_stack+0x197/0x210 [ 2347.772717][T14494] should_fail.cold+0xa/0x15 [ 2347.777308][T14494] ? fault_create_debugfs_attr+0x180/0x180 [ 2347.783111][T14494] ? ___might_sleep+0x163/0x2c0 [ 2347.787952][T14494] should_fail_alloc_page+0x50/0x60 [ 2347.793130][T14494] __alloc_pages_nodemask+0x1a1/0x910 [ 2347.798481][T14494] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2347.804009][T14494] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2347.809712][T14494] ? kasan_unpoison_shadow+0x35/0x50 [ 2347.814981][T14494] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2347.821206][T14494] alloc_pages_current+0x107/0x210 [ 2347.826295][T14494] ? ___might_sleep+0x163/0x2c0 [ 2347.831126][T14494] __vmalloc_node_range+0x4f8/0x810 [ 2347.836313][T14494] ? bpf_map_area_alloc+0x20/0x30 [ 2347.841320][T14494] __vmalloc_node_flags_caller+0x71/0x90 [ 2347.846933][T14494] ? bpf_map_area_alloc+0x20/0x30 [ 2347.851939][T14494] __bpf_map_area_alloc+0xde/0xf0 [ 2347.856943][T14494] bpf_map_area_alloc+0x20/0x30 [ 2347.861786][T14494] htab_map_alloc+0x8d3/0x11c0 [ 2347.866542][T14494] ? htab_map_update_elem+0xca0/0xca0 [ 2347.871893][T14494] __do_sys_bpf+0x478/0x3810 [ 2347.876467][T14494] ? bpf_prog_load+0x18f0/0x18f0 [ 2347.881401][T14494] ? __kasan_check_write+0x14/0x20 [ 2347.886503][T14494] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2347.892035][T14494] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2347.897303][T14494] ? wait_for_completion+0x440/0x440 [ 2347.902599][T14494] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2347.908847][T14494] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2347.914288][T14494] ? do_syscall_64+0x26/0x790 [ 2347.918949][T14494] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2347.924996][T14494] ? do_syscall_64+0x26/0x790 [ 2347.929660][T14494] __x64_sys_bpf+0x73/0xb0 [ 2347.934062][T14494] do_syscall_64+0xfa/0x790 [ 2347.938557][T14494] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2347.944430][T14494] RIP: 0033:0x45a909 [ 2347.948312][T14494] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2347.967899][T14494] RSP: 002b:00007f5b93d6ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2347.976297][T14494] RAX: ffffffffffffffda RBX: 00007f5b93d6ac90 RCX: 000000000045a909 [ 2347.984248][T14494] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2347.992197][T14494] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2348.000143][T14494] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d6b6d4 [ 2348.008091][T14494] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 03:38:31 executing program 2: 03:38:31 executing program 1 (fault-call:17 fault-nth:22): bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) [ 2356.372825][T14505] FAULT_INJECTION: forcing a failure. [ 2356.372825][T14505] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2356.386176][T14505] CPU: 0 PID: 14505 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2356.394849][T14505] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2356.404899][T14505] Call Trace: [ 2356.408211][T14505] dump_stack+0x197/0x210 [ 2356.412568][T14505] should_fail.cold+0xa/0x15 [ 2356.417262][T14505] ? fault_create_debugfs_attr+0x180/0x180 [ 2356.423081][T14505] ? ___might_sleep+0x163/0x2c0 [ 2356.427984][T14505] should_fail_alloc_page+0x50/0x60 [ 2356.433178][T14505] __alloc_pages_nodemask+0x1a1/0x910 [ 2356.438539][T14505] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2356.444076][T14505] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2356.449811][T14505] ? kasan_unpoison_shadow+0x35/0x50 [ 2356.455095][T14505] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2356.461332][T14505] alloc_pages_current+0x107/0x210 [ 2356.466427][T14505] ? ___might_sleep+0x163/0x2c0 [ 2356.471276][T14505] __vmalloc_node_range+0x4f8/0x810 [ 2356.476476][T14505] ? bpf_map_area_alloc+0x20/0x30 [ 2356.481495][T14505] __vmalloc_node_flags_caller+0x71/0x90 [ 2356.487120][T14505] ? bpf_map_area_alloc+0x20/0x30 [ 2356.492133][T14505] __bpf_map_area_alloc+0xde/0xf0 [ 2356.497147][T14505] bpf_map_area_alloc+0x20/0x30 [ 2356.501992][T14505] htab_map_alloc+0x8d3/0x11c0 [ 2356.506774][T14505] ? htab_map_update_elem+0xca0/0xca0 [ 2356.512145][T14505] __do_sys_bpf+0x478/0x3810 [ 2356.516727][T14505] ? bpf_prog_load+0x18f0/0x18f0 [ 2356.521675][T14505] ? __kasan_check_write+0x14/0x20 [ 2356.526789][T14505] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2356.532335][T14505] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2356.537611][T14505] ? wait_for_completion+0x440/0x440 [ 2356.542893][T14505] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2356.549177][T14505] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2356.554626][T14505] ? do_syscall_64+0x26/0x790 [ 2356.559294][T14505] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2356.565359][T14505] ? do_syscall_64+0x26/0x790 [ 2356.570036][T14505] __x64_sys_bpf+0x73/0xb0 [ 2356.574444][T14505] do_syscall_64+0xfa/0x790 [ 2356.578941][T14505] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2356.584821][T14505] RIP: 0033:0x45a909 [ 2356.588704][T14505] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2356.608295][T14505] RSP: 002b:00007f5b93d6ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2356.616689][T14505] RAX: ffffffffffffffda RBX: 00007f5b93d6ac90 RCX: 000000000045a909 [ 2356.624644][T14505] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2356.632613][T14505] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2356.640574][T14505] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d6b6d4 [ 2356.648536][T14505] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 03:38:35 executing program 4: 03:38:35 executing program 5: 03:38:35 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_type(r0, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000380)='cpuset.mems\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x30863, 0x0) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0xfffffc61) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000240)={'hwsim0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f00000000c0)={'hwsim0\x00', @random="0894f53e01dc"}) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)={0xffff, 0x5}, 0xc) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup\x00\f\x7f\xd9\xfa;\x8b\x88gb\xefi\x16\x91\xbb\xc4\xd5Jk\tU~ \xa4\vR\\\x8a\xdb\xcel\xe0\xa3[\xae\x9d\xac\x84\x9f\v\x9e\x9f\r\x10\x1f\xd3\x80\xc1\xccq\xab\x01y\xed\xfc\x96)\xf6_>+\xa03\xf4\xcc0\xbbE\xb0\xc3\x94\xd53\x87\xd6\xc4\\\xc7\x82\xe9\xaf\xb5\xb6\x15\xf4K2\x17\f\x98\x1c\xebq/\xf5\x81#\x85\xc5\xa0\xfd\xfac\xd9\xf2c`\xe9[c\a\x12\x1bb\x82\x83\x86d\xf0k\xa8\x90\x06\xa8\x1cK\xea\x19\x91\a1z)\xde_r`\xee\xb6\x9e\xcb\x05\x00\x00\x82\xa1\t\xc9\x05\xcc^', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000200)='memory.high\x00\x90\x80\xa4\x96\xbb\xe4\xb2\xa2\x01\xc0\xb8*Z\xef\xf8\x0e\x1f]\xf7\x10\xdb\xfe\xe4\x1d\xc6\x92\x7f\xeeK_p\t\x8c\x9f5\xd0\xef)\xd8\x04\xbf\xc2N\x1c\xf0R\xdc\r\xb1Gf\xba\xd11#<\xaf^,s\x85\x10R\x99\xc2D\xee\n\"\xf9c\x15{\xc1[\xef\x06\x8a\xcd\x9d\xc8\x90#\xd0\xe7\xe3\xe0\xa9\xf3\xc0n\x1f\xd1\x11P\xe20\xcd\x1c\xfa\xfd\xa3\xcf\x9c\xc6\xb7]\x16\xc7\xd7\xb4/\x82\xd1\xae\xd9TM\x05a\xe5\xc5U\x91\xbe\x81\xac4\x9d\x02`\xe7\xa6q\x1f@\x1f\x1f?tm\x9c\xd1\x8c\xa1\xb5\xe0`H)\x97r\xc0?y\x9cc=c`A^\x9f\xcd\xbc\xf4m>I\xae\xdf\x946\xe7M`\xeb\x9fm\xbe+n\x00\x18k\x98\xab\xd5\xeet\"d\x81\x94\x04\xf5\xeb', 0x2, 0x0) write$cgroup_int(r4, 0x0, 0x0) 03:38:35 executing program 1 (fault-call:17 fault-nth:23): bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) [ 2360.103727][T14513] FAULT_INJECTION: forcing a failure. [ 2360.103727][T14513] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2360.117105][T14513] CPU: 1 PID: 14513 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2360.125772][T14513] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2360.135943][T14513] Call Trace: [ 2360.139229][T14513] dump_stack+0x197/0x210 [ 2360.143559][T14513] should_fail.cold+0xa/0x15 [ 2360.148148][T14513] ? fault_create_debugfs_attr+0x180/0x180 [ 2360.153945][T14513] ? ___might_sleep+0x163/0x2c0 [ 2360.158880][T14513] should_fail_alloc_page+0x50/0x60 [ 2360.164065][T14513] __alloc_pages_nodemask+0x1a1/0x910 [ 2360.169431][T14513] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2360.174978][T14513] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2360.180777][T14513] ? kasan_unpoison_shadow+0x35/0x50 [ 2360.186060][T14513] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2360.192289][T14513] alloc_pages_current+0x107/0x210 [ 2360.197537][T14513] ? ___might_sleep+0x163/0x2c0 [ 2360.202428][T14513] __vmalloc_node_range+0x4f8/0x810 [ 2360.207639][T14513] ? bpf_map_area_alloc+0x20/0x30 [ 2360.212653][T14513] __vmalloc_node_flags_caller+0x71/0x90 [ 2360.218273][T14513] ? bpf_map_area_alloc+0x20/0x30 [ 2360.223288][T14513] __bpf_map_area_alloc+0xde/0xf0 [ 2360.228317][T14513] bpf_map_area_alloc+0x20/0x30 [ 2360.233163][T14513] htab_map_alloc+0x8d3/0x11c0 [ 2360.237924][T14513] ? htab_map_update_elem+0xca0/0xca0 [ 2360.243449][T14513] __do_sys_bpf+0x478/0x3810 [ 2360.248033][T14513] ? bpf_prog_load+0x18f0/0x18f0 [ 2360.252966][T14513] ? __kasan_check_write+0x14/0x20 [ 2360.258132][T14513] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2360.263664][T14513] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2360.268944][T14513] ? wait_for_completion+0x440/0x440 [ 2360.274224][T14513] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2360.280470][T14513] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2360.286143][T14513] ? do_syscall_64+0x26/0x790 [ 2360.290873][T14513] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2360.296966][T14513] ? do_syscall_64+0x26/0x790 [ 2360.301643][T14513] __x64_sys_bpf+0x73/0xb0 [ 2360.306051][T14513] do_syscall_64+0xfa/0x790 [ 2360.310546][T14513] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2360.316427][T14513] RIP: 0033:0x45a909 [ 2360.320313][T14513] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2360.339915][T14513] RSP: 002b:00007f5b93d6ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2360.348728][T14513] RAX: ffffffffffffffda RBX: 00007f5b93d6ac90 RCX: 000000000045a909 [ 2360.356694][T14513] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2360.364750][T14513] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2360.372717][T14513] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d6b6d4 [ 2360.380675][T14513] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 03:38:36 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_type(r0, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000380)='cpuset.mems\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x30863, 0x0) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0xfffffc61) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000240)={'hwsim0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f00000000c0)={'hwsim0\x00', @random="0894f53e01dc"}) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)={0xffff, 0x5}, 0xc) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000200)='memory.high\x00\x90\x80\xa4\x96\xbb\xe4\xb2\xa2\x01\xc0\xb8*Z\xef\xf8\x0e\x1f]\xf7\x10\xdb\xfe\xe4\x1d\xc6\x92\x7f\xeeK_p\t\x8c\x9f5\xd0\xef)\xd8\x04\xbf\xc2N\x1c\xf0R\xdc\r\xb1Gf\xba\xd11#<\xaf^,s\x85\x10R\x99\xc2D\xee\n\"\xf9c\x15{\xc1[\xef\x06\x8a\xcd\x9d\xc8\x90#\xd0\xe7\xe3\xe0\xa9\xf3\xc0n\x1f\xd1\x11P\xe20\xcd\x1c\xfa\xfd\xa3\xcf\x9c\xc6\xb7]\x16\xc7\xd7\xb4/\x82\xd1\xae\xd9TM\x05a\xe5\xc5U\x91\xbe\x81\xac4\x9d\x02`\xe7\xa6q\x1f@\x1f\x1f?tm\x9c\xd1\x8c\xa1\xb5\xe0`H)\x97r\xc0?y\x9cc=c`A^\x9f\xcd\xbc\xf4m>I\xae\xdf\x946\xe7M`\xeb\x9fm\xbe+n\x00\x18k\x98\xab\xd5\xeet\"d\x81\x94\x04\xf5\xeb', 0x2, 0x0) write$cgroup_int(r4, 0x0, 0x0) 03:38:36 executing program 1 (fault-call:17 fault-nth:24): bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) [ 2360.978556][T14520] FAULT_INJECTION: forcing a failure. [ 2360.978556][T14520] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2360.992247][T14520] CPU: 1 PID: 14520 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2361.000912][T14520] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2361.010956][T14520] Call Trace: [ 2361.014291][T14520] dump_stack+0x197/0x210 [ 2361.018619][T14520] should_fail.cold+0xa/0x15 [ 2361.023223][T14520] ? fault_create_debugfs_attr+0x180/0x180 [ 2361.029039][T14520] ? ___might_sleep+0x163/0x2c0 [ 2361.033894][T14520] should_fail_alloc_page+0x50/0x60 [ 2361.039080][T14520] __alloc_pages_nodemask+0x1a1/0x910 [ 2361.044440][T14520] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2361.049979][T14520] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2361.055694][T14520] ? kasan_unpoison_shadow+0x35/0x50 [ 2361.060966][T14520] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2361.067198][T14520] alloc_pages_current+0x107/0x210 [ 2361.072300][T14520] ? ___might_sleep+0x163/0x2c0 [ 2361.077144][T14520] __vmalloc_node_range+0x4f8/0x810 [ 2361.082344][T14520] ? bpf_map_area_alloc+0x20/0x30 [ 2361.087360][T14520] __vmalloc_node_flags_caller+0x71/0x90 [ 2361.092983][T14520] ? bpf_map_area_alloc+0x20/0x30 [ 2361.098024][T14520] __bpf_map_area_alloc+0xde/0xf0 [ 2361.103112][T14520] bpf_map_area_alloc+0x20/0x30 [ 2361.107954][T14520] htab_map_alloc+0x8d3/0x11c0 [ 2361.112719][T14520] ? htab_map_update_elem+0xca0/0xca0 [ 2361.118083][T14520] __do_sys_bpf+0x478/0x3810 [ 2361.122758][T14520] ? bpf_prog_load+0x18f0/0x18f0 [ 2361.127800][T14520] ? __kasan_check_write+0x14/0x20 [ 2361.133058][T14520] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2361.138598][T14520] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2361.143877][T14520] ? wait_for_completion+0x440/0x440 [ 2361.149160][T14520] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2361.155404][T14520] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2361.160856][T14520] ? do_syscall_64+0x26/0x790 [ 2361.165562][T14520] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2361.171655][T14520] ? do_syscall_64+0x26/0x790 [ 2361.176331][T14520] __x64_sys_bpf+0x73/0xb0 [ 2361.180746][T14520] do_syscall_64+0xfa/0x790 [ 2361.185247][T14520] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2361.191136][T14520] RIP: 0033:0x45a909 [ 2361.195028][T14520] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2361.214795][T14520] RSP: 002b:00007f5b93d6ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2361.223199][T14520] RAX: ffffffffffffffda RBX: 00007f5b93d6ac90 RCX: 000000000045a909 [ 2361.231203][T14520] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2361.239252][T14520] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2361.247212][T14520] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d6b6d4 [ 2361.255224][T14520] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 03:38:36 executing program 1 (fault-call:17 fault-nth:25): bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) [ 2361.425739][T14525] FAULT_INJECTION: forcing a failure. [ 2361.425739][T14525] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2361.439629][T14525] CPU: 0 PID: 14525 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2361.448304][T14525] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2361.458351][T14525] Call Trace: [ 2361.461762][T14525] dump_stack+0x197/0x210 [ 2361.466126][T14525] should_fail.cold+0xa/0x15 [ 2361.470744][T14525] ? fault_create_debugfs_attr+0x180/0x180 [ 2361.476554][T14525] ? ___might_sleep+0x163/0x2c0 [ 2361.481413][T14525] should_fail_alloc_page+0x50/0x60 [ 2361.486693][T14525] __alloc_pages_nodemask+0x1a1/0x910 [ 2361.492065][T14525] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2361.497608][T14525] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2361.503336][T14525] ? kasan_unpoison_shadow+0x35/0x50 [ 2361.508622][T14525] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2361.514865][T14525] alloc_pages_current+0x107/0x210 [ 2361.519985][T14525] ? ___might_sleep+0x163/0x2c0 [ 2361.524844][T14525] __vmalloc_node_range+0x4f8/0x810 [ 2361.530053][T14525] ? bpf_map_area_alloc+0x20/0x30 [ 2361.535088][T14525] __vmalloc_node_flags_caller+0x71/0x90 [ 2361.540719][T14525] ? bpf_map_area_alloc+0x20/0x30 [ 2361.545754][T14525] __bpf_map_area_alloc+0xde/0xf0 [ 2361.550810][T14525] bpf_map_area_alloc+0x20/0x30 [ 2361.555667][T14525] htab_map_alloc+0x8d3/0x11c0 [ 2361.560440][T14525] ? htab_map_update_elem+0xca0/0xca0 [ 2361.565810][T14525] __do_sys_bpf+0x478/0x3810 [ 2361.570401][T14525] ? bpf_prog_load+0x18f0/0x18f0 [ 2361.575336][T14525] ? __kasan_check_write+0x14/0x20 [ 2361.580440][T14525] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2361.585983][T14525] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2361.591309][T14525] ? wait_for_completion+0x440/0x440 [ 2361.596603][T14525] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2361.602868][T14525] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2361.608322][T14525] ? do_syscall_64+0x26/0x790 [ 2361.612995][T14525] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2361.619072][T14525] ? do_syscall_64+0x26/0x790 [ 2361.623931][T14525] __x64_sys_bpf+0x73/0xb0 [ 2361.628346][T14525] do_syscall_64+0xfa/0x790 [ 2361.632940][T14525] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2361.638912][T14525] RIP: 0033:0x45a909 [ 2361.642800][T14525] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2361.662579][T14525] RSP: 002b:00007f5b93d6ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2361.671118][T14525] RAX: ffffffffffffffda RBX: 00007f5b93d6ac90 RCX: 000000000045a909 [ 2361.679090][T14525] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2361.687148][T14525] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2361.695122][T14525] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d6b6d4 [ 2361.703098][T14525] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 03:38:37 executing program 1 (fault-call:17 fault-nth:26): bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) [ 2361.887221][T14530] FAULT_INJECTION: forcing a failure. [ 2361.887221][T14530] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2361.900903][T14530] CPU: 1 PID: 14530 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2361.909586][T14530] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2361.919754][T14530] Call Trace: [ 2361.923061][T14530] dump_stack+0x197/0x210 [ 2361.927440][T14530] should_fail.cold+0xa/0x15 [ 2361.932125][T14530] ? fault_create_debugfs_attr+0x180/0x180 [ 2361.937923][T14530] ? ___might_sleep+0x163/0x2c0 [ 2361.942776][T14530] should_fail_alloc_page+0x50/0x60 [ 2361.947961][T14530] __alloc_pages_nodemask+0x1a1/0x910 [ 2361.953324][T14530] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2361.958858][T14530] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2361.964571][T14530] ? kasan_unpoison_shadow+0x35/0x50 [ 2361.969850][T14530] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2361.976133][T14530] alloc_pages_current+0x107/0x210 [ 2361.981336][T14530] ? ___might_sleep+0x163/0x2c0 [ 2361.986238][T14530] __vmalloc_node_range+0x4f8/0x810 [ 2361.991438][T14530] ? bpf_map_area_alloc+0x20/0x30 [ 2361.996451][T14530] __vmalloc_node_flags_caller+0x71/0x90 [ 2362.002185][T14530] ? bpf_map_area_alloc+0x20/0x30 [ 2362.007197][T14530] __bpf_map_area_alloc+0xde/0xf0 [ 2362.012209][T14530] bpf_map_area_alloc+0x20/0x30 [ 2362.017143][T14530] htab_map_alloc+0x8d3/0x11c0 [ 2362.022170][T14530] ? htab_map_update_elem+0xca0/0xca0 [ 2362.027529][T14530] __do_sys_bpf+0x478/0x3810 [ 2362.032195][T14530] ? bpf_prog_load+0x18f0/0x18f0 [ 2362.037131][T14530] ? __kasan_check_write+0x14/0x20 [ 2362.042342][T14530] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2362.047958][T14530] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2362.053235][T14530] ? wait_for_completion+0x440/0x440 [ 2362.058512][T14530] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2362.064747][T14530] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2362.070211][T14530] ? do_syscall_64+0x26/0x790 [ 2362.074873][T14530] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2362.080937][T14530] ? do_syscall_64+0x26/0x790 [ 2362.085605][T14530] __x64_sys_bpf+0x73/0xb0 [ 2362.090017][T14530] do_syscall_64+0xfa/0x790 [ 2362.094510][T14530] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2362.100387][T14530] RIP: 0033:0x45a909 [ 2362.104271][T14530] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2362.123866][T14530] RSP: 002b:00007f5b93d6ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2362.132348][T14530] RAX: ffffffffffffffda RBX: 00007f5b93d6ac90 RCX: 000000000045a909 [ 2362.140433][T14530] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2362.148391][T14530] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2362.156394][T14530] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d6b6d4 [ 2362.164349][T14530] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 03:38:37 executing program 1 (fault-call:17 fault-nth:27): bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) [ 2362.326786][T14535] FAULT_INJECTION: forcing a failure. [ 2362.326786][T14535] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2362.340307][T14535] CPU: 1 PID: 14535 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2362.349064][T14535] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2362.359175][T14535] Call Trace: [ 2362.362464][T14535] dump_stack+0x197/0x210 [ 2362.366796][T14535] should_fail.cold+0xa/0x15 [ 2362.371436][T14535] ? fault_create_debugfs_attr+0x180/0x180 [ 2362.377252][T14535] ? ___might_sleep+0x163/0x2c0 [ 2362.382108][T14535] should_fail_alloc_page+0x50/0x60 [ 2362.387301][T14535] __alloc_pages_nodemask+0x1a1/0x910 [ 2362.392671][T14535] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2362.398256][T14535] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2362.404232][T14535] ? kasan_unpoison_shadow+0x35/0x50 [ 2362.409514][T14535] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2362.415753][T14535] alloc_pages_current+0x107/0x210 [ 2362.420858][T14535] ? ___might_sleep+0x163/0x2c0 [ 2362.425708][T14535] __vmalloc_node_range+0x4f8/0x810 [ 2362.430910][T14535] ? bpf_map_area_alloc+0x20/0x30 [ 2362.435931][T14535] __vmalloc_node_flags_caller+0x71/0x90 [ 2362.441556][T14535] ? bpf_map_area_alloc+0x20/0x30 [ 2362.446575][T14535] __bpf_map_area_alloc+0xde/0xf0 [ 2362.451596][T14535] bpf_map_area_alloc+0x20/0x30 [ 2362.456469][T14535] htab_map_alloc+0x8d3/0x11c0 [ 2362.461229][T14535] ? htab_map_update_elem+0xca0/0xca0 [ 2362.466677][T14535] __do_sys_bpf+0x478/0x3810 [ 2362.471266][T14535] ? bpf_prog_load+0x18f0/0x18f0 [ 2362.476196][T14535] ? __kasan_check_write+0x14/0x20 [ 2362.481374][T14535] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2362.486909][T14535] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2362.492186][T14535] ? wait_for_completion+0x440/0x440 [ 2362.497465][T14535] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2362.503707][T14535] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2362.509153][T14535] ? do_syscall_64+0x26/0x790 [ 2362.513817][T14535] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2362.519872][T14535] ? do_syscall_64+0x26/0x790 [ 2362.524542][T14535] __x64_sys_bpf+0x73/0xb0 [ 2362.528952][T14535] do_syscall_64+0xfa/0x790 [ 2362.533449][T14535] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2362.539344][T14535] RIP: 0033:0x45a909 [ 2362.543236][T14535] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2362.562835][T14535] RSP: 002b:00007f5b93d6ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2362.571247][T14535] RAX: ffffffffffffffda RBX: 00007f5b93d6ac90 RCX: 000000000045a909 [ 2362.579213][T14535] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2362.587173][T14535] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2362.595133][T14535] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d6b6d4 [ 2362.603100][T14535] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 03:38:38 executing program 1 (fault-call:17 fault-nth:28): bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) [ 2362.759017][T14540] FAULT_INJECTION: forcing a failure. [ 2362.759017][T14540] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2362.773589][T14540] CPU: 0 PID: 14540 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2362.782285][T14540] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2362.792349][T14540] Call Trace: [ 2362.795662][T14540] dump_stack+0x197/0x210 [ 2362.800008][T14540] should_fail.cold+0xa/0x15 [ 2362.804605][T14540] ? fault_create_debugfs_attr+0x180/0x180 [ 2362.810403][T14540] ? ___might_sleep+0x163/0x2c0 [ 2362.815281][T14540] should_fail_alloc_page+0x50/0x60 [ 2362.820476][T14540] __alloc_pages_nodemask+0x1a1/0x910 [ 2362.825842][T14540] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2362.831550][T14540] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2362.837324][T14540] ? kasan_unpoison_shadow+0x35/0x50 [ 2362.842615][T14540] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2362.848899][T14540] alloc_pages_current+0x107/0x210 [ 2362.855400][T14540] ? ___might_sleep+0x163/0x2c0 [ 2362.860258][T14540] __vmalloc_node_range+0x4f8/0x810 [ 2362.865579][T14540] ? bpf_map_area_alloc+0x20/0x30 [ 2362.870698][T14540] __vmalloc_node_flags_caller+0x71/0x90 [ 2362.876348][T14540] ? bpf_map_area_alloc+0x20/0x30 [ 2362.881393][T14540] __bpf_map_area_alloc+0xde/0xf0 [ 2362.886506][T14540] bpf_map_area_alloc+0x20/0x30 [ 2362.891356][T14540] htab_map_alloc+0x8d3/0x11c0 [ 2362.896165][T14540] ? htab_map_update_elem+0xca0/0xca0 [ 2362.901564][T14540] __do_sys_bpf+0x478/0x3810 [ 2362.906349][T14540] ? bpf_prog_load+0x18f0/0x18f0 [ 2362.911295][T14540] ? __kasan_check_write+0x14/0x20 [ 2362.916420][T14540] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2362.921978][T14540] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2362.927258][T14540] ? wait_for_completion+0x440/0x440 [ 2362.932654][T14540] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2362.938915][T14540] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2362.944370][T14540] ? do_syscall_64+0x26/0x790 [ 2362.949037][T14540] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2362.955102][T14540] ? do_syscall_64+0x26/0x790 [ 2362.959784][T14540] __x64_sys_bpf+0x73/0xb0 [ 2362.964196][T14540] do_syscall_64+0xfa/0x790 [ 2362.968821][T14540] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2362.974718][T14540] RIP: 0033:0x45a909 [ 2362.978615][T14540] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2362.998211][T14540] RSP: 002b:00007f5b93d6ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2363.006613][T14540] RAX: ffffffffffffffda RBX: 00007f5b93d6ac90 RCX: 000000000045a909 [ 2363.014583][T14540] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2363.022560][T14540] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2363.030530][T14540] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d6b6d4 [ 2363.038493][T14540] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 03:38:48 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)={0x80000000, 0x4}, 0xc) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="214e017c6f767920"], 0xda00) 03:38:48 executing program 1 (fault-call:17 fault-nth:29): bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) [ 2373.033640][T14550] FAULT_INJECTION: forcing a failure. [ 2373.033640][T14550] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2373.047191][T14550] CPU: 0 PID: 14550 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2373.055860][T14550] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2373.065903][T14550] Call Trace: [ 2373.069207][T14550] dump_stack+0x197/0x210 [ 2373.073549][T14550] should_fail.cold+0xa/0x15 [ 2373.078168][T14550] ? fault_create_debugfs_attr+0x180/0x180 [ 2373.083984][T14550] ? ___might_sleep+0x163/0x2c0 [ 2373.088839][T14550] should_fail_alloc_page+0x50/0x60 [ 2373.094109][T14550] __alloc_pages_nodemask+0x1a1/0x910 [ 2373.099468][T14550] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2373.105003][T14550] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2373.110720][T14550] ? kasan_unpoison_shadow+0x35/0x50 [ 2373.115990][T14550] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2373.122220][T14550] alloc_pages_current+0x107/0x210 [ 2373.127317][T14550] ? ___might_sleep+0x163/0x2c0 [ 2373.132159][T14550] __vmalloc_node_range+0x4f8/0x810 [ 2373.137358][T14550] ? bpf_map_area_alloc+0x20/0x30 [ 2373.142461][T14550] __vmalloc_node_flags_caller+0x71/0x90 [ 2373.148079][T14550] ? bpf_map_area_alloc+0x20/0x30 [ 2373.153195][T14550] __bpf_map_area_alloc+0xde/0xf0 [ 2373.158217][T14550] bpf_map_area_alloc+0x20/0x30 [ 2373.163055][T14550] htab_map_alloc+0x8d3/0x11c0 [ 2373.167833][T14550] ? htab_map_update_elem+0xca0/0xca0 [ 2373.173193][T14550] __do_sys_bpf+0x478/0x3810 [ 2373.177780][T14550] ? bpf_prog_load+0x18f0/0x18f0 [ 2373.182705][T14550] ? __kasan_check_write+0x14/0x20 [ 2373.187800][T14550] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2373.193331][T14550] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2373.198603][T14550] ? wait_for_completion+0x440/0x440 [ 2373.203883][T14550] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2373.210127][T14550] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2373.215570][T14550] ? do_syscall_64+0x26/0x790 [ 2373.220245][T14550] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2373.226293][T14550] ? do_syscall_64+0x26/0x790 [ 2373.230957][T14550] __x64_sys_bpf+0x73/0xb0 [ 2373.235362][T14550] do_syscall_64+0xfa/0x790 [ 2373.239862][T14550] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2373.245738][T14550] RIP: 0033:0x45a909 [ 2373.249645][T14550] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2373.269253][T14550] RSP: 002b:00007f5b93d6ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2373.277650][T14550] RAX: ffffffffffffffda RBX: 00007f5b93d6ac90 RCX: 000000000045a909 [ 2373.285607][T14550] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2373.293563][T14550] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2373.301520][T14550] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d6b6d4 [ 2373.309474][T14550] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 03:38:51 executing program 4: r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_int(r1, &(0x7f0000000000)=0x13, 0x12) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0xc020662a, 0x400004) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000040)={0x8, 0x81}, 0xc) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000700)={'team0\x00\x00\x00\x00\x00\x00\x00\xf7\x00', @local}) socketpair(0x0, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.evefts\x00\xc6t\xb8\xa6\xa9\xe8b\x94k\xeaXW5*_\xc3\xa6\x8e\xa2\xfd\x03A\xf40C|t\xfc\xd0$\xac<\xb9m\x18\xbf\x9bp\x9a\xea\x16\x7f\x9f\x1e\x18$\xc6\xa9L6\xb0\xda\x1f\x00q\x9d\xa6T\fX\xa0\xc9\x03\xd5GU\xbd\b[\xc3PE\xac\xb2\xbe\x0e\xe3\xc8\xcf9\x1aRR$\x1e55\xce\xc5|\x0e\xe6z,\xd8*\x8b\xf1\xaf\xe6|g\v\x96d i~\x10fW\xd3[\xffYfC\xf9\xa5\x8arN\xdb30x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) 03:38:51 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_type(r0, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000380)='cpuset.mems\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x30863, 0x0) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0xfffffc61) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000240)={'hwsim0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f00000000c0)={'hwsim0\x00', @random="0894f53e01dc"}) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)={0xffff, 0x5}, 0xc) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup\x00\f\x7f\xd9\xfa;\x8b\x88gb\xefi\x16\x91\xbb\xc4\xd5Jk\tU~ \xa4\vR\\\x8a\xdb\xcel\xe0\xa3[\xae\x9d\xac\x84\x9f\v\x9e\x9f\r\x10\x1f\xd3\x80\xc1\xccq\xab\x01y\xed\xfc\x96)\xf6_>+\xa03\xf4\xcc0\xbbE\xb0\xc3\x94\xd53\x87\xd6\xc4\\\xc7\x82\xe9\xaf\xb5\xb6\x15\xf4K2\x17\f\x98\x1c\xebq/\xf5\x81#\x85\xc5\xa0\xfd\xfac\xd9\xf2c`\xe9[c\a\x12\x1bb\x82\x83\x86d\xf0k\xa8\x90\x06\xa8\x1cK\xea\x19\x91\a1z)\xde_r`\xee\xb6\x9e\xcb\x05\x00\x00\x82\xa1\t\xc9\x05\xcc^', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000200)='memory.high\x00\x90\x80\xa4\x96\xbb\xe4\xb2\xa2\x01\xc0\xb8*Z\xef\xf8\x0e\x1f]\xf7\x10\xdb\xfe\xe4\x1d\xc6\x92\x7f\xeeK_p\t\x8c\x9f5\xd0\xef)\xd8\x04\xbf\xc2N\x1c\xf0R\xdc\r\xb1Gf\xba\xd11#<\xaf^,s\x85\x10R\x99\xc2D\xee\n\"\xf9c\x15{\xc1[\xef\x06\x8a\xcd\x9d\xc8\x90#\xd0\xe7\xe3\xe0\xa9\xf3\xc0n\x1f\xd1\x11P\xe20\xcd\x1c\xfa\xfd\xa3\xcf\x9c\xc6\xb7]\x16\xc7\xd7\xb4/\x82\xd1\xae\xd9TM\x05a\xe5\xc5U\x91\xbe\x81\xac4\x9d\x02`\xe7\xa6q\x1f@\x1f\x1f?tm\x9c\xd1\x8c\xa1\xb5\xe0`H)\x97r\xc0?y\x9cc=c`A^\x9f\xcd\xbc\xf4m>I\xae\xdf\x946\xe7M`\xeb\x9fm\xbe+n\x00\x18k\x98\xab\xd5\xeet\"d\x81\x94\x04\xf5\xeb', 0x2, 0x0) write$cgroup_int(r4, 0x0, 0x0) [ 2375.653049][T14558] FAULT_INJECTION: forcing a failure. [ 2375.653049][T14558] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2375.666435][T14558] CPU: 1 PID: 14558 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2375.675096][T14558] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2375.685131][T14558] Call Trace: [ 2375.688405][T14558] dump_stack+0x197/0x210 [ 2375.692720][T14558] should_fail.cold+0xa/0x15 [ 2375.697294][T14558] ? fault_create_debugfs_attr+0x180/0x180 [ 2375.703083][T14558] ? ___might_sleep+0x163/0x2c0 [ 2375.707917][T14558] should_fail_alloc_page+0x50/0x60 [ 2375.713100][T14558] __alloc_pages_nodemask+0x1a1/0x910 [ 2375.718458][T14558] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2375.723985][T14558] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2375.729684][T14558] ? kasan_unpoison_shadow+0x35/0x50 [ 2375.734960][T14558] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2375.741189][T14558] alloc_pages_current+0x107/0x210 [ 2375.746276][T14558] ? ___might_sleep+0x163/0x2c0 [ 2375.751122][T14558] __vmalloc_node_range+0x4f8/0x810 [ 2375.756301][T14558] ? bpf_map_area_alloc+0x20/0x30 [ 2375.761319][T14558] __vmalloc_node_flags_caller+0x71/0x90 [ 2375.766933][T14558] ? bpf_map_area_alloc+0x20/0x30 [ 2375.771941][T14558] __bpf_map_area_alloc+0xde/0xf0 [ 2375.776939][T14558] bpf_map_area_alloc+0x20/0x30 [ 2375.781770][T14558] htab_map_alloc+0x8d3/0x11c0 [ 2375.786523][T14558] ? htab_map_update_elem+0xca0/0xca0 [ 2375.791870][T14558] __do_sys_bpf+0x478/0x3810 [ 2375.796438][T14558] ? bpf_prog_load+0x18f0/0x18f0 [ 2375.801352][T14558] ? __kasan_check_write+0x14/0x20 [ 2375.806442][T14558] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2375.811963][T14558] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2375.817225][T14558] ? wait_for_completion+0x440/0x440 [ 2375.822491][T14558] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2375.828715][T14558] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2375.834148][T14558] ? do_syscall_64+0x26/0x790 [ 2375.838800][T14558] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2375.844842][T14558] ? do_syscall_64+0x26/0x790 [ 2375.849497][T14558] __x64_sys_bpf+0x73/0xb0 [ 2375.853890][T14558] do_syscall_64+0xfa/0x790 [ 2375.858380][T14558] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2375.864247][T14558] RIP: 0033:0x45a909 [ 2375.868119][T14558] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2375.887694][T14558] RSP: 002b:00007f5b93d6ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2375.896078][T14558] RAX: ffffffffffffffda RBX: 00007f5b93d6ac90 RCX: 000000000045a909 [ 2375.904027][T14558] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2375.911977][T14558] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2375.919952][T14558] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d6b6d4 [ 2375.927915][T14558] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 03:38:54 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_type(r0, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000380)='cpuset.mems\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x30863, 0x0) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0xfffffc61) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000240)={'hwsim0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f00000000c0)={'hwsim0\x00', @random="0894f53e01dc"}) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)={0xffff, 0x5}, 0xc) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup\x00\f\x7f\xd9\xfa;\x8b\x88gb\xefi\x16\x91\xbb\xc4\xd5Jk\tU~ \xa4\vR\\\x8a\xdb\xcel\xe0\xa3[\xae\x9d\xac\x84\x9f\v\x9e\x9f\r\x10\x1f\xd3\x80\xc1\xccq\xab\x01y\xed\xfc\x96)\xf6_>+\xa03\xf4\xcc0\xbbE\xb0\xc3\x94\xd53\x87\xd6\xc4\\\xc7\x82\xe9\xaf\xb5\xb6\x15\xf4K2\x17\f\x98\x1c\xebq/\xf5\x81#\x85\xc5\xa0\xfd\xfac\xd9\xf2c`\xe9[c\a\x12\x1bb\x82\x83\x86d\xf0k\xa8\x90\x06\xa8\x1cK\xea\x19\x91\a1z)\xde_r`\xee\xb6\x9e\xcb\x05\x00\x00\x82\xa1\t\xc9\x05\xcc^', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000200)='memory.high\x00\x90\x80\xa4\x96\xbb\xe4\xb2\xa2\x01\xc0\xb8*Z\xef\xf8\x0e\x1f]\xf7\x10\xdb\xfe\xe4\x1d\xc6\x92\x7f\xeeK_p\t\x8c\x9f5\xd0\xef)\xd8\x04\xbf\xc2N\x1c\xf0R\xdc\r\xb1Gf\xba\xd11#<\xaf^,s\x85\x10R\x99\xc2D\xee\n\"\xf9c\x15{\xc1[\xef\x06\x8a\xcd\x9d\xc8\x90#\xd0\xe7\xe3\xe0\xa9\xf3\xc0n\x1f\xd1\x11P\xe20\xcd\x1c\xfa\xfd\xa3\xcf\x9c\xc6\xb7]\x16\xc7\xd7\xb4/\x82\xd1\xae\xd9TM\x05a\xe5\xc5U\x91\xbe\x81\xac4\x9d\x02`\xe7\xa6q\x1f@\x1f\x1f?tm\x9c\xd1\x8c\xa1\xb5\xe0`H)\x97r\xc0?y\x9cc=c`A^\x9f\xcd\xbc\xf4m>I\xae\xdf\x946\xe7M`\xeb\x9fm\xbe+n\x00\x18k\x98\xab\xd5\xeet\"d\x81\x94\x04\xf5\xeb', 0x2, 0x0) write$cgroup_int(r4, 0x0, 0x0) 03:38:54 executing program 1 (fault-call:17 fault-nth:31): bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) [ 2378.538570][T14567] FAULT_INJECTION: forcing a failure. [ 2378.538570][T14567] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2378.551949][T14567] CPU: 0 PID: 14567 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2378.560614][T14567] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2378.570648][T14567] Call Trace: [ 2378.573934][T14567] dump_stack+0x197/0x210 [ 2378.578281][T14567] should_fail.cold+0xa/0x15 [ 2378.582883][T14567] ? fault_create_debugfs_attr+0x180/0x180 [ 2378.588699][T14567] ? ___might_sleep+0x163/0x2c0 [ 2378.593563][T14567] should_fail_alloc_page+0x50/0x60 [ 2378.598760][T14567] __alloc_pages_nodemask+0x1a1/0x910 [ 2378.604136][T14567] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2378.609664][T14567] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2378.615466][T14567] ? kasan_unpoison_shadow+0x35/0x50 [ 2378.620746][T14567] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2378.626983][T14567] alloc_pages_current+0x107/0x210 [ 2378.632081][T14567] ? ___might_sleep+0x163/0x2c0 [ 2378.636932][T14567] __vmalloc_node_range+0x4f8/0x810 [ 2378.642235][T14567] ? bpf_map_area_alloc+0x20/0x30 [ 2378.647237][T14567] __vmalloc_node_flags_caller+0x71/0x90 [ 2378.652856][T14567] ? bpf_map_area_alloc+0x20/0x30 [ 2378.657882][T14567] __bpf_map_area_alloc+0xde/0xf0 [ 2378.662908][T14567] bpf_map_area_alloc+0x20/0x30 [ 2378.667852][T14567] htab_map_alloc+0x8d3/0x11c0 [ 2378.672649][T14567] ? htab_map_update_elem+0xca0/0xca0 [ 2378.678146][T14567] __do_sys_bpf+0x478/0x3810 [ 2378.682747][T14567] ? bpf_prog_load+0x18f0/0x18f0 [ 2378.687680][T14567] ? __kasan_check_write+0x14/0x20 [ 2378.692780][T14567] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2378.698328][T14567] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2378.703597][T14567] ? wait_for_completion+0x440/0x440 [ 2378.708911][T14567] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2378.715160][T14567] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2378.720637][T14567] ? do_syscall_64+0x26/0x790 [ 2378.725297][T14567] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2378.731350][T14567] ? do_syscall_64+0x26/0x790 [ 2378.736037][T14567] __x64_sys_bpf+0x73/0xb0 [ 2378.740446][T14567] do_syscall_64+0xfa/0x790 [ 2378.744934][T14567] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2378.750801][T14567] RIP: 0033:0x45a909 [ 2378.754689][T14567] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2378.774302][T14567] RSP: 002b:00007f5b93d49c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2378.782824][T14567] RAX: ffffffffffffffda RBX: 00007f5b93d49c90 RCX: 000000000045a909 [ 2378.790771][T14567] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2378.798739][T14567] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2378.806698][T14567] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d4a6d4 [ 2378.814676][T14567] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 03:38:54 executing program 1 (fault-call:17 fault-nth:32): bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) [ 2378.967273][T14571] FAULT_INJECTION: forcing a failure. [ 2378.967273][T14571] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2378.980869][T14571] CPU: 0 PID: 14571 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2378.989568][T14571] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2378.999605][T14571] Call Trace: [ 2379.002897][T14571] dump_stack+0x197/0x210 [ 2379.007232][T14571] should_fail.cold+0xa/0x15 [ 2379.011834][T14571] ? fault_create_debugfs_attr+0x180/0x180 [ 2379.017680][T14571] ? ___might_sleep+0x163/0x2c0 [ 2379.022543][T14571] should_fail_alloc_page+0x50/0x60 [ 2379.027739][T14571] __alloc_pages_nodemask+0x1a1/0x910 [ 2379.033115][T14571] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2379.038700][T14571] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2379.044434][T14571] ? kasan_unpoison_shadow+0x35/0x50 [ 2379.049722][T14571] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2379.055960][T14571] alloc_pages_current+0x107/0x210 [ 2379.061048][T14571] ? ___might_sleep+0x163/0x2c0 [ 2379.065906][T14571] __vmalloc_node_range+0x4f8/0x810 [ 2379.071112][T14571] ? bpf_map_area_alloc+0x20/0x30 [ 2379.076127][T14571] __vmalloc_node_flags_caller+0x71/0x90 [ 2379.081764][T14571] ? bpf_map_area_alloc+0x20/0x30 [ 2379.086782][T14571] __bpf_map_area_alloc+0xde/0xf0 [ 2379.091802][T14571] bpf_map_area_alloc+0x20/0x30 [ 2379.096642][T14571] htab_map_alloc+0x8d3/0x11c0 [ 2379.101395][T14571] ? htab_map_update_elem+0xca0/0xca0 [ 2379.106748][T14571] __do_sys_bpf+0x478/0x3810 [ 2379.111324][T14571] ? bpf_prog_load+0x18f0/0x18f0 [ 2379.116241][T14571] ? __kasan_check_write+0x14/0x20 [ 2379.121331][T14571] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2379.126878][T14571] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2379.132179][T14571] ? wait_for_completion+0x440/0x440 [ 2379.137462][T14571] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2379.143737][T14571] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2379.149214][T14571] ? do_syscall_64+0x26/0x790 [ 2379.153971][T14571] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2379.160031][T14571] ? do_syscall_64+0x26/0x790 [ 2379.164721][T14571] __x64_sys_bpf+0x73/0xb0 [ 2379.169138][T14571] do_syscall_64+0xfa/0x790 [ 2379.173649][T14571] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2379.179535][T14571] RIP: 0033:0x45a909 [ 2379.183441][T14571] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2379.203056][T14571] RSP: 002b:00007f5b93d6ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2379.211482][T14571] RAX: ffffffffffffffda RBX: 00007f5b93d6ac90 RCX: 000000000045a909 [ 2379.219455][T14571] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2379.227426][T14571] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2379.235411][T14571] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d6b6d4 [ 2379.243391][T14571] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 03:38:54 executing program 1 (fault-call:17 fault-nth:33): bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) [ 2379.396772][T14577] FAULT_INJECTION: forcing a failure. [ 2379.396772][T14577] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2379.410379][T14577] CPU: 1 PID: 14577 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2379.419060][T14577] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2379.429106][T14577] Call Trace: [ 2379.432403][T14577] dump_stack+0x197/0x210 [ 2379.436735][T14577] should_fail.cold+0xa/0x15 [ 2379.441312][T14577] ? fault_create_debugfs_attr+0x180/0x180 [ 2379.447097][T14577] ? ___might_sleep+0x163/0x2c0 [ 2379.451929][T14577] should_fail_alloc_page+0x50/0x60 [ 2379.457106][T14577] __alloc_pages_nodemask+0x1a1/0x910 [ 2379.462454][T14577] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2379.467970][T14577] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2379.473668][T14577] ? kasan_unpoison_shadow+0x35/0x50 [ 2379.478976][T14577] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2379.485202][T14577] alloc_pages_current+0x107/0x210 [ 2379.490327][T14577] ? ___might_sleep+0x163/0x2c0 [ 2379.495158][T14577] __vmalloc_node_range+0x4f8/0x810 [ 2379.500340][T14577] ? bpf_map_area_alloc+0x20/0x30 [ 2379.505342][T14577] __vmalloc_node_flags_caller+0x71/0x90 [ 2379.510958][T14577] ? bpf_map_area_alloc+0x20/0x30 [ 2379.515962][T14577] __bpf_map_area_alloc+0xde/0xf0 [ 2379.520990][T14577] bpf_map_area_alloc+0x20/0x30 [ 2379.525824][T14577] htab_map_alloc+0x8d3/0x11c0 [ 2379.530571][T14577] ? htab_map_update_elem+0xca0/0xca0 [ 2379.535920][T14577] __do_sys_bpf+0x478/0x3810 [ 2379.540487][T14577] ? bpf_prog_load+0x18f0/0x18f0 [ 2379.545400][T14577] ? __kasan_check_write+0x14/0x20 [ 2379.550491][T14577] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2379.556025][T14577] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2379.561292][T14577] ? wait_for_completion+0x440/0x440 [ 2379.566572][T14577] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2379.572948][T14577] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2379.578398][T14577] ? do_syscall_64+0x26/0x790 [ 2379.583112][T14577] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2379.589154][T14577] ? do_syscall_64+0x26/0x790 [ 2379.593811][T14577] __x64_sys_bpf+0x73/0xb0 [ 2379.598204][T14577] do_syscall_64+0xfa/0x790 [ 2379.602690][T14577] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2379.608554][T14577] RIP: 0033:0x45a909 [ 2379.612457][T14577] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2379.632040][T14577] RSP: 002b:00007f5b93d6ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2379.640422][T14577] RAX: ffffffffffffffda RBX: 00007f5b93d6ac90 RCX: 000000000045a909 [ 2379.648376][T14577] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2379.656374][T14577] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2379.664338][T14577] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d6b6d4 [ 2379.672282][T14577] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 03:38:55 executing program 1 (fault-call:17 fault-nth:34): bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) [ 2379.835460][T14582] FAULT_INJECTION: forcing a failure. [ 2379.835460][T14582] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2379.849161][T14582] CPU: 1 PID: 14582 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2379.857815][T14582] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2379.867861][T14582] Call Trace: [ 2379.871133][T14582] dump_stack+0x197/0x210 [ 2379.875451][T14582] should_fail.cold+0xa/0x15 [ 2379.880022][T14582] ? fault_create_debugfs_attr+0x180/0x180 [ 2379.885812][T14582] ? ___might_sleep+0x163/0x2c0 [ 2379.890645][T14582] should_fail_alloc_page+0x50/0x60 [ 2379.895816][T14582] __alloc_pages_nodemask+0x1a1/0x910 [ 2379.901164][T14582] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2379.906699][T14582] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2379.912399][T14582] ? kasan_unpoison_shadow+0x35/0x50 [ 2379.917660][T14582] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2379.923879][T14582] alloc_pages_current+0x107/0x210 [ 2379.928985][T14582] ? ___might_sleep+0x163/0x2c0 [ 2379.933813][T14582] __vmalloc_node_range+0x4f8/0x810 [ 2379.938992][T14582] ? bpf_map_area_alloc+0x20/0x30 [ 2379.943991][T14582] __vmalloc_node_flags_caller+0x71/0x90 [ 2379.949614][T14582] ? bpf_map_area_alloc+0x20/0x30 [ 2379.954617][T14582] __bpf_map_area_alloc+0xde/0xf0 [ 2379.959618][T14582] bpf_map_area_alloc+0x20/0x30 [ 2379.964445][T14582] htab_map_alloc+0x8d3/0x11c0 [ 2379.969195][T14582] ? htab_map_update_elem+0xca0/0xca0 [ 2379.974544][T14582] __do_sys_bpf+0x478/0x3810 [ 2379.979125][T14582] ? bpf_prog_load+0x18f0/0x18f0 [ 2379.984044][T14582] ? __kasan_check_write+0x14/0x20 [ 2379.989131][T14582] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2379.994649][T14582] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2379.999921][T14582] ? wait_for_completion+0x440/0x440 [ 2380.005211][T14582] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2380.011433][T14582] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2380.016870][T14582] ? do_syscall_64+0x26/0x790 [ 2380.021534][T14582] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2380.027574][T14582] ? do_syscall_64+0x26/0x790 [ 2380.032222][T14582] __x64_sys_bpf+0x73/0xb0 [ 2380.036614][T14582] do_syscall_64+0xfa/0x790 [ 2380.041129][T14582] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2380.046994][T14582] RIP: 0033:0x45a909 [ 2380.050876][T14582] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2380.070453][T14582] RSP: 002b:00007f5b93d6ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2380.078879][T14582] RAX: ffffffffffffffda RBX: 00007f5b93d6ac90 RCX: 000000000045a909 [ 2380.086824][T14582] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2380.094774][T14582] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2380.102718][T14582] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d6b6d4 [ 2380.110663][T14582] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 03:38:55 executing program 1 (fault-call:17 fault-nth:35): bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) [ 2380.258446][T14587] FAULT_INJECTION: forcing a failure. [ 2380.258446][T14587] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2380.271852][T14587] CPU: 0 PID: 14587 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2380.280510][T14587] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2380.290572][T14587] Call Trace: [ 2380.293852][T14587] dump_stack+0x197/0x210 [ 2380.298176][T14587] should_fail.cold+0xa/0x15 [ 2380.302790][T14587] ? fault_create_debugfs_attr+0x180/0x180 [ 2380.308603][T14587] ? ___might_sleep+0x163/0x2c0 [ 2380.313456][T14587] should_fail_alloc_page+0x50/0x60 [ 2380.318640][T14587] __alloc_pages_nodemask+0x1a1/0x910 [ 2380.324003][T14587] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2380.329539][T14587] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2380.335258][T14587] ? kasan_unpoison_shadow+0x35/0x50 [ 2380.340534][T14587] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2380.346773][T14587] alloc_pages_current+0x107/0x210 [ 2380.351870][T14587] ? ___might_sleep+0x163/0x2c0 [ 2380.356715][T14587] __vmalloc_node_range+0x4f8/0x810 [ 2380.361922][T14587] ? bpf_map_area_alloc+0x20/0x30 [ 2380.366932][T14587] __vmalloc_node_flags_caller+0x71/0x90 [ 2380.372551][T14587] ? bpf_map_area_alloc+0x20/0x30 [ 2380.377555][T14587] __bpf_map_area_alloc+0xde/0xf0 [ 2380.382567][T14587] bpf_map_area_alloc+0x20/0x30 [ 2380.387403][T14587] htab_map_alloc+0x8d3/0x11c0 [ 2380.392170][T14587] ? htab_map_update_elem+0xca0/0xca0 [ 2380.397525][T14587] __do_sys_bpf+0x478/0x3810 [ 2380.402106][T14587] ? bpf_prog_load+0x18f0/0x18f0 [ 2380.407024][T14587] ? __kasan_check_write+0x14/0x20 [ 2380.412121][T14587] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2380.417735][T14587] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2380.423066][T14587] ? wait_for_completion+0x440/0x440 [ 2380.428355][T14587] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2380.434597][T14587] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2380.440047][T14587] ? do_syscall_64+0x26/0x790 [ 2380.444705][T14587] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2380.450765][T14587] ? do_syscall_64+0x26/0x790 [ 2380.455454][T14587] __x64_sys_bpf+0x73/0xb0 [ 2380.459865][T14587] do_syscall_64+0xfa/0x790 [ 2380.464366][T14587] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2380.470248][T14587] RIP: 0033:0x45a909 [ 2380.474134][T14587] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2380.493725][T14587] RSP: 002b:00007f5b93d6ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2380.502133][T14587] RAX: ffffffffffffffda RBX: 00007f5b93d6ac90 RCX: 000000000045a909 [ 2380.510095][T14587] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2380.518058][T14587] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2380.526016][T14587] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d6b6d4 [ 2380.533978][T14587] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 03:39:04 executing program 2: r0 = socket$kcm(0x10, 0x5, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) 03:39:04 executing program 1 (fault-call:17 fault-nth:36): bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) [ 2388.497069][T14598] FAULT_INJECTION: forcing a failure. [ 2388.497069][T14598] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2388.510432][T14598] CPU: 0 PID: 14598 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2388.519102][T14598] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2388.529147][T14598] Call Trace: [ 2388.532429][T14598] dump_stack+0x197/0x210 [ 2388.536754][T14598] should_fail.cold+0xa/0x15 [ 2388.541354][T14598] ? fault_create_debugfs_attr+0x180/0x180 [ 2388.547176][T14598] ? ___might_sleep+0x163/0x2c0 [ 2388.552121][T14598] should_fail_alloc_page+0x50/0x60 [ 2388.557331][T14598] __alloc_pages_nodemask+0x1a1/0x910 [ 2388.562698][T14598] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2388.568242][T14598] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2388.573975][T14598] ? kasan_unpoison_shadow+0x35/0x50 [ 2388.579256][T14598] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2388.585495][T14598] alloc_pages_current+0x107/0x210 [ 2388.590592][T14598] ? ___might_sleep+0x163/0x2c0 [ 2388.595437][T14598] __vmalloc_node_range+0x4f8/0x810 [ 2388.600636][T14598] ? bpf_map_area_alloc+0x20/0x30 [ 2388.605650][T14598] __vmalloc_node_flags_caller+0x71/0x90 [ 2388.611267][T14598] ? bpf_map_area_alloc+0x20/0x30 [ 2388.616402][T14598] __bpf_map_area_alloc+0xde/0xf0 [ 2388.621415][T14598] bpf_map_area_alloc+0x20/0x30 [ 2388.626262][T14598] htab_map_alloc+0x8d3/0x11c0 [ 2388.631030][T14598] ? htab_map_update_elem+0xca0/0xca0 [ 2388.636393][T14598] __do_sys_bpf+0x478/0x3810 [ 2388.640972][T14598] ? bpf_prog_load+0x18f0/0x18f0 [ 2388.645925][T14598] ? __kasan_check_write+0x14/0x20 [ 2388.651024][T14598] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2388.656557][T14598] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2388.661835][T14598] ? wait_for_completion+0x440/0x440 [ 2388.667109][T14598] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2388.673352][T14598] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2388.678822][T14598] ? do_syscall_64+0x26/0x790 [ 2388.683502][T14598] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2388.689571][T14598] ? do_syscall_64+0x26/0x790 [ 2388.694276][T14598] __x64_sys_bpf+0x73/0xb0 [ 2388.698689][T14598] do_syscall_64+0xfa/0x790 [ 2388.703194][T14598] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2388.709088][T14598] RIP: 0033:0x45a909 [ 2388.712996][T14598] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2388.732600][T14598] RSP: 002b:00007f5b93d6ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2388.740998][T14598] RAX: ffffffffffffffda RBX: 00007f5b93d6ac90 RCX: 000000000045a909 [ 2388.748955][T14598] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2388.756913][T14598] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2388.764871][T14598] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d6b6d4 [ 2388.772828][T14598] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 03:39:06 executing program 5: socket$kcm(0x10, 0x2, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x19, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x4009}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'veth1_to_hsr\x00'}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x0) socket$kcm(0x29, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-0\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r3 = openat$cgroup_int(r0, &(0x7f0000000000)='cpuset.cpu_exclusive\x00', 0x2, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000040), 0x12) 03:39:06 executing program 1 (fault-call:17 fault-nth:37): bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) 03:39:06 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x140, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000440)=""/202) r3 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x200, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x2000, 0x0, 0x98b, 0x0, 0x2, 0x40}, r3, 0x1, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000040)={0x7, 0x70, 0x1, 0x53, 0x2, 0x6, 0x0, 0x1, 0x7842bacadaa710e6, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0xd2c, 0x7, @perf_config_ext={0x7, 0x8a}, 0x10, 0x1d2, 0xc7, 0xc, 0x1, 0x3f, 0x4c22}, r3, 0x1, r0, 0x2) write$cgroup_pid(r1, &(0x7f0000000280)=r3, 0x12) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r4, &(0x7f0000000200), 0x400c00) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r3, 0x12) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci={0x1f, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0xb, 0x6, 0x9, 0x4, 0x401, r5, 0x5, [], r6, r7, 0x5}, 0x3c) r8 = openat$cgroup_ro(r5, &(0x7f0000000200)='memory.events\x00', 0x2761, 0x0) write$cgroup_subtree(r8, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400000) [ 2391.364092][T14604] FAULT_INJECTION: forcing a failure. [ 2391.364092][T14604] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2391.377445][T14604] CPU: 0 PID: 14604 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2391.386115][T14604] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2391.396195][T14604] Call Trace: [ 2391.399498][T14604] dump_stack+0x197/0x210 [ 2391.403836][T14604] should_fail.cold+0xa/0x15 [ 2391.408436][T14604] ? fault_create_debugfs_attr+0x180/0x180 [ 2391.414234][T14604] ? ___might_sleep+0x163/0x2c0 [ 2391.419083][T14604] should_fail_alloc_page+0x50/0x60 [ 2391.424270][T14604] __alloc_pages_nodemask+0x1a1/0x910 [ 2391.429658][T14604] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2391.435199][T14604] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2391.440964][T14604] ? kasan_unpoison_shadow+0x35/0x50 [ 2391.446251][T14604] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2391.452485][T14604] alloc_pages_current+0x107/0x210 [ 2391.457614][T14604] ? ___might_sleep+0x163/0x2c0 [ 2391.462463][T14604] __vmalloc_node_range+0x4f8/0x810 [ 2391.467652][T14604] ? bpf_map_area_alloc+0x20/0x30 [ 2391.472662][T14604] __vmalloc_node_flags_caller+0x71/0x90 [ 2391.478278][T14604] ? bpf_map_area_alloc+0x20/0x30 [ 2391.483284][T14604] __bpf_map_area_alloc+0xde/0xf0 [ 2391.488292][T14604] bpf_map_area_alloc+0x20/0x30 [ 2391.493276][T14604] htab_map_alloc+0x8d3/0x11c0 [ 2391.498180][T14604] ? htab_map_update_elem+0xca0/0xca0 [ 2391.503540][T14604] __do_sys_bpf+0x478/0x3810 [ 2391.508136][T14604] ? bpf_prog_load+0x18f0/0x18f0 [ 2391.513066][T14604] ? __kasan_check_write+0x14/0x20 [ 2391.518163][T14604] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2391.523692][T14604] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2391.528999][T14604] ? wait_for_completion+0x440/0x440 [ 2391.534284][T14604] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2391.540520][T14604] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2391.545976][T14604] ? do_syscall_64+0x26/0x790 [ 2391.550652][T14604] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2391.556706][T14604] ? do_syscall_64+0x26/0x790 [ 2391.561367][T14604] __x64_sys_bpf+0x73/0xb0 [ 2391.565766][T14604] do_syscall_64+0xfa/0x790 [ 2391.570251][T14604] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2391.576125][T14604] RIP: 0033:0x45a909 [ 2391.580020][T14604] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2391.599618][T14604] RSP: 002b:00007f5b93d6ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2391.608008][T14604] RAX: ffffffffffffffda RBX: 00007f5b93d6ac90 RCX: 000000000045a909 [ 2391.615993][T14604] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2391.623947][T14604] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2391.631900][T14604] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d6b6d4 [ 2391.639850][T14604] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 03:39:07 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_type(r0, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000380)='cpuset.mems\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x30863, 0x0) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0xfffffc61) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000240)={'hwsim0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f00000000c0)={'hwsim0\x00', @random="0894f53e01dc"}) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)={0xffff, 0x5}, 0xc) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup\x00\f\x7f\xd9\xfa;\x8b\x88gb\xefi\x16\x91\xbb\xc4\xd5Jk\tU~ \xa4\vR\\\x8a\xdb\xcel\xe0\xa3[\xae\x9d\xac\x84\x9f\v\x9e\x9f\r\x10\x1f\xd3\x80\xc1\xccq\xab\x01y\xed\xfc\x96)\xf6_>+\xa03\xf4\xcc0\xbbE\xb0\xc3\x94\xd53\x87\xd6\xc4\\\xc7\x82\xe9\xaf\xb5\xb6\x15\xf4K2\x17\f\x98\x1c\xebq/\xf5\x81#\x85\xc5\xa0\xfd\xfac\xd9\xf2c`\xe9[c\a\x12\x1bb\x82\x83\x86d\xf0k\xa8\x90\x06\xa8\x1cK\xea\x19\x91\a1z)\xde_r`\xee\xb6\x9e\xcb\x05\x00\x00\x82\xa1\t\xc9\x05\xcc^', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000200)='memory.high\x00\x90\x80\xa4\x96\xbb\xe4\xb2\xa2\x01\xc0\xb8*Z\xef\xf8\x0e\x1f]\xf7\x10\xdb\xfe\xe4\x1d\xc6\x92\x7f\xeeK_p\t\x8c\x9f5\xd0\xef)\xd8\x04\xbf\xc2N\x1c\xf0R\xdc\r\xb1Gf\xba\xd11#<\xaf^,s\x85\x10R\x99\xc2D\xee\n\"\xf9c\x15{\xc1[\xef\x06\x8a\xcd\x9d\xc8\x90#\xd0\xe7\xe3\xe0\xa9\xf3\xc0n\x1f\xd1\x11P\xe20\xcd\x1c\xfa\xfd\xa3\xcf\x9c\xc6\xb7]\x16\xc7\xd7\xb4/\x82\xd1\xae\xd9TM\x05a\xe5\xc5U\x91\xbe\x81\xac4\x9d\x02`\xe7\xa6q\x1f@\x1f\x1f?tm\x9c\xd1\x8c\xa1\xb5\xe0`H)\x97r\xc0?y\x9cc=c`A^\x9f\xcd\xbc\xf4m>I\xae\xdf\x946\xe7M`\xeb\x9fm\xbe+n\x00\x18k\x98\xab\xd5\xeet\"d\x81\x94\x04\xf5\xeb', 0x2, 0x0) write$cgroup_int(r4, 0x0, 0x0) 03:39:11 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_type(r0, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000380)='cpuset.mems\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x30863, 0x0) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0xfffffc61) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000240)={'hwsim0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f00000000c0)={'hwsim0\x00', @random="0894f53e01dc"}) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)={0xffff, 0x5}, 0xc) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup\x00\f\x7f\xd9\xfa;\x8b\x88gb\xefi\x16\x91\xbb\xc4\xd5Jk\tU~ \xa4\vR\\\x8a\xdb\xcel\xe0\xa3[\xae\x9d\xac\x84\x9f\v\x9e\x9f\r\x10\x1f\xd3\x80\xc1\xccq\xab\x01y\xed\xfc\x96)\xf6_>+\xa03\xf4\xcc0\xbbE\xb0\xc3\x94\xd53\x87\xd6\xc4\\\xc7\x82\xe9\xaf\xb5\xb6\x15\xf4K2\x17\f\x98\x1c\xebq/\xf5\x81#\x85\xc5\xa0\xfd\xfac\xd9\xf2c`\xe9[c\a\x12\x1bb\x82\x83\x86d\xf0k\xa8\x90\x06\xa8\x1cK\xea\x19\x91\a1z)\xde_r`\xee\xb6\x9e\xcb\x05\x00\x00\x82\xa1\t\xc9\x05\xcc^', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000200)='memory.high\x00\x90\x80\xa4\x96\xbb\xe4\xb2\xa2\x01\xc0\xb8*Z\xef\xf8\x0e\x1f]\xf7\x10\xdb\xfe\xe4\x1d\xc6\x92\x7f\xeeK_p\t\x8c\x9f5\xd0\xef)\xd8\x04\xbf\xc2N\x1c\xf0R\xdc\r\xb1Gf\xba\xd11#<\xaf^,s\x85\x10R\x99\xc2D\xee\n\"\xf9c\x15{\xc1[\xef\x06\x8a\xcd\x9d\xc8\x90#\xd0\xe7\xe3\xe0\xa9\xf3\xc0n\x1f\xd1\x11P\xe20\xcd\x1c\xfa\xfd\xa3\xcf\x9c\xc6\xb7]\x16\xc7\xd7\xb4/\x82\xd1\xae\xd9TM\x05a\xe5\xc5U\x91\xbe\x81\xac4\x9d\x02`\xe7\xa6q\x1f@\x1f\x1f?tm\x9c\xd1\x8c\xa1\xb5\xe0`H)\x97r\xc0?y\x9cc=c`A^\x9f\xcd\xbc\xf4m>I\xae\xdf\x946\xe7M`\xeb\x9fm\xbe+n\x00\x18k\x98\xab\xd5\xeet\"d\x81\x94\x04\xf5\xeb', 0x2, 0x0) write$cgroup_int(r4, 0x0, 0x0) 03:39:11 executing program 1 (fault-call:17 fault-nth:38): bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) [ 2396.053674][T14610] FAULT_INJECTION: forcing a failure. [ 2396.053674][T14610] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2396.068180][T14610] CPU: 0 PID: 14610 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2396.076864][T14610] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2396.086913][T14610] Call Trace: [ 2396.090220][T14610] dump_stack+0x197/0x210 [ 2396.094540][T14610] should_fail.cold+0xa/0x15 [ 2396.099229][T14610] ? fault_create_debugfs_attr+0x180/0x180 [ 2396.105022][T14610] ? ___might_sleep+0x163/0x2c0 [ 2396.109861][T14610] should_fail_alloc_page+0x50/0x60 [ 2396.115035][T14610] __alloc_pages_nodemask+0x1a1/0x910 [ 2396.120412][T14610] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2396.125943][T14610] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2396.131684][T14610] ? kasan_unpoison_shadow+0x35/0x50 [ 2396.137003][T14610] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2396.143249][T14610] alloc_pages_current+0x107/0x210 [ 2396.148353][T14610] ? ___might_sleep+0x163/0x2c0 [ 2396.153194][T14610] __vmalloc_node_range+0x4f8/0x810 [ 2396.158385][T14610] ? bpf_map_area_alloc+0x20/0x30 [ 2396.163396][T14610] __vmalloc_node_flags_caller+0x71/0x90 [ 2396.169013][T14610] ? bpf_map_area_alloc+0x20/0x30 [ 2396.174025][T14610] __bpf_map_area_alloc+0xde/0xf0 [ 2396.179054][T14610] bpf_map_area_alloc+0x20/0x30 [ 2396.183889][T14610] htab_map_alloc+0x8d3/0x11c0 [ 2396.188653][T14610] ? htab_map_update_elem+0xca0/0xca0 [ 2396.194056][T14610] __do_sys_bpf+0x478/0x3810 [ 2396.198630][T14610] ? bpf_prog_load+0x18f0/0x18f0 [ 2396.203550][T14610] ? __kasan_check_write+0x14/0x20 [ 2396.208647][T14610] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2396.214171][T14610] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2396.219438][T14610] ? wait_for_completion+0x440/0x440 [ 2396.224711][T14610] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2396.230944][T14610] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2396.236414][T14610] ? do_syscall_64+0x26/0x790 [ 2396.241067][T14610] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2396.247113][T14610] ? do_syscall_64+0x26/0x790 [ 2396.251778][T14610] __x64_sys_bpf+0x73/0xb0 [ 2396.256179][T14610] do_syscall_64+0xfa/0x790 [ 2396.260664][T14610] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2396.266533][T14610] RIP: 0033:0x45a909 [ 2396.270409][T14610] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2396.289993][T14610] RSP: 002b:00007f5b93d6ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2396.298388][T14610] RAX: ffffffffffffffda RBX: 00007f5b93d6ac90 RCX: 000000000045a909 [ 2396.306335][T14610] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2396.314289][T14610] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2396.322236][T14610] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d6b6d4 [ 2396.330183][T14610] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 03:39:12 executing program 1 (fault-call:17 fault-nth:39): bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) [ 2396.485379][T14615] FAULT_INJECTION: forcing a failure. [ 2396.485379][T14615] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2396.499016][T14615] CPU: 0 PID: 14615 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2396.507690][T14615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2396.517742][T14615] Call Trace: [ 2396.521062][T14615] dump_stack+0x197/0x210 [ 2396.525398][T14615] should_fail.cold+0xa/0x15 [ 2396.529974][T14615] ? fault_create_debugfs_attr+0x180/0x180 [ 2396.535768][T14615] ? ___might_sleep+0x163/0x2c0 [ 2396.540614][T14615] should_fail_alloc_page+0x50/0x60 [ 2396.545791][T14615] __alloc_pages_nodemask+0x1a1/0x910 [ 2396.551143][T14615] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2396.556716][T14615] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2396.562474][T14615] ? kasan_unpoison_shadow+0x35/0x50 [ 2396.567744][T14615] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2396.574114][T14615] alloc_pages_current+0x107/0x210 [ 2396.579220][T14615] ? ___might_sleep+0x163/0x2c0 [ 2396.584077][T14615] __vmalloc_node_range+0x4f8/0x810 [ 2396.589275][T14615] ? bpf_map_area_alloc+0x20/0x30 [ 2396.594328][T14615] __vmalloc_node_flags_caller+0x71/0x90 [ 2396.599942][T14615] ? bpf_map_area_alloc+0x20/0x30 [ 2396.604955][T14615] __bpf_map_area_alloc+0xde/0xf0 [ 2396.609989][T14615] bpf_map_area_alloc+0x20/0x30 [ 2396.614825][T14615] htab_map_alloc+0x8d3/0x11c0 [ 2396.619590][T14615] ? htab_map_update_elem+0xca0/0xca0 [ 2396.624947][T14615] __do_sys_bpf+0x478/0x3810 [ 2396.629573][T14615] ? bpf_prog_load+0x18f0/0x18f0 [ 2396.634509][T14615] ? __kasan_check_write+0x14/0x20 [ 2396.639603][T14615] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2396.645129][T14615] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2396.650393][T14615] ? wait_for_completion+0x440/0x440 [ 2396.655670][T14615] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2396.661919][T14615] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2396.667393][T14615] ? do_syscall_64+0x26/0x790 [ 2396.672053][T14615] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2396.678100][T14615] ? do_syscall_64+0x26/0x790 [ 2396.682809][T14615] __x64_sys_bpf+0x73/0xb0 [ 2396.687211][T14615] do_syscall_64+0xfa/0x790 [ 2396.691696][T14615] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2396.697717][T14615] RIP: 0033:0x45a909 [ 2396.701594][T14615] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2396.721384][T14615] RSP: 002b:00007f5b93d6ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2396.729786][T14615] RAX: ffffffffffffffda RBX: 00007f5b93d6ac90 RCX: 000000000045a909 [ 2396.737746][T14615] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2396.745705][T14615] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2396.753668][T14615] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d6b6d4 [ 2396.761630][T14615] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 03:39:12 executing program 1 (fault-call:17 fault-nth:40): bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) [ 2396.909748][T14620] FAULT_INJECTION: forcing a failure. [ 2396.909748][T14620] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2396.923246][T14620] CPU: 1 PID: 14620 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2396.931927][T14620] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2396.941979][T14620] Call Trace: [ 2396.945270][T14620] dump_stack+0x197/0x210 [ 2396.949589][T14620] should_fail.cold+0xa/0x15 [ 2396.954193][T14620] ? fault_create_debugfs_attr+0x180/0x180 [ 2396.959999][T14620] ? ___might_sleep+0x163/0x2c0 [ 2396.964850][T14620] should_fail_alloc_page+0x50/0x60 [ 2396.970025][T14620] __alloc_pages_nodemask+0x1a1/0x910 [ 2396.975380][T14620] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2396.980908][T14620] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2396.986632][T14620] ? kasan_unpoison_shadow+0x35/0x50 [ 2396.991900][T14620] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2396.998128][T14620] alloc_pages_current+0x107/0x210 [ 2397.003217][T14620] ? ___might_sleep+0x163/0x2c0 [ 2397.008052][T14620] __vmalloc_node_range+0x4f8/0x810 [ 2397.013240][T14620] ? bpf_map_area_alloc+0x20/0x30 [ 2397.018262][T14620] __vmalloc_node_flags_caller+0x71/0x90 [ 2397.023874][T14620] ? bpf_map_area_alloc+0x20/0x30 [ 2397.028896][T14620] __bpf_map_area_alloc+0xde/0xf0 [ 2397.033903][T14620] bpf_map_area_alloc+0x20/0x30 [ 2397.038746][T14620] htab_map_alloc+0x8d3/0x11c0 [ 2397.043502][T14620] ? htab_map_update_elem+0xca0/0xca0 [ 2397.048865][T14620] __do_sys_bpf+0x478/0x3810 [ 2397.053439][T14620] ? bpf_prog_load+0x18f0/0x18f0 [ 2397.058356][T14620] ? __kasan_check_write+0x14/0x20 [ 2397.063453][T14620] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2397.068980][T14620] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2397.074248][T14620] ? wait_for_completion+0x440/0x440 [ 2397.079607][T14620] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2397.085837][T14620] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2397.091275][T14620] ? do_syscall_64+0x26/0x790 [ 2397.095932][T14620] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2397.101975][T14620] ? do_syscall_64+0x26/0x790 [ 2397.106639][T14620] __x64_sys_bpf+0x73/0xb0 [ 2397.111145][T14620] do_syscall_64+0xfa/0x790 [ 2397.115633][T14620] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2397.121508][T14620] RIP: 0033:0x45a909 [ 2397.125384][T14620] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2397.144966][T14620] RSP: 002b:00007f5b93d6ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2397.153358][T14620] RAX: ffffffffffffffda RBX: 00007f5b93d6ac90 RCX: 000000000045a909 [ 2397.161318][T14620] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2397.169284][T14620] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2397.177322][T14620] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d6b6d4 [ 2397.185290][T14620] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 03:39:12 executing program 1 (fault-call:17 fault-nth:41): bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) [ 2397.362905][T14625] FAULT_INJECTION: forcing a failure. [ 2397.362905][T14625] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2397.376658][T14625] CPU: 1 PID: 14625 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2397.385339][T14625] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2397.395401][T14625] Call Trace: [ 2397.398722][T14625] dump_stack+0x197/0x210 [ 2397.403079][T14625] should_fail.cold+0xa/0x15 [ 2397.407676][T14625] ? fault_create_debugfs_attr+0x180/0x180 [ 2397.413472][T14625] ? ___might_sleep+0x163/0x2c0 [ 2397.418318][T14625] should_fail_alloc_page+0x50/0x60 [ 2397.423500][T14625] __alloc_pages_nodemask+0x1a1/0x910 [ 2397.428861][T14625] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2397.434571][T14625] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2397.440101][T14625] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 2397.446171][T14625] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2397.452508][T14625] alloc_pages_current+0x107/0x210 [ 2397.457603][T14625] __get_free_pages+0xc/0x40 [ 2397.462178][T14625] kasan_populate_vmalloc_pte+0x2f/0x1c0 [ 2397.467794][T14625] apply_to_page_range+0x445/0x700 [ 2397.472885][T14625] ? memset+0x40/0x40 [ 2397.476881][T14625] kasan_populate_vmalloc+0x68/0x90 [ 2397.482071][T14625] __vmalloc_node_range+0x47e/0x810 [ 2397.487257][T14625] ? bpf_map_area_alloc+0x20/0x30 [ 2397.492261][T14625] __vmalloc_node_flags_caller+0x71/0x90 [ 2397.497868][T14625] ? bpf_map_area_alloc+0x20/0x30 [ 2397.502869][T14625] __bpf_map_area_alloc+0xde/0xf0 [ 2397.507896][T14625] bpf_map_area_alloc+0x20/0x30 [ 2397.512735][T14625] htab_map_alloc+0x8d3/0x11c0 [ 2397.517496][T14625] ? htab_map_update_elem+0xca0/0xca0 [ 2397.522876][T14625] __do_sys_bpf+0x478/0x3810 [ 2397.527458][T14625] ? bpf_prog_load+0x18f0/0x18f0 [ 2397.532384][T14625] ? __kasan_check_write+0x14/0x20 [ 2397.537493][T14625] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2397.543028][T14625] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2397.548298][T14625] ? wait_for_completion+0x440/0x440 [ 2397.553585][T14625] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2397.559816][T14625] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2397.565272][T14625] ? do_syscall_64+0x26/0x790 [ 2397.569940][T14625] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2397.575988][T14625] ? do_syscall_64+0x26/0x790 [ 2397.580661][T14625] __x64_sys_bpf+0x73/0xb0 [ 2397.585066][T14625] do_syscall_64+0xfa/0x790 [ 2397.589557][T14625] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2397.595431][T14625] RIP: 0033:0x45a909 [ 2397.599311][T14625] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2397.618918][T14625] RSP: 002b:00007f5b93d6ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2397.627316][T14625] RAX: ffffffffffffffda RBX: 00007f5b93d6ac90 RCX: 000000000045a909 [ 2397.635267][T14625] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2397.643221][T14625] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2397.651175][T14625] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d6b6d4 [ 2397.659126][T14625] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 03:39:13 executing program 1 (fault-call:17 fault-nth:42): bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) [ 2397.827048][T14630] FAULT_INJECTION: forcing a failure. [ 2397.827048][T14630] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2397.840512][T14630] CPU: 1 PID: 14630 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2397.849186][T14630] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2397.859228][T14630] Call Trace: [ 2397.862504][T14630] dump_stack+0x197/0x210 [ 2397.866820][T14630] should_fail.cold+0xa/0x15 [ 2397.871399][T14630] ? fault_create_debugfs_attr+0x180/0x180 [ 2397.877202][T14630] ? ___might_sleep+0x163/0x2c0 [ 2397.882049][T14630] should_fail_alloc_page+0x50/0x60 [ 2397.887226][T14630] __alloc_pages_nodemask+0x1a1/0x910 [ 2397.892582][T14630] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2397.898296][T14630] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2397.903815][T14630] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 2397.909769][T14630] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2397.916043][T14630] alloc_pages_current+0x107/0x210 [ 2397.921133][T14630] __get_free_pages+0xc/0x40 [ 2397.925712][T14630] kasan_populate_vmalloc_pte+0x2f/0x1c0 [ 2397.931375][T14630] apply_to_page_range+0x445/0x700 [ 2397.936465][T14630] ? memset+0x40/0x40 [ 2397.940427][T14630] kasan_populate_vmalloc+0x68/0x90 [ 2397.945603][T14630] __vmalloc_node_range+0x47e/0x810 [ 2397.950782][T14630] ? bpf_map_area_alloc+0x20/0x30 [ 2397.955781][T14630] __vmalloc_node_flags_caller+0x71/0x90 [ 2397.961387][T14630] ? bpf_map_area_alloc+0x20/0x30 [ 2397.966388][T14630] __bpf_map_area_alloc+0xde/0xf0 [ 2397.971425][T14630] bpf_map_area_alloc+0x20/0x30 [ 2397.976254][T14630] htab_map_alloc+0x8d3/0x11c0 [ 2397.981032][T14630] ? htab_map_update_elem+0xca0/0xca0 [ 2397.986380][T14630] __do_sys_bpf+0x478/0x3810 [ 2397.990947][T14630] ? bpf_prog_load+0x18f0/0x18f0 [ 2397.995861][T14630] ? __kasan_check_write+0x14/0x20 [ 2398.000947][T14630] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2398.006471][T14630] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2398.011731][T14630] ? wait_for_completion+0x440/0x440 [ 2398.016998][T14630] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2398.023258][T14630] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2398.028691][T14630] ? do_syscall_64+0x26/0x790 [ 2398.033342][T14630] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2398.039386][T14630] ? do_syscall_64+0x26/0x790 [ 2398.044046][T14630] __x64_sys_bpf+0x73/0xb0 [ 2398.048444][T14630] do_syscall_64+0xfa/0x790 [ 2398.052926][T14630] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2398.058792][T14630] RIP: 0033:0x45a909 [ 2398.062663][T14630] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2398.082238][T14630] RSP: 002b:00007f5b93d6ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2398.090623][T14630] RAX: ffffffffffffffda RBX: 00007f5b93d6ac90 RCX: 000000000045a909 [ 2398.098579][T14630] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2398.106541][T14630] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2398.114498][T14630] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d6b6d4 [ 2398.122447][T14630] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 03:39:25 executing program 2: r0 = socket$kcm(0x2c, 0x3, 0x0) r1 = gettid() perf_event_open(0x0, r1, 0x1, 0xffffffffffffffff, 0x3) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x32600) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="404e017c6f767920"], 0xda00) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x2af5e20005319cb2, 0x70, 0x81, 0x1, 0x80, 0x7, 0x0, 0x0, 0x1020, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, @perf_config_ext={0x3, 0x1ff}, 0x48, 0x0, 0x0, 0x2, 0x1aa0, 0x7cab, 0x5}, r5, 0x1, r6, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x0}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x8, r7, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0x1f000) r8 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$cgroup_pid(r8, &(0x7f0000000000), 0x12) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='io.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x27, 0x8a, 0x0, 0x3, 0x0, 0x5, 0x14, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0xc, @perf_bp={&(0x7f0000000040), 0xdb72201d12e14feb}, 0x28000, 0xc2, 0xfff, 0x9, 0x7, 0xff, 0x7}, r1, 0x6, 0xffffffffffffffff, 0x8) setsockopt$sock_attach_bpf(r0, 0x11b, 0x3, &(0x7f0000000000)=r0, 0x4) 03:39:25 executing program 1 (fault-call:17 fault-nth:43): bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) 03:39:25 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x10}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000080), 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000240)={r0, 0x10, &(0x7f0000000180)={&(0x7f00000000c0)=""/154, 0x9a, 0xffffffffffffffff}}, 0x10) [ 2410.222301][T14644] FAULT_INJECTION: forcing a failure. [ 2410.222301][T14644] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2410.235606][T14644] CPU: 0 PID: 14644 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2410.244267][T14644] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2410.254312][T14644] Call Trace: [ 2410.257597][T14644] dump_stack+0x197/0x210 [ 2410.261924][T14644] should_fail.cold+0xa/0x15 [ 2410.266541][T14644] ? fault_create_debugfs_attr+0x180/0x180 [ 2410.272357][T14644] ? ___might_sleep+0x163/0x2c0 [ 2410.277193][T14644] should_fail_alloc_page+0x50/0x60 [ 2410.282397][T14644] __alloc_pages_nodemask+0x1a1/0x910 [ 2410.287889][T14644] ? find_held_lock+0x35/0x130 [ 2410.292632][T14644] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2410.298329][T14644] ? lock_downgrade+0x920/0x920 [ 2410.303173][T14644] ? rwlock_bug.part.0+0x90/0x90 [ 2410.308111][T14644] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2410.314348][T14644] alloc_pages_current+0x107/0x210 [ 2410.319476][T14644] __get_free_pages+0xc/0x40 [ 2410.324054][T14644] kasan_populate_vmalloc_pte+0x2f/0x1c0 [ 2410.329676][T14644] apply_to_page_range+0x445/0x700 [ 2410.334766][T14644] ? memset+0x40/0x40 [ 2410.338726][T14644] kasan_populate_vmalloc+0x68/0x90 [ 2410.343911][T14644] __vmalloc_node_range+0x47e/0x810 [ 2410.349106][T14644] ? bpf_map_area_alloc+0x20/0x30 [ 2410.354112][T14644] __vmalloc_node_flags_caller+0x71/0x90 [ 2410.359718][T14644] ? bpf_map_area_alloc+0x20/0x30 [ 2410.364743][T14644] __bpf_map_area_alloc+0xde/0xf0 [ 2410.369789][T14644] bpf_map_area_alloc+0x20/0x30 [ 2410.374618][T14644] htab_map_alloc+0x8d3/0x11c0 [ 2410.379451][T14644] ? htab_map_update_elem+0xca0/0xca0 [ 2410.384824][T14644] __do_sys_bpf+0x478/0x3810 [ 2410.389492][T14644] ? bpf_prog_load+0x18f0/0x18f0 [ 2410.394408][T14644] ? __kasan_check_write+0x14/0x20 [ 2410.399510][T14644] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2410.405052][T14644] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2410.410338][T14644] ? wait_for_completion+0x440/0x440 [ 2410.415611][T14644] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2410.421855][T14644] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2410.427317][T14644] ? do_syscall_64+0x26/0x790 [ 2410.431979][T14644] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2410.438018][T14644] ? do_syscall_64+0x26/0x790 [ 2410.442695][T14644] __x64_sys_bpf+0x73/0xb0 [ 2410.447211][T14644] do_syscall_64+0xfa/0x790 [ 2410.451705][T14644] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2410.457570][T14644] RIP: 0033:0x45a909 [ 2410.461458][T14644] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2410.481051][T14644] RSP: 002b:00007f5b93d49c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2410.489461][T14644] RAX: ffffffffffffffda RBX: 00007f5b93d49c90 RCX: 000000000045a909 [ 2410.497411][T14644] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2410.505371][T14644] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2410.513419][T14644] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d4a6d4 [ 2410.521384][T14644] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 03:39:26 executing program 1 (fault-call:17 fault-nth:44): bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) [ 2410.713712][T14647] FAULT_INJECTION: forcing a failure. [ 2410.713712][T14647] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2410.727056][T14647] CPU: 1 PID: 14647 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2410.735726][T14647] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2410.745767][T14647] Call Trace: [ 2410.749058][T14647] dump_stack+0x197/0x210 [ 2410.753387][T14647] should_fail.cold+0xa/0x15 [ 2410.757988][T14647] ? fault_create_debugfs_attr+0x180/0x180 [ 2410.763801][T14647] ? ___might_sleep+0x163/0x2c0 [ 2410.768641][T14647] should_fail_alloc_page+0x50/0x60 [ 2410.773819][T14647] __alloc_pages_nodemask+0x1a1/0x910 [ 2410.779169][T14647] ? find_held_lock+0x35/0x130 [ 2410.783910][T14647] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2410.789642][T14647] ? lock_downgrade+0x920/0x920 [ 2410.794471][T14647] ? rwlock_bug.part.0+0x90/0x90 [ 2410.799394][T14647] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2410.805621][T14647] alloc_pages_current+0x107/0x210 [ 2410.810731][T14647] __get_free_pages+0xc/0x40 [ 2410.815298][T14647] kasan_populate_vmalloc_pte+0x2f/0x1c0 [ 2410.820910][T14647] apply_to_page_range+0x445/0x700 [ 2410.826001][T14647] ? memset+0x40/0x40 [ 2410.830002][T14647] kasan_populate_vmalloc+0x68/0x90 [ 2410.835178][T14647] __vmalloc_node_range+0x47e/0x810 [ 2410.840357][T14647] ? bpf_map_area_alloc+0x20/0x30 [ 2410.845362][T14647] __vmalloc_node_flags_caller+0x71/0x90 [ 2410.850970][T14647] ? bpf_map_area_alloc+0x20/0x30 [ 2410.855973][T14647] __bpf_map_area_alloc+0xde/0xf0 [ 2410.860975][T14647] bpf_map_area_alloc+0x20/0x30 [ 2410.865815][T14647] htab_map_alloc+0x8d3/0x11c0 [ 2410.870571][T14647] ? htab_map_update_elem+0xca0/0xca0 [ 2410.875959][T14647] __do_sys_bpf+0x478/0x3810 [ 2410.880536][T14647] ? bpf_prog_load+0x18f0/0x18f0 [ 2410.885454][T14647] ? __kasan_check_write+0x14/0x20 [ 2410.890546][T14647] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2410.896069][T14647] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2410.901371][T14647] ? wait_for_completion+0x440/0x440 [ 2410.906673][T14647] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2410.912898][T14647] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2410.918329][T14647] ? do_syscall_64+0x26/0x790 [ 2410.922981][T14647] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2410.929046][T14647] ? do_syscall_64+0x26/0x790 [ 2410.933703][T14647] __x64_sys_bpf+0x73/0xb0 [ 2410.938115][T14647] do_syscall_64+0xfa/0x790 [ 2410.942597][T14647] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2410.948473][T14647] RIP: 0033:0x45a909 [ 2410.952359][T14647] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2410.971948][T14647] RSP: 002b:00007f5b93d6ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2410.980345][T14647] RAX: ffffffffffffffda RBX: 00007f5b93d6ac90 RCX: 000000000045a909 [ 2410.988298][T14647] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2410.996334][T14647] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2411.004290][T14647] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d6b6d4 [ 2411.012250][T14647] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 03:39:37 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x6d, 0x4, 0x4, 0xff, 0x0, 0x3, 0x8000, 0x12, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x8001, 0x2, @perf_bp={&(0x7f0000000200), 0xa83b5f09fbc1af9e}, 0x1000, 0x2, 0x8, 0x4, 0xffffffffffffff6d, 0x8001, 0x9}, 0x0, 0x10, 0xffffffffffffffff, 0xb) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci={0x1f, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="2d637075202b696f20440fef4e1fc7a95507d1a11cee94577cdf8cc39fac325d9b55efbfc6a3c1da874f7e38a03a8d1d5fd2821ffb801acfb6aa5057b2913f8c99c8685e08eed73ab622d1d0e3eecc321f25c39c2e6c43b605906282f842f48aef722a3224ebca2e8b36020518713a6e2ec56e90ccb3d0ccc3342d0a555edab5991f9595e4488367b74b53a53ba39a4949b92b69fa3e4894d08c0f1e63046c65aa5dd293233fbe0708bafc8d"], 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0xb, 0x6, 0x9, 0x4, 0x401, r2, 0x5, [], r3, r4, 0x5}, 0x3c) mkdirat$cgroup(r4, &(0x7f00000002c0)='syz0\x00', 0x1ff) socket$kcm(0x29, 0x5, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(r4, &(0x7f00000003c0)='cpuacct.usage_all\x00', 0x0, 0x0) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci={0x1f, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r8, 0x40086602, 0x400007) write$cgroup_subtree(r8, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) ioctl$PERF_EVENT_IOC_RESET(r6, 0x2403, 0x336) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0xb, 0x6, 0x9, 0x4, 0x401, r6, 0x5, [], r7, r8, 0x5}, 0x3c) write$cgroup_subtree(r8, &(0x7f0000000040)={[{0x2b, 'cpu'}, {0x5a, 'rdma'}, {0x38, 'pids'}]}, 0x11) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x210000, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x3, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e05b80ecdb4cb904044865160b00170002000000740004140e00110002000000dc2976d153b4", 0x235}], 0x1}, 0x0) 03:39:37 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x8, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="c10048000010000095dda40500000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x5d) 03:39:37 executing program 1 (fault-call:17 fault-nth:45): bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) 03:39:37 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_type(r0, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000380)='cpuset.mems\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x30863, 0x0) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0xfffffc61) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000240)={'hwsim0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f00000000c0)={'hwsim0\x00', @random="0894f53e01dc"}) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)={0xffff, 0x5}, 0xc) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000200)='memory.high\x00\x90\x80\xa4\x96\xbb\xe4\xb2\xa2\x01\xc0\xb8*Z\xef\xf8\x0e\x1f]\xf7\x10\xdb\xfe\xe4\x1d\xc6\x92\x7f\xeeK_p\t\x8c\x9f5\xd0\xef)\xd8\x04\xbf\xc2N\x1c\xf0R\xdc\r\xb1Gf\xba\xd11#<\xaf^,s\x85\x10R\x99\xc2D\xee\n\"\xf9c\x15{\xc1[\xef\x06\x8a\xcd\x9d\xc8\x90#\xd0\xe7\xe3\xe0\xa9\xf3\xc0n\x1f\xd1\x11P\xe20\xcd\x1c\xfa\xfd\xa3\xcf\x9c\xc6\xb7]\x16\xc7\xd7\xb4/\x82\xd1\xae\xd9TM\x05a\xe5\xc5U\x91\xbe\x81\xac4\x9d\x02`\xe7\xa6q\x1f@\x1f\x1f?tm\x9c\xd1\x8c\xa1\xb5\xe0`H)\x97r\xc0?y\x9cc=c`A^\x9f\xcd\xbc\xf4m>I\xae\xdf\x946\xe7M`\xeb\x9fm\xbe+n\x00\x18k\x98\xab\xd5\xeet\"d\x81\x94\x04\xf5\xeb', 0x2, 0x0) write$cgroup_int(r4, 0x0, 0x0) 03:39:37 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_type(r0, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000380)='cpuset.mems\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x30863, 0x0) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0xfffffc61) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000240)={'hwsim0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f00000000c0)={'hwsim0\x00', @random="0894f53e01dc"}) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)={0xffff, 0x5}, 0xc) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup\x00\f\x7f\xd9\xfa;\x8b\x88gb\xefi\x16\x91\xbb\xc4\xd5Jk\tU~ \xa4\vR\\\x8a\xdb\xcel\xe0\xa3[\xae\x9d\xac\x84\x9f\v\x9e\x9f\r\x10\x1f\xd3\x80\xc1\xccq\xab\x01y\xed\xfc\x96)\xf6_>+\xa03\xf4\xcc0\xbbE\xb0\xc3\x94\xd53\x87\xd6\xc4\\\xc7\x82\xe9\xaf\xb5\xb6\x15\xf4K2\x17\f\x98\x1c\xebq/\xf5\x81#\x85\xc5\xa0\xfd\xfac\xd9\xf2c`\xe9[c\a\x12\x1bb\x82\x83\x86d\xf0k\xa8\x90\x06\xa8\x1cK\xea\x19\x91\a1z)\xde_r`\xee\xb6\x9e\xcb\x05\x00\x00\x82\xa1\t\xc9\x05\xcc^', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000200)='memory.high\x00\x90\x80\xa4\x96\xbb\xe4\xb2\xa2\x01\xc0\xb8*Z\xef\xf8\x0e\x1f]\xf7\x10\xdb\xfe\xe4\x1d\xc6\x92\x7f\xeeK_p\t\x8c\x9f5\xd0\xef)\xd8\x04\xbf\xc2N\x1c\xf0R\xdc\r\xb1Gf\xba\xd11#<\xaf^,s\x85\x10R\x99\xc2D\xee\n\"\xf9c\x15{\xc1[\xef\x06\x8a\xcd\x9d\xc8\x90#\xd0\xe7\xe3\xe0\xa9\xf3\xc0n\x1f\xd1\x11P\xe20\xcd\x1c\xfa\xfd\xa3\xcf\x9c\xc6\xb7]\x16\xc7\xd7\xb4/\x82\xd1\xae\xd9TM\x05a\xe5\xc5U\x91\xbe\x81\xac4\x9d\x02`\xe7\xa6q\x1f@\x1f\x1f?tm\x9c\xd1\x8c\xa1\xb5\xe0`H)\x97r\xc0?y\x9cc=c`A^\x9f\xcd\xbc\xf4m>I\xae\xdf\x946\xe7M`\xeb\x9fm\xbe+n\x00\x18k\x98\xab\xd5\xeet\"d\x81\x94\x04\xf5\xeb', 0x2, 0x0) write$cgroup_int(r4, 0x0, 0x0) [ 2421.515144][T14663] FAULT_INJECTION: forcing a failure. [ 2421.515144][T14663] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2421.528863][T14663] CPU: 0 PID: 14663 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2421.537762][T14663] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2421.547799][T14663] Call Trace: [ 2421.551096][T14663] dump_stack+0x197/0x210 [ 2421.555448][T14663] should_fail.cold+0xa/0x15 [ 2421.560153][T14663] ? fault_create_debugfs_attr+0x180/0x180 [ 2421.565982][T14663] ? ___might_sleep+0x163/0x2c0 [ 2421.570834][T14663] should_fail_alloc_page+0x50/0x60 [ 2421.576017][T14663] __alloc_pages_nodemask+0x1a1/0x910 [ 2421.581465][T14663] ? find_held_lock+0x35/0x130 [ 2421.586451][T14663] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2421.592300][T14663] ? lock_downgrade+0x920/0x920 [ 2421.597156][T14663] ? rwlock_bug.part.0+0x90/0x90 [ 2421.602114][T14663] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2421.608355][T14663] alloc_pages_current+0x107/0x210 [ 2421.613471][T14663] __get_free_pages+0xc/0x40 [ 2421.618056][T14663] kasan_populate_vmalloc_pte+0x2f/0x1c0 [ 2421.623692][T14663] apply_to_page_range+0x445/0x700 [ 2421.628818][T14663] ? memset+0x40/0x40 [ 2421.632814][T14663] kasan_populate_vmalloc+0x68/0x90 [ 2421.638090][T14663] __vmalloc_node_range+0x47e/0x810 [ 2421.643391][T14663] ? bpf_map_area_alloc+0x20/0x30 [ 2421.648416][T14663] __vmalloc_node_flags_caller+0x71/0x90 [ 2421.654046][T14663] ? bpf_map_area_alloc+0x20/0x30 [ 2421.659155][T14663] __bpf_map_area_alloc+0xde/0xf0 [ 2421.664169][T14663] bpf_map_area_alloc+0x20/0x30 [ 2421.669016][T14663] htab_map_alloc+0x8d3/0x11c0 [ 2421.673793][T14663] ? htab_map_update_elem+0xca0/0xca0 [ 2421.679168][T14663] __do_sys_bpf+0x478/0x3810 [ 2421.683761][T14663] ? bpf_prog_load+0x18f0/0x18f0 [ 2421.688698][T14663] ? __kasan_check_write+0x14/0x20 [ 2421.693813][T14663] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2421.699447][T14663] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2421.704733][T14663] ? wait_for_completion+0x440/0x440 [ 2421.710034][T14663] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2421.716270][T14663] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2421.721727][T14663] ? do_syscall_64+0x26/0x790 [ 2421.726400][T14663] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2421.732462][T14663] ? do_syscall_64+0x26/0x790 [ 2421.737139][T14663] __x64_sys_bpf+0x73/0xb0 [ 2421.741554][T14663] do_syscall_64+0xfa/0x790 [ 2421.746144][T14663] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2421.752027][T14663] RIP: 0033:0x45a909 [ 2421.755929][T14663] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2421.775533][T14663] RSP: 002b:00007f5b93d49c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2421.783945][T14663] RAX: ffffffffffffffda RBX: 00007f5b93d49c90 RCX: 000000000045a909 [ 2421.791915][T14663] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2421.799915][T14663] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2421.807872][T14663] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d4a6d4 [ 2421.815839][T14663] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 03:39:37 executing program 1 (fault-call:17 fault-nth:46): bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) [ 2421.982383][T14667] FAULT_INJECTION: forcing a failure. [ 2421.982383][T14667] name failslab, interval 1, probability 0, space 0, times 0 [ 2421.995443][T14667] CPU: 0 PID: 14667 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2422.004124][T14667] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2422.014171][T14667] Call Trace: [ 2422.017459][T14667] dump_stack+0x197/0x210 [ 2422.021789][T14667] should_fail.cold+0xa/0x15 [ 2422.026395][T14667] ? fault_create_debugfs_attr+0x180/0x180 [ 2422.032212][T14667] ? ___might_sleep+0x163/0x2c0 [ 2422.037065][T14667] __should_failslab+0x121/0x190 [ 2422.042026][T14667] should_failslab+0x9/0x14 [ 2422.046537][T14667] __kmalloc+0x2e0/0x770 [ 2422.050771][T14667] ? mark_held_locks+0xa4/0xf0 [ 2422.055529][T14667] ? pcpu_mem_zalloc+0xac/0xf0 [ 2422.060296][T14667] pcpu_mem_zalloc+0xac/0xf0 [ 2422.064886][T14667] pcpu_create_chunk+0x28/0x7f0 [ 2422.069733][T14667] pcpu_alloc+0x10f3/0x1380 [ 2422.074245][T14667] ? pcpu_alloc_area+0x820/0x820 [ 2422.079179][T14667] ? bpf_map_area_alloc+0x20/0x30 [ 2422.084217][T14667] __alloc_percpu_gfp+0x28/0x30 [ 2422.089063][T14667] htab_map_alloc+0xdb9/0x11c0 [ 2422.093843][T14667] ? htab_map_update_elem+0xca0/0xca0 [ 2422.099209][T14667] __do_sys_bpf+0x478/0x3810 [ 2422.103802][T14667] ? bpf_prog_load+0x18f0/0x18f0 [ 2422.108732][T14667] ? __kasan_check_write+0x14/0x20 [ 2422.113838][T14667] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2422.119417][T14667] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2422.124706][T14667] ? wait_for_completion+0x440/0x440 [ 2422.129997][T14667] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2422.136253][T14667] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2422.141707][T14667] ? do_syscall_64+0x26/0x790 [ 2422.146381][T14667] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2422.152449][T14667] ? do_syscall_64+0x26/0x790 [ 2422.157124][T14667] __x64_sys_bpf+0x73/0xb0 [ 2422.161538][T14667] do_syscall_64+0xfa/0x790 [ 2422.166039][T14667] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2422.171919][T14667] RIP: 0033:0x45a909 [ 2422.175807][T14667] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2422.195407][T14667] RSP: 002b:00007f5b93d6ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2422.203810][T14667] RAX: ffffffffffffffda RBX: 00007f5b93d6ac90 RCX: 000000000045a909 [ 2422.211776][T14667] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2422.219738][T14667] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2422.227701][T14667] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d6b6d4 [ 2422.235669][T14667] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 03:39:37 executing program 1 (fault-call:17 fault-nth:47): bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) [ 2422.390933][T14672] FAULT_INJECTION: forcing a failure. [ 2422.390933][T14672] name failslab, interval 1, probability 0, space 0, times 0 [ 2422.403747][T14672] CPU: 0 PID: 14672 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2422.412432][T14672] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2422.422560][T14672] Call Trace: [ 2422.425889][T14672] dump_stack+0x197/0x210 [ 2422.430232][T14672] should_fail.cold+0xa/0x15 [ 2422.434830][T14672] ? fault_create_debugfs_attr+0x180/0x180 [ 2422.440635][T14672] ? ___might_sleep+0x163/0x2c0 [ 2422.445489][T14672] __should_failslab+0x121/0x190 [ 2422.450421][T14672] should_failslab+0x9/0x14 [ 2422.454943][T14672] kmem_cache_alloc_node+0x268/0x740 [ 2422.460222][T14672] ? ___might_sleep+0x163/0x2c0 [ 2422.465101][T14672] alloc_vmap_area+0x147/0x2030 [ 2422.469945][T14672] ? __get_vm_area_node+0x12b/0x4f0 [ 2422.475144][T14672] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2422.480700][T14672] ? purge_vmap_area_lazy+0x40/0x40 [ 2422.485896][T14672] ? __kasan_check_read+0x11/0x20 [ 2422.490928][T14672] __get_vm_area_node+0x179/0x4f0 [ 2422.495959][T14672] __vmalloc_node_range+0xd4/0x810 [ 2422.501063][T14672] ? pcpu_mem_zalloc+0x8a/0xf0 [ 2422.505830][T14672] ? __kmalloc+0x608/0x770 [ 2422.510250][T14672] __vmalloc+0x44/0x50 [ 2422.514322][T14672] ? pcpu_mem_zalloc+0x8a/0xf0 [ 2422.519085][T14672] pcpu_mem_zalloc+0x8a/0xf0 [ 2422.523695][T14672] pcpu_create_chunk+0xe0/0x7f0 [ 2422.528538][T14672] pcpu_alloc+0x10f3/0x1380 [ 2422.533061][T14672] ? pcpu_alloc_area+0x820/0x820 [ 2422.537994][T14672] ? bpf_map_area_alloc+0x20/0x30 [ 2422.543024][T14672] __alloc_percpu_gfp+0x28/0x30 [ 2422.547885][T14672] htab_map_alloc+0xdb9/0x11c0 [ 2422.552655][T14672] ? htab_map_update_elem+0xca0/0xca0 [ 2422.558023][T14672] __do_sys_bpf+0x478/0x3810 [ 2422.562655][T14672] ? bpf_prog_load+0x18f0/0x18f0 [ 2422.567584][T14672] ? __kasan_check_write+0x14/0x20 [ 2422.572690][T14672] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2422.578224][T14672] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2422.583499][T14672] ? wait_for_completion+0x440/0x440 [ 2422.588781][T14672] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2422.595029][T14672] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2422.600468][T14672] ? do_syscall_64+0x26/0x790 [ 2422.605131][T14672] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2422.611187][T14672] ? do_syscall_64+0x26/0x790 [ 2422.615870][T14672] __x64_sys_bpf+0x73/0xb0 [ 2422.620273][T14672] do_syscall_64+0xfa/0x790 [ 2422.624772][T14672] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2422.630661][T14672] RIP: 0033:0x45a909 [ 2422.634544][T14672] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2422.654145][T14672] RSP: 002b:00007f5b93d6ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2422.662552][T14672] RAX: ffffffffffffffda RBX: 00007f5b93d6ac90 RCX: 000000000045a909 [ 2422.670523][T14672] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2422.678485][T14672] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2422.686448][T14672] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d6b6d4 [ 2422.694411][T14672] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 03:39:38 executing program 1 (fault-call:17 fault-nth:48): bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) [ 2422.850027][T14678] FAULT_INJECTION: forcing a failure. [ 2422.850027][T14678] name failslab, interval 1, probability 0, space 0, times 0 [ 2422.862876][T14678] CPU: 0 PID: 14678 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2422.871556][T14678] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2422.881607][T14678] Call Trace: [ 2422.884888][T14678] dump_stack+0x197/0x210 [ 2422.889210][T14678] should_fail.cold+0xa/0x15 [ 2422.893804][T14678] ? fault_create_debugfs_attr+0x180/0x180 [ 2422.899620][T14678] ? ___might_sleep+0x163/0x2c0 [ 2422.904469][T14678] __should_failslab+0x121/0x190 [ 2422.909393][T14678] should_failslab+0x9/0x14 [ 2422.913884][T14678] kmem_cache_alloc_node+0x268/0x740 [ 2422.919153][T14678] ? ___might_sleep+0x163/0x2c0 [ 2422.924103][T14678] alloc_vmap_area+0x147/0x2030 [ 2422.928941][T14678] ? __get_vm_area_node+0x12b/0x4f0 [ 2422.934131][T14678] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2422.939677][T14678] ? purge_vmap_area_lazy+0x40/0x40 [ 2422.944865][T14678] ? __kasan_check_read+0x11/0x20 [ 2422.949896][T14678] __get_vm_area_node+0x179/0x4f0 [ 2422.954913][T14678] __vmalloc_node_range+0xd4/0x810 [ 2422.960023][T14678] ? pcpu_mem_zalloc+0x8a/0xf0 [ 2422.964791][T14678] ? __kmalloc+0x608/0x770 [ 2422.969201][T14678] __vmalloc+0x44/0x50 [ 2422.973257][T14678] ? pcpu_mem_zalloc+0x8a/0xf0 [ 2422.978001][T14678] pcpu_mem_zalloc+0x8a/0xf0 [ 2422.982574][T14678] pcpu_create_chunk+0xe0/0x7f0 [ 2422.987415][T14678] pcpu_alloc+0x10f3/0x1380 [ 2422.992026][T14678] ? pcpu_alloc_area+0x820/0x820 [ 2422.996950][T14678] ? bpf_map_area_alloc+0x20/0x30 [ 2423.001977][T14678] __alloc_percpu_gfp+0x28/0x30 [ 2423.006818][T14678] htab_map_alloc+0xdb9/0x11c0 [ 2423.011592][T14678] ? htab_map_update_elem+0xca0/0xca0 [ 2423.016945][T14678] __do_sys_bpf+0x478/0x3810 [ 2423.021523][T14678] ? bpf_prog_load+0x18f0/0x18f0 [ 2423.026445][T14678] ? __kasan_check_write+0x14/0x20 [ 2423.031554][T14678] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2423.037083][T14678] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2423.042359][T14678] ? wait_for_completion+0x440/0x440 [ 2423.047641][T14678] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2423.053886][T14678] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2423.059329][T14678] ? do_syscall_64+0x26/0x790 [ 2423.063997][T14678] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2423.070047][T14678] ? do_syscall_64+0x26/0x790 [ 2423.074725][T14678] __x64_sys_bpf+0x73/0xb0 [ 2423.079127][T14678] do_syscall_64+0xfa/0x790 [ 2423.083632][T14678] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2423.089507][T14678] RIP: 0033:0x45a909 [ 2423.093391][T14678] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2423.112981][T14678] RSP: 002b:00007f5b93d6ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2423.121393][T14678] RAX: ffffffffffffffda RBX: 00007f5b93d6ac90 RCX: 000000000045a909 [ 2423.129349][T14678] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2423.137303][T14678] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2423.145260][T14678] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d6b6d4 [ 2423.153219][T14678] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 03:39:43 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\xfc', 0x248800) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0xc0185879, 0x20000000) write$cgroup_int(r2, &(0x7f0000000080), 0xfffffec7) write$cgroup_type(r2, &(0x7f0000000040)='threaded\x00', 0x9) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100003, 0x500001c) 03:39:43 executing program 1 (fault-call:17 fault-nth:49): bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) 03:39:43 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000080)={0x5, &(0x7f00000000c0)=[{0x7, 0xd9, 0x8, 0x6}, {0x0, 0x0, 0xfa}, {0xf800, 0xf9, 0x2c, 0x3}, {0x8, 0x3, 0x0, 0x2b}, {0x7, 0xb5, 0x46, 0x5}]}) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0xc0185879, 0x20000000) write$cgroup_int(r2, &(0x7f0000000080), 0xfffffec7) ioctl$TUNSETSNDBUF(r2, 0x400454d4, &(0x7f0000000100)) [ 2427.821264][T14686] FAULT_INJECTION: forcing a failure. [ 2427.821264][T14686] name failslab, interval 1, probability 0, space 0, times 0 [ 2427.834567][T14686] CPU: 0 PID: 14686 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2427.843234][T14686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2427.853281][T14686] Call Trace: [ 2427.856576][T14686] dump_stack+0x197/0x210 [ 2427.861003][T14686] should_fail.cold+0xa/0x15 [ 2427.865595][T14686] ? fault_create_debugfs_attr+0x180/0x180 [ 2427.871419][T14686] ? ___might_sleep+0x163/0x2c0 [ 2427.876268][T14686] __should_failslab+0x121/0x190 [ 2427.881194][T14686] should_failslab+0x9/0x14 [ 2427.885676][T14686] kmem_cache_alloc_node_trace+0x274/0x750 [ 2427.891474][T14686] ? do_raw_spin_unlock+0x178/0x270 [ 2427.896681][T14686] __kmalloc_node+0x3d/0x70 [ 2427.901173][T14686] __vmalloc_node_range+0x1db/0x810 [ 2427.906359][T14686] __vmalloc+0x44/0x50 [ 2427.910404][T14686] ? pcpu_mem_zalloc+0x8a/0xf0 [ 2427.915155][T14686] pcpu_mem_zalloc+0x8a/0xf0 [ 2427.919749][T14686] pcpu_create_chunk+0xe0/0x7f0 [ 2427.924625][T14686] pcpu_alloc+0x10f3/0x1380 [ 2427.929141][T14686] ? pcpu_alloc_area+0x820/0x820 [ 2427.934072][T14686] ? bpf_map_area_alloc+0x20/0x30 [ 2427.939137][T14686] __alloc_percpu_gfp+0x28/0x30 [ 2427.943981][T14686] htab_map_alloc+0xdb9/0x11c0 [ 2427.948729][T14686] ? htab_map_update_elem+0xca0/0xca0 [ 2427.954107][T14686] __do_sys_bpf+0x478/0x3810 [ 2427.958709][T14686] ? bpf_prog_load+0x18f0/0x18f0 [ 2427.963625][T14686] ? __kasan_check_write+0x14/0x20 [ 2427.968716][T14686] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2427.974254][T14686] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2427.979641][T14686] ? wait_for_completion+0x440/0x440 [ 2427.984927][T14686] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2427.991170][T14686] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2427.996623][T14686] ? do_syscall_64+0x26/0x790 [ 2428.001290][T14686] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2428.007336][T14686] ? do_syscall_64+0x26/0x790 [ 2428.012018][T14686] __x64_sys_bpf+0x73/0xb0 [ 2428.016442][T14686] do_syscall_64+0xfa/0x790 [ 2428.021040][T14686] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2428.026910][T14686] RIP: 0033:0x45a909 [ 2428.030815][T14686] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2428.050406][T14686] RSP: 002b:00007f5b93d49c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2428.058806][T14686] RAX: ffffffffffffffda RBX: 00007f5b93d49c90 RCX: 000000000045a909 [ 2428.066760][T14686] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2428.074715][T14686] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2428.082673][T14686] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d4a6d4 [ 2428.090618][T14686] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 03:39:43 executing program 1 (fault-call:17 fault-nth:50): bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) [ 2428.239868][T14689] FAULT_INJECTION: forcing a failure. [ 2428.239868][T14689] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2428.254765][T14689] CPU: 1 PID: 14689 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2428.263611][T14689] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2428.273745][T14689] Call Trace: [ 2428.277016][T14689] dump_stack+0x197/0x210 [ 2428.281333][T14689] should_fail.cold+0xa/0x15 [ 2428.285922][T14689] ? fault_create_debugfs_attr+0x180/0x180 [ 2428.291722][T14689] ? ___might_sleep+0x163/0x2c0 [ 2428.296556][T14689] should_fail_alloc_page+0x50/0x60 [ 2428.301743][T14689] __alloc_pages_nodemask+0x1a1/0x910 [ 2428.307136][T14689] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2428.312676][T14689] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2428.318380][T14689] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2428.324609][T14689] alloc_pages_current+0x107/0x210 [ 2428.329794][T14689] ? ___might_sleep+0x163/0x2c0 [ 2428.334627][T14689] __vmalloc_node_range+0x4f8/0x810 [ 2428.339814][T14689] __vmalloc+0x44/0x50 [ 2428.343871][T14689] ? pcpu_mem_zalloc+0x8a/0xf0 [ 2428.348623][T14689] pcpu_mem_zalloc+0x8a/0xf0 [ 2428.353190][T14689] pcpu_create_chunk+0xe0/0x7f0 [ 2428.358059][T14689] pcpu_alloc+0x10f3/0x1380 [ 2428.362574][T14689] ? pcpu_alloc_area+0x820/0x820 [ 2428.367510][T14689] ? bpf_map_area_alloc+0x20/0x30 [ 2428.372526][T14689] __alloc_percpu_gfp+0x28/0x30 [ 2428.377356][T14689] htab_map_alloc+0xdb9/0x11c0 [ 2428.382124][T14689] ? htab_map_update_elem+0xca0/0xca0 [ 2428.387509][T14689] __do_sys_bpf+0x478/0x3810 [ 2428.392121][T14689] ? bpf_prog_load+0x18f0/0x18f0 [ 2428.397129][T14689] ? __kasan_check_write+0x14/0x20 [ 2428.402231][T14689] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2428.407781][T14689] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2428.413191][T14689] ? wait_for_completion+0x440/0x440 [ 2428.418461][T14689] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2428.424736][T14689] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2428.430186][T14689] ? do_syscall_64+0x26/0x790 [ 2428.434843][T14689] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2428.440894][T14689] ? do_syscall_64+0x26/0x790 [ 2428.445567][T14689] __x64_sys_bpf+0x73/0xb0 [ 2428.449975][T14689] do_syscall_64+0xfa/0x790 [ 2428.454459][T14689] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2428.460358][T14689] RIP: 0033:0x45a909 [ 2428.464239][T14689] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2428.483842][T14689] RSP: 002b:00007f5b93d6ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2428.492331][T14689] RAX: ffffffffffffffda RBX: 00007f5b93d6ac90 RCX: 000000000045a909 [ 2428.500282][T14689] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2428.508251][T14689] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2428.516209][T14689] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d6b6d4 [ 2428.524296][T14689] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 03:40:00 executing program 1 (fault-call:17 fault-nth:51): bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) 03:40:00 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_type(r0, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000380)='cpuset.mems\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x30863, 0x0) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0xfffffc61) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000240)={'hwsim0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f00000000c0)={'hwsim0\x00', @random="0894f53e01dc"}) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)={0xffff, 0x5}, 0xc) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000200)='memory.high\x00\x90\x80\xa4\x96\xbb\xe4\xb2\xa2\x01\xc0\xb8*Z\xef\xf8\x0e\x1f]\xf7\x10\xdb\xfe\xe4\x1d\xc6\x92\x7f\xeeK_p\t\x8c\x9f5\xd0\xef)\xd8\x04\xbf\xc2N\x1c\xf0R\xdc\r\xb1Gf\xba\xd11#<\xaf^,s\x85\x10R\x99\xc2D\xee\n\"\xf9c\x15{\xc1[\xef\x06\x8a\xcd\x9d\xc8\x90#\xd0\xe7\xe3\xe0\xa9\xf3\xc0n\x1f\xd1\x11P\xe20\xcd\x1c\xfa\xfd\xa3\xcf\x9c\xc6\xb7]\x16\xc7\xd7\xb4/\x82\xd1\xae\xd9TM\x05a\xe5\xc5U\x91\xbe\x81\xac4\x9d\x02`\xe7\xa6q\x1f@\x1f\x1f?tm\x9c\xd1\x8c\xa1\xb5\xe0`H)\x97r\xc0?y\x9cc=c`A^\x9f\xcd\xbc\xf4m>I\xae\xdf\x946\xe7M`\xeb\x9fm\xbe+n\x00\x18k\x98\xab\xd5\xeet\"d\x81\x94\x04\xf5\xeb', 0x2, 0x0) write$cgroup_int(r4, 0x0, 0x0) 03:40:00 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_type(r0, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000380)='cpuset.mems\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x30863, 0x0) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0xfffffc61) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000240)={'hwsim0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f00000000c0)={'hwsim0\x00', @random="0894f53e01dc"}) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)={0xffff, 0x5}, 0xc) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup\x00\f\x7f\xd9\xfa;\x8b\x88gb\xefi\x16\x91\xbb\xc4\xd5Jk\tU~ \xa4\vR\\\x8a\xdb\xcel\xe0\xa3[\xae\x9d\xac\x84\x9f\v\x9e\x9f\r\x10\x1f\xd3\x80\xc1\xccq\xab\x01y\xed\xfc\x96)\xf6_>+\xa03\xf4\xcc0\xbbE\xb0\xc3\x94\xd53\x87\xd6\xc4\\\xc7\x82\xe9\xaf\xb5\xb6\x15\xf4K2\x17\f\x98\x1c\xebq/\xf5\x81#\x85\xc5\xa0\xfd\xfac\xd9\xf2c`\xe9[c\a\x12\x1bb\x82\x83\x86d\xf0k\xa8\x90\x06\xa8\x1cK\xea\x19\x91\a1z)\xde_r`\xee\xb6\x9e\xcb\x05\x00\x00\x82\xa1\t\xc9\x05\xcc^', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='memory.high\x00\x90\x80\xa4\x96\xbb\xe4\xb2\xa2\x01\xc0\xb8*Z\xef\xf8\x0e\x1f]\xf7\x10\xdb\xfe\xe4\x1d\xc6\x92\x7f\xeeK_p\t\x8c\x9f5\xd0\xef)\xd8\x04\xbf\xc2N\x1c\xf0R\xdc\r\xb1Gf\xba\xd11#<\xaf^,s\x85\x10R\x99\xc2D\xee\n\"\xf9c\x15{\xc1[\xef\x06\x8a\xcd\x9d\xc8\x90#\xd0\xe7\xe3\xe0\xa9\xf3\xc0n\x1f\xd1\x11P\xe20\xcd\x1c\xfa\xfd\xa3\xcf\x9c\xc6\xb7]\x16\xc7\xd7\xb4/\x82\xd1\xae\xd9TM\x05a\xe5\xc5U\x91\xbe\x81\xac4\x9d\x02`\xe7\xa6q\x1f@\x1f\x1f?tm\x9c\xd1\x8c\xa1\xb5\xe0`H)\x97r\xc0?y\x9cc=c`A^\x9f\xcd\xbc\xf4m>I\xae\xdf\x946\xe7M`\xeb\x9fm\xbe+n\x00\x18k\x98\xab\xd5\xeet\"d\x81\x94\x04\xf5\xeb', 0x2, 0x0) write$cgroup_int(r3, 0x0, 0x0) 03:40:00 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci={0x1f, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, r4, 0x0) r5 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, r4, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci={0x1f, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r8, 0x40086602, 0x400007) write$cgroup_subtree(r8, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0xb, 0x6, 0x9, 0x4, 0x401, r6, 0x5, [], r7, r8, 0x5}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r9, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci={0x1f, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r11, 0x40086602, 0x400007) write$cgroup_subtree(r11, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0xb, 0x6, 0x9, 0x4, 0x401, r9, 0x5, [], r10, r11, 0x5}, 0x3c) r13 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r13, 0xc0185879, 0x20000000) write$cgroup_int(r13, &(0x7f0000000080), 0xfffffec7) r14 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000480)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x8c, 0x8c, 0x7, [@const={0xc}, @union={0xf, 0x0, 0x0, 0x5, 0x0, 0x1031}, @volatile={0xf, 0x0, 0x0, 0x9, 0x3}, @restrict={0x4, 0x0, 0x0, 0xb, 0x2}, @ptr={0x4}, @typedef={0x9}, @enum={0x10, 0x7, 0x0, 0x6, 0x4, [{0x8, 0x80000000}, {0xf, 0x2}, {0x9, 0x8d}, {0x0, 0x101}, {0xa}, {0x2, 0x4}, {0x10, 0x5}]}]}, {0x0, [0x61, 0x5f, 0x24f7dd6f40eafe4b, 0x5f, 0xc1aa9ba0aa280e01]}}, &(0x7f0000000200)=""/74, 0xab, 0x4a}, 0x20) close(r14) r15 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r15, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci={0x1f, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r17 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r17, 0x40086602, 0x400007) write$cgroup_subtree(r17, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0xb, 0x6, 0x9, 0x4, 0x401, r15, 0x5, [], r16, r17, 0x5}, 0x3c) r18 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r18, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci={0x1f, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r20 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r20, 0x40086602, 0x400007) write$cgroup_subtree(r20, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0xb, 0x6, 0x9, 0x4, 0x401, r18, 0x5, [], r19, r20, 0x5}, 0x3c) r21 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r21, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000032000535d25a80648c63940d0124fc60100002400a000200053582c137153e370400018003001700d1bd", 0x33fe0}], 0x1}, 0x0) recvmsg$kcm(r21, &(0x7f0000000740)={&(0x7f00000003c0)=@nfc, 0x80, 0x0, 0x0, &(0x7f0000000cc0)=""/4096, 0x1000}, 0x40010080) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000c40)=ANY=[@ANYRES16=r6, @ANYRESDEC=0x0, @ANYRES32=r10, @ANYBLOB="45d0ecc317648da06c72101376", @ANYPTR=&(0x7f0000001cc0)=ANY=[@ANYRESDEC, @ANYRES16, @ANYRES16=r12, @ANYBLOB="294b145cd7d477839b1b4ef417986dc3357775eba0bb9ad8b09e934f9152fcfbef", @ANYPTR=&(0x7f0000000580)=ANY=[], @ANYRES32=r14, @ANYBLOB="e535daeee795e652753aa204018f6d4457d32384ebb291e26dc2c3d4af1f65285f76646ea484129ebc4d", @ANYRES32=r18, @ANYRESHEX=r21], @ANYRESDEC=0x0], 0x43) r22 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(r3, 0x0, 0x0) write$cgroup_int(r22, &(0x7f0000000200)=0x1a0ffffffff, 0x43400) write$cgroup_subtree(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="2d637075202b066f20"], 0x9) openat$cgroup_procs(r2, &(0x7f0000000440)='cgroup.procs\x00', 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0xb, 0x6, 0x9, 0x4, 0x401, r0, 0x5, [], r1, r2, 0x5}, 0x3c) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0xffffffffffffffff, r2, 0x0, 0x9, &(0x7f0000000480)='cpu.stat\x00'}, 0xfffffe86) ioctl$PERF_EVENT_IOC_SET_FILTER(r23, 0x40082406, &(0x7f0000000500)='cpu.stat\x00') r24 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r24, 0x40082404, &(0x7f0000000040)) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8130, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r24, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=0x100, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x5, 0x4}, 0x0, 0x0, &(0x7f0000000240)={0x1, 0xb, 0x4, 0x3a22}, &(0x7f0000000280)=0x1000, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x81}}, 0x10) r25 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r25, 0xc0185879, 0x20000000) write$cgroup_int(r25, &(0x7f0000000080), 0xfffffec7) ioctl$TUNGETSNDBUF(r25, 0x800454d3, &(0x7f0000000540)) 03:40:00 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci={0x1f, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0xb, 0x4, 0x9, 0x4, 0x401, r0, 0x5, [], r1, r2, 0x5}, 0x3c) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r3, &(0x7f0000000200), 0x43400) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r4, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci={0x1f, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40086602, 0x400007) write$cgroup_subtree(r6, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0xb, 0x6, 0x9, 0x4, 0x401, r4, 0x5, [], r5, r6, 0x5}, 0x3c) recvmsg(r4, &(0x7f0000000b40)={&(0x7f0000000840)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000100), 0x0, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r8, 0x40086602, 0x400007) write$cgroup_subtree(r8, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0xb, 0x6, 0x9, 0x4, 0x401, r3, 0x5, [], r7, r8, 0x5}, 0x3c) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r9, 0xc0185879, 0x20000000) write$cgroup_int(r9, &(0x7f0000000080), 0xfffffec7) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xe, 0xffffff3b, 0x0, 0x100, 0x200, r0, 0x40000000, [], r7, r9, 0x2, 0x4}, 0x3c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', r10}, 0x10) [ 2445.265113][T14703] FAULT_INJECTION: forcing a failure. [ 2445.265113][T14703] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2445.278532][T14703] CPU: 0 PID: 14703 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2445.287206][T14703] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2445.297245][T14703] Call Trace: [ 2445.300535][T14703] dump_stack+0x197/0x210 [ 2445.304863][T14703] should_fail.cold+0xa/0x15 [ 2445.309471][T14703] ? fault_create_debugfs_attr+0x180/0x180 [ 2445.315265][T14703] ? ___might_sleep+0x163/0x2c0 [ 2445.320128][T14703] should_fail_alloc_page+0x50/0x60 [ 2445.325312][T14703] __alloc_pages_nodemask+0x1a1/0x910 [ 2445.330676][T14703] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2445.336212][T14703] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2445.341939][T14703] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2445.348179][T14703] alloc_pages_current+0x107/0x210 [ 2445.353275][T14703] ? ___might_sleep+0x163/0x2c0 [ 2445.358112][T14703] __vmalloc_node_range+0x4f8/0x810 [ 2445.363310][T14703] __vmalloc+0x44/0x50 [ 2445.367366][T14703] ? pcpu_mem_zalloc+0x8a/0xf0 [ 2445.372113][T14703] pcpu_mem_zalloc+0x8a/0xf0 [ 2445.376686][T14703] pcpu_create_chunk+0xe0/0x7f0 [ 2445.381539][T14703] pcpu_alloc+0x10f3/0x1380 [ 2445.386136][T14703] ? pcpu_alloc_area+0x820/0x820 [ 2445.391060][T14703] ? bpf_map_area_alloc+0x20/0x30 [ 2445.396109][T14703] __alloc_percpu_gfp+0x28/0x30 [ 2445.400952][T14703] htab_map_alloc+0xdb9/0x11c0 [ 2445.405722][T14703] ? htab_map_update_elem+0xca0/0xca0 [ 2445.411082][T14703] __do_sys_bpf+0x478/0x3810 [ 2445.415755][T14703] ? bpf_prog_load+0x18f0/0x18f0 [ 2445.420688][T14703] ? __kasan_check_write+0x14/0x20 [ 2445.425791][T14703] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2445.431321][T14703] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2445.436598][T14703] ? wait_for_completion+0x440/0x440 [ 2445.441990][T14703] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2445.448243][T14703] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2445.453689][T14703] ? do_syscall_64+0x26/0x790 [ 2445.458352][T14703] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2445.464403][T14703] ? do_syscall_64+0x26/0x790 [ 2445.469074][T14703] __x64_sys_bpf+0x73/0xb0 [ 2445.473482][T14703] do_syscall_64+0xfa/0x790 [ 2445.477983][T14703] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2445.483859][T14703] RIP: 0033:0x45a909 [ 2445.487744][T14703] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2445.507426][T14703] RSP: 002b:00007f5b93d6ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2445.515825][T14703] RAX: ffffffffffffffda RBX: 00007f5b93d6ac90 RCX: 000000000045a909 [ 2445.523792][T14703] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2445.531747][T14703] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2445.539704][T14703] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d6b6d4 [ 2445.547655][T14703] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 03:40:01 executing program 1 (fault-call:17 fault-nth:52): bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) [ 2445.705744][T14708] FAULT_INJECTION: forcing a failure. [ 2445.705744][T14708] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2445.719116][T14708] CPU: 1 PID: 14708 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2445.727782][T14708] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2445.737815][T14708] Call Trace: [ 2445.741113][T14708] dump_stack+0x197/0x210 [ 2445.745424][T14708] should_fail.cold+0xa/0x15 [ 2445.750006][T14708] ? fault_create_debugfs_attr+0x180/0x180 [ 2445.755794][T14708] ? ___might_sleep+0x163/0x2c0 [ 2445.760635][T14708] should_fail_alloc_page+0x50/0x60 [ 2445.765827][T14708] __alloc_pages_nodemask+0x1a1/0x910 [ 2445.771179][T14708] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2445.776707][T14708] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2445.782416][T14708] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2445.788641][T14708] alloc_pages_current+0x107/0x210 [ 2445.793731][T14708] ? ___might_sleep+0x163/0x2c0 [ 2445.798560][T14708] __vmalloc_node_range+0x4f8/0x810 [ 2445.803747][T14708] __vmalloc+0x44/0x50 [ 2445.807803][T14708] ? pcpu_mem_zalloc+0x8a/0xf0 [ 2445.812541][T14708] pcpu_mem_zalloc+0x8a/0xf0 [ 2445.817124][T14708] pcpu_create_chunk+0xe0/0x7f0 [ 2445.821954][T14708] pcpu_alloc+0x10f3/0x1380 [ 2445.826446][T14708] ? pcpu_alloc_area+0x820/0x820 [ 2445.831374][T14708] ? bpf_map_area_alloc+0x20/0x30 [ 2445.836384][T14708] __alloc_percpu_gfp+0x28/0x30 [ 2445.841215][T14708] htab_map_alloc+0xdb9/0x11c0 [ 2445.845978][T14708] ? htab_map_update_elem+0xca0/0xca0 [ 2445.851331][T14708] __do_sys_bpf+0x478/0x3810 [ 2445.855910][T14708] ? bpf_prog_load+0x18f0/0x18f0 [ 2445.860831][T14708] ? __kasan_check_write+0x14/0x20 [ 2445.865935][T14708] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2445.871460][T14708] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2445.876735][T14708] ? wait_for_completion+0x440/0x440 [ 2445.882011][T14708] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2445.888245][T14708] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2445.893771][T14708] ? do_syscall_64+0x26/0x790 [ 2445.898437][T14708] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2445.904483][T14708] ? do_syscall_64+0x26/0x790 [ 2445.909144][T14708] __x64_sys_bpf+0x73/0xb0 [ 2445.913553][T14708] do_syscall_64+0xfa/0x790 [ 2445.918042][T14708] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2445.923913][T14708] RIP: 0033:0x45a909 [ 2445.927789][T14708] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2445.947367][T14708] RSP: 002b:00007f5b93d6ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2445.955756][T14708] RAX: ffffffffffffffda RBX: 00007f5b93d6ac90 RCX: 000000000045a909 [ 2445.963709][T14708] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2445.971658][T14708] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2445.979604][T14708] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d6b6d4 [ 2445.987566][T14708] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 03:40:01 executing program 1 (fault-call:17 fault-nth:53): bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) [ 2446.154627][T14713] FAULT_INJECTION: forcing a failure. [ 2446.154627][T14713] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2446.168071][T14713] CPU: 1 PID: 14713 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2446.176722][T14713] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2446.186765][T14713] Call Trace: [ 2446.190047][T14713] dump_stack+0x197/0x210 [ 2446.194398][T14713] should_fail.cold+0xa/0x15 [ 2446.198996][T14713] ? fault_create_debugfs_attr+0x180/0x180 [ 2446.204789][T14713] ? ___might_sleep+0x163/0x2c0 [ 2446.209630][T14713] should_fail_alloc_page+0x50/0x60 [ 2446.214807][T14713] __alloc_pages_nodemask+0x1a1/0x910 [ 2446.220161][T14713] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2446.225690][T14713] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2446.231400][T14713] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2446.237624][T14713] alloc_pages_current+0x107/0x210 [ 2446.242714][T14713] ? ___might_sleep+0x163/0x2c0 [ 2446.247555][T14713] __vmalloc_node_range+0x4f8/0x810 [ 2446.252745][T14713] __vmalloc+0x44/0x50 [ 2446.256793][T14713] ? pcpu_mem_zalloc+0x8a/0xf0 [ 2446.261537][T14713] pcpu_mem_zalloc+0x8a/0xf0 [ 2446.266137][T14713] pcpu_create_chunk+0xe0/0x7f0 [ 2446.270980][T14713] pcpu_alloc+0x10f3/0x1380 [ 2446.275472][T14713] ? pcpu_alloc_area+0x820/0x820 [ 2446.280389][T14713] ? bpf_map_area_alloc+0x20/0x30 [ 2446.285403][T14713] __alloc_percpu_gfp+0x28/0x30 [ 2446.290238][T14713] htab_map_alloc+0xdb9/0x11c0 [ 2446.294992][T14713] ? htab_map_update_elem+0xca0/0xca0 [ 2446.300344][T14713] __do_sys_bpf+0x478/0x3810 [ 2446.304918][T14713] ? bpf_prog_load+0x18f0/0x18f0 [ 2446.309834][T14713] ? __kasan_check_write+0x14/0x20 [ 2446.314927][T14713] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2446.320450][T14713] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2446.325716][T14713] ? wait_for_completion+0x440/0x440 [ 2446.330989][T14713] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2446.337227][T14713] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2446.342666][T14713] ? do_syscall_64+0x26/0x790 [ 2446.347320][T14713] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2446.353366][T14713] ? do_syscall_64+0x26/0x790 [ 2446.358026][T14713] __x64_sys_bpf+0x73/0xb0 [ 2446.362426][T14713] do_syscall_64+0xfa/0x790 [ 2446.366912][T14713] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2446.372781][T14713] RIP: 0033:0x45a909 [ 2446.376842][T14713] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2446.396429][T14713] RSP: 002b:00007f5b93d6ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2446.404832][T14713] RAX: ffffffffffffffda RBX: 00007f5b93d6ac90 RCX: 000000000045a909 [ 2446.412788][T14713] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2446.420748][T14713] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2446.428711][T14713] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d6b6d4 [ 2446.436661][T14713] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 03:40:02 executing program 1 (fault-call:17 fault-nth:54): bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) [ 2446.601385][T14718] FAULT_INJECTION: forcing a failure. [ 2446.601385][T14718] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2446.614732][T14718] CPU: 1 PID: 14718 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2446.623402][T14718] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2446.633452][T14718] Call Trace: [ 2446.636830][T14718] dump_stack+0x197/0x210 [ 2446.641161][T14718] should_fail.cold+0xa/0x15 [ 2446.645750][T14718] ? fault_create_debugfs_attr+0x180/0x180 [ 2446.651565][T14718] ? ___might_sleep+0x163/0x2c0 [ 2446.656474][T14718] should_fail_alloc_page+0x50/0x60 [ 2446.661659][T14718] __alloc_pages_nodemask+0x1a1/0x910 [ 2446.667018][T14718] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2446.672550][T14718] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2446.678254][T14718] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2446.684566][T14718] alloc_pages_current+0x107/0x210 [ 2446.689654][T14718] ? ___might_sleep+0x163/0x2c0 [ 2446.694501][T14718] __vmalloc_node_range+0x4f8/0x810 [ 2446.699690][T14718] __vmalloc+0x44/0x50 [ 2446.703754][T14718] ? pcpu_mem_zalloc+0x8a/0xf0 [ 2446.708505][T14718] pcpu_mem_zalloc+0x8a/0xf0 [ 2446.713083][T14718] pcpu_create_chunk+0xe0/0x7f0 [ 2446.717927][T14718] pcpu_alloc+0x10f3/0x1380 [ 2446.722420][T14718] ? pcpu_alloc_area+0x820/0x820 [ 2446.727359][T14718] ? bpf_map_area_alloc+0x20/0x30 [ 2446.732377][T14718] __alloc_percpu_gfp+0x28/0x30 [ 2446.737220][T14718] htab_map_alloc+0xdb9/0x11c0 [ 2446.741981][T14718] ? htab_map_update_elem+0xca0/0xca0 [ 2446.747337][T14718] __do_sys_bpf+0x478/0x3810 [ 2446.751917][T14718] ? bpf_prog_load+0x18f0/0x18f0 [ 2446.756837][T14718] ? __kasan_check_write+0x14/0x20 [ 2446.761935][T14718] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2446.767488][T14718] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2446.772759][T14718] ? wait_for_completion+0x440/0x440 [ 2446.778037][T14718] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2446.784273][T14718] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2446.789717][T14718] ? do_syscall_64+0x26/0x790 [ 2446.794388][T14718] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2446.800438][T14718] ? do_syscall_64+0x26/0x790 [ 2446.805104][T14718] __x64_sys_bpf+0x73/0xb0 [ 2446.809506][T14718] do_syscall_64+0xfa/0x790 [ 2446.813999][T14718] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2446.819878][T14718] RIP: 0033:0x45a909 [ 2446.823758][T14718] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2446.843343][T14718] RSP: 002b:00007f5b93d6ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2446.851733][T14718] RAX: ffffffffffffffda RBX: 00007f5b93d6ac90 RCX: 000000000045a909 [ 2446.859692][T14718] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2446.867666][T14718] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2446.875629][T14718] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d6b6d4 [ 2446.883586][T14718] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 03:40:02 executing program 1 (fault-call:17 fault-nth:55): bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) [ 2447.048452][T14723] FAULT_INJECTION: forcing a failure. [ 2447.048452][T14723] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2447.062612][T14723] CPU: 0 PID: 14723 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2447.071286][T14723] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2447.081347][T14723] Call Trace: [ 2447.084630][T14723] dump_stack+0x197/0x210 [ 2447.088961][T14723] should_fail.cold+0xa/0x15 [ 2447.093564][T14723] ? fault_create_debugfs_attr+0x180/0x180 [ 2447.099368][T14723] ? ___might_sleep+0x163/0x2c0 [ 2447.104222][T14723] should_fail_alloc_page+0x50/0x60 [ 2447.109408][T14723] __alloc_pages_nodemask+0x1a1/0x910 [ 2447.114774][T14723] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2447.120315][T14723] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2447.126044][T14723] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2447.132283][T14723] alloc_pages_current+0x107/0x210 [ 2447.137384][T14723] ? ___might_sleep+0x163/0x2c0 [ 2447.142230][T14723] __vmalloc_node_range+0x4f8/0x810 [ 2447.147432][T14723] __vmalloc+0x44/0x50 [ 2447.151580][T14723] ? pcpu_mem_zalloc+0x8a/0xf0 [ 2447.156337][T14723] pcpu_mem_zalloc+0x8a/0xf0 [ 2447.160921][T14723] pcpu_create_chunk+0xe0/0x7f0 [ 2447.165767][T14723] pcpu_alloc+0x10f3/0x1380 [ 2447.170281][T14723] ? pcpu_alloc_area+0x820/0x820 [ 2447.175209][T14723] ? bpf_map_area_alloc+0x20/0x30 [ 2447.180238][T14723] __alloc_percpu_gfp+0x28/0x30 [ 2447.185081][T14723] htab_map_alloc+0xdb9/0x11c0 [ 2447.189852][T14723] ? htab_map_update_elem+0xca0/0xca0 [ 2447.195214][T14723] __do_sys_bpf+0x478/0x3810 [ 2447.199797][T14723] ? bpf_prog_load+0x18f0/0x18f0 [ 2447.204722][T14723] ? __kasan_check_write+0x14/0x20 [ 2447.209834][T14723] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2447.215444][T14723] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2447.220721][T14723] ? wait_for_completion+0x440/0x440 [ 2447.226006][T14723] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2447.232249][T14723] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2447.237709][T14723] ? do_syscall_64+0x26/0x790 [ 2447.242374][T14723] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2447.248427][T14723] ? do_syscall_64+0x26/0x790 [ 2447.253118][T14723] __x64_sys_bpf+0x73/0xb0 [ 2447.257530][T14723] do_syscall_64+0xfa/0x790 [ 2447.262031][T14723] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2447.267915][T14723] RIP: 0033:0x45a909 [ 2447.271803][T14723] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2447.291391][T14723] RSP: 002b:00007f5b93d6ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2447.299789][T14723] RAX: ffffffffffffffda RBX: 00007f5b93d6ac90 RCX: 000000000045a909 [ 2447.307746][T14723] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2447.315715][T14723] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2447.323673][T14723] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d6b6d4 [ 2447.331641][T14723] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 03:40:05 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2b, 0x3, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) setsockopt$sock_attach_bpf(r1, 0x6, 0x4, &(0x7f0000000140)=r2, 0x4) 03:40:05 executing program 1 (fault-call:17 fault-nth:56): bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) [ 2449.524870][T14729] FAULT_INJECTION: forcing a failure. [ 2449.524870][T14729] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2449.538328][T14729] CPU: 1 PID: 14729 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2449.546998][T14729] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2449.557035][T14729] Call Trace: [ 2449.560317][T14729] dump_stack+0x197/0x210 [ 2449.564638][T14729] should_fail.cold+0xa/0x15 [ 2449.569213][T14729] ? fault_create_debugfs_attr+0x180/0x180 [ 2449.574998][T14729] ? ___might_sleep+0x163/0x2c0 [ 2449.579835][T14729] should_fail_alloc_page+0x50/0x60 [ 2449.585010][T14729] __alloc_pages_nodemask+0x1a1/0x910 [ 2449.590368][T14729] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2449.595895][T14729] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2449.601599][T14729] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2449.607830][T14729] alloc_pages_current+0x107/0x210 [ 2449.612926][T14729] ? ___might_sleep+0x163/0x2c0 [ 2449.617756][T14729] __vmalloc_node_range+0x4f8/0x810 [ 2449.622940][T14729] __vmalloc+0x44/0x50 [ 2449.626985][T14729] ? pcpu_mem_zalloc+0x8a/0xf0 [ 2449.631723][T14729] pcpu_mem_zalloc+0x8a/0xf0 [ 2449.636293][T14729] pcpu_create_chunk+0xe0/0x7f0 [ 2449.641120][T14729] pcpu_alloc+0x10f3/0x1380 [ 2449.645612][T14729] ? pcpu_alloc_area+0x820/0x820 [ 2449.650540][T14729] ? bpf_map_area_alloc+0x20/0x30 [ 2449.655549][T14729] __alloc_percpu_gfp+0x28/0x30 [ 2449.660377][T14729] htab_map_alloc+0xdb9/0x11c0 [ 2449.665126][T14729] ? htab_map_update_elem+0xca0/0xca0 [ 2449.670477][T14729] __do_sys_bpf+0x478/0x3810 [ 2449.675049][T14729] ? bpf_prog_load+0x18f0/0x18f0 [ 2449.679965][T14729] ? __kasan_check_write+0x14/0x20 [ 2449.685143][T14729] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2449.690667][T14729] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2449.695940][T14729] ? wait_for_completion+0x440/0x440 [ 2449.701339][T14729] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2449.707609][T14729] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2449.713070][T14729] ? do_syscall_64+0x26/0x790 [ 2449.717723][T14729] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2449.723906][T14729] ? do_syscall_64+0x26/0x790 [ 2449.728566][T14729] __x64_sys_bpf+0x73/0xb0 [ 2449.732960][T14729] do_syscall_64+0xfa/0x790 [ 2449.737449][T14729] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2449.743317][T14729] RIP: 0033:0x45a909 [ 2449.747188][T14729] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2449.766864][T14729] RSP: 002b:00007f5b93d6ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2449.775249][T14729] RAX: ffffffffffffffda RBX: 00007f5b93d6ac90 RCX: 000000000045a909 [ 2449.783197][T14729] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2449.791142][T14729] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2449.799106][T14729] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d6b6d4 [ 2449.807062][T14729] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 03:40:05 executing program 1 (fault-call:17 fault-nth:57): bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) [ 2449.997324][T14734] FAULT_INJECTION: forcing a failure. [ 2449.997324][T14734] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2450.010822][T14734] CPU: 0 PID: 14734 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2450.019502][T14734] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2450.029540][T14734] Call Trace: [ 2450.032830][T14734] dump_stack+0x197/0x210 [ 2450.037204][T14734] should_fail.cold+0xa/0x15 [ 2450.041814][T14734] ? fault_create_debugfs_attr+0x180/0x180 [ 2450.047615][T14734] ? ___might_sleep+0x163/0x2c0 [ 2450.052469][T14734] should_fail_alloc_page+0x50/0x60 [ 2450.057650][T14734] __alloc_pages_nodemask+0x1a1/0x910 [ 2450.063009][T14734] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2450.068547][T14734] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2450.074273][T14734] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2450.080509][T14734] alloc_pages_current+0x107/0x210 [ 2450.085602][T14734] ? ___might_sleep+0x163/0x2c0 [ 2450.090449][T14734] __vmalloc_node_range+0x4f8/0x810 [ 2450.095660][T14734] __vmalloc+0x44/0x50 [ 2450.099718][T14734] ? pcpu_mem_zalloc+0x8a/0xf0 [ 2450.104482][T14734] pcpu_mem_zalloc+0x8a/0xf0 [ 2450.109060][T14734] pcpu_create_chunk+0xe0/0x7f0 [ 2450.113902][T14734] pcpu_alloc+0x10f3/0x1380 [ 2450.118409][T14734] ? pcpu_alloc_area+0x820/0x820 [ 2450.123338][T14734] ? bpf_map_area_alloc+0x20/0x30 [ 2450.128359][T14734] __alloc_percpu_gfp+0x28/0x30 [ 2450.133198][T14734] htab_map_alloc+0xdb9/0x11c0 [ 2450.137968][T14734] ? htab_map_update_elem+0xca0/0xca0 [ 2450.143418][T14734] __do_sys_bpf+0x478/0x3810 [ 2450.148074][T14734] ? bpf_prog_load+0x18f0/0x18f0 [ 2450.153001][T14734] ? __kasan_check_write+0x14/0x20 [ 2450.158117][T14734] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2450.163651][T14734] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2450.168926][T14734] ? wait_for_completion+0x440/0x440 [ 2450.174219][T14734] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2450.180462][T14734] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2450.185911][T14734] ? do_syscall_64+0x26/0x790 [ 2450.190573][T14734] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2450.196624][T14734] ? do_syscall_64+0x26/0x790 [ 2450.201291][T14734] __x64_sys_bpf+0x73/0xb0 [ 2450.205695][T14734] do_syscall_64+0xfa/0x790 [ 2450.210187][T14734] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2450.216064][T14734] RIP: 0033:0x45a909 [ 2450.219947][T14734] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2450.239537][T14734] RSP: 002b:00007f5b93d6ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2450.247948][T14734] RAX: ffffffffffffffda RBX: 00007f5b93d6ac90 RCX: 000000000045a909 [ 2450.255912][T14734] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2450.263878][T14734] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2450.271841][T14734] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d6b6d4 [ 2450.279805][T14734] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 03:40:06 executing program 1 (fault-call:17 fault-nth:58): bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) [ 2450.483062][T14740] FAULT_INJECTION: forcing a failure. [ 2450.483062][T14740] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2450.496711][T14740] CPU: 0 PID: 14740 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2450.505394][T14740] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2450.515443][T14740] Call Trace: [ 2450.518738][T14740] dump_stack+0x197/0x210 [ 2450.523083][T14740] should_fail.cold+0xa/0x15 [ 2450.527728][T14740] ? fault_create_debugfs_attr+0x180/0x180 [ 2450.533531][T14740] ? ___might_sleep+0x163/0x2c0 [ 2450.538385][T14740] should_fail_alloc_page+0x50/0x60 [ 2450.543575][T14740] __alloc_pages_nodemask+0x1a1/0x910 [ 2450.548952][T14740] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2450.554509][T14740] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2450.560245][T14740] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2450.566478][T14740] alloc_pages_current+0x107/0x210 [ 2450.571581][T14740] ? ___might_sleep+0x163/0x2c0 [ 2450.576446][T14740] __vmalloc_node_range+0x4f8/0x810 [ 2450.581677][T14740] __vmalloc+0x44/0x50 [ 2450.585755][T14740] ? pcpu_mem_zalloc+0x8a/0xf0 [ 2450.590601][T14740] pcpu_mem_zalloc+0x8a/0xf0 [ 2450.595194][T14740] pcpu_create_chunk+0xe0/0x7f0 [ 2450.600046][T14740] pcpu_alloc+0x10f3/0x1380 [ 2450.604549][T14740] ? pcpu_alloc_area+0x820/0x820 [ 2450.609473][T14740] ? bpf_map_area_alloc+0x20/0x30 [ 2450.614530][T14740] __alloc_percpu_gfp+0x28/0x30 [ 2450.619381][T14740] htab_map_alloc+0xdb9/0x11c0 [ 2450.624143][T14740] ? htab_map_update_elem+0xca0/0xca0 [ 2450.629538][T14740] __do_sys_bpf+0x478/0x3810 [ 2450.634141][T14740] ? bpf_prog_load+0x18f0/0x18f0 [ 2450.639091][T14740] ? __kasan_check_write+0x14/0x20 [ 2450.644215][T14740] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2450.649747][T14740] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2450.655036][T14740] ? wait_for_completion+0x440/0x440 [ 2450.660349][T14740] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2450.666587][T14740] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2450.672040][T14740] ? do_syscall_64+0x26/0x790 [ 2450.676713][T14740] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2450.682791][T14740] ? do_syscall_64+0x26/0x790 [ 2450.687470][T14740] __x64_sys_bpf+0x73/0xb0 [ 2450.691890][T14740] do_syscall_64+0xfa/0x790 [ 2450.696398][T14740] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2450.702283][T14740] RIP: 0033:0x45a909 [ 2450.706176][T14740] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2450.725772][T14740] RSP: 002b:00007f5b93d6ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2450.734191][T14740] RAX: ffffffffffffffda RBX: 00007f5b93d6ac90 RCX: 000000000045a909 [ 2450.742173][T14740] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2450.750137][T14740] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2450.758099][T14740] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d6b6d4 [ 2450.766054][T14740] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 03:40:07 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_type(r0, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000380)='cpuset.mems\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x30863, 0x0) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0xfffffc61) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000240)={'hwsim0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f00000000c0)={'hwsim0\x00', @random="0894f53e01dc"}) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)={0xffff, 0x5}, 0xc) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000200)='memory.high\x00\x90\x80\xa4\x96\xbb\xe4\xb2\xa2\x01\xc0\xb8*Z\xef\xf8\x0e\x1f]\xf7\x10\xdb\xfe\xe4\x1d\xc6\x92\x7f\xeeK_p\t\x8c\x9f5\xd0\xef)\xd8\x04\xbf\xc2N\x1c\xf0R\xdc\r\xb1Gf\xba\xd11#<\xaf^,s\x85\x10R\x99\xc2D\xee\n\"\xf9c\x15{\xc1[\xef\x06\x8a\xcd\x9d\xc8\x90#\xd0\xe7\xe3\xe0\xa9\xf3\xc0n\x1f\xd1\x11P\xe20\xcd\x1c\xfa\xfd\xa3\xcf\x9c\xc6\xb7]\x16\xc7\xd7\xb4/\x82\xd1\xae\xd9TM\x05a\xe5\xc5U\x91\xbe\x81\xac4\x9d\x02`\xe7\xa6q\x1f@\x1f\x1f?tm\x9c\xd1\x8c\xa1\xb5\xe0`H)\x97r\xc0?y\x9cc=c`A^\x9f\xcd\xbc\xf4m>I\xae\xdf\x946\xe7M`\xeb\x9fm\xbe+n\x00\x18k\x98\xab\xd5\xeet\"d\x81\x94\x04\xf5\xeb', 0x2, 0x0) write$cgroup_int(r4, 0x0, 0x0) 03:40:10 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_type(r0, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000380)='cpuset.mems\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x30863, 0x0) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0xfffffc61) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000240)={'hwsim0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f00000000c0)={'hwsim0\x00', @random="0894f53e01dc"}) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)={0xffff, 0x5}, 0xc) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup\x00\f\x7f\xd9\xfa;\x8b\x88gb\xefi\x16\x91\xbb\xc4\xd5Jk\tU~ \xa4\vR\\\x8a\xdb\xcel\xe0\xa3[\xae\x9d\xac\x84\x9f\v\x9e\x9f\r\x10\x1f\xd3\x80\xc1\xccq\xab\x01y\xed\xfc\x96)\xf6_>+\xa03\xf4\xcc0\xbbE\xb0\xc3\x94\xd53\x87\xd6\xc4\\\xc7\x82\xe9\xaf\xb5\xb6\x15\xf4K2\x17\f\x98\x1c\xebq/\xf5\x81#\x85\xc5\xa0\xfd\xfac\xd9\xf2c`\xe9[c\a\x12\x1bb\x82\x83\x86d\xf0k\xa8\x90\x06\xa8\x1cK\xea\x19\x91\a1z)\xde_r`\xee\xb6\x9e\xcb\x05\x00\x00\x82\xa1\t\xc9\x05\xcc^', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='memory.high\x00\x90\x80\xa4\x96\xbb\xe4\xb2\xa2\x01\xc0\xb8*Z\xef\xf8\x0e\x1f]\xf7\x10\xdb\xfe\xe4\x1d\xc6\x92\x7f\xeeK_p\t\x8c\x9f5\xd0\xef)\xd8\x04\xbf\xc2N\x1c\xf0R\xdc\r\xb1Gf\xba\xd11#<\xaf^,s\x85\x10R\x99\xc2D\xee\n\"\xf9c\x15{\xc1[\xef\x06\x8a\xcd\x9d\xc8\x90#\xd0\xe7\xe3\xe0\xa9\xf3\xc0n\x1f\xd1\x11P\xe20\xcd\x1c\xfa\xfd\xa3\xcf\x9c\xc6\xb7]\x16\xc7\xd7\xb4/\x82\xd1\xae\xd9TM\x05a\xe5\xc5U\x91\xbe\x81\xac4\x9d\x02`\xe7\xa6q\x1f@\x1f\x1f?tm\x9c\xd1\x8c\xa1\xb5\xe0`H)\x97r\xc0?y\x9cc=c`A^\x9f\xcd\xbc\xf4m>I\xae\xdf\x946\xe7M`\xeb\x9fm\xbe+n\x00\x18k\x98\xab\xd5\xeet\"d\x81\x94\x04\xf5\xeb', 0x2, 0x0) write$cgroup_int(r3, 0x0, 0x0) 03:40:16 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x40, 0x0, 0x5, 0x1, 0x1}, 0x3c) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x1002, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000000000000000950000000000"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) 03:40:17 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x40000f00, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e001a000000e8bd6efb250009000e000100400000ff050005001201", 0x2e}], 0x1}, 0x0) 03:40:17 executing program 1 (fault-call:17 fault-nth:59): bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) [ 2461.656047][T14752] FAULT_INJECTION: forcing a failure. [ 2461.656047][T14752] name failslab, interval 1, probability 0, space 0, times 0 [ 2461.668757][T14752] CPU: 0 PID: 14752 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2461.677419][T14752] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2461.687477][T14752] Call Trace: [ 2461.690769][T14752] dump_stack+0x197/0x210 [ 2461.695196][T14752] should_fail.cold+0xa/0x15 [ 2461.699806][T14752] ? fault_create_debugfs_attr+0x180/0x180 [ 2461.705601][T14752] ? ___might_sleep+0x163/0x2c0 [ 2461.710436][T14752] __should_failslab+0x121/0x190 [ 2461.715374][T14752] should_failslab+0x9/0x14 [ 2461.719870][T14752] kmem_cache_alloc_node_trace+0x274/0x750 [ 2461.725661][T14752] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2461.731360][T14752] ? apply_to_page_range+0x562/0x700 [ 2461.736658][T14752] __get_vm_area_node+0x12b/0x4f0 [ 2461.741714][T14752] __vmalloc_node_range+0xd4/0x810 [ 2461.746822][T14752] ? pcpu_mem_zalloc+0x8a/0xf0 [ 2461.751617][T14752] __vmalloc+0x44/0x50 [ 2461.755701][T14752] ? pcpu_mem_zalloc+0x8a/0xf0 [ 2461.760465][T14752] pcpu_mem_zalloc+0x8a/0xf0 [ 2461.765038][T14752] pcpu_create_chunk+0x12d/0x7f0 [ 2461.769960][T14752] pcpu_alloc+0x10f3/0x1380 [ 2461.774486][T14752] ? pcpu_alloc_area+0x820/0x820 [ 2461.779420][T14752] ? bpf_map_area_alloc+0x20/0x30 [ 2461.784437][T14752] __alloc_percpu_gfp+0x28/0x30 [ 2461.789273][T14752] htab_map_alloc+0xdb9/0x11c0 [ 2461.794065][T14752] ? htab_map_update_elem+0xca0/0xca0 [ 2461.799432][T14752] __do_sys_bpf+0x478/0x3810 [ 2461.804009][T14752] ? bpf_prog_load+0x18f0/0x18f0 [ 2461.808925][T14752] ? __kasan_check_write+0x14/0x20 [ 2461.814032][T14752] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2461.819585][T14752] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2461.824855][T14752] ? wait_for_completion+0x440/0x440 [ 2461.830131][T14752] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2461.836390][T14752] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2461.841855][T14752] ? do_syscall_64+0x26/0x790 [ 2461.846588][T14752] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2461.852676][T14752] ? do_syscall_64+0x26/0x790 [ 2461.857377][T14752] __x64_sys_bpf+0x73/0xb0 [ 2461.861809][T14752] do_syscall_64+0xfa/0x790 [ 2461.866317][T14752] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2461.872215][T14752] RIP: 0033:0x45a909 [ 2461.876115][T14752] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2461.895731][T14752] RSP: 002b:00007f5b93d6ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2461.904147][T14752] RAX: ffffffffffffffda RBX: 00007f5b93d6ac90 RCX: 000000000045a909 [ 2461.912115][T14752] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2461.920081][T14752] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2461.928034][T14752] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d6b6d4 [ 2461.936001][T14752] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 03:40:17 executing program 1 (fault-call:17 fault-nth:60): bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) [ 2462.095977][T14757] FAULT_INJECTION: forcing a failure. [ 2462.095977][T14757] name failslab, interval 1, probability 0, space 0, times 0 [ 2462.108947][T14757] CPU: 1 PID: 14757 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2462.117617][T14757] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2462.127701][T14757] Call Trace: [ 2462.130973][T14757] dump_stack+0x197/0x210 [ 2462.135303][T14757] should_fail.cold+0xa/0x15 [ 2462.139904][T14757] ? fault_create_debugfs_attr+0x180/0x180 [ 2462.145709][T14757] ? ___might_sleep+0x163/0x2c0 [ 2462.150542][T14757] __should_failslab+0x121/0x190 [ 2462.155475][T14757] should_failslab+0x9/0x14 [ 2462.159970][T14757] kmem_cache_alloc_node+0x268/0x740 [ 2462.165234][T14757] ? ___might_sleep+0x163/0x2c0 [ 2462.170077][T14757] alloc_vmap_area+0x147/0x2030 [ 2462.174916][T14757] ? __get_vm_area_node+0x12b/0x4f0 [ 2462.180108][T14757] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2462.185679][T14757] ? purge_vmap_area_lazy+0x40/0x40 [ 2462.190857][T14757] ? apply_to_page_range+0x562/0x700 [ 2462.196126][T14757] __get_vm_area_node+0x179/0x4f0 [ 2462.201136][T14757] __vmalloc_node_range+0xd4/0x810 [ 2462.206224][T14757] ? pcpu_mem_zalloc+0x8a/0xf0 [ 2462.210969][T14757] __vmalloc+0x44/0x50 [ 2462.215026][T14757] ? pcpu_mem_zalloc+0x8a/0xf0 [ 2462.219781][T14757] pcpu_mem_zalloc+0x8a/0xf0 [ 2462.224348][T14757] pcpu_create_chunk+0x12d/0x7f0 [ 2462.229353][T14757] pcpu_alloc+0x10f3/0x1380 [ 2462.233855][T14757] ? pcpu_alloc_area+0x820/0x820 [ 2462.238801][T14757] ? bpf_map_area_alloc+0x20/0x30 [ 2462.243831][T14757] __alloc_percpu_gfp+0x28/0x30 [ 2462.248664][T14757] htab_map_alloc+0xdb9/0x11c0 [ 2462.253431][T14757] ? htab_map_update_elem+0xca0/0xca0 [ 2462.258794][T14757] __do_sys_bpf+0x478/0x3810 [ 2462.263523][T14757] ? bpf_prog_load+0x18f0/0x18f0 [ 2462.268450][T14757] ? __kasan_check_write+0x14/0x20 [ 2462.273551][T14757] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2462.279086][T14757] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2462.284352][T14757] ? wait_for_completion+0x440/0x440 [ 2462.289622][T14757] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2462.295866][T14757] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2462.301301][T14757] ? do_syscall_64+0x26/0x790 [ 2462.305956][T14757] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2462.312009][T14757] ? do_syscall_64+0x26/0x790 [ 2462.316678][T14757] __x64_sys_bpf+0x73/0xb0 [ 2462.321071][T14757] do_syscall_64+0xfa/0x790 [ 2462.325556][T14757] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2462.331422][T14757] RIP: 0033:0x45a909 [ 2462.335307][T14757] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2462.354904][T14757] RSP: 002b:00007f5b93d6ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2462.363315][T14757] RAX: ffffffffffffffda RBX: 00007f5b93d6ac90 RCX: 000000000045a909 [ 2462.371277][T14757] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2462.379225][T14757] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2462.387176][T14757] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d6b6d4 [ 2462.395144][T14757] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 03:40:18 executing program 1 (fault-call:17 fault-nth:61): bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) [ 2462.557668][T14762] FAULT_INJECTION: forcing a failure. [ 2462.557668][T14762] name failslab, interval 1, probability 0, space 0, times 0 [ 2462.570693][T14762] CPU: 0 PID: 14762 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2462.579363][T14762] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2462.589418][T14762] Call Trace: [ 2462.592713][T14762] dump_stack+0x197/0x210 [ 2462.597088][T14762] should_fail.cold+0xa/0x15 [ 2462.601704][T14762] ? fault_create_debugfs_attr+0x180/0x180 [ 2462.607512][T14762] ? ___might_sleep+0x163/0x2c0 [ 2462.612359][T14762] __should_failslab+0x121/0x190 [ 2462.617283][T14762] should_failslab+0x9/0x14 [ 2462.621769][T14762] kmem_cache_alloc_node+0x268/0x740 [ 2462.627039][T14762] ? ___might_sleep+0x163/0x2c0 [ 2462.631889][T14762] alloc_vmap_area+0x147/0x2030 [ 2462.636740][T14762] ? __get_vm_area_node+0x12b/0x4f0 [ 2462.641925][T14762] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2462.647493][T14762] ? purge_vmap_area_lazy+0x40/0x40 [ 2462.652680][T14762] ? apply_to_page_range+0x562/0x700 [ 2462.657968][T14762] __get_vm_area_node+0x179/0x4f0 [ 2462.662998][T14762] __vmalloc_node_range+0xd4/0x810 [ 2462.668103][T14762] ? pcpu_mem_zalloc+0x8a/0xf0 [ 2462.672891][T14762] __vmalloc+0x44/0x50 [ 2462.676947][T14762] ? pcpu_mem_zalloc+0x8a/0xf0 [ 2462.681723][T14762] pcpu_mem_zalloc+0x8a/0xf0 [ 2462.686305][T14762] pcpu_create_chunk+0x12d/0x7f0 [ 2462.691234][T14762] pcpu_alloc+0x10f3/0x1380 [ 2462.695746][T14762] ? pcpu_alloc_area+0x820/0x820 [ 2462.700675][T14762] ? bpf_map_area_alloc+0x20/0x30 [ 2462.705706][T14762] __alloc_percpu_gfp+0x28/0x30 [ 2462.710556][T14762] htab_map_alloc+0xdb9/0x11c0 [ 2462.715352][T14762] ? htab_map_update_elem+0xca0/0xca0 [ 2462.720738][T14762] __do_sys_bpf+0x478/0x3810 [ 2462.725345][T14762] ? bpf_prog_load+0x18f0/0x18f0 [ 2462.730290][T14762] ? __kasan_check_write+0x14/0x20 [ 2462.735409][T14762] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2462.740961][T14762] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2462.746256][T14762] ? wait_for_completion+0x440/0x440 [ 2462.751557][T14762] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2462.757824][T14762] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2462.763287][T14762] ? do_syscall_64+0x26/0x790 [ 2462.767966][T14762] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2462.774037][T14762] ? do_syscall_64+0x26/0x790 [ 2462.778746][T14762] __x64_sys_bpf+0x73/0xb0 [ 2462.783170][T14762] do_syscall_64+0xfa/0x790 [ 2462.787682][T14762] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2462.793563][T14762] RIP: 0033:0x45a909 [ 2462.797451][T14762] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2462.817044][T14762] RSP: 002b:00007f5b93d6ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2462.825535][T14762] RAX: ffffffffffffffda RBX: 00007f5b93d6ac90 RCX: 000000000045a909 [ 2462.833502][T14762] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2462.841472][T14762] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2462.849452][T14762] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d6b6d4 [ 2462.857411][T14762] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 03:40:18 executing program 1 (fault-call:17 fault-nth:62): bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) [ 2463.029408][T14768] FAULT_INJECTION: forcing a failure. [ 2463.029408][T14768] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2463.042949][T14768] CPU: 0 PID: 14768 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2463.051632][T14768] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2463.061686][T14768] Call Trace: [ 2463.064998][T14768] dump_stack+0x197/0x210 [ 2463.069338][T14768] should_fail.cold+0xa/0x15 [ 2463.073932][T14768] ? fault_create_debugfs_attr+0x180/0x180 [ 2463.079731][T14768] ? ___might_sleep+0x163/0x2c0 [ 2463.084587][T14768] should_fail_alloc_page+0x50/0x60 [ 2463.089908][T14768] __alloc_pages_nodemask+0x1a1/0x910 [ 2463.095272][T14768] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2463.100811][T14768] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2463.106531][T14768] ? kasan_unpoison_shadow+0x35/0x50 [ 2463.111810][T14768] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2463.118044][T14768] alloc_pages_current+0x107/0x210 [ 2463.123154][T14768] __vmalloc_node_range+0x4f8/0x810 [ 2463.128359][T14768] __vmalloc+0x44/0x50 [ 2463.132414][T14768] ? pcpu_mem_zalloc+0x8a/0xf0 [ 2463.137164][T14768] pcpu_mem_zalloc+0x8a/0xf0 [ 2463.141745][T14768] pcpu_create_chunk+0x12d/0x7f0 [ 2463.146676][T14768] pcpu_alloc+0x10f3/0x1380 [ 2463.151179][T14768] ? pcpu_alloc_area+0x820/0x820 [ 2463.156105][T14768] ? bpf_map_area_alloc+0x20/0x30 [ 2463.161134][T14768] __alloc_percpu_gfp+0x28/0x30 [ 2463.165976][T14768] htab_map_alloc+0xdb9/0x11c0 [ 2463.170753][T14768] ? htab_map_update_elem+0xca0/0xca0 [ 2463.176115][T14768] __do_sys_bpf+0x478/0x3810 [ 2463.180697][T14768] ? bpf_prog_load+0x18f0/0x18f0 [ 2463.185622][T14768] ? __kasan_check_write+0x14/0x20 [ 2463.190725][T14768] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2463.196265][T14768] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2463.201543][T14768] ? wait_for_completion+0x440/0x440 [ 2463.206841][T14768] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2463.213112][T14768] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2463.218568][T14768] ? do_syscall_64+0x26/0x790 [ 2463.223232][T14768] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2463.229285][T14768] ? do_syscall_64+0x26/0x790 [ 2463.233958][T14768] __x64_sys_bpf+0x73/0xb0 [ 2463.238385][T14768] do_syscall_64+0xfa/0x790 [ 2463.242884][T14768] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2463.248775][T14768] RIP: 0033:0x45a909 [ 2463.252672][T14768] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2463.272265][T14768] RSP: 002b:00007f5b93d6ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2463.280684][T14768] RAX: ffffffffffffffda RBX: 00007f5b93d6ac90 RCX: 000000000045a909 [ 2463.288640][T14768] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2463.296595][T14768] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2463.304562][T14768] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d6b6d4 [ 2463.312619][T14768] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 03:40:28 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r0, &(0x7f0000001240)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty, 0x22}, 0x80, 0x0}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0xc0185879, 0x20000000) write$cgroup_int(r1, &(0x7f0000000080), 0xfffffec7) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000000c0)={r2}) 03:40:28 executing program 1 (fault-call:17 fault-nth:63): bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) 03:40:28 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_type(r0, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000380)='cpuset.mems\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x30863, 0x0) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0xfffffc61) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000240)={'hwsim0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f00000000c0)={'hwsim0\x00', @random="0894f53e01dc"}) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)={0xffff, 0x5}, 0xc) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup\x00\f\x7f\xd9\xfa;\x8b\x88gb\xefi\x16\x91\xbb\xc4\xd5Jk\tU~ \xa4\vR\\\x8a\xdb\xcel\xe0\xa3[\xae\x9d\xac\x84\x9f\v\x9e\x9f\r\x10\x1f\xd3\x80\xc1\xccq\xab\x01y\xed\xfc\x96)\xf6_>+\xa03\xf4\xcc0\xbbE\xb0\xc3\x94\xd53\x87\xd6\xc4\\\xc7\x82\xe9\xaf\xb5\xb6\x15\xf4K2\x17\f\x98\x1c\xebq/\xf5\x81#\x85\xc5\xa0\xfd\xfac\xd9\xf2c`\xe9[c\a\x12\x1bb\x82\x83\x86d\xf0k\xa8\x90\x06\xa8\x1cK\xea\x19\x91\a1z)\xde_r`\xee\xb6\x9e\xcb\x05\x00\x00\x82\xa1\t\xc9\x05\xcc^', 0x200002, 0x0) r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='memory.high\x00\x90\x80\xa4\x96\xbb\xe4\xb2\xa2\x01\xc0\xb8*Z\xef\xf8\x0e\x1f]\xf7\x10\xdb\xfe\xe4\x1d\xc6\x92\x7f\xeeK_p\t\x8c\x9f5\xd0\xef)\xd8\x04\xbf\xc2N\x1c\xf0R\xdc\r\xb1Gf\xba\xd11#<\xaf^,s\x85\x10R\x99\xc2D\xee\n\"\xf9c\x15{\xc1[\xef\x06\x8a\xcd\x9d\xc8\x90#\xd0\xe7\xe3\xe0\xa9\xf3\xc0n\x1f\xd1\x11P\xe20\xcd\x1c\xfa\xfd\xa3\xcf\x9c\xc6\xb7]\x16\xc7\xd7\xb4/\x82\xd1\xae\xd9TM\x05a\xe5\xc5U\x91\xbe\x81\xac4\x9d\x02`\xe7\xa6q\x1f@\x1f\x1f?tm\x9c\xd1\x8c\xa1\xb5\xe0`H)\x97r\xc0?y\x9cc=c`A^\x9f\xcd\xbc\xf4m>I\xae\xdf\x946\xe7M`\xeb\x9fm\xbe+n\x00\x18k\x98\xab\xd5\xeet\"d\x81\x94\x04\xf5\xeb', 0x2, 0x0) write$cgroup_int(r3, 0x0, 0x0) 03:40:28 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_type(r0, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000380)='cpuset.mems\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x30863, 0x0) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0xfffffc61) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000240)={'hwsim0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f00000000c0)={'hwsim0\x00', @random="0894f53e01dc"}) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)={0xffff, 0x5}, 0xc) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup\x00\f\x7f\xd9\xfa;\x8b\x88gb\xefi\x16\x91\xbb\xc4\xd5Jk\tU~ \xa4\vR\\\x8a\xdb\xcel\xe0\xa3[\xae\x9d\xac\x84\x9f\v\x9e\x9f\r\x10\x1f\xd3\x80\xc1\xccq\xab\x01y\xed\xfc\x96)\xf6_>+\xa03\xf4\xcc0\xbbE\xb0\xc3\x94\xd53\x87\xd6\xc4\\\xc7\x82\xe9\xaf\xb5\xb6\x15\xf4K2\x17\f\x98\x1c\xebq/\xf5\x81#\x85\xc5\xa0\xfd\xfac\xd9\xf2c`\xe9[c\a\x12\x1bb\x82\x83\x86d\xf0k\xa8\x90\x06\xa8\x1cK\xea\x19\x91\a1z)\xde_r`\xee\xb6\x9e\xcb\x05\x00\x00\x82\xa1\t\xc9\x05\xcc^', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='memory.high\x00\x90\x80\xa4\x96\xbb\xe4\xb2\xa2\x01\xc0\xb8*Z\xef\xf8\x0e\x1f]\xf7\x10\xdb\xfe\xe4\x1d\xc6\x92\x7f\xeeK_p\t\x8c\x9f5\xd0\xef)\xd8\x04\xbf\xc2N\x1c\xf0R\xdc\r\xb1Gf\xba\xd11#<\xaf^,s\x85\x10R\x99\xc2D\xee\n\"\xf9c\x15{\xc1[\xef\x06\x8a\xcd\x9d\xc8\x90#\xd0\xe7\xe3\xe0\xa9\xf3\xc0n\x1f\xd1\x11P\xe20\xcd\x1c\xfa\xfd\xa3\xcf\x9c\xc6\xb7]\x16\xc7\xd7\xb4/\x82\xd1\xae\xd9TM\x05a\xe5\xc5U\x91\xbe\x81\xac4\x9d\x02`\xe7\xa6q\x1f@\x1f\x1f?tm\x9c\xd1\x8c\xa1\xb5\xe0`H)\x97r\xc0?y\x9cc=c`A^\x9f\xcd\xbc\xf4m>I\xae\xdf\x946\xe7M`\xeb\x9fm\xbe+n\x00\x18k\x98\xab\xd5\xeet\"d\x81\x94\x04\xf5\xeb', 0x2, 0x0) write$cgroup_int(r3, 0x0, 0x0) [ 2473.265701][T14777] FAULT_INJECTION: forcing a failure. [ 2473.265701][T14777] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2473.279016][T14777] CPU: 0 PID: 14777 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2473.287670][T14777] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2473.297813][T14777] Call Trace: [ 2473.301089][T14777] dump_stack+0x197/0x210 [ 2473.305409][T14777] should_fail.cold+0xa/0x15 [ 2473.309988][T14777] ? fault_create_debugfs_attr+0x180/0x180 [ 2473.315777][T14777] ? ___might_sleep+0x163/0x2c0 [ 2473.320662][T14777] should_fail_alloc_page+0x50/0x60 [ 2473.325850][T14777] __alloc_pages_nodemask+0x1a1/0x910 [ 2473.331205][T14777] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2473.336769][T14777] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2473.342480][T14777] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2473.348719][T14777] alloc_pages_current+0x107/0x210 [ 2473.353810][T14777] ? ___might_sleep+0x163/0x2c0 [ 2473.358649][T14777] __vmalloc_node_range+0x4f8/0x810 [ 2473.363843][T14777] __vmalloc+0x44/0x50 [ 2473.367913][T14777] ? pcpu_mem_zalloc+0x8a/0xf0 [ 2473.372672][T14777] pcpu_mem_zalloc+0x8a/0xf0 [ 2473.377247][T14777] pcpu_create_chunk+0x12d/0x7f0 [ 2473.382177][T14777] pcpu_alloc+0x10f3/0x1380 [ 2473.386686][T14777] ? pcpu_alloc_area+0x820/0x820 [ 2473.391609][T14777] ? bpf_map_area_alloc+0x20/0x30 [ 2473.396625][T14777] __alloc_percpu_gfp+0x28/0x30 [ 2473.401459][T14777] htab_map_alloc+0xdb9/0x11c0 [ 2473.406233][T14777] ? htab_map_update_elem+0xca0/0xca0 [ 2473.411607][T14777] __do_sys_bpf+0x478/0x3810 [ 2473.416191][T14777] ? bpf_prog_load+0x18f0/0x18f0 [ 2473.421112][T14777] ? __kasan_check_write+0x14/0x20 [ 2473.426230][T14777] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2473.431770][T14777] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2473.437077][T14777] ? wait_for_completion+0x440/0x440 [ 2473.442351][T14777] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2473.448592][T14777] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2473.454030][T14777] ? do_syscall_64+0x26/0x790 [ 2473.458685][T14777] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2473.464752][T14777] ? do_syscall_64+0x26/0x790 [ 2473.469433][T14777] __x64_sys_bpf+0x73/0xb0 [ 2473.473830][T14777] do_syscall_64+0xfa/0x790 [ 2473.478320][T14777] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2473.484197][T14777] RIP: 0033:0x45a909 [ 2473.488075][T14777] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2473.507670][T14777] RSP: 002b:00007f5b93d6ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2473.516067][T14777] RAX: ffffffffffffffda RBX: 00007f5b93d6ac90 RCX: 000000000045a909 [ 2473.524029][T14777] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2473.531989][T14777] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2473.539947][T14777] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d6b6d4 [ 2473.547904][T14777] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 03:40:29 executing program 1 (fault-call:17 fault-nth:64): bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) [ 2473.699521][T14783] FAULT_INJECTION: forcing a failure. [ 2473.699521][T14783] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2473.713040][T14783] CPU: 0 PID: 14783 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2473.721723][T14783] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2473.731787][T14783] Call Trace: [ 2473.735080][T14783] dump_stack+0x197/0x210 [ 2473.739405][T14783] should_fail.cold+0xa/0x15 [ 2473.743998][T14783] ? fault_create_debugfs_attr+0x180/0x180 [ 2473.749794][T14783] ? ___might_sleep+0x163/0x2c0 [ 2473.754650][T14783] should_fail_alloc_page+0x50/0x60 [ 2473.759845][T14783] __alloc_pages_nodemask+0x1a1/0x910 [ 2473.765215][T14783] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2473.770749][T14783] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2473.776481][T14783] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2473.782716][T14783] alloc_pages_current+0x107/0x210 [ 2473.787813][T14783] ? ___might_sleep+0x163/0x2c0 [ 2473.792667][T14783] __vmalloc_node_range+0x4f8/0x810 [ 2473.797867][T14783] __vmalloc+0x44/0x50 [ 2473.801924][T14783] ? pcpu_mem_zalloc+0x8a/0xf0 [ 2473.806675][T14783] pcpu_mem_zalloc+0x8a/0xf0 [ 2473.811264][T14783] pcpu_create_chunk+0x12d/0x7f0 [ 2473.816190][T14783] pcpu_alloc+0x10f3/0x1380 [ 2473.820694][T14783] ? pcpu_alloc_area+0x820/0x820 [ 2473.825628][T14783] ? bpf_map_area_alloc+0x20/0x30 [ 2473.830657][T14783] __alloc_percpu_gfp+0x28/0x30 [ 2473.835499][T14783] htab_map_alloc+0xdb9/0x11c0 [ 2473.840267][T14783] ? htab_map_update_elem+0xca0/0xca0 [ 2473.845628][T14783] __do_sys_bpf+0x478/0x3810 [ 2473.850212][T14783] ? bpf_prog_load+0x18f0/0x18f0 [ 2473.855141][T14783] ? __kasan_check_write+0x14/0x20 [ 2473.860240][T14783] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2473.865773][T14783] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2473.871048][T14783] ? wait_for_completion+0x440/0x440 [ 2473.876330][T14783] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2473.882574][T14783] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2473.888026][T14783] ? do_syscall_64+0x26/0x790 [ 2473.892683][T14783] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2473.898729][T14783] ? do_syscall_64+0x26/0x790 [ 2473.903402][T14783] __x64_sys_bpf+0x73/0xb0 [ 2473.907817][T14783] do_syscall_64+0xfa/0x790 [ 2473.912315][T14783] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2473.918193][T14783] RIP: 0033:0x45a909 [ 2473.922077][T14783] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2473.941663][T14783] RSP: 002b:00007f5b93d6ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2473.950145][T14783] RAX: ffffffffffffffda RBX: 00007f5b93d6ac90 RCX: 000000000045a909 [ 2473.958102][T14783] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2473.966061][T14783] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2473.974025][T14783] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d6b6d4 [ 2473.981980][T14783] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 03:40:29 executing program 1 (fault-call:17 fault-nth:65): bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) [ 2474.178074][T14787] FAULT_INJECTION: forcing a failure. [ 2474.178074][T14787] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2474.191849][T14787] CPU: 1 PID: 14787 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2474.200517][T14787] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2474.210690][T14787] Call Trace: [ 2474.213978][T14787] dump_stack+0x197/0x210 [ 2474.218306][T14787] should_fail.cold+0xa/0x15 [ 2474.222891][T14787] ? fault_create_debugfs_attr+0x180/0x180 [ 2474.228680][T14787] ? ___might_sleep+0x163/0x2c0 [ 2474.233516][T14787] should_fail_alloc_page+0x50/0x60 [ 2474.238737][T14787] __alloc_pages_nodemask+0x1a1/0x910 [ 2474.244092][T14787] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2474.249653][T14787] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2474.255384][T14787] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2474.261612][T14787] alloc_pages_current+0x107/0x210 [ 2474.266706][T14787] ? ___might_sleep+0x163/0x2c0 [ 2474.271539][T14787] __vmalloc_node_range+0x4f8/0x810 [ 2474.276728][T14787] __vmalloc+0x44/0x50 [ 2474.280779][T14787] ? pcpu_mem_zalloc+0x8a/0xf0 [ 2474.285520][T14787] pcpu_mem_zalloc+0x8a/0xf0 [ 2474.290090][T14787] pcpu_create_chunk+0x12d/0x7f0 [ 2474.295009][T14787] pcpu_alloc+0x10f3/0x1380 [ 2474.299497][T14787] ? pcpu_alloc_area+0x820/0x820 [ 2474.304435][T14787] ? bpf_map_area_alloc+0x20/0x30 [ 2474.309470][T14787] __alloc_percpu_gfp+0x28/0x30 [ 2474.314314][T14787] htab_map_alloc+0xdb9/0x11c0 [ 2474.319082][T14787] ? htab_map_update_elem+0xca0/0xca0 [ 2474.324443][T14787] __do_sys_bpf+0x478/0x3810 [ 2474.329015][T14787] ? bpf_prog_load+0x18f0/0x18f0 [ 2474.333930][T14787] ? __kasan_check_write+0x14/0x20 [ 2474.339019][T14787] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2474.344544][T14787] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2474.349820][T14787] ? wait_for_completion+0x440/0x440 [ 2474.355093][T14787] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2474.361319][T14787] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2474.366758][T14787] ? do_syscall_64+0x26/0x790 [ 2474.371420][T14787] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2474.377507][T14787] ? do_syscall_64+0x26/0x790 [ 2474.382165][T14787] __x64_sys_bpf+0x73/0xb0 [ 2474.386575][T14787] do_syscall_64+0xfa/0x790 [ 2474.391059][T14787] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2474.396932][T14787] RIP: 0033:0x45a909 [ 2474.400812][T14787] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2474.420393][T14787] RSP: 002b:00007f5b93d6ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2474.428782][T14787] RAX: ffffffffffffffda RBX: 00007f5b93d6ac90 RCX: 000000000045a909 [ 2474.436784][T14787] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2474.444734][T14787] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2474.452682][T14787] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d6b6d4 [ 2474.460637][T14787] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 03:40:38 executing program 1 (fault-call:17 fault-nth:66): bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) 03:40:38 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x10, 0x0, 0x0, 0x0, 0x3, 0x0, 0x70ff3ca6b855515, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x10b0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x1}, 0x0, 0x4, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000280)={0x5, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x2, 0x2, 0x0, 0x0, 0x3, 0x0, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xa) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="215e017c6f768520"], 0xda00) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(r3, &(0x7f0000000080)='cpuacct.usage_percpu\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r4, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci={0x1f, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000340)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40086602, 0x400007) write$cgroup_subtree(r6, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0xb, 0x6, 0x9, 0x4, 0x401, r4, 0x5, [], r5, r6, 0x5}, 0x3c) r7 = openat$cgroup_ro(r6, &(0x7f0000000100)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x40082406, &(0x7f0000000300)='selinuxmime_typewlan1&\x00') write$cgroup_int(r2, &(0x7f0000000200)=0x4, 0x12) 03:40:38 executing program 5: close(0xffffffffffffffff) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) socketpair(0x18, 0x0, 0x1, &(0x7f0000000200)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci={0x1f, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) r4 = gettid() r5 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xe, 0x4, 0x4, 0x4, 0x0, 0x1, 0x2, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={r5, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r6}, 0xc) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r6, 0x8, 0x10}, 0xc) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r7, &(0x7f00000002c0)="0c0d9a630e9a4d384681caa97ff1890fe3598631f0cb65ccca3f04fd7c37f6f4723a4aadf25733", &(0x7f0000000540)="0608ce06544f3228e8fc899fed5757d4385fc73991b7b9512b4992fac4629c0fadf52e52ef5a9ccb82e8c590b8e2d1fad52daf155dc1f56f877c5ca4a168ee178e4d067b4b664559b1e3ce575f5f39d82b29feb80875702e61e685f163db2b920dfe615c01612d13d516101f3d83a7d2e1e1149d61849eaa15893335c3c0a0d8cbbc10e590d583f17579da766faad776d98c473aac416314730df407e0820f96fddd0b4ba3e09c85f745518b79be1db8dd7571e0da4342fbace2fb69b45d6e93732ecfd56474", 0x2}, 0x20) perf_event_open$cgroup(&(0x7f0000000240)={0x7, 0x70, 0x5, 0x94, 0x1, 0x1f, 0x0, 0xffffffff80000001, 0x80322, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x5, @perf_config_ext={0x80, 0x9}, 0x3, 0x2, 0xfffff801, 0xb, 0x10000, 0xffff, 0xfffe}, 0xffffffffffffffff, 0x1, r0, 0x8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2000000000401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)={0x2, 0x2, 0x4, 0x5}, &(0x7f0000000380)=0x7, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=0x10000}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={r4, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='/dev/net/tun\x00', r8}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r8}, 0xc) write$cgroup_subtree(r3, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) r9 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r9, 0x89e2, &(0x7f0000001040)={r3}) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0xb, 0x6, 0x9, 0x4, 0x401, r1, 0x5, [], r2, r3, 0x5}, 0x3c) r10 = openat$cgroup_ro(r3, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000040)=0xaf) [ 2482.554021][T14801] FAULT_INJECTION: forcing a failure. [ 2482.554021][T14801] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2482.567284][T14801] CPU: 0 PID: 14801 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2482.575938][T14801] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2482.585981][T14801] Call Trace: [ 2482.589287][T14801] dump_stack+0x197/0x210 [ 2482.593610][T14801] should_fail.cold+0xa/0x15 [ 2482.598188][T14801] ? fault_create_debugfs_attr+0x180/0x180 [ 2482.604031][T14801] ? ___might_sleep+0x163/0x2c0 [ 2482.608893][T14801] should_fail_alloc_page+0x50/0x60 [ 2482.614085][T14801] __alloc_pages_nodemask+0x1a1/0x910 [ 2482.619468][T14801] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2482.625006][T14801] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2482.630773][T14801] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2482.636995][T14801] alloc_pages_current+0x107/0x210 [ 2482.642089][T14801] ? ___might_sleep+0x163/0x2c0 [ 2482.646945][T14801] __vmalloc_node_range+0x4f8/0x810 [ 2482.652160][T14801] __vmalloc+0x44/0x50 [ 2482.656220][T14801] ? pcpu_mem_zalloc+0x8a/0xf0 [ 2482.661006][T14801] pcpu_mem_zalloc+0x8a/0xf0 [ 2482.665585][T14801] pcpu_create_chunk+0x12d/0x7f0 [ 2482.670511][T14801] pcpu_alloc+0x10f3/0x1380 [ 2482.674998][T14801] ? pcpu_alloc_area+0x820/0x820 [ 2482.679915][T14801] ? bpf_map_area_alloc+0x20/0x30 [ 2482.684946][T14801] __alloc_percpu_gfp+0x28/0x30 [ 2482.689789][T14801] htab_map_alloc+0xdb9/0x11c0 [ 2482.694539][T14801] ? htab_map_update_elem+0xca0/0xca0 [ 2482.700009][T14801] __do_sys_bpf+0x478/0x3810 [ 2482.704601][T14801] ? bpf_prog_load+0x18f0/0x18f0 [ 2482.709564][T14801] ? __kasan_check_write+0x14/0x20 [ 2482.714673][T14801] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2482.720196][T14801] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2482.725488][T14801] ? wait_for_completion+0x440/0x440 [ 2482.730789][T14801] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2482.737026][T14801] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2482.742481][T14801] ? do_syscall_64+0x26/0x790 [ 2482.747165][T14801] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2482.753228][T14801] ? do_syscall_64+0x26/0x790 [ 2482.757891][T14801] __x64_sys_bpf+0x73/0xb0 [ 2482.762311][T14801] do_syscall_64+0xfa/0x790 [ 2482.766825][T14801] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2482.772710][T14801] RIP: 0033:0x45a909 [ 2482.776591][T14801] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2482.796211][T14801] RSP: 002b:00007f5b93d49c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2482.804614][T14801] RAX: ffffffffffffffda RBX: 00007f5b93d49c90 RCX: 000000000045a909 [ 2482.812591][T14801] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2482.820651][T14801] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2482.828623][T14801] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d4a6d4 [ 2482.836593][T14801] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 03:40:38 executing program 1 (fault-call:17 fault-nth:67): bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) [ 2482.993709][T14804] FAULT_INJECTION: forcing a failure. [ 2482.993709][T14804] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2483.007019][T14804] CPU: 1 PID: 14804 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2483.015694][T14804] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2483.025738][T14804] Call Trace: [ 2483.029010][T14804] dump_stack+0x197/0x210 [ 2483.033363][T14804] should_fail.cold+0xa/0x15 [ 2483.037945][T14804] ? fault_create_debugfs_attr+0x180/0x180 [ 2483.043734][T14804] ? ___might_sleep+0x163/0x2c0 [ 2483.048575][T14804] should_fail_alloc_page+0x50/0x60 [ 2483.053754][T14804] __alloc_pages_nodemask+0x1a1/0x910 [ 2483.059109][T14804] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2483.064639][T14804] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2483.070346][T14804] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2483.076573][T14804] alloc_pages_current+0x107/0x210 [ 2483.081674][T14804] ? ___might_sleep+0x163/0x2c0 [ 2483.086508][T14804] __vmalloc_node_range+0x4f8/0x810 [ 2483.091696][T14804] __vmalloc+0x44/0x50 [ 2483.095757][T14804] ? pcpu_mem_zalloc+0x8a/0xf0 [ 2483.100527][T14804] pcpu_mem_zalloc+0x8a/0xf0 [ 2483.105107][T14804] pcpu_create_chunk+0x12d/0x7f0 [ 2483.110039][T14804] pcpu_alloc+0x10f3/0x1380 [ 2483.114543][T14804] ? pcpu_alloc_area+0x820/0x820 [ 2483.119471][T14804] ? bpf_map_area_alloc+0x20/0x30 [ 2483.124493][T14804] __alloc_percpu_gfp+0x28/0x30 [ 2483.129342][T14804] htab_map_alloc+0xdb9/0x11c0 [ 2483.134103][T14804] ? htab_map_update_elem+0xca0/0xca0 [ 2483.139474][T14804] __do_sys_bpf+0x478/0x3810 [ 2483.144053][T14804] ? bpf_prog_load+0x18f0/0x18f0 [ 2483.148976][T14804] ? __kasan_check_write+0x14/0x20 [ 2483.154159][T14804] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2483.159688][T14804] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2483.164959][T14804] ? wait_for_completion+0x440/0x440 [ 2483.170245][T14804] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2483.176480][T14804] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2483.181940][T14804] ? do_syscall_64+0x26/0x790 [ 2483.186602][T14804] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2483.192656][T14804] ? do_syscall_64+0x26/0x790 [ 2483.197328][T14804] __x64_sys_bpf+0x73/0xb0 [ 2483.201732][T14804] do_syscall_64+0xfa/0x790 [ 2483.206231][T14804] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2483.212116][T14804] RIP: 0033:0x45a909 [ 2483.215991][T14804] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2483.235659][T14804] RSP: 002b:00007f5b93d6ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2483.244052][T14804] RAX: ffffffffffffffda RBX: 00007f5b93d6ac90 RCX: 000000000045a909 [ 2483.252004][T14804] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2483.259953][T14804] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2483.267915][T14804] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d6b6d4 [ 2483.275976][T14804] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 03:40:39 executing program 1 (fault-call:17 fault-nth:68): bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) [ 2483.447367][T14809] FAULT_INJECTION: forcing a failure. [ 2483.447367][T14809] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2483.461181][T14809] CPU: 0 PID: 14809 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2483.469859][T14809] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2483.479911][T14809] Call Trace: [ 2483.483203][T14809] dump_stack+0x197/0x210 [ 2483.487556][T14809] should_fail.cold+0xa/0x15 [ 2483.492165][T14809] ? fault_create_debugfs_attr+0x180/0x180 [ 2483.497966][T14809] ? ___might_sleep+0x163/0x2c0 [ 2483.502835][T14809] should_fail_alloc_page+0x50/0x60 [ 2483.508042][T14809] __alloc_pages_nodemask+0x1a1/0x910 [ 2483.513428][T14809] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2483.518958][T14809] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2483.524697][T14809] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2483.530935][T14809] alloc_pages_current+0x107/0x210 [ 2483.536045][T14809] ? ___might_sleep+0x163/0x2c0 [ 2483.540884][T14809] __vmalloc_node_range+0x4f8/0x810 [ 2483.546143][T14809] __vmalloc+0x44/0x50 [ 2483.550222][T14809] ? pcpu_mem_zalloc+0x8a/0xf0 [ 2483.554994][T14809] pcpu_mem_zalloc+0x8a/0xf0 [ 2483.559581][T14809] pcpu_create_chunk+0x12d/0x7f0 [ 2483.564567][T14809] pcpu_alloc+0x10f3/0x1380 [ 2483.569101][T14809] ? pcpu_alloc_area+0x820/0x820 [ 2483.574043][T14809] ? bpf_map_area_alloc+0x20/0x30 [ 2483.579120][T14809] __alloc_percpu_gfp+0x28/0x30 [ 2483.583958][T14809] htab_map_alloc+0xdb9/0x11c0 [ 2483.588743][T14809] ? htab_map_update_elem+0xca0/0xca0 [ 2483.594114][T14809] __do_sys_bpf+0x478/0x3810 [ 2483.598793][T14809] ? bpf_prog_load+0x18f0/0x18f0 [ 2483.603769][T14809] ? __kasan_check_write+0x14/0x20 [ 2483.609060][T14809] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2483.614606][T14809] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2483.619889][T14809] ? wait_for_completion+0x440/0x440 [ 2483.625166][T14809] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2483.631398][T14809] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2483.636854][T14809] ? do_syscall_64+0x26/0x790 [ 2483.641536][T14809] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2483.647586][T14809] ? do_syscall_64+0x26/0x790 [ 2483.652271][T14809] __x64_sys_bpf+0x73/0xb0 [ 2483.656697][T14809] do_syscall_64+0xfa/0x790 [ 2483.661197][T14809] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2483.667064][T14809] RIP: 0033:0x45a909 [ 2483.670937][T14809] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2483.690567][T14809] RSP: 002b:00007f5b93d6ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2483.699050][T14809] RAX: ffffffffffffffda RBX: 00007f5b93d6ac90 RCX: 000000000045a909 [ 2483.707007][T14809] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2483.714971][T14809] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2483.722953][T14809] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d6b6d4 [ 2483.730927][T14809] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 03:40:39 executing program 1 (fault-call:17 fault-nth:69): bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) [ 2483.892518][T14815] FAULT_INJECTION: forcing a failure. [ 2483.892518][T14815] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2483.905790][T14815] CPU: 1 PID: 14815 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2483.914448][T14815] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2483.924498][T14815] Call Trace: [ 2483.927790][T14815] dump_stack+0x197/0x210 [ 2483.932117][T14815] should_fail.cold+0xa/0x15 [ 2483.936729][T14815] ? fault_create_debugfs_attr+0x180/0x180 [ 2483.942535][T14815] ? ___might_sleep+0x163/0x2c0 [ 2483.947383][T14815] should_fail_alloc_page+0x50/0x60 [ 2483.952562][T14815] __alloc_pages_nodemask+0x1a1/0x910 [ 2483.957925][T14815] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2483.963454][T14815] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2483.969165][T14815] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2483.975392][T14815] alloc_pages_current+0x107/0x210 [ 2483.980499][T14815] ? ___might_sleep+0x163/0x2c0 [ 2483.985336][T14815] __vmalloc_node_range+0x4f8/0x810 [ 2483.990525][T14815] __vmalloc+0x44/0x50 [ 2483.994575][T14815] ? pcpu_mem_zalloc+0x8a/0xf0 [ 2483.999326][T14815] pcpu_mem_zalloc+0x8a/0xf0 [ 2484.003907][T14815] pcpu_create_chunk+0x12d/0x7f0 [ 2484.008838][T14815] pcpu_alloc+0x10f3/0x1380 [ 2484.013331][T14815] ? pcpu_alloc_area+0x820/0x820 [ 2484.018264][T14815] ? bpf_map_area_alloc+0x20/0x30 [ 2484.023279][T14815] __alloc_percpu_gfp+0x28/0x30 [ 2484.028111][T14815] htab_map_alloc+0xdb9/0x11c0 [ 2484.032869][T14815] ? htab_map_update_elem+0xca0/0xca0 [ 2484.038224][T14815] __do_sys_bpf+0x478/0x3810 [ 2484.042802][T14815] ? bpf_prog_load+0x18f0/0x18f0 [ 2484.047723][T14815] ? __kasan_check_write+0x14/0x20 [ 2484.052814][T14815] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2484.058350][T14815] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2484.063706][T14815] ? wait_for_completion+0x440/0x440 [ 2484.068977][T14815] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2484.075218][T14815] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2484.080659][T14815] ? do_syscall_64+0x26/0x790 [ 2484.085317][T14815] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2484.091362][T14815] ? do_syscall_64+0x26/0x790 [ 2484.096025][T14815] __x64_sys_bpf+0x73/0xb0 [ 2484.100425][T14815] do_syscall_64+0xfa/0x790 [ 2484.104914][T14815] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2484.110787][T14815] RIP: 0033:0x45a909 [ 2484.114681][T14815] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2484.134265][T14815] RSP: 002b:00007f5b93d6ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2484.142663][T14815] RAX: ffffffffffffffda RBX: 00007f5b93d6ac90 RCX: 000000000045a909 [ 2484.150610][T14815] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2484.158577][T14815] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2484.166544][T14815] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d6b6d4 [ 2484.174503][T14815] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 03:40:48 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x2, 0x2, &(0x7f0000000000)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @exit], &(0x7f0000000080)='GPL\x00', 0x6, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(r0, &(0x7f0000000200)='threaded\x00', 0x9) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f00000000c0)='cpuacct.usage_percpu\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='pids.events\x00', 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000180)={r3, 0x7e6035816519dbef, 0x1, 0x7ba, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x4}, 0x20) 03:40:48 executing program 1 (fault-call:17 fault-nth:70): bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) 03:40:48 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_type(r0, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000380)='cpuset.mems\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x30863, 0x0) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0xfffffc61) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000240)={'hwsim0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f00000000c0)={'hwsim0\x00', @random="0894f53e01dc"}) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)={0xffff, 0x5}, 0xc) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup\x00\f\x7f\xd9\xfa;\x8b\x88gb\xefi\x16\x91\xbb\xc4\xd5Jk\tU~ \xa4\vR\\\x8a\xdb\xcel\xe0\xa3[\xae\x9d\xac\x84\x9f\v\x9e\x9f\r\x10\x1f\xd3\x80\xc1\xccq\xab\x01y\xed\xfc\x96)\xf6_>+\xa03\xf4\xcc0\xbbE\xb0\xc3\x94\xd53\x87\xd6\xc4\\\xc7\x82\xe9\xaf\xb5\xb6\x15\xf4K2\x17\f\x98\x1c\xebq/\xf5\x81#\x85\xc5\xa0\xfd\xfac\xd9\xf2c`\xe9[c\a\x12\x1bb\x82\x83\x86d\xf0k\xa8\x90\x06\xa8\x1cK\xea\x19\x91\a1z)\xde_r`\xee\xb6\x9e\xcb\x05\x00\x00\x82\xa1\t\xc9\x05\xcc^', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, 0x0, 0x2, 0x0) write$cgroup_int(r4, 0x0, 0x0) 03:40:48 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_type(r0, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000380)='cpuset.mems\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x30863, 0x0) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0xfffffc61) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000240)={'hwsim0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f00000000c0)={'hwsim0\x00', @random="0894f53e01dc"}) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)={0xffff, 0x5}, 0xc) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup\x00\f\x7f\xd9\xfa;\x8b\x88gb\xefi\x16\x91\xbb\xc4\xd5Jk\tU~ \xa4\vR\\\x8a\xdb\xcel\xe0\xa3[\xae\x9d\xac\x84\x9f\v\x9e\x9f\r\x10\x1f\xd3\x80\xc1\xccq\xab\x01y\xed\xfc\x96)\xf6_>+\xa03\xf4\xcc0\xbbE\xb0\xc3\x94\xd53\x87\xd6\xc4\\\xc7\x82\xe9\xaf\xb5\xb6\x15\xf4K2\x17\f\x98\x1c\xebq/\xf5\x81#\x85\xc5\xa0\xfd\xfac\xd9\xf2c`\xe9[c\a\x12\x1bb\x82\x83\x86d\xf0k\xa8\x90\x06\xa8\x1cK\xea\x19\x91\a1z)\xde_r`\xee\xb6\x9e\xcb\x05\x00\x00\x82\xa1\t\xc9\x05\xcc^', 0x200002, 0x0) r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='memory.high\x00\x90\x80\xa4\x96\xbb\xe4\xb2\xa2\x01\xc0\xb8*Z\xef\xf8\x0e\x1f]\xf7\x10\xdb\xfe\xe4\x1d\xc6\x92\x7f\xeeK_p\t\x8c\x9f5\xd0\xef)\xd8\x04\xbf\xc2N\x1c\xf0R\xdc\r\xb1Gf\xba\xd11#<\xaf^,s\x85\x10R\x99\xc2D\xee\n\"\xf9c\x15{\xc1[\xef\x06\x8a\xcd\x9d\xc8\x90#\xd0\xe7\xe3\xe0\xa9\xf3\xc0n\x1f\xd1\x11P\xe20\xcd\x1c\xfa\xfd\xa3\xcf\x9c\xc6\xb7]\x16\xc7\xd7\xb4/\x82\xd1\xae\xd9TM\x05a\xe5\xc5U\x91\xbe\x81\xac4\x9d\x02`\xe7\xa6q\x1f@\x1f\x1f?tm\x9c\xd1\x8c\xa1\xb5\xe0`H)\x97r\xc0?y\x9cc=c`A^\x9f\xcd\xbc\xf4m>I\xae\xdf\x946\xe7M`\xeb\x9fm\xbe+n\x00\x18k\x98\xab\xd5\xeet\"d\x81\x94\x04\xf5\xeb', 0x2, 0x0) write$cgroup_int(r3, 0x0, 0x0) [ 2493.024097][T14824] FAULT_INJECTION: forcing a failure. [ 2493.024097][T14824] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2493.037803][T14824] CPU: 1 PID: 14824 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2493.046463][T14824] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2493.056513][T14824] Call Trace: [ 2493.059790][T14824] dump_stack+0x197/0x210 [ 2493.064117][T14824] should_fail.cold+0xa/0x15 [ 2493.068721][T14824] ? fault_create_debugfs_attr+0x180/0x180 [ 2493.074534][T14824] ? ___might_sleep+0x163/0x2c0 [ 2493.079380][T14824] should_fail_alloc_page+0x50/0x60 [ 2493.084579][T14824] __alloc_pages_nodemask+0x1a1/0x910 [ 2493.089925][T14824] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2493.095465][T14824] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2493.101177][T14824] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2493.107397][T14824] alloc_pages_current+0x107/0x210 [ 2493.112493][T14824] ? ___might_sleep+0x163/0x2c0 [ 2493.117349][T14824] __vmalloc_node_range+0x4f8/0x810 [ 2493.122575][T14824] __vmalloc+0x44/0x50 [ 2493.126660][T14824] ? pcpu_mem_zalloc+0x8a/0xf0 [ 2493.131403][T14824] pcpu_mem_zalloc+0x8a/0xf0 [ 2493.135992][T14824] pcpu_create_chunk+0x12d/0x7f0 [ 2493.140921][T14824] pcpu_alloc+0x10f3/0x1380 [ 2493.145406][T14824] ? pcpu_alloc_area+0x820/0x820 [ 2493.150328][T14824] ? bpf_map_area_alloc+0x20/0x30 [ 2493.155358][T14824] __alloc_percpu_gfp+0x28/0x30 [ 2493.160195][T14824] htab_map_alloc+0xdb9/0x11c0 [ 2493.164939][T14824] ? htab_map_update_elem+0xca0/0xca0 [ 2493.170300][T14824] __do_sys_bpf+0x478/0x3810 [ 2493.174893][T14824] ? bpf_prog_load+0x18f0/0x18f0 [ 2493.179820][T14824] ? __kasan_check_write+0x14/0x20 [ 2493.184919][T14824] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2493.190460][T14824] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2493.195743][T14824] ? wait_for_completion+0x440/0x440 [ 2493.201017][T14824] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2493.207253][T14824] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2493.212712][T14824] ? do_syscall_64+0x26/0x790 [ 2493.217383][T14824] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2493.223433][T14824] ? do_syscall_64+0x26/0x790 [ 2493.228094][T14824] __x64_sys_bpf+0x73/0xb0 [ 2493.232496][T14824] do_syscall_64+0xfa/0x790 [ 2493.237015][T14824] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2493.242896][T14824] RIP: 0033:0x45a909 [ 2493.246775][T14824] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2493.266360][T14824] RSP: 002b:00007f5b93d49c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2493.274760][T14824] RAX: ffffffffffffffda RBX: 00007f5b93d49c90 RCX: 000000000045a909 [ 2493.282718][T14824] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2493.290670][T14824] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2493.298609][T14824] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d4a6d4 [ 2493.306560][T14824] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 03:40:49 executing program 1 (fault-call:17 fault-nth:71): bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) [ 2493.491894][T14827] FAULT_INJECTION: forcing a failure. [ 2493.491894][T14827] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2493.505205][T14827] CPU: 0 PID: 14827 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2493.513868][T14827] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2493.523915][T14827] Call Trace: [ 2493.527216][T14827] dump_stack+0x197/0x210 [ 2493.531568][T14827] should_fail.cold+0xa/0x15 [ 2493.536165][T14827] ? fault_create_debugfs_attr+0x180/0x180 [ 2493.541957][T14827] ? ___might_sleep+0x163/0x2c0 [ 2493.546816][T14827] should_fail_alloc_page+0x50/0x60 [ 2493.552003][T14827] __alloc_pages_nodemask+0x1a1/0x910 [ 2493.557363][T14827] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2493.563083][T14827] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2493.568614][T14827] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 2493.574573][T14827] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2493.580798][T14827] alloc_pages_current+0x107/0x210 [ 2493.585892][T14827] __get_free_pages+0xc/0x40 [ 2493.590458][T14827] kasan_populate_vmalloc_pte+0x2f/0x1c0 [ 2493.596078][T14827] apply_to_page_range+0x445/0x700 [ 2493.601204][T14827] ? memset+0x40/0x40 [ 2493.605181][T14827] kasan_populate_vmalloc+0x68/0x90 [ 2493.610371][T14827] __vmalloc_node_range+0x47e/0x810 [ 2493.615583][T14827] __vmalloc+0x44/0x50 [ 2493.619642][T14827] ? pcpu_mem_zalloc+0x8a/0xf0 [ 2493.624394][T14827] pcpu_mem_zalloc+0x8a/0xf0 [ 2493.628985][T14827] pcpu_create_chunk+0x12d/0x7f0 [ 2493.633930][T14827] pcpu_alloc+0x10f3/0x1380 [ 2493.638449][T14827] ? pcpu_alloc_area+0x820/0x820 [ 2493.643377][T14827] ? bpf_map_area_alloc+0x20/0x30 [ 2493.648404][T14827] __alloc_percpu_gfp+0x28/0x30 [ 2493.653257][T14827] htab_map_alloc+0xdb9/0x11c0 [ 2493.658028][T14827] ? htab_map_update_elem+0xca0/0xca0 [ 2493.663391][T14827] __do_sys_bpf+0x478/0x3810 [ 2493.667973][T14827] ? bpf_prog_load+0x18f0/0x18f0 [ 2493.672930][T14827] ? __kasan_check_write+0x14/0x20 [ 2493.678058][T14827] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2493.683598][T14827] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2493.688873][T14827] ? wait_for_completion+0x440/0x440 [ 2493.694156][T14827] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2493.700408][T14827] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2493.705855][T14827] ? do_syscall_64+0x26/0x790 [ 2493.710532][T14827] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2493.716583][T14827] ? do_syscall_64+0x26/0x790 [ 2493.721263][T14827] __x64_sys_bpf+0x73/0xb0 [ 2493.725675][T14827] do_syscall_64+0xfa/0x790 [ 2493.730175][T14827] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2493.736346][T14827] RIP: 0033:0x45a909 [ 2493.740227][T14827] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2493.759834][T14827] RSP: 002b:00007f5b93d6ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2493.768240][T14827] RAX: ffffffffffffffda RBX: 00007f5b93d6ac90 RCX: 000000000045a909 [ 2493.776208][T14827] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2493.784167][T14827] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2493.792123][T14827] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d6b6d4 [ 2493.800078][T14827] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 03:40:49 executing program 1 (fault-call:17 fault-nth:72): bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) [ 2493.966552][T14834] FAULT_INJECTION: forcing a failure. [ 2493.966552][T14834] name failslab, interval 1, probability 0, space 0, times 0 [ 2493.979305][T14834] CPU: 0 PID: 14834 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2493.987982][T14834] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2493.998025][T14834] Call Trace: [ 2494.001308][T14834] dump_stack+0x197/0x210 [ 2494.005652][T14834] should_fail.cold+0xa/0x15 [ 2494.010242][T14834] ? fault_create_debugfs_attr+0x180/0x180 [ 2494.016036][T14834] ? ___might_sleep+0x163/0x2c0 [ 2494.020871][T14834] __should_failslab+0x121/0x190 [ 2494.025824][T14834] should_failslab+0x9/0x14 [ 2494.030319][T14834] kmem_cache_alloc_node_trace+0x274/0x750 [ 2494.036108][T14834] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2494.041829][T14834] ? apply_to_page_range+0x562/0x700 [ 2494.047115][T14834] __get_vm_area_node+0x12b/0x4f0 [ 2494.052140][T14834] __vmalloc_node_range+0xd4/0x810 [ 2494.057253][T14834] ? pcpu_mem_zalloc+0x8a/0xf0 [ 2494.062036][T14834] __vmalloc+0x44/0x50 [ 2494.066138][T14834] ? pcpu_mem_zalloc+0x8a/0xf0 [ 2494.070889][T14834] pcpu_mem_zalloc+0x8a/0xf0 [ 2494.075499][T14834] pcpu_create_chunk+0x196/0x7f0 [ 2494.080421][T14834] pcpu_alloc+0x10f3/0x1380 [ 2494.084934][T14834] ? pcpu_alloc_area+0x820/0x820 [ 2494.089862][T14834] ? bpf_map_area_alloc+0x20/0x30 [ 2494.094886][T14834] __alloc_percpu_gfp+0x28/0x30 [ 2494.099715][T14834] htab_map_alloc+0xdb9/0x11c0 [ 2494.104503][T14834] ? htab_map_update_elem+0xca0/0xca0 [ 2494.109866][T14834] __do_sys_bpf+0x478/0x3810 [ 2494.114461][T14834] ? bpf_prog_load+0x18f0/0x18f0 [ 2494.119378][T14834] ? __kasan_check_write+0x14/0x20 [ 2494.124488][T14834] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2494.130041][T14834] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2494.135335][T14834] ? wait_for_completion+0x440/0x440 [ 2494.140622][T14834] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2494.146886][T14834] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2494.152358][T14834] ? do_syscall_64+0x26/0x790 [ 2494.157030][T14834] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2494.163088][T14834] ? do_syscall_64+0x26/0x790 [ 2494.167769][T14834] __x64_sys_bpf+0x73/0xb0 [ 2494.172188][T14834] do_syscall_64+0xfa/0x790 [ 2494.176703][T14834] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2494.182584][T14834] RIP: 0033:0x45a909 [ 2494.186481][T14834] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2494.206087][T14834] RSP: 002b:00007f5b93d6ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2494.214490][T14834] RAX: ffffffffffffffda RBX: 00007f5b93d6ac90 RCX: 000000000045a909 [ 2494.222450][T14834] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2494.230419][T14834] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2494.238370][T14834] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d6b6d4 [ 2494.246335][T14834] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 03:40:49 executing program 1 (fault-call:17 fault-nth:73): bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) [ 2494.400827][T14839] FAULT_INJECTION: forcing a failure. [ 2494.400827][T14839] name failslab, interval 1, probability 0, space 0, times 0 [ 2494.413787][T14839] CPU: 0 PID: 14839 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2494.422473][T14839] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2494.432624][T14839] Call Trace: [ 2494.436412][T14839] dump_stack+0x197/0x210 [ 2494.440756][T14839] should_fail.cold+0xa/0x15 [ 2494.445355][T14839] ? fault_create_debugfs_attr+0x180/0x180 [ 2494.451158][T14839] ? ___might_sleep+0x163/0x2c0 [ 2494.456004][T14839] __should_failslab+0x121/0x190 [ 2494.460931][T14839] should_failslab+0x9/0x14 [ 2494.465421][T14839] kmem_cache_alloc_node+0x268/0x740 [ 2494.470692][T14839] ? ___might_sleep+0x163/0x2c0 [ 2494.475548][T14839] alloc_vmap_area+0x147/0x2030 [ 2494.480385][T14839] ? __get_vm_area_node+0x12b/0x4f0 [ 2494.485576][T14839] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2494.491126][T14839] ? purge_vmap_area_lazy+0x40/0x40 [ 2494.496326][T14839] ? apply_to_page_range+0x562/0x700 [ 2494.501615][T14839] __get_vm_area_node+0x179/0x4f0 [ 2494.506640][T14839] __vmalloc_node_range+0xd4/0x810 [ 2494.511742][T14839] ? pcpu_mem_zalloc+0x8a/0xf0 [ 2494.516510][T14839] __vmalloc+0x44/0x50 [ 2494.520578][T14839] ? pcpu_mem_zalloc+0x8a/0xf0 [ 2494.525329][T14839] pcpu_mem_zalloc+0x8a/0xf0 [ 2494.529908][T14839] pcpu_create_chunk+0x196/0x7f0 [ 2494.534842][T14839] pcpu_alloc+0x10f3/0x1380 [ 2494.539758][T14839] ? pcpu_alloc_area+0x820/0x820 [ 2494.544683][T14839] ? bpf_map_area_alloc+0x20/0x30 [ 2494.549715][T14839] __alloc_percpu_gfp+0x28/0x30 [ 2494.554558][T14839] htab_map_alloc+0xdb9/0x11c0 [ 2494.559353][T14839] ? htab_map_update_elem+0xca0/0xca0 [ 2494.564712][T14839] __do_sys_bpf+0x478/0x3810 [ 2494.569291][T14839] ? bpf_prog_load+0x18f0/0x18f0 [ 2494.574217][T14839] ? __kasan_check_write+0x14/0x20 [ 2494.579318][T14839] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2494.584857][T14839] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2494.590130][T14839] ? wait_for_completion+0x440/0x440 [ 2494.595845][T14839] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2494.602090][T14839] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2494.607535][T14839] ? do_syscall_64+0x26/0x790 [ 2494.612196][T14839] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2494.618251][T14839] ? do_syscall_64+0x26/0x790 [ 2494.622923][T14839] __x64_sys_bpf+0x73/0xb0 [ 2494.627327][T14839] do_syscall_64+0xfa/0x790 [ 2494.631820][T14839] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2494.637695][T14839] RIP: 0033:0x45a909 [ 2494.641577][T14839] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2494.661161][T14839] RSP: 002b:00007f5b93d6ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2494.669553][T14839] RAX: ffffffffffffffda RBX: 00007f5b93d6ac90 RCX: 000000000045a909 [ 2494.677509][T14839] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2494.685464][T14839] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2494.693419][T14839] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d6b6d4 [ 2494.701372][T14839] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 03:41:01 executing program 4: 03:41:01 executing program 1 (fault-call:17 fault-nth:74): bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) 03:41:01 executing program 5: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x2, @multicast1}}, 0x80, 0x0, 0x0, 0x0, 0x1c6}, 0x1bb44e227ecbc7d5) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c45, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffff7fffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0185879, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x2761, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$TUNSETFILTEREBPF(r2, 0x800454e1, &(0x7f0000000100)=r3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x9) r4 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000700)={'team0\x00\x00\x00@\x00\x00\x00\xf7\x00'}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x2, 0x3, 0x2) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000700)={'team0\x00\x00\x00\x00\x00\x00\x00\xf7\x00', @broadcast}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci={0x1f, 0x0}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r8, 0xc0185879, 0x20000000) write$cgroup_int(r8, &(0x7f0000000080), 0xfffffec7) r9 = openat$cgroup_ro(r8, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r10 = openat$cgroup_ro(r9, &(0x7f0000000240)='memory.eve\x18c\xafXnts\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r10, 0x40086602, 0x400007) write$cgroup_subtree(r10, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0xb, 0x6, 0x9, 0x4, 0x401, r6, 0x5, [], r7, r10, 0x5}, 0x3c) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x40082406, &(0x7f0000000140)='\x00') openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 03:41:01 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_type(r0, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000380)='cpuset.mems\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x30863, 0x0) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0xfffffc61) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000240)={'hwsim0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f00000000c0)={'hwsim0\x00', @random="0894f53e01dc"}) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)={0xffff, 0x5}, 0xc) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup\x00\f\x7f\xd9\xfa;\x8b\x88gb\xefi\x16\x91\xbb\xc4\xd5Jk\tU~ \xa4\vR\\\x8a\xdb\xcel\xe0\xa3[\xae\x9d\xac\x84\x9f\v\x9e\x9f\r\x10\x1f\xd3\x80\xc1\xccq\xab\x01y\xed\xfc\x96)\xf6_>+\xa03\xf4\xcc0\xbbE\xb0\xc3\x94\xd53\x87\xd6\xc4\\\xc7\x82\xe9\xaf\xb5\xb6\x15\xf4K2\x17\f\x98\x1c\xebq/\xf5\x81#\x85\xc5\xa0\xfd\xfac\xd9\xf2c`\xe9[c\a\x12\x1bb\x82\x83\x86d\xf0k\xa8\x90\x06\xa8\x1cK\xea\x19\x91\a1z)\xde_r`\xee\xb6\x9e\xcb\x05\x00\x00\x82\xa1\t\xc9\x05\xcc^', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, 0x0, 0x2, 0x0) write$cgroup_int(r4, 0x0, 0x0) 03:41:01 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_type(r0, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000380)='cpuset.mems\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x30863, 0x0) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0xfffffc61) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000240)={'hwsim0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f00000000c0)={'hwsim0\x00', @random="0894f53e01dc"}) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)={0xffff, 0x5}, 0xc) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup\x00\f\x7f\xd9\xfa;\x8b\x88gb\xefi\x16\x91\xbb\xc4\xd5Jk\tU~ \xa4\vR\\\x8a\xdb\xcel\xe0\xa3[\xae\x9d\xac\x84\x9f\v\x9e\x9f\r\x10\x1f\xd3\x80\xc1\xccq\xab\x01y\xed\xfc\x96)\xf6_>+\xa03\xf4\xcc0\xbbE\xb0\xc3\x94\xd53\x87\xd6\xc4\\\xc7\x82\xe9\xaf\xb5\xb6\x15\xf4K2\x17\f\x98\x1c\xebq/\xf5\x81#\x85\xc5\xa0\xfd\xfac\xd9\xf2c`\xe9[c\a\x12\x1bb\x82\x83\x86d\xf0k\xa8\x90\x06\xa8\x1cK\xea\x19\x91\a1z)\xde_r`\xee\xb6\x9e\xcb\x05\x00\x00\x82\xa1\t\xc9\x05\xcc^', 0x200002, 0x0) r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)='memory.high\x00\x90\x80\xa4\x96\xbb\xe4\xb2\xa2\x01\xc0\xb8*Z\xef\xf8\x0e\x1f]\xf7\x10\xdb\xfe\xe4\x1d\xc6\x92\x7f\xeeK_p\t\x8c\x9f5\xd0\xef)\xd8\x04\xbf\xc2N\x1c\xf0R\xdc\r\xb1Gf\xba\xd11#<\xaf^,s\x85\x10R\x99\xc2D\xee\n\"\xf9c\x15{\xc1[\xef\x06\x8a\xcd\x9d\xc8\x90#\xd0\xe7\xe3\xe0\xa9\xf3\xc0n\x1f\xd1\x11P\xe20\xcd\x1c\xfa\xfd\xa3\xcf\x9c\xc6\xb7]\x16\xc7\xd7\xb4/\x82\xd1\xae\xd9TM\x05a\xe5\xc5U\x91\xbe\x81\xac4\x9d\x02`\xe7\xa6q\x1f@\x1f\x1f?tm\x9c\xd1\x8c\xa1\xb5\xe0`H)\x97r\xc0?y\x9cc=c`A^\x9f\xcd\xbc\xf4m>I\xae\xdf\x946\xe7M`\xeb\x9fm\xbe+n\x00\x18k\x98\xab\xd5\xeet\"d\x81\x94\x04\xf5\xeb', 0x2, 0x0) write$cgroup_int(r3, 0x0, 0x0) [ 2506.323617][T14853] FAULT_INJECTION: forcing a failure. [ 2506.323617][T14853] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2506.337044][T14853] CPU: 1 PID: 14853 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2506.345762][T14853] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2506.355842][T14853] Call Trace: [ 2506.359114][T14853] dump_stack+0x197/0x210 [ 2506.363443][T14853] should_fail.cold+0xa/0x15 [ 2506.368031][T14853] ? fault_create_debugfs_attr+0x180/0x180 [ 2506.373818][T14853] ? ___might_sleep+0x163/0x2c0 [ 2506.378667][T14853] should_fail_alloc_page+0x50/0x60 [ 2506.383943][T14853] __alloc_pages_nodemask+0x1a1/0x910 [ 2506.389308][T14853] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2506.394849][T14853] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2506.400560][T14853] ? kasan_unpoison_shadow+0x35/0x50 [ 2506.405831][T14853] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2506.412059][T14853] alloc_pages_current+0x107/0x210 [ 2506.417157][T14853] __vmalloc_node_range+0x4f8/0x810 [ 2506.422346][T14853] __vmalloc+0x44/0x50 [ 2506.426394][T14853] ? pcpu_mem_zalloc+0x8a/0xf0 [ 2506.431140][T14853] pcpu_mem_zalloc+0x8a/0xf0 [ 2506.435714][T14853] pcpu_create_chunk+0x196/0x7f0 [ 2506.440634][T14853] pcpu_alloc+0x10f3/0x1380 [ 2506.445122][T14853] ? pcpu_alloc_area+0x820/0x820 [ 2506.450042][T14853] ? bpf_map_area_alloc+0x20/0x30 [ 2506.455060][T14853] __alloc_percpu_gfp+0x28/0x30 [ 2506.459895][T14853] htab_map_alloc+0xdb9/0x11c0 [ 2506.464651][T14853] ? htab_map_update_elem+0xca0/0xca0 [ 2506.470004][T14853] __do_sys_bpf+0x478/0x3810 [ 2506.474585][T14853] ? bpf_prog_load+0x18f0/0x18f0 [ 2506.479508][T14853] ? __kasan_check_write+0x14/0x20 [ 2506.484617][T14853] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2506.490145][T14853] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2506.495415][T14853] ? wait_for_completion+0x440/0x440 [ 2506.500687][T14853] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2506.506922][T14853] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2506.512361][T14853] ? do_syscall_64+0x26/0x790 [ 2506.517018][T14853] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2506.523070][T14853] ? do_syscall_64+0x26/0x790 [ 2506.527750][T14853] __x64_sys_bpf+0x73/0xb0 [ 2506.532149][T14853] do_syscall_64+0xfa/0x790 [ 2506.536642][T14853] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2506.542515][T14853] RIP: 0033:0x45a909 [ 2506.546390][T14853] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2506.566065][T14853] RSP: 002b:00007f5b93d6ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2506.574458][T14853] RAX: ffffffffffffffda RBX: 00007f5b93d6ac90 RCX: 000000000045a909 [ 2506.582408][T14853] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2506.590352][T14853] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2506.598297][T14853] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d6b6d4 [ 2506.606434][T14853] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 03:41:08 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000100)=ANY=[@ANYBLOB="aad45c44000000110800000000000000e40c52b031d6943d9e28445c64d35513ac744b666995095e5cbf2d2dd3ba866cbab6fec219b2e3be3299c5"]) 03:41:08 executing program 1 (fault-call:17 fault-nth:75): bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) [ 2512.622647][T14862] FAULT_INJECTION: forcing a failure. [ 2512.622647][T14862] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2512.636044][T14862] CPU: 0 PID: 14862 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2512.644703][T14862] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2512.654735][T14862] Call Trace: [ 2512.658008][T14862] dump_stack+0x197/0x210 [ 2512.662335][T14862] should_fail.cold+0xa/0x15 [ 2512.666922][T14862] ? fault_create_debugfs_attr+0x180/0x180 [ 2512.672731][T14862] ? ___might_sleep+0x163/0x2c0 [ 2512.677575][T14862] should_fail_alloc_page+0x50/0x60 [ 2512.682746][T14862] __alloc_pages_nodemask+0x1a1/0x910 [ 2512.688091][T14862] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2512.693611][T14862] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2512.699308][T14862] ? kasan_unpoison_shadow+0x35/0x50 [ 2512.704574][T14862] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2512.710785][T14862] alloc_pages_current+0x107/0x210 [ 2512.715874][T14862] __vmalloc_node_range+0x4f8/0x810 [ 2512.721063][T14862] __vmalloc+0x44/0x50 [ 2512.725106][T14862] ? pcpu_mem_zalloc+0x8a/0xf0 [ 2512.729855][T14862] pcpu_mem_zalloc+0x8a/0xf0 [ 2512.734439][T14862] pcpu_create_chunk+0x196/0x7f0 [ 2512.739373][T14862] pcpu_alloc+0x10f3/0x1380 [ 2512.743892][T14862] ? pcpu_alloc_area+0x820/0x820 [ 2512.748831][T14862] ? bpf_map_area_alloc+0x20/0x30 [ 2512.753843][T14862] __alloc_percpu_gfp+0x28/0x30 [ 2512.758692][T14862] htab_map_alloc+0xdb9/0x11c0 [ 2512.763461][T14862] ? htab_map_update_elem+0xca0/0xca0 [ 2512.768903][T14862] __do_sys_bpf+0x478/0x3810 [ 2512.773477][T14862] ? bpf_prog_load+0x18f0/0x18f0 [ 2512.778426][T14862] ? __kasan_check_write+0x14/0x20 [ 2512.783522][T14862] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2512.789134][T14862] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2512.794407][T14862] ? wait_for_completion+0x440/0x440 [ 2512.799688][T14862] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2512.805920][T14862] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2512.811353][T14862] ? do_syscall_64+0x26/0x790 [ 2512.816007][T14862] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2512.822057][T14862] ? do_syscall_64+0x26/0x790 [ 2512.826724][T14862] __x64_sys_bpf+0x73/0xb0 [ 2512.831140][T14862] do_syscall_64+0xfa/0x790 [ 2512.835656][T14862] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2512.841653][T14862] RIP: 0033:0x45a909 [ 2512.845525][T14862] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2512.865233][T14862] RSP: 002b:00007f5b93d49c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2512.873624][T14862] RAX: ffffffffffffffda RBX: 00007f5b93d49c90 RCX: 000000000045a909 [ 2512.881579][T14862] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2512.889535][T14862] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2512.897495][T14862] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d4a6d4 [ 2512.905445][T14862] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 03:41:08 executing program 1 (fault-call:17 fault-nth:76): bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) [ 2513.077666][T14865] FAULT_INJECTION: forcing a failure. [ 2513.077666][T14865] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2513.091422][T14865] CPU: 1 PID: 14865 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2513.100105][T14865] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2513.110144][T14865] Call Trace: [ 2513.113426][T14865] dump_stack+0x197/0x210 [ 2513.117759][T14865] should_fail.cold+0xa/0x15 [ 2513.122343][T14865] ? fault_create_debugfs_attr+0x180/0x180 [ 2513.128146][T14865] ? ___might_sleep+0x163/0x2c0 [ 2513.132986][T14865] should_fail_alloc_page+0x50/0x60 [ 2513.138192][T14865] __alloc_pages_nodemask+0x1a1/0x910 [ 2513.143551][T14865] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2513.149073][T14865] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2513.154774][T14865] ? kasan_unpoison_shadow+0x35/0x50 [ 2513.160041][T14865] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2513.166259][T14865] alloc_pages_current+0x107/0x210 [ 2513.171348][T14865] __vmalloc_node_range+0x4f8/0x810 [ 2513.176531][T14865] __vmalloc+0x44/0x50 [ 2513.180575][T14865] ? pcpu_mem_zalloc+0x8a/0xf0 [ 2513.185320][T14865] pcpu_mem_zalloc+0x8a/0xf0 [ 2513.189887][T14865] pcpu_create_chunk+0x196/0x7f0 [ 2513.194818][T14865] pcpu_alloc+0x10f3/0x1380 [ 2513.199307][T14865] ? pcpu_alloc_area+0x820/0x820 [ 2513.204223][T14865] ? bpf_map_area_alloc+0x20/0x30 [ 2513.209234][T14865] __alloc_percpu_gfp+0x28/0x30 [ 2513.214075][T14865] htab_map_alloc+0xdb9/0x11c0 [ 2513.218828][T14865] ? htab_map_update_elem+0xca0/0xca0 [ 2513.224179][T14865] __do_sys_bpf+0x478/0x3810 [ 2513.228750][T14865] ? bpf_prog_load+0x18f0/0x18f0 [ 2513.233673][T14865] ? __kasan_check_write+0x14/0x20 [ 2513.238765][T14865] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2513.244305][T14865] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2513.249565][T14865] ? wait_for_completion+0x440/0x440 [ 2513.254832][T14865] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2513.261064][T14865] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2513.266500][T14865] ? do_syscall_64+0x26/0x790 [ 2513.271153][T14865] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2513.277193][T14865] ? do_syscall_64+0x26/0x790 [ 2513.281850][T14865] __x64_sys_bpf+0x73/0xb0 [ 2513.286245][T14865] do_syscall_64+0xfa/0x790 [ 2513.290726][T14865] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2513.296597][T14865] RIP: 0033:0x45a909 [ 2513.300467][T14865] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2513.320043][T14865] RSP: 002b:00007f5b93d6ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 03:41:08 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_type(r0, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000380)='cpuset.mems\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x30863, 0x0) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0xfffffc61) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000240)={'hwsim0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f00000000c0)={'hwsim0\x00', @random="0894f53e01dc"}) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)={0xffff, 0x5}, 0xc) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup\x00\f\x7f\xd9\xfa;\x8b\x88gb\xefi\x16\x91\xbb\xc4\xd5Jk\tU~ \xa4\vR\\\x8a\xdb\xcel\xe0\xa3[\xae\x9d\xac\x84\x9f\v\x9e\x9f\r\x10\x1f\xd3\x80\xc1\xccq\xab\x01y\xed\xfc\x96)\xf6_>+\xa03\xf4\xcc0\xbbE\xb0\xc3\x94\xd53\x87\xd6\xc4\\\xc7\x82\xe9\xaf\xb5\xb6\x15\xf4K2\x17\f\x98\x1c\xebq/\xf5\x81#\x85\xc5\xa0\xfd\xfac\xd9\xf2c`\xe9[c\a\x12\x1bb\x82\x83\x86d\xf0k\xa8\x90\x06\xa8\x1cK\xea\x19\x91\a1z)\xde_r`\xee\xb6\x9e\xcb\x05\x00\x00\x82\xa1\t\xc9\x05\xcc^', 0x200002, 0x0) r4 = openat$cgroup_int(r3, 0x0, 0x2, 0x0) write$cgroup_int(r4, 0x0, 0x0) 03:41:09 executing program 5: [ 2513.328438][T14865] RAX: ffffffffffffffda RBX: 00007f5b93d6ac90 RCX: 000000000045a909 [ 2513.336390][T14865] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2513.344338][T14865] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2513.352283][T14865] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d6b6d4 [ 2513.360228][T14865] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 03:41:09 executing program 1 (fault-call:17 fault-nth:77): bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) [ 2513.517096][T14870] FAULT_INJECTION: forcing a failure. [ 2513.517096][T14870] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2513.530500][T14870] CPU: 1 PID: 14870 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2513.539162][T14870] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2513.549288][T14870] Call Trace: [ 2513.552577][T14870] dump_stack+0x197/0x210 [ 2513.557039][T14870] should_fail.cold+0xa/0x15 [ 2513.561624][T14870] ? fault_create_debugfs_attr+0x180/0x180 [ 2513.567419][T14870] ? ___might_sleep+0x163/0x2c0 [ 2513.572256][T14870] should_fail_alloc_page+0x50/0x60 [ 2513.577436][T14870] __alloc_pages_nodemask+0x1a1/0x910 [ 2513.582798][T14870] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 2513.588327][T14870] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2513.594036][T14870] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2513.600257][T14870] alloc_pages_current+0x107/0x210 [ 2513.605346][T14870] ? ___might_sleep+0x163/0x2c0 [ 2513.610190][T14870] __vmalloc_node_range+0x4f8/0x810 [ 2513.615392][T14870] __vmalloc+0x44/0x50 [ 2513.619443][T14870] ? pcpu_mem_zalloc+0x8a/0xf0 [ 2513.624214][T14870] pcpu_mem_zalloc+0x8a/0xf0 [ 2513.628783][T14870] pcpu_create_chunk+0x196/0x7f0 [ 2513.633702][T14870] pcpu_alloc+0x10f3/0x1380 [ 2513.638191][T14870] ? pcpu_alloc_area+0x820/0x820 [ 2513.643113][T14870] ? bpf_map_area_alloc+0x20/0x30 [ 2513.648126][T14870] __alloc_percpu_gfp+0x28/0x30 [ 2513.653087][T14870] htab_map_alloc+0xdb9/0x11c0 [ 2513.657843][T14870] ? htab_map_update_elem+0xca0/0xca0 [ 2513.663196][T14870] __do_sys_bpf+0x478/0x3810 [ 2513.667767][T14870] ? bpf_prog_load+0x18f0/0x18f0 [ 2513.672692][T14870] ? __kasan_check_write+0x14/0x20 [ 2513.677784][T14870] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2513.683309][T14870] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2513.688593][T14870] ? wait_for_completion+0x440/0x440 [ 2513.693865][T14870] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2513.700096][T14870] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2513.705542][T14870] ? do_syscall_64+0x26/0x790 [ 2513.710195][T14870] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2513.716246][T14870] ? do_syscall_64+0x26/0x790 [ 2513.720902][T14870] __x64_sys_bpf+0x73/0xb0 [ 2513.725296][T14870] do_syscall_64+0xfa/0x790 [ 2513.729778][T14870] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2513.735652][T14870] RIP: 0033:0x45a909 [ 2513.739524][T14870] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2513.759112][T14870] RSP: 002b:00007f5b93d6ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2513.767496][T14870] RAX: ffffffffffffffda RBX: 00007f5b93d6ac90 RCX: 000000000045a909 [ 2513.775452][T14870] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2513.783402][T14870] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2513.791355][T14870] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d6b6d4 [ 2513.799322][T14870] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 03:41:09 executing program 1 (fault-call:17 fault-nth:78): bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) [ 2513.956565][T14875] FAULT_INJECTION: forcing a failure. [ 2513.956565][T14875] name failslab, interval 1, probability 0, space 0, times 0 [ 2513.969435][T14875] CPU: 1 PID: 14875 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2513.978178][T14875] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2513.988267][T14875] Call Trace: [ 2513.991558][T14875] dump_stack+0x197/0x210 [ 2513.995894][T14875] should_fail.cold+0xa/0x15 [ 2514.000475][T14875] ? fault_create_debugfs_attr+0x180/0x180 [ 2514.006257][T14875] ? ___might_sleep+0x163/0x2c0 [ 2514.011085][T14875] __should_failslab+0x121/0x190 [ 2514.016012][T14875] should_failslab+0x9/0x14 [ 2514.020502][T14875] __kmalloc+0x2e0/0x770 [ 2514.024723][T14875] ? memset+0x40/0x40 [ 2514.028683][T14875] ? pcpu_get_vm_areas+0x3d5/0x3ee0 [ 2514.033873][T14875] pcpu_get_vm_areas+0x3d5/0x3ee0 [ 2514.038885][T14875] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2514.045102][T14875] ? __vmalloc_node_range+0x4d7/0x810 [ 2514.050457][T14875] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2514.056681][T14875] pcpu_create_chunk+0x24e/0x7f0 [ 2514.061618][T14875] pcpu_alloc+0x10f3/0x1380 [ 2514.066113][T14875] ? pcpu_alloc_area+0x820/0x820 [ 2514.071027][T14875] ? bpf_map_area_alloc+0x20/0x30 [ 2514.076046][T14875] __alloc_percpu_gfp+0x28/0x30 [ 2514.080881][T14875] htab_map_alloc+0xdb9/0x11c0 [ 2514.085625][T14875] ? htab_map_update_elem+0xca0/0xca0 [ 2514.090971][T14875] __do_sys_bpf+0x478/0x3810 [ 2514.095558][T14875] ? bpf_prog_load+0x18f0/0x18f0 [ 2514.100484][T14875] ? __kasan_check_write+0x14/0x20 [ 2514.105574][T14875] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2514.111096][T14875] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2514.116367][T14875] ? wait_for_completion+0x440/0x440 [ 2514.121649][T14875] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2514.127881][T14875] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2514.133331][T14875] ? do_syscall_64+0x26/0x790 [ 2514.137997][T14875] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2514.144039][T14875] ? do_syscall_64+0x26/0x790 [ 2514.148694][T14875] __x64_sys_bpf+0x73/0xb0 [ 2514.153105][T14875] do_syscall_64+0xfa/0x790 [ 2514.157603][T14875] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2514.163469][T14875] RIP: 0033:0x45a909 [ 2514.167338][T14875] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2514.186913][T14875] RSP: 002b:00007f5b93d6ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2514.195302][T14875] RAX: ffffffffffffffda RBX: 00007f5b93d6ac90 RCX: 000000000045a909 [ 2514.203258][T14875] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2514.211213][T14875] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2514.219169][T14875] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d6b6d4 [ 2514.227109][T14875] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 03:41:21 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x10, 0x1, &(0x7f0000001780)=ANY=[@ANYBLOB="d5fd99846e7dcc5a35ed84db9c1802000000676e3a30000000000000008700000000000000000000717b11f22d543d0000000000aa2d3ccaca45145cfe50ab1d5db6e57d342b04ef61b91e19e544a1c1a2f7877943c48e4bb02602cd039556ab96ff19e400e9f9bd631753b304d65680c19a78591294784993dece5982afcb92f10a6239f2498adb6134609f81e07153af27751d8417ce1a3b3bb524eb9913b76bf9f8e620ea53faf8b247794174bb87072c43c4fe93604c49cf2047683a70801e691ada"], &(0x7f00000000c0)='GPL\x00', 0x4, 0xffffffffffffffc5, &(0x7f0000000740)=""/4100, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='.+lgroup/\r\x85\xdc\xb0|\x03>@H\x03%\xde\x00\x04\x00', 0x200002, 0x0) openat$cgroup(r0, &(0x7f0000000400), 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000006c0)=@ipx={0x4, 0x1000, 0x1ff, '\x00', 0x3}, 0xffffffffffffff43, 0x0}, 0x1) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x20000, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x4, 0x3}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r3, 0x28, &(0x7f0000000500)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={r4}, 0x44) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000004c0)={r4}, 0xc) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x7, 0x4, 0xffffffbc, 0xf1a}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r5, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={r6}, 0xc) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={r6, 0x7ffe, 0x8}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000440)={r7, &(0x7f00000002c0)="74411fed71c819ab98dbe0bd72ad9dc50574f1dbffa19448ee8d565b4840d767b4fc4f8b7cbb22ead1e4a9c431ee7a4b0607e5c69e1915dbeb48018364927238ec5998050f3fcaad5014a62202f8d00b8738dd43c251834a5a6a2e7728806ae4287f49e0e7bc3adb3b029fc87fb2febdb55b08b538051c9808545f91dcbd358cac24354b9d24e3d262878e265062ef6f8d90c5aabb7e9c411221b51b4db4d8fa8baf37f79c7697dbb9be0e0ad9618f990860dc3312cde3623d558b50bcf3ab92ee687ac4fd866385fc2666c28b3539cbb4ed7c63a549738080e2d58387dc66014910eed415", &(0x7f00000003c0)=""/104, 0x4}, 0x20) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net//yz1\xff', 0x1ff) r8 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000140)='./file0\x00'}, 0x10) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000240)=r8) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x20b, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000010008108040f80ecdb4cb92e0a480e001a000000e8bd6efb120009000e0002000c0000ff050005001204", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x5, 0x11) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) r9 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) perf_event_open$cgroup(0x0, r9, 0x0, 0xffffffffffffffff, 0x0) 03:41:21 executing program 1 (fault-call:17 fault-nth:79): bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) 03:41:21 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_type(r0, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000380)='cpuset.mems\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x30863, 0x0) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0xfffffc61) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000240)={'hwsim0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f00000000c0)={'hwsim0\x00', @random="0894f53e01dc"}) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)={0xffff, 0x5}, 0xc) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup\x00\f\x7f\xd9\xfa;\x8b\x88gb\xefi\x16\x91\xbb\xc4\xd5Jk\tU~ \xa4\vR\\\x8a\xdb\xcel\xe0\xa3[\xae\x9d\xac\x84\x9f\v\x9e\x9f\r\x10\x1f\xd3\x80\xc1\xccq\xab\x01y\xed\xfc\x96)\xf6_>+\xa03\xf4\xcc0\xbbE\xb0\xc3\x94\xd53\x87\xd6\xc4\\\xc7\x82\xe9\xaf\xb5\xb6\x15\xf4K2\x17\f\x98\x1c\xebq/\xf5\x81#\x85\xc5\xa0\xfd\xfac\xd9\xf2c`\xe9[c\a\x12\x1bb\x82\x83\x86d\xf0k\xa8\x90\x06\xa8\x1cK\xea\x19\x91\a1z)\xde_r`\xee\xb6\x9e\xcb\x05\x00\x00\x82\xa1\t\xc9\x05\xcc^', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, 0x0, 0x2, 0x0) write$cgroup_int(r4, 0x0, 0x0) [ 2525.964729][T14887] FAULT_INJECTION: forcing a failure. [ 2525.964729][T14887] name failslab, interval 1, probability 0, space 0, times 0 [ 2525.977527][T14887] CPU: 1 PID: 14887 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2525.986202][T14887] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2525.996246][T14887] Call Trace: [ 2525.999514][T14887] dump_stack+0x197/0x210 [ 2526.003847][T14887] should_fail.cold+0xa/0x15 [ 2526.008435][T14887] ? fault_create_debugfs_attr+0x180/0x180 [ 2526.014227][T14887] ? ___might_sleep+0x163/0x2c0 [ 2526.019053][T14887] __should_failslab+0x121/0x190 [ 2526.023976][T14887] should_failslab+0x9/0x14 [ 2526.028471][T14887] kmem_cache_alloc+0x2aa/0x710 [ 2526.033295][T14887] ? memset+0x40/0x40 [ 2526.037254][T14887] ? pcpu_get_vm_areas+0x3ec/0x3ee0 [ 2526.042438][T14887] pcpu_get_vm_areas+0x49e/0x3ee0 [ 2526.047459][T14887] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2526.053694][T14887] ? __vmalloc_node_range+0x4d7/0x810 [ 2526.059069][T14887] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2526.065314][T14887] pcpu_create_chunk+0x24e/0x7f0 [ 2526.070254][T14887] pcpu_alloc+0x10f3/0x1380 [ 2526.074743][T14887] ? pcpu_alloc_area+0x820/0x820 [ 2526.079671][T14887] ? bpf_map_area_alloc+0x20/0x30 [ 2526.084690][T14887] __alloc_percpu_gfp+0x28/0x30 [ 2526.089543][T14887] htab_map_alloc+0xdb9/0x11c0 [ 2526.094307][T14887] ? htab_map_update_elem+0xca0/0xca0 [ 2526.099667][T14887] __do_sys_bpf+0x478/0x3810 [ 2526.104249][T14887] ? bpf_prog_load+0x18f0/0x18f0 [ 2526.109221][T14887] ? __kasan_check_write+0x14/0x20 [ 2526.114450][T14887] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2526.119970][T14887] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2526.125248][T14887] ? wait_for_completion+0x440/0x440 [ 2526.130525][T14887] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2526.136750][T14887] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2526.142198][T14887] ? do_syscall_64+0x26/0x790 [ 2526.146872][T14887] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2526.152933][T14887] ? do_syscall_64+0x26/0x790 [ 2526.157591][T14887] __x64_sys_bpf+0x73/0xb0 [ 2526.162087][T14887] do_syscall_64+0xfa/0x790 [ 2526.166595][T14887] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2526.172483][T14887] RIP: 0033:0x45a909 [ 2526.176357][T14887] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2526.195945][T14887] RSP: 002b:00007f5b93d6ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2526.204351][T14887] RAX: ffffffffffffffda RBX: 00007f5b93d6ac90 RCX: 000000000045a909 [ 2526.212316][T14887] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2526.220261][T14887] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2526.228205][T14887] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d6b6d4 [ 2526.236156][T14887] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 03:41:21 executing program 1 (fault-call:17 fault-nth:80): bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) [ 2526.412498][T14892] FAULT_INJECTION: forcing a failure. [ 2526.412498][T14892] name failslab, interval 1, probability 0, space 0, times 0 [ 2526.425399][T14892] CPU: 1 PID: 14892 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2526.434075][T14892] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2526.444127][T14892] Call Trace: [ 2526.447416][T14892] dump_stack+0x197/0x210 [ 2526.451750][T14892] should_fail.cold+0xa/0x15 [ 2526.456332][T14892] ? fault_create_debugfs_attr+0x180/0x180 [ 2526.462128][T14892] ? ___might_sleep+0x163/0x2c0 [ 2526.466976][T14892] __should_failslab+0x121/0x190 [ 2526.471895][T14892] should_failslab+0x9/0x14 [ 2526.476368][T14892] kmem_cache_alloc+0x2aa/0x710 [ 2526.481190][T14892] ? memset+0x40/0x40 [ 2526.485153][T14892] ? pcpu_get_vm_areas+0x3ec/0x3ee0 [ 2526.490330][T14892] pcpu_get_vm_areas+0x49e/0x3ee0 [ 2526.495331][T14892] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2526.501567][T14892] ? __vmalloc_node_range+0x4d7/0x810 [ 2526.506953][T14892] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2526.513179][T14892] pcpu_create_chunk+0x24e/0x7f0 [ 2526.518107][T14892] pcpu_alloc+0x10f3/0x1380 [ 2526.522598][T14892] ? pcpu_alloc_area+0x820/0x820 [ 2526.527512][T14892] ? bpf_map_area_alloc+0x20/0x30 [ 2526.532523][T14892] __alloc_percpu_gfp+0x28/0x30 [ 2526.537360][T14892] htab_map_alloc+0xdb9/0x11c0 [ 2526.542119][T14892] ? htab_map_update_elem+0xca0/0xca0 [ 2526.547489][T14892] __do_sys_bpf+0x478/0x3810 [ 2526.552074][T14892] ? bpf_prog_load+0x18f0/0x18f0 [ 2526.556999][T14892] ? __kasan_check_write+0x14/0x20 [ 2526.562096][T14892] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2526.567628][T14892] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2526.572897][T14892] ? wait_for_completion+0x440/0x440 [ 2526.578172][T14892] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2526.584401][T14892] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2526.589836][T14892] ? do_syscall_64+0x26/0x790 [ 2526.594491][T14892] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2526.600540][T14892] ? do_syscall_64+0x26/0x790 [ 2526.605200][T14892] __x64_sys_bpf+0x73/0xb0 [ 2526.609593][T14892] do_syscall_64+0xfa/0x790 [ 2526.614083][T14892] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2526.619952][T14892] RIP: 0033:0x45a909 [ 2526.623838][T14892] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2526.643420][T14892] RSP: 002b:00007f5b93d6ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2526.651809][T14892] RAX: ffffffffffffffda RBX: 00007f5b93d6ac90 RCX: 000000000045a909 [ 2526.659765][T14892] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2526.667712][T14892] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2526.675665][T14892] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d6b6d4 [ 2526.683628][T14892] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 03:41:22 executing program 1 (fault-call:17 fault-nth:81): bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) [ 2526.850331][T14897] FAULT_INJECTION: forcing a failure. [ 2526.850331][T14897] name failslab, interval 1, probability 0, space 0, times 0 [ 2526.863144][T14897] CPU: 1 PID: 14897 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2526.871817][T14897] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2526.881861][T14897] Call Trace: [ 2526.885136][T14897] dump_stack+0x197/0x210 [ 2526.889451][T14897] should_fail.cold+0xa/0x15 [ 2526.894027][T14897] ? fault_create_debugfs_attr+0x180/0x180 [ 2526.899828][T14897] ? ___might_sleep+0x163/0x2c0 [ 2526.904669][T14897] __should_failslab+0x121/0x190 [ 2526.909585][T14897] should_failslab+0x9/0x14 [ 2526.914066][T14897] kmem_cache_alloc_trace+0x2d3/0x790 [ 2526.919513][T14897] ? kmem_cache_alloc+0x364/0x710 [ 2526.924509][T14897] ? memset+0x40/0x40 [ 2526.928479][T14897] ? pcpu_get_vm_areas+0x3ec/0x3ee0 [ 2526.933656][T14897] pcpu_get_vm_areas+0x4d6/0x3ee0 [ 2526.938660][T14897] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2526.944876][T14897] ? __vmalloc_node_range+0x4d7/0x810 [ 2526.950268][T14897] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2526.956489][T14897] pcpu_create_chunk+0x24e/0x7f0 [ 2526.961402][T14897] pcpu_alloc+0x10f3/0x1380 [ 2526.965905][T14897] ? pcpu_alloc_area+0x820/0x820 [ 2526.970860][T14897] ? bpf_map_area_alloc+0x20/0x30 [ 2526.975877][T14897] __alloc_percpu_gfp+0x28/0x30 [ 2526.980700][T14897] htab_map_alloc+0xdb9/0x11c0 [ 2526.985444][T14897] ? htab_map_update_elem+0xca0/0xca0 [ 2526.990786][T14897] __do_sys_bpf+0x478/0x3810 [ 2526.995350][T14897] ? bpf_prog_load+0x18f0/0x18f0 [ 2527.000261][T14897] ? __kasan_check_write+0x14/0x20 [ 2527.005351][T14897] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2527.010874][T14897] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2527.016148][T14897] ? wait_for_completion+0x440/0x440 [ 2527.021414][T14897] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2527.027639][T14897] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2527.033073][T14897] ? do_syscall_64+0x26/0x790 [ 2527.037731][T14897] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2527.043781][T14897] ? do_syscall_64+0x26/0x790 [ 2527.048466][T14897] __x64_sys_bpf+0x73/0xb0 [ 2527.053017][T14897] do_syscall_64+0xfa/0x790 [ 2527.057509][T14897] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2527.063375][T14897] RIP: 0033:0x45a909 [ 2527.067242][T14897] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2527.086815][T14897] RSP: 002b:00007f5b93d6ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2527.095200][T14897] RAX: ffffffffffffffda RBX: 00007f5b93d6ac90 RCX: 000000000045a909 [ 2527.103147][T14897] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2527.111102][T14897] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 2527.119048][T14897] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d6b6d4 [ 2527.127014][T14897] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 03:41:31 executing program 1 (fault-call:17 fault-nth:82): bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x4, 0x4, 0x1004, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) r1 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000140)=@caif=@dbg={0x25, 0x8}, 0x80, 0x0}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r0, &(0x7f0000001640)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200)=0xffffffffffffffff, 0x12) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001680)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)={0x6, 0x10000, 0x9, 0x4, 0x401, r2, 0x9e5, [], 0x0, r4, 0x5}, 0xfe32) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000001c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000000)=""/7, 0x7}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/170, 0xaa}], 0x6, &(0x7f0000001580)=""/154, 0x9a}, 0x12042) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000840)=@hci, 0x80, &(0x7f00000007c0)=[{&(0x7f00000008c0)=""/232, 0xe8}, {&(0x7f00000009c0)=""/134, 0x86}], 0x2, &(0x7f0000000a80)=""/133, 0x85}, 0x21) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40086602, 0x400007) write$cgroup_subtree(r7, &(0x7f0000000180)={[{0x2d, 'cpu'}, {0x2b, 'io'}]}, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x14, 0x6, 0x7, 0x2, 0x10, r4, 0x2, [], r5, r6, 0x1, 0x5}, 0x3c) 03:41:31 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_type(r0, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000380)='cpuset.mems\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x30863, 0x0) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0xfffffc61) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000240)={'hwsim0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f00000000c0)={'hwsim0\x00', @random="0894f53e01dc"}) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)={0xffff, 0x5}, 0xc) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup\x00\f\x7f\xd9\xfa;\x8b\x88gb\xefi\x16\x91\xbb\xc4\xd5Jk\tU~ \xa4\vR\\\x8a\xdb\xcel\xe0\xa3[\xae\x9d\xac\x84\x9f\v\x9e\x9f\r\x10\x1f\xd3\x80\xc1\xccq\xab\x01y\xed\xfc\x96)\xf6_>+\xa03\xf4\xcc0\xbbE\xb0\xc3\x94\xd53\x87\xd6\xc4\\\xc7\x82\xe9\xaf\xb5\xb6\x15\xf4K2\x17\f\x98\x1c\xebq/\xf5\x81#\x85\xc5\xa0\xfd\xfac\xd9\xf2c`\xe9[c\a\x12\x1bb\x82\x83\x86d\xf0k\xa8\x90\x06\xa8\x1cK\xea\x19\x91\a1z)\xde_r`\xee\xb6\x9e\xcb\x05\x00\x00\x82\xa1\t\xc9\x05\xcc^', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000200)='memory.high\x00\x90\x80\xa4\x96\xbb\xe4\xb2\xa2\x01\xc0\xb8*Z\xef\xf8\x0e\x1f]\xf7\x10\xdb\xfe\xe4\x1d\xc6\x92\x7f\xeeK_p\t\x8c\x9f5\xd0\xef)\xd8\x04\xbf\xc2N\x1c\xf0R\xdc\r\xb1Gf\xba\xd11#<\xaf^,s\x85\x10R\x99\xc2D\xee\n\"\xf9c\x15{\xc1[\xef\x06\x8a\xcd\x9d\xc8\x90#\xd0\xe7\xe3\xe0\xa9\xf3\xc0n\x1f\xd1\x11P\xe20\xcd\x1c\xfa\xfd\xa3\xcf\x9c\xc6\xb7]\x16\xc7\xd7\xb4/\x82\xd1\xae\xd9TM\x05a\xe5\xc5U\x91\xbe\x81\xac4\x9d\x02`\xe7\xa6q\x1f@\x1f\x1f?tm\x9c\xd1\x8c\xa1\xb5\xe0`H)\x97r\xc0?y\x9cc=c`A^\x9f\xcd\xbc\xf4m>I\xae\xdf\x946\xe7M`\xeb\x9fm\xbe+n\x00\x18k\x98\xab\xd5\xeet\"d\x81\x94\x04\xf5\xeb', 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 03:41:31 executing program 2: perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8f533b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x7, 0x3}, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xc, &(0x7f00000000c0)='trustedproc\x00'}, 0x30) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0185879, 0x20000000) write$cgroup_int(r0, &(0x7f0000000080), 0xfffffec7) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x801) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r3, &(0x7f00000004c0)='syz0\x00', 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x200002, 0x0) r4 = gettid() r5 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000280)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x101, "2b04ec665b4b", 0xff}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r6 = socket$kcm(0x11, 0x7, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r3, 0x15, 0x1, 0x4, 0x0, 0xfffffffffffffeb2}, 0x35e4ed281d171825) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffcf) socket$kcm(0xa, 0x6, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000006c0)) sendmsg(r5, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100)=r4, 0xfffffffffffffec6) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') r9 = gettid() perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x8, 0x6, 0x0, 0x0, 0x0, 0x3, 0x41004, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x1ff}, 0x4, 0x0, 0x0, 0x8, 0x0, 0x2, 0x80}, r9, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, r9, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r10 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r10, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r12 = socket$kcm(0x2, 0x3, 0x2) setsockopt$sock_attach_bpf(r12, 0x1, 0x3e, &(0x7f00000002c0)=r11, 0x4) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001a80)=ANY=[@ANYBLOB="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"/474], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r13, 0x18000000000002a0, 0x2b, 0xffffff68, &(0x7f0000000500)="b9ff0300600d698cb89e14f088a81fffffff00004000630677fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) r14 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0xb, 0x202, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"/4098, @ANYRES32=r11, @ANYRESOCT=r2, @ANYRES32=r6], &(0x7f00000002c0)='syzkaller\x00', 0xa8f, 0x0, 0x0, 0x41100, 0x8, [], 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000580)={0x1, 0xc, 0x80, 0x4}, 0x10}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r8, 0x89e0, &(0x7f0000000500)={r6, r14}) socketpair(0x0, 0x0, 0x0, 0x0) [ 2536.464642][T14910] FAULT_INJECTION: forcing a failure. [ 2536.464642][T14910] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2536.477964][T14910] CPU: 1 PID: 14910 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2536.486619][T14910] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2536.496649][T14910] Call Trace: [ 2536.499918][T14910] dump_stack+0x197/0x210 [ 2536.504256][T14910] should_fail.cold+0xa/0x15 [ 2536.508912][T14910] ? fault_create_debugfs_attr+0x180/0x180 [ 2536.514691][T14910] ? ___might_sleep+0x163/0x2c0 [ 2536.519541][T14910] should_fail_alloc_page+0x50/0x60 [ 2536.524726][T14910] __alloc_pages_nodemask+0x1a1/0x910 [ 2536.530072][T14910] ? find_held_lock+0x35/0x130 [ 2536.534812][T14910] ? __alloc_pages_slowpath+0x2920/0x2920 [ 2536.540517][T14910] ? lock_downgrade+0x920/0x920 [ 2536.545360][T14910] ? rwlock_bug.part.0+0x90/0x90 [ 2536.550284][T14910] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2536.556504][T14910] alloc_pages_current+0x107/0x210 [ 2536.561593][T14910] __get_free_pages+0xc/0x40 [ 2536.566160][T14910] kasan_populate_vmalloc_pte+0x2f/0x1c0 [ 2536.571793][T14910] apply_to_page_range+0x445/0x700 [ 2536.576900][T14910] ? memset+0x40/0x40 [ 2536.580872][T14910] kasan_populate_vmalloc+0x68/0x90 [ 2536.586043][T14910] pcpu_get_vm_areas+0x3c5f/0x3ee0 [ 2536.591164][T14910] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2536.597403][T14910] pcpu_create_chunk+0x24e/0x7f0 [ 2536.602313][T14910] pcpu_alloc+0x10f3/0x1380 [ 2536.606792][T14910] ? pcpu_alloc_area+0x820/0x820 [ 2536.611724][T14910] ? bpf_map_area_alloc+0x20/0x30 [ 2536.616855][T14910] __alloc_percpu_gfp+0x28/0x30 [ 2536.621688][T14910] htab_map_alloc+0xdb9/0x11c0 [ 2536.626445][T14910] ? htab_map_update_elem+0xca0/0xca0 [ 2536.631807][T14910] __do_sys_bpf+0x478/0x3810 [ 2536.636393][T14910] ? bpf_prog_load+0x18f0/0x18f0 [ 2536.641303][T14910] ? __kasan_check_write+0x14/0x20 [ 2536.646391][T14910] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2536.651932][T14910] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2536.657191][T14910] ? wait_for_completion+0x440/0x440 [ 2536.662468][T14910] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2536.668698][T14910] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2536.674132][T14910] ? do_syscall_64+0x26/0x790 [ 2536.678783][T14910] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2536.684824][T14910] ? do_syscall_64+0x26/0x790 [ 2536.689504][T14910] __x64_sys_bpf+0x73/0xb0 [ 2536.693897][T14910] do_syscall_64+0xfa/0x790 [ 2536.698382][T14910] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2536.704250][T14910] RIP: 0033:0x45a909 [ 2536.708124][T14910] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2536.727711][T14910] RSP: 002b:00007f5b93d49c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2536.736125][T14910] RAX: ffffffffffffffda RBX: 00007f5b93d49c90 RCX: 000000000045a909 [ 2536.744092][T14910] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2536.752042][T14910] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2536.759997][T14910] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d4a6d4 [ 2536.767949][T14910] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 [ 2536.779392][T14910] ================================================================== [ 2536.787724][T14910] BUG: KASAN: vmalloc-out-of-bounds in pcpu_alloc+0x589/0x1380 [ 2536.795344][T14910] Write of size 30848 at addr ffffe8ffffa00000 by task syz-executor.1/14910 [ 2536.803991][T14910] [ 2536.806312][T14910] CPU: 1 PID: 14910 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2536.814949][T14910] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2536.824980][T14910] Call Trace: [ 2536.828245][T14910] dump_stack+0x197/0x210 [ 2536.832546][T14910] ? pcpu_alloc+0x589/0x1380 [ 2536.837114][T14910] print_address_description.constprop.0.cold+0x5/0x30b [ 2536.844054][T14910] ? pcpu_alloc+0x589/0x1380 [ 2536.848625][T14910] ? pcpu_alloc+0x589/0x1380 [ 2536.853193][T14910] __kasan_report.cold+0x1b/0x41 [ 2536.858108][T14910] ? pcpu_alloc+0x589/0x1380 [ 2536.862676][T14910] kasan_report+0x12/0x20 [ 2536.866996][T14910] check_memory_region+0x134/0x1a0 [ 2536.872096][T14910] memset+0x24/0x40 [ 2536.875905][T14910] pcpu_alloc+0x589/0x1380 [ 2536.880337][T14910] ? pcpu_alloc_area+0x820/0x820 [ 2536.885261][T14910] ? bpf_map_area_alloc+0x20/0x30 [ 2536.890300][T14910] __alloc_percpu_gfp+0x28/0x30 [ 2536.895139][T14910] htab_map_alloc+0xdb9/0x11c0 [ 2536.899884][T14910] ? htab_map_update_elem+0xca0/0xca0 [ 2536.905231][T14910] __do_sys_bpf+0x478/0x3810 [ 2536.909835][T14910] ? bpf_prog_load+0x18f0/0x18f0 [ 2536.914758][T14910] ? __kasan_check_write+0x14/0x20 [ 2536.919873][T14910] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2536.925418][T14910] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2536.930691][T14910] ? wait_for_completion+0x440/0x440 [ 2536.935960][T14910] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2536.942206][T14910] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2536.947652][T14910] ? do_syscall_64+0x26/0x790 [ 2536.952336][T14910] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2536.958385][T14910] ? do_syscall_64+0x26/0x790 [ 2536.963100][T14910] __x64_sys_bpf+0x73/0xb0 [ 2536.967492][T14910] do_syscall_64+0xfa/0x790 [ 2536.971971][T14910] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2536.977860][T14910] RIP: 0033:0x45a909 [ 2536.981746][T14910] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2537.001434][T14910] RSP: 002b:00007f5b93d49c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2537.009840][T14910] RAX: ffffffffffffffda RBX: 00007f5b93d49c90 RCX: 000000000045a909 [ 2537.017824][T14910] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2537.025774][T14910] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2537.033730][T14910] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d4a6d4 [ 2537.041674][T14910] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 [ 2537.049627][T14910] [ 2537.051927][T14910] [ 2537.054232][T14910] Memory state around the buggy address: [ 2537.059854][T14910] BUG: unable to handle page fault for address: fffff91ffff3ffe0 [ 2537.067539][T14910] #PF: supervisor read access in kernel mode [ 2537.073488][T14910] #PF: error_code(0x0000) - not-present page [ 2537.079435][T14910] PGD 21ffe6067 P4D 21ffe6067 PUD aa56c067 PMD aa56d067 PTE 0 [ 2537.086870][T14910] Oops: 0000 [#1] PREEMPT SMP KASAN [ 2537.092076][T14910] CPU: 1 PID: 14910 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 2537.100720][T14910] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2537.110763][T14910] RIP: 0010:memcpy_erms+0x6/0x10 [ 2537.115683][T14910] Code: cc cc cc cc eb 1e 0f 1f 00 48 89 f8 48 89 d1 48 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 c3 66 0f 1f 44 00 00 48 89 f8 48 89 d1 a4 c3 0f 1f 80 00 00 00 00 48 89 f8 48 83 fa 20 72 7e 40 38 fe [ 2537.135267][T14910] RSP: 0018:ffffc9000603f990 EFLAGS: 00010082 [ 2537.141318][T14910] RAX: ffffc9000603f99c RBX: fffff91ffff3ffe0 RCX: 0000000000000010 [ 2537.149266][T14910] RDX: 0000000000000010 RSI: fffff91ffff3ffe0 RDI: ffffc9000603f99c [ 2537.157215][T14910] RBP: ffffc9000603f9f0 R08: ffff88809815c0c0 R09: fffff52000c07f38 03:41:32 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_type(r0, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000380)='cpuset.mems\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x30863, 0x0) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0xfffffc61) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000240)={'hwsim0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f00000000c0)={'hwsim0\x00', @random="0894f53e01dc"}) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)={0xffff, 0x5}, 0xc) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup\x00\f\x7f\xd9\xfa;\x8b\x88gb\xefi\x16\x91\xbb\xc4\xd5Jk\tU~ \xa4\vR\\\x8a\xdb\xcel\xe0\xa3[\xae\x9d\xac\x84\x9f\v\x9e\x9f\r\x10\x1f\xd3\x80\xc1\xccq\xab\x01y\xed\xfc\x96)\xf6_>+\xa03\xf4\xcc0\xbbE\xb0\xc3\x94\xd53\x87\xd6\xc4\\\xc7\x82\xe9\xaf\xb5\xb6\x15\xf4K2\x17\f\x98\x1c\xebq/\xf5\x81#\x85\xc5\xa0\xfd\xfac\xd9\xf2c`\xe9[c\a\x12\x1bb\x82\x83\x86d\xf0k\xa8\x90\x06\xa8\x1cK\xea\x19\x91\a1z)\xde_r`\xee\xb6\x9e\xcb\x05\x00\x00\x82\xa1\t\xc9\x05\xcc^', 0x200002, 0x0) r4 = openat$cgroup_int(r3, 0x0, 0x2, 0x0) write$cgroup_int(r4, 0x0, 0x0) 03:41:32 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) close(r0) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x3, 0x1, 0x0, 0x4, {0xa, 0x4e20, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x10000}}}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000640)="f4001100002b3c25fe8000000000000005baa68754ba00e8c1344f3e62d76c27e800004102ffffff8880", 0x2a}], 0x1}, 0x0) [ 2537.165163][T14910] R10: fffff52000c07f37 R11: ffffc9000603f9be R12: fffff91ffff40000 [ 2537.173242][T14910] R13: 0000200000000000 R14: 00000000fffffffe R15: ffff88821fffd100 [ 2537.181190][T14910] FS: 00007f5b93d4a700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 2537.190100][T14910] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2537.196676][T14910] CR2: fffff91ffff3ffe0 CR3: 0000000097c3f000 CR4: 00000000001406e0 [ 2537.204647][T14910] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2537.212608][T14910] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2537.220561][T14910] Call Trace: [ 2537.223922][T14910] ? print_shadow_for_address+0x91/0x117 [ 2537.229526][T14910] ? pcpu_alloc+0x589/0x1380 [ 2537.234087][T14910] ? pcpu_alloc+0x589/0x1380 [ 2537.238683][T14910] ? pcpu_alloc+0x589/0x1380 [ 2537.243336][T14910] ? pcpu_alloc+0x589/0x1380 [ 2537.247899][T14910] __kasan_report.cold+0x30/0x41 [ 2537.252815][T14910] ? pcpu_alloc+0x589/0x1380 [ 2537.257382][T14910] kasan_report+0x12/0x20 [ 2537.261687][T14910] check_memory_region+0x134/0x1a0 [ 2537.266776][T14910] memset+0x24/0x40 [ 2537.270559][T14910] pcpu_alloc+0x589/0x1380 [ 2537.274958][T14910] ? pcpu_alloc_area+0x820/0x820 [ 2537.279868][T14910] ? bpf_map_area_alloc+0x20/0x30 [ 2537.284880][T14910] __alloc_percpu_gfp+0x28/0x30 [ 2537.289732][T14910] htab_map_alloc+0xdb9/0x11c0 [ 2537.294510][T14910] ? htab_map_update_elem+0xca0/0xca0 [ 2537.299852][T14910] __do_sys_bpf+0x478/0x3810 [ 2537.304416][T14910] ? bpf_prog_load+0x18f0/0x18f0 [ 2537.309543][T14910] ? __kasan_check_write+0x14/0x20 [ 2537.314635][T14910] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 2537.320167][T14910] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 2537.325428][T14910] ? wait_for_completion+0x440/0x440 [ 2537.330686][T14910] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2537.336991][T14910] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2537.342526][T14910] ? do_syscall_64+0x26/0x790 [ 2537.347298][T14910] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2537.353335][T14910] ? do_syscall_64+0x26/0x790 [ 2537.358074][T14910] __x64_sys_bpf+0x73/0xb0 [ 2537.362491][T14910] do_syscall_64+0xfa/0x790 [ 2537.367088][T14910] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2537.372952][T14910] RIP: 0033:0x45a909 [ 2537.376829][T14910] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2537.396405][T14910] RSP: 002b:00007f5b93d49c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2537.404801][T14910] RAX: ffffffffffffffda RBX: 00007f5b93d49c90 RCX: 000000000045a909 [ 2537.412894][T14910] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 2537.420851][T14910] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 2537.428826][T14910] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5b93d4a6d4 [ 2537.436829][T14910] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000007 [ 2537.444808][T14910] Modules linked in: [ 2537.448676][T14910] CR2: fffff91ffff3ffe0 [ 2537.452808][T14910] ---[ end trace 6ecf2086ebf9741d ]--- [ 2537.458243][T14910] RIP: 0010:memcpy_erms+0x6/0x10 [ 2537.463152][T14910] Code: cc cc cc cc eb 1e 0f 1f 00 48 89 f8 48 89 d1 48 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 c3 66 0f 1f 44 00 00 48 89 f8 48 89 d1 a4 c3 0f 1f 80 00 00 00 00 48 89 f8 48 83 fa 20 72 7e 40 38 fe [ 2537.482732][T14910] RSP: 0018:ffffc9000603f990 EFLAGS: 00010082 [ 2537.488767][T14910] RAX: ffffc9000603f99c RBX: fffff91ffff3ffe0 RCX: 0000000000000010 [ 2537.496709][T14910] RDX: 0000000000000010 RSI: fffff91ffff3ffe0 RDI: ffffc9000603f99c [ 2537.504661][T14910] RBP: ffffc9000603f9f0 R08: ffff88809815c0c0 R09: fffff52000c07f38 [ 2537.512602][T14910] R10: fffff52000c07f37 R11: ffffc9000603f9be R12: fffff91ffff40000 [ 2537.520545][T14910] R13: 0000200000000000 R14: 00000000fffffffe R15: ffff88821fffd100 [ 2537.528490][T14910] FS: 00007f5b93d4a700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 2537.537418][T14910] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2537.543973][T14910] CR2: fffff91ffff3ffe0 CR3: 0000000097c3f000 CR4: 00000000001406e0 [ 2537.551925][T14910] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2537.559877][T14910] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2537.567819][T14910] Kernel panic - not syncing: Fatal exception [ 2537.575049][T14910] Kernel Offset: disabled [ 2537.579365][T14910] Rebooting in 86400 seconds..