n_check_write+0x14/0x20 [ 602.874146][ T9714] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 602.874163][ T9714] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 602.874187][ T9714] ? wait_for_completion+0x440/0x440 [ 602.900327][ T9714] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 602.906615][ T9714] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 602.912089][ T9714] ? do_syscall_64+0x26/0x790 [ 602.916780][ T9714] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 602.922951][ T9714] ? do_syscall_64+0x26/0x790 [ 602.927663][ T9714] __x64_sys_bpf+0x73/0xb0 [ 602.932100][ T9714] do_syscall_64+0xfa/0x790 [ 602.936628][ T9714] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 602.942532][ T9714] RIP: 0033:0x45a919 [ 602.946444][ T9714] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 602.969620][ T9714] RSP: 002b:00007f565edffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 602.978050][ T9714] RAX: ffffffffffffffda RBX: 00007f565edffc90 RCX: 000000000045a919 [ 602.986036][ T9714] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 602.994025][ T9714] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 603.002010][ T9714] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f565ee006d4 [ 603.009995][ T9714] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 04:51:13 executing program 3 (fault-call:7 fault-nth:21): socketpair(0x0, 0x0, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 04:51:13 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1, 0xef, 0x209e21, 0x100008000000001}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f00000000c0), &(0x7f0000000180)}, 0x20) 04:51:13 executing program 4: socketpair(0x1f, 0x9010000, 0x0, &(0x7f00000000c0)) 04:51:13 executing program 1: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) r2 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) sendmsg$kcm(r5, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r5, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:13 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10, 0xff000000}, 0x0) 04:51:13 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x20010020}], 0x1, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18}, 0xfc) [ 603.359006][ T9750] FAULT_INJECTION: forcing a failure. [ 603.359006][ T9750] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 603.393539][ C1] net_ratelimit: 10 callbacks suppressed [ 603.393589][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 603.406014][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:51:13 executing program 4: socketpair(0x1f, 0xa000000, 0x0, &(0x7f00000000c0)) 04:51:13 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x7ffff000}], 0x1, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18}, 0xfc) 04:51:13 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10, 0xffff1f00}, 0x0) [ 603.412504][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 603.418426][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 603.442726][ T9750] CPU: 0 PID: 9750 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 603.451346][ T9750] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 603.461418][ T9750] Call Trace: [ 603.464733][ T9750] dump_stack+0x197/0x210 [ 603.469097][ T9750] should_fail.cold+0xa/0x15 [ 603.473718][ T9750] ? fault_create_debugfs_attr+0x180/0x180 [ 603.479541][ T9750] ? ___might_sleep+0x163/0x2c0 [ 603.484434][ T9750] should_fail_alloc_page+0x50/0x60 [ 603.489650][ T9750] __alloc_pages_nodemask+0x1a1/0x910 [ 603.495053][ T9750] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 603.500626][ T9750] ? __alloc_pages_slowpath+0x2920/0x2920 [ 603.506387][ T9750] ? kasan_unpoison_shadow+0x35/0x50 [ 603.511698][ T9750] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 603.517972][ T9750] alloc_pages_current+0x107/0x210 [ 603.523095][ T9750] ? ___might_sleep+0x163/0x2c0 [ 603.527967][ T9750] __vmalloc_node_range+0x4f8/0x810 [ 603.533212][ T9750] ? bpf_map_area_alloc+0x20/0x30 [ 603.538250][ T9750] __vmalloc_node_flags_caller+0x71/0x90 [ 603.543894][ T9750] ? bpf_map_area_alloc+0x20/0x30 [ 603.548937][ T9750] __bpf_map_area_alloc+0xde/0xf0 [ 603.554091][ T9750] bpf_map_area_alloc+0x20/0x30 [ 603.558967][ T9750] htab_map_alloc+0x8d3/0x11c0 04:51:14 executing program 2: r0 = socket$kcm(0x2, 0x2000000000003, 0x2) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x0, @empty}, 0x10, 0x0}, 0x24008008) [ 603.563793][ T9750] ? htab_map_update_elem+0xca0/0xca0 [ 603.569191][ T9750] __do_sys_bpf+0x478/0x3810 [ 603.573815][ T9750] ? bpf_prog_load+0x18f0/0x18f0 [ 603.578777][ T9750] ? __kasan_check_write+0x14/0x20 [ 603.583914][ T9750] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 603.589472][ T9750] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 603.594780][ T9750] ? wait_for_completion+0x440/0x440 [ 603.600102][ T9750] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 603.606390][ T9750] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 603.611869][ T9750] ? do_syscall_64+0x26/0x790 [ 603.616567][ T9750] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 603.622638][ T9750] ? do_syscall_64+0x26/0x790 [ 603.622670][ T9750] __x64_sys_bpf+0x73/0xb0 [ 603.622691][ T9750] do_syscall_64+0xfa/0x790 [ 603.622717][ T9750] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 603.622732][ T9750] RIP: 0033:0x45a919 [ 603.622750][ T9750] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 603.622759][ T9750] RSP: 002b:00007f565edffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 603.636327][ T9750] RAX: ffffffffffffffda RBX: 00007f565edffc90 RCX: 000000000045a919 [ 603.682057][ T9750] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 603.691617][ T9750] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 603.699598][ T9750] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f565ee006d4 [ 603.707581][ T9750] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 04:51:14 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10, 0xfffffffd}, 0x0) 04:51:14 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xfffffdef}], 0x1, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18}, 0xfc) 04:51:14 executing program 4: socketpair(0x1f, 0xa010000, 0x0, &(0x7f00000000c0)) 04:51:14 executing program 3 (fault-call:7 fault-nth:22): socketpair(0x0, 0x0, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 04:51:14 executing program 1: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) r2 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) sendmsg$kcm(r5, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r5, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:14 executing program 2: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) r2 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) sendmsg$kcm(r5, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r5, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="0b08da6e96e9af8e50e8aeea267d45fc47d2e6f37dfc3aec5247f245d2e51d3c3e73be1a04b9f7f28b07d631f6b73ce58543acc3f03b49636b862d4f99bb20b6d70fc0f4e863d2868516b94ad8ffb9ed41cb944234444dc51b2251cebcd04e3734bd34ac8718dab51d12778b5071f0635ba4e3395e65d1dee3c671bf9357c2a5b365639d917494b38c9f70bd691356de5da68ff827e64236afbd4ec381715dbc8d06c0999516342a02189274e0a4da97c7e098ed6cc696451a824516c5c7e59d734d0923daffb51e63b4e0011fe1e3f98ef6d615c96d8e74095831238f13b6bd7985e2b2c8db7f9d10e021f338e6038f31832d715885b0612c0c", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:14 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10, 0xffffffff}, 0x0) 04:51:14 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffffffe0}], 0x1, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18}, 0xfc) 04:51:14 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0x2) 04:51:14 executing program 4: socketpair(0x1f, 0xb000000, 0x0, &(0x7f00000000c0)) 04:51:14 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x2, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18}, 0xfc) [ 604.272718][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 604.278553][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 604.284447][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 604.290233][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 604.337252][ T9798] FAULT_INJECTION: forcing a failure. [ 604.337252][ T9798] name fail_page_alloc, interval 1, probability 0, space 0, times 0 04:51:14 executing program 4: socketpair(0x1f, 0xb010000, 0x0, &(0x7f00000000c0)) [ 604.426706][ T9798] CPU: 0 PID: 9798 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 604.435342][ T9798] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 604.445404][ T9798] Call Trace: [ 604.448708][ T9798] dump_stack+0x197/0x210 [ 604.453063][ T9798] should_fail.cold+0xa/0x15 [ 604.457669][ T9798] ? fault_create_debugfs_attr+0x180/0x180 [ 604.463485][ T9798] ? ___might_sleep+0x163/0x2c0 [ 604.468357][ T9798] should_fail_alloc_page+0x50/0x60 04:51:14 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x3, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18}, 0xfc) [ 604.473564][ T9798] __alloc_pages_nodemask+0x1a1/0x910 [ 604.478955][ T9798] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 604.484508][ T9798] ? __alloc_pages_slowpath+0x2920/0x2920 [ 604.490242][ T9798] ? kasan_unpoison_shadow+0x35/0x50 [ 604.495530][ T9798] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 604.495551][ T9798] alloc_pages_current+0x107/0x210 [ 604.495565][ T9798] ? ___might_sleep+0x163/0x2c0 [ 604.495586][ T9798] __vmalloc_node_range+0x4f8/0x810 [ 604.495610][ T9798] ? bpf_map_area_alloc+0x20/0x30 [ 604.495628][ T9798] __vmalloc_node_flags_caller+0x71/0x90 [ 604.516992][ T9798] ? bpf_map_area_alloc+0x20/0x30 [ 604.532627][ T9798] __bpf_map_area_alloc+0xde/0xf0 [ 604.537664][ T9798] bpf_map_area_alloc+0x20/0x30 [ 604.542522][ T9798] htab_map_alloc+0x8d3/0x11c0 [ 604.547414][ T9798] ? htab_map_update_elem+0xca0/0xca0 [ 604.552844][ T9798] __do_sys_bpf+0x478/0x3810 [ 604.552878][ T9798] ? bpf_prog_load+0x18f0/0x18f0 [ 604.552894][ T9798] ? __kasan_check_write+0x14/0x20 [ 604.552911][ T9798] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 604.552926][ T9798] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 604.552945][ T9798] ? wait_for_completion+0x440/0x440 [ 604.552968][ T9798] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 604.552998][ T9798] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 604.567604][ T9798] ? do_syscall_64+0x26/0x790 [ 604.600083][ T9798] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 604.606163][ T9798] ? do_syscall_64+0x26/0x790 [ 604.610862][ T9798] __x64_sys_bpf+0x73/0xb0 [ 604.615328][ T9798] do_syscall_64+0xfa/0x790 [ 604.619985][ T9798] entry_SYSCALL_64_after_hwframe+0x49/0xbe 04:51:15 executing program 4: socketpair(0x1f, 0xc000000, 0x0, &(0x7f00000000c0)) [ 604.625882][ T9798] RIP: 0033:0x45a919 [ 604.629788][ T9798] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 604.649428][ T9798] RSP: 002b:00007f565eddec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 604.657848][ T9798] RAX: ffffffffffffffda RBX: 00007f565eddec90 RCX: 000000000045a919 [ 604.665824][ T9798] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 604.673808][ T9798] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 604.681788][ T9798] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f565eddf6d4 [ 604.689867][ T9798] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 04:51:15 executing program 3 (fault-call:7 fault-nth:23): socketpair(0x0, 0x0, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 04:51:15 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x4, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18}, 0xfc) 04:51:15 executing program 1: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) r2 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) sendmsg$kcm(r5, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r5, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:15 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0x3) 04:51:15 executing program 2: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) r2 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) sendmsg$kcm(r5, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r5, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:15 executing program 4: socketpair(0x1f, 0xc010000, 0x0, &(0x7f00000000c0)) 04:51:15 executing program 4: socketpair(0x1f, 0xd000000, 0x0, &(0x7f00000000c0)) 04:51:15 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x5, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18}, 0xfc) 04:51:15 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0x4) [ 605.084394][ T9827] FAULT_INJECTION: forcing a failure. [ 605.084394][ T9827] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 605.193353][ T9827] CPU: 1 PID: 9827 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 605.201986][ T9827] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 605.212053][ T9827] Call Trace: [ 605.215363][ T9827] dump_stack+0x197/0x210 [ 605.219709][ T9827] should_fail.cold+0xa/0x15 [ 605.224322][ T9827] ? fault_create_debugfs_attr+0x180/0x180 [ 605.230138][ T9827] ? ___might_sleep+0x163/0x2c0 [ 605.235013][ T9827] should_fail_alloc_page+0x50/0x60 [ 605.240227][ T9827] __alloc_pages_nodemask+0x1a1/0x910 [ 605.245614][ T9827] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 605.251176][ T9827] ? __alloc_pages_slowpath+0x2920/0x2920 [ 605.256919][ T9827] ? kasan_unpoison_shadow+0x35/0x50 [ 605.256937][ T9827] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 605.256956][ T9827] alloc_pages_current+0x107/0x210 [ 605.256975][ T9827] ? ___might_sleep+0x163/0x2c0 [ 605.279727][ T9827] __vmalloc_node_range+0x4f8/0x810 [ 605.284956][ T9827] ? bpf_map_area_alloc+0x20/0x30 [ 605.289991][ T9827] __vmalloc_node_flags_caller+0x71/0x90 [ 605.295637][ T9827] ? bpf_map_area_alloc+0x20/0x30 [ 605.300675][ T9827] __bpf_map_area_alloc+0xde/0xf0 [ 605.305708][ T9827] bpf_map_area_alloc+0x20/0x30 [ 605.310569][ T9827] htab_map_alloc+0x8d3/0x11c0 [ 605.315354][ T9827] ? htab_map_update_elem+0xca0/0xca0 [ 605.320732][ T9827] __do_sys_bpf+0x478/0x3810 [ 605.325333][ T9827] ? bpf_prog_load+0x18f0/0x18f0 [ 605.330279][ T9827] ? __kasan_check_write+0x14/0x20 [ 605.335397][ T9827] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 605.340940][ T9827] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 605.346224][ T9827] ? wait_for_completion+0x440/0x440 [ 605.346248][ T9827] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 605.346277][ T9827] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 605.363213][ T9827] ? do_syscall_64+0x26/0x790 [ 605.367905][ T9827] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 605.373981][ T9827] ? do_syscall_64+0x26/0x790 [ 605.378671][ T9827] __x64_sys_bpf+0x73/0xb0 [ 605.383092][ T9827] do_syscall_64+0xfa/0x790 [ 605.387603][ T9827] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 605.393500][ T9827] RIP: 0033:0x45a919 [ 605.397389][ T9827] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 605.417000][ T9827] RSP: 002b:00007f565edffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 605.425416][ T9827] RAX: ffffffffffffffda RBX: 00007f565edffc90 RCX: 000000000045a919 [ 605.433394][ T9827] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 04:51:15 executing program 4: socketpair(0x1f, 0xd010000, 0x0, &(0x7f00000000c0)) 04:51:15 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0x8) 04:51:15 executing program 4: socketpair(0x1f, 0xe000000, 0x0, &(0x7f00000000c0)) [ 605.441373][ T9827] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 605.449353][ T9827] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f565ee006d4 [ 605.457336][ T9827] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 [ 605.473436][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 605.480176][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:51:16 executing program 3 (fault-call:7 fault-nth:24): socketpair(0x0, 0x0, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 04:51:16 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0xa) 04:51:16 executing program 4: socketpair(0x1f, 0xe010000, 0x0, &(0x7f00000000c0)) 04:51:16 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x6, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18}, 0xfc) 04:51:16 executing program 1: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) r2 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) sendmsg$kcm(r5, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r5, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:16 executing program 2: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) r2 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) sendmsg$kcm(r5, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r5, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:16 executing program 4: socketpair(0x1f, 0xf000000, 0x0, &(0x7f00000000c0)) 04:51:16 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0xfc) [ 605.803200][ T9868] FAULT_INJECTION: forcing a failure. [ 605.803200][ T9868] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 605.842939][ T9868] CPU: 1 PID: 9868 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 605.851567][ T9868] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 605.861632][ T9868] Call Trace: [ 605.864939][ T9868] dump_stack+0x197/0x210 [ 605.869294][ T9868] should_fail.cold+0xa/0x15 [ 605.873903][ T9868] ? fault_create_debugfs_attr+0x180/0x180 [ 605.879724][ T9868] ? ___might_sleep+0x163/0x2c0 [ 605.884585][ T9868] should_fail_alloc_page+0x50/0x60 [ 605.889772][ T9868] __alloc_pages_nodemask+0x1a1/0x910 [ 605.895137][ T9868] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 605.900671][ T9868] ? __alloc_pages_slowpath+0x2920/0x2920 [ 605.906382][ T9868] ? kasan_unpoison_shadow+0x35/0x50 [ 605.911653][ T9868] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 605.917883][ T9868] alloc_pages_current+0x107/0x210 [ 605.922978][ T9868] ? ___might_sleep+0x163/0x2c0 [ 605.927822][ T9868] __vmalloc_node_range+0x4f8/0x810 [ 605.933014][ T9868] ? bpf_map_area_alloc+0x20/0x30 [ 605.938040][ T9868] __vmalloc_node_flags_caller+0x71/0x90 [ 605.943658][ T9868] ? bpf_map_area_alloc+0x20/0x30 [ 605.948668][ T9868] __bpf_map_area_alloc+0xde/0xf0 [ 605.953681][ T9868] bpf_map_area_alloc+0x20/0x30 [ 605.958515][ T9868] htab_map_alloc+0x8d3/0x11c0 [ 605.963375][ T9868] ? htab_map_update_elem+0xca0/0xca0 [ 605.968734][ T9868] __do_sys_bpf+0x478/0x3810 [ 605.973328][ T9868] ? bpf_prog_load+0x18f0/0x18f0 [ 605.978267][ T9868] ? __kasan_check_write+0x14/0x20 [ 605.983364][ T9868] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 605.988906][ T9868] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 605.994177][ T9868] ? wait_for_completion+0x440/0x440 [ 605.999540][ T9868] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 606.005776][ T9868] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 606.011222][ T9868] ? do_syscall_64+0x26/0x790 [ 606.015881][ T9868] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 606.021940][ T9868] ? do_syscall_64+0x26/0x790 [ 606.026606][ T9868] __x64_sys_bpf+0x73/0xb0 [ 606.031009][ T9868] do_syscall_64+0xfa/0x790 [ 606.035500][ T9868] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 606.041375][ T9868] RIP: 0033:0x45a919 [ 606.045257][ T9868] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 606.064846][ T9868] RSP: 002b:00007f565edffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 606.073242][ T9868] RAX: ffffffffffffffda RBX: 00007f565edffc90 RCX: 000000000045a919 [ 606.081195][ T9868] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 606.089150][ T9868] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 04:51:16 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x7, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18}, 0xfc) 04:51:16 executing program 4: socketpair(0x1f, 0xf010000, 0x0, &(0x7f00000000c0)) [ 606.097102][ T9868] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f565ee006d4 [ 606.105059][ T9868] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 04:51:16 executing program 1: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) r2 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) sendmsg$kcm(r5, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r5, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:16 executing program 4: socketpair(0x1f, 0x10000000, 0x0, &(0x7f00000000c0)) 04:51:16 executing program 3 (fault-call:7 fault-nth:25): socketpair(0x0, 0x0, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 04:51:16 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0x12c) 04:51:16 executing program 2: socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0xa, 0x300) r1 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) 04:51:16 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x8, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18}, 0xfc) 04:51:16 executing program 4: socketpair(0x1f, 0x10010000, 0x0, &(0x7f00000000c0)) 04:51:16 executing program 1: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) r2 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) sendmsg$kcm(r5, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r5, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:17 executing program 4: socketpair(0x1f, 0x11000000, 0x0, &(0x7f00000000c0)) 04:51:17 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0x300) 04:51:17 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x9, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18}, 0xfc) [ 606.764825][ T9906] FAULT_INJECTION: forcing a failure. [ 606.764825][ T9906] name fail_page_alloc, interval 1, probability 0, space 0, times 0 04:51:17 executing program 2: socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0xa, 0x300) r1 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="0b08da6e96e9af8e50e8aeea267d45fc47d2e6f37dfc3aec5247f245d2e51d3c3e73be1a04b9f7f28b07d631f6b73ce58543acc3f03b49636b862d4f99bb20b6d70fc0f4e863d2868516b94ad8ffb9ed41cb944234444dc51b2251cebcd04e3734bd34ac8718dab51d12778b5071f0635ba4e3395e65d1dee3c671bf9357c2a5b365639d917494b38c9f70bd691356de5da68ff827e64236afbd4ec381715dbc8d06c0999516342a02189274e0a4da97c7e098ed6cc696451a824516c5c7e59d734d0923daffb51e63b4e0011fe1e3f98ef6d615c96d8e74095831238f13b6bd7985e2b2c8db7f9d10e021f338e6038f31832d715885b0612c0c", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) [ 606.883188][ T9906] CPU: 1 PID: 9906 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 606.891814][ T9906] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 606.901884][ T9906] Call Trace: [ 606.905194][ T9906] dump_stack+0x197/0x210 [ 606.909546][ T9906] should_fail.cold+0xa/0x15 [ 606.914159][ T9906] ? fault_create_debugfs_attr+0x180/0x180 [ 606.919985][ T9906] ? ___might_sleep+0x163/0x2c0 [ 606.924864][ T9906] should_fail_alloc_page+0x50/0x60 [ 606.930070][ T9906] __alloc_pages_nodemask+0x1a1/0x910 [ 606.935447][ T9906] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 606.935468][ T9906] ? __alloc_pages_slowpath+0x2920/0x2920 [ 606.935491][ T9906] ? kasan_unpoison_shadow+0x35/0x50 [ 606.952005][ T9906] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 606.958257][ T9906] alloc_pages_current+0x107/0x210 [ 606.958271][ T9906] ? ___might_sleep+0x163/0x2c0 [ 606.958291][ T9906] __vmalloc_node_range+0x4f8/0x810 [ 606.973435][ T9906] ? bpf_map_area_alloc+0x20/0x30 [ 606.978472][ T9906] __vmalloc_node_flags_caller+0x71/0x90 [ 606.984114][ T9906] ? bpf_map_area_alloc+0x20/0x30 [ 606.989154][ T9906] __bpf_map_area_alloc+0xde/0xf0 [ 606.994199][ T9906] bpf_map_area_alloc+0x20/0x30 [ 606.999066][ T9906] htab_map_alloc+0x8d3/0x11c0 [ 607.003891][ T9906] ? htab_map_update_elem+0xca0/0xca0 [ 607.009272][ T9906] __do_sys_bpf+0x478/0x3810 [ 607.013876][ T9906] ? bpf_prog_load+0x18f0/0x18f0 [ 607.018818][ T9906] ? __kasan_check_write+0x14/0x20 [ 607.023929][ T9906] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 607.023945][ T9906] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 607.023963][ T9906] ? wait_for_completion+0x440/0x440 [ 607.023989][ T9906] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 607.046314][ T9906] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 607.051785][ T9906] ? do_syscall_64+0x26/0x790 [ 607.056468][ T9906] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 607.062540][ T9906] ? do_syscall_64+0x26/0x790 [ 607.067237][ T9906] __x64_sys_bpf+0x73/0xb0 [ 607.071666][ T9906] do_syscall_64+0xfa/0x790 [ 607.076181][ T9906] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 607.082080][ T9906] RIP: 0033:0x45a919 [ 607.085982][ T9906] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 607.105594][ T9906] RSP: 002b:00007f565edffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 607.114018][ T9906] RAX: ffffffffffffffda RBX: 00007f565edffc90 RCX: 000000000045a919 [ 607.121998][ T9906] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 04:51:17 executing program 4: socketpair(0x1f, 0x11010000, 0x0, &(0x7f00000000c0)) 04:51:17 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0x5dc) [ 607.129979][ T9906] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 607.137961][ T9906] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f565ee006d4 [ 607.145937][ T9906] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 04:51:17 executing program 3 (fault-call:7 fault-nth:26): socketpair(0x0, 0x0, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 04:51:17 executing program 4: socketpair(0x1f, 0x12000000, 0x0, &(0x7f00000000c0)) 04:51:17 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0xa00) 04:51:17 executing program 1: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) r2 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) sendmsg$kcm(r5, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r5, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:17 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0xa, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18}, 0xfc) 04:51:17 executing program 2: socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0xa, 0x300) r1 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) 04:51:17 executing program 4: socketpair(0x1f, 0x12010000, 0x0, &(0x7f00000000c0)) 04:51:17 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0x2000) [ 607.476925][ T9946] FAULT_INJECTION: forcing a failure. [ 607.476925][ T9946] name fail_page_alloc, interval 1, probability 0, space 0, times 0 04:51:17 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0xb, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18}, 0xfc) [ 607.553694][ T9946] CPU: 1 PID: 9946 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 607.562431][ T9946] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 607.562444][ T9946] Call Trace: [ 607.575804][ T9946] dump_stack+0x197/0x210 [ 607.580152][ T9946] should_fail.cold+0xa/0x15 [ 607.584768][ T9946] ? fault_create_debugfs_attr+0x180/0x180 [ 607.590589][ T9946] ? ___might_sleep+0x163/0x2c0 [ 607.595466][ T9946] should_fail_alloc_page+0x50/0x60 [ 607.600678][ T9946] __alloc_pages_nodemask+0x1a1/0x910 [ 607.606059][ T9946] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 607.611623][ T9946] ? __alloc_pages_slowpath+0x2920/0x2920 [ 607.617365][ T9946] ? kasan_unpoison_shadow+0x35/0x50 [ 607.622651][ T9946] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 607.622672][ T9946] alloc_pages_current+0x107/0x210 [ 607.622686][ T9946] ? ___might_sleep+0x163/0x2c0 [ 607.622706][ T9946] __vmalloc_node_range+0x4f8/0x810 [ 607.622736][ T9946] ? bpf_map_area_alloc+0x20/0x30 [ 607.649144][ T9946] __vmalloc_node_flags_caller+0x71/0x90 [ 607.654791][ T9946] ? bpf_map_area_alloc+0x20/0x30 [ 607.659832][ T9946] __bpf_map_area_alloc+0xde/0xf0 [ 607.664876][ T9946] bpf_map_area_alloc+0x20/0x30 [ 607.669738][ T9946] htab_map_alloc+0x8d3/0x11c0 [ 607.674527][ T9946] ? htab_map_update_elem+0xca0/0xca0 [ 607.679894][ T9946] __do_sys_bpf+0x478/0x3810 [ 607.684487][ T9946] ? bpf_prog_load+0x18f0/0x18f0 [ 607.684502][ T9946] ? __kasan_check_write+0x14/0x20 [ 607.684521][ T9946] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 607.684534][ T9946] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 607.684554][ T9946] ? wait_for_completion+0x440/0x440 [ 607.710671][ T9946] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 607.716951][ T9946] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 607.722422][ T9946] ? do_syscall_64+0x26/0x790 [ 607.727109][ T9946] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 607.733188][ T9946] ? do_syscall_64+0x26/0x790 [ 607.737884][ T9946] __x64_sys_bpf+0x73/0xb0 [ 607.742317][ T9946] do_syscall_64+0xfa/0x790 [ 607.746839][ T9946] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 607.752737][ T9946] RIP: 0033:0x45a919 [ 607.757595][ T9946] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 607.777219][ T9946] RSP: 002b:00007f565edffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 607.785642][ T9946] RAX: ffffffffffffffda RBX: 00007f565edffc90 RCX: 000000000045a919 [ 607.793780][ T9946] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 04:51:18 executing program 4: socketpair(0x1f, 0x13000000, 0x0, &(0x7f00000000c0)) 04:51:18 executing program 4: socketpair(0x1f, 0x13010000, 0x0, &(0x7f00000000c0)) 04:51:18 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0x2c01) [ 607.801853][ T9946] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 607.809830][ T9946] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f565ee006d4 [ 607.817912][ T9946] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 04:51:18 executing program 3 (fault-call:7 fault-nth:27): socketpair(0x0, 0x0, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 04:51:18 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0xc, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18}, 0xfc) 04:51:18 executing program 1: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) r2 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) sendmsg$kcm(r5, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r5, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:18 executing program 2: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) r2 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) sendmsg$kcm(r5, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r5, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:18 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0x4000) 04:51:18 executing program 4: socketpair(0x1f, 0x14000000, 0x0, &(0x7f00000000c0)) 04:51:18 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0xd, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18}, 0xfc) [ 608.177543][ T9980] FAULT_INJECTION: forcing a failure. [ 608.177543][ T9980] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 608.266767][ T9980] CPU: 1 PID: 9980 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 608.275396][ T9980] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 608.285462][ T9980] Call Trace: [ 608.288768][ T9980] dump_stack+0x197/0x210 [ 608.293118][ T9980] should_fail.cold+0xa/0x15 [ 608.297722][ T9980] ? fault_create_debugfs_attr+0x180/0x180 [ 608.303537][ T9980] ? ___might_sleep+0x163/0x2c0 [ 608.308414][ T9980] should_fail_alloc_page+0x50/0x60 [ 608.313623][ T9980] __alloc_pages_nodemask+0x1a1/0x910 [ 608.319017][ T9980] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 608.324576][ T9980] ? __alloc_pages_slowpath+0x2920/0x2920 [ 608.330307][ T9980] ? kasan_unpoison_shadow+0x35/0x50 [ 608.335590][ T9980] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 608.335610][ T9980] alloc_pages_current+0x107/0x210 [ 608.335624][ T9980] ? ___might_sleep+0x163/0x2c0 [ 608.335647][ T9980] __vmalloc_node_range+0x4f8/0x810 [ 608.335671][ T9980] ? bpf_map_area_alloc+0x20/0x30 [ 608.362041][ T9980] __vmalloc_node_flags_caller+0x71/0x90 [ 608.367678][ T9980] ? bpf_map_area_alloc+0x20/0x30 [ 608.372702][ T9980] __bpf_map_area_alloc+0xde/0xf0 [ 608.372720][ T9980] bpf_map_area_alloc+0x20/0x30 [ 608.372736][ T9980] htab_map_alloc+0x8d3/0x11c0 [ 608.372768][ T9980] ? htab_map_update_elem+0xca0/0xca0 [ 608.392765][ T9980] __do_sys_bpf+0x478/0x3810 [ 608.397374][ T9980] ? bpf_prog_load+0x18f0/0x18f0 [ 608.402323][ T9980] ? __kasan_check_write+0x14/0x20 [ 608.407442][ T9980] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 608.412996][ T9980] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 608.418292][ T9980] ? wait_for_completion+0x440/0x440 [ 608.423594][ T9980] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 608.429862][ T9980] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 608.435331][ T9980] ? do_syscall_64+0x26/0x790 [ 608.440016][ T9980] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 608.446084][ T9980] ? do_syscall_64+0x26/0x790 [ 608.450767][ T9980] __x64_sys_bpf+0x73/0xb0 [ 608.455199][ T9980] do_syscall_64+0xfa/0x790 [ 608.459711][ T9980] entry_SYSCALL_64_after_hwframe+0x49/0xbe 04:51:18 executing program 4: socketpair(0x1f, 0x14010000, 0x0, &(0x7f00000000c0)) 04:51:18 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0x80fe) 04:51:18 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0xe, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18}, 0xfc) [ 608.465603][ T9980] RIP: 0033:0x45a919 [ 608.469502][ T9980] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 608.489096][ T9980] RSP: 002b:00007f565edffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 608.489110][ T9980] RAX: ffffffffffffffda RBX: 00007f565edffc90 RCX: 000000000045a919 [ 608.489118][ T9980] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 04:51:18 executing program 1: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) r2 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) sendmsg$kcm(r5, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r5, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:18 executing program 2: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) r2 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) sendmsg$kcm(r5, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r5, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) [ 608.489126][ T9980] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 608.489133][ T9980] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f565ee006d4 [ 608.489141][ T9980] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 04:51:19 executing program 3 (fault-call:7 fault-nth:28): socketpair(0x0, 0x0, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 04:51:19 executing program 4: socketpair(0x1f, 0x15000000, 0x0, &(0x7f00000000c0)) 04:51:19 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0xc0fe) 04:51:19 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0xf, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18}, 0xfc) 04:51:19 executing program 1: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) r2 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) sendmsg$kcm(r5, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r5, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:19 executing program 2: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) r2 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) sendmsg$kcm(r5, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r5, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:19 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0xdc05) 04:51:19 executing program 4: socketpair(0x1f, 0x15010000, 0x0, &(0x7f00000000c0)) [ 609.025376][T10021] FAULT_INJECTION: forcing a failure. [ 609.025376][T10021] name fail_page_alloc, interval 1, probability 0, space 0, times 0 04:51:19 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x10, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18}, 0xfc) [ 609.108622][T10021] CPU: 1 PID: 10021 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 609.117338][T10021] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 609.127400][T10021] Call Trace: [ 609.130707][T10021] dump_stack+0x197/0x210 [ 609.135059][T10021] should_fail.cold+0xa/0x15 [ 609.139667][T10021] ? fault_create_debugfs_attr+0x180/0x180 [ 609.145484][T10021] ? ___might_sleep+0x163/0x2c0 [ 609.150368][T10021] should_fail_alloc_page+0x50/0x60 [ 609.155579][T10021] __alloc_pages_nodemask+0x1a1/0x910 [ 609.160961][T10021] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 609.166503][T10021] ? __alloc_pages_slowpath+0x2920/0x2920 [ 609.166525][T10021] ? kasan_unpoison_shadow+0x35/0x50 [ 609.166542][T10021] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 609.166561][T10021] alloc_pages_current+0x107/0x210 [ 609.166578][T10021] ? ___might_sleep+0x163/0x2c0 [ 609.193725][T10021] __vmalloc_node_range+0x4f8/0x810 [ 609.198945][T10021] ? bpf_map_area_alloc+0x20/0x30 [ 609.203976][T10021] __vmalloc_node_flags_caller+0x71/0x90 [ 609.209622][T10021] ? bpf_map_area_alloc+0x20/0x30 [ 609.214657][T10021] __bpf_map_area_alloc+0xde/0xf0 [ 609.219695][T10021] bpf_map_area_alloc+0x20/0x30 [ 609.224555][T10021] htab_map_alloc+0x8d3/0x11c0 [ 609.229353][T10021] ? htab_map_update_elem+0xca0/0xca0 [ 609.234822][T10021] __do_sys_bpf+0x478/0x3810 [ 609.239427][T10021] ? bpf_prog_load+0x18f0/0x18f0 [ 609.244374][T10021] ? __kasan_check_write+0x14/0x20 [ 609.249498][T10021] ? __mutex_unlock_slowpath+0xf0/0x6a0 04:51:19 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x11, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18}, 0xfc) [ 609.255050][T10021] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 609.260342][T10021] ? wait_for_completion+0x440/0x440 [ 609.265642][T10021] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 609.271907][T10021] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 609.277372][T10021] ? do_syscall_64+0x26/0x790 [ 609.282052][T10021] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 609.288123][T10021] ? do_syscall_64+0x26/0x790 [ 609.292913][T10021] __x64_sys_bpf+0x73/0xb0 [ 609.297343][T10021] do_syscall_64+0xfa/0x790 [ 609.301858][T10021] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 609.307740][T10021] RIP: 0033:0x45a919 [ 609.307756][T10021] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 609.307764][T10021] RSP: 002b:00007f565edffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 609.307777][T10021] RAX: ffffffffffffffda RBX: 00007f565edffc90 RCX: 000000000045a919 [ 609.307790][T10021] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 609.355601][T10021] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 609.363582][T10021] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f565ee006d4 [ 609.371564][T10021] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 04:51:19 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0xfc00) 04:51:19 executing program 2: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) r2 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) sendmsg$kcm(r5, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r5, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:19 executing program 3 (fault-call:7 fault-nth:29): socketpair(0x0, 0x0, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 04:51:19 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x12, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18}, 0xfc) 04:51:19 executing program 4: socketpair(0x1f, 0x16000000, 0x0, &(0x7f00000000c0)) 04:51:19 executing program 1: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x2c, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:20 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0xfe80) 04:51:20 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x13, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18}, 0xfc) 04:51:20 executing program 4: socketpair(0x1f, 0x16010000, 0x0, &(0x7f00000000c0)) [ 609.788634][T10063] FAULT_INJECTION: forcing a failure. [ 609.788634][T10063] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 609.852838][T10063] CPU: 1 PID: 10063 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 609.861571][T10063] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 609.871631][T10063] Call Trace: [ 609.874921][T10063] dump_stack+0x197/0x210 [ 609.879250][T10063] should_fail.cold+0xa/0x15 [ 609.883835][T10063] ? fault_create_debugfs_attr+0x180/0x180 [ 609.889631][T10063] ? ___might_sleep+0x163/0x2c0 [ 609.894476][T10063] should_fail_alloc_page+0x50/0x60 [ 609.899658][T10063] __alloc_pages_nodemask+0x1a1/0x910 [ 609.905015][T10063] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 609.910563][T10063] ? __alloc_pages_slowpath+0x2920/0x2920 [ 609.916275][T10063] ? kasan_unpoison_shadow+0x35/0x50 [ 609.921572][T10063] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 609.927803][T10063] alloc_pages_current+0x107/0x210 [ 609.932898][T10063] ? ___might_sleep+0x163/0x2c0 [ 609.937733][T10063] __vmalloc_node_range+0x4f8/0x810 [ 609.942922][T10063] ? bpf_map_area_alloc+0x20/0x30 [ 609.947933][T10063] __vmalloc_node_flags_caller+0x71/0x90 [ 609.953563][T10063] ? bpf_map_area_alloc+0x20/0x30 [ 609.958571][T10063] __bpf_map_area_alloc+0xde/0xf0 [ 609.963580][T10063] bpf_map_area_alloc+0x20/0x30 [ 609.968440][T10063] htab_map_alloc+0x8d3/0x11c0 [ 609.973201][T10063] ? htab_map_update_elem+0xca0/0xca0 [ 609.978571][T10063] __do_sys_bpf+0x478/0x3810 [ 609.983159][T10063] ? bpf_prog_load+0x18f0/0x18f0 [ 609.988085][T10063] ? __kasan_check_write+0x14/0x20 [ 609.993184][T10063] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 609.998714][T10063] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 610.003985][T10063] ? wait_for_completion+0x440/0x440 [ 610.009261][T10063] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 610.015496][T10063] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 610.020951][T10063] ? do_syscall_64+0x26/0x790 [ 610.025613][T10063] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 610.031663][T10063] ? do_syscall_64+0x26/0x790 [ 610.036330][T10063] __x64_sys_bpf+0x73/0xb0 [ 610.040733][T10063] do_syscall_64+0xfa/0x790 [ 610.045223][T10063] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 610.051100][T10063] RIP: 0033:0x45a919 [ 610.054995][T10063] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 610.074583][T10063] RSP: 002b:00007f565edffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 610.082988][T10063] RAX: ffffffffffffffda RBX: 00007f565edffc90 RCX: 000000000045a919 [ 610.090945][T10063] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 04:51:20 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0xfec0) [ 610.098912][T10063] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 610.106909][T10063] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f565ee006d4 [ 610.114874][T10063] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 04:51:20 executing program 2: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) r2 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) sendmsg$kcm(r5, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r5, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:20 executing program 4: socketpair(0x1f, 0x17000000, 0x0, &(0x7f00000000c0)) 04:51:20 executing program 1: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="0b08da6e96e9af8e50e8aeea267d45fc47d2e6f37dfc3aec5247f245d2e51d3c3e73be1a04b9f7f28b07d631f6b73ce58543acc3f03b49636b862d4f99bb20b6d70fc0f4e863d2868516b94ad8ffb9ed41cb944234444dc51b2251cebcd04e3734bd34ac8718dab51d12778b5071f0635ba4e3395e65d1dee3c671bf9357c2a5b365639d917494b38c9f70bd691356de5da68ff827e64236afbd4ec381715dbc8d06c0999516342a02189274e0a4da97c7e098ed6cc696451a824516c5c7e59d734d0923daffb51e63b4e0011fe1e3f98ef6d615c96d8e74095831238f13b6bd7985e2b2c8db7f9d10e021f338e6038f31832d715885b0612c0c", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:20 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0xff00) 04:51:20 executing program 3 (fault-call:7 fault-nth:30): socketpair(0x0, 0x0, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 04:51:20 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x14, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18}, 0xfc) 04:51:20 executing program 2: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) r2 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) sendmsg$kcm(r5, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r5, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) [ 610.512735][ C1] net_ratelimit: 14 callbacks suppressed [ 610.512744][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 610.524237][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 610.530089][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 610.535889][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:51:20 executing program 4: socketpair(0x1f, 0x17010000, 0x0, &(0x7f00000000c0)) 04:51:20 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0x1fffff) 04:51:21 executing program 1: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) [ 610.715682][T10104] FAULT_INJECTION: forcing a failure. [ 610.715682][T10104] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 610.752849][T10104] CPU: 0 PID: 10104 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 610.761554][T10104] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 610.771629][T10104] Call Trace: [ 610.774952][T10104] dump_stack+0x197/0x210 [ 610.779320][T10104] should_fail.cold+0xa/0x15 [ 610.783948][T10104] ? fault_create_debugfs_attr+0x180/0x180 [ 610.789783][T10104] ? ___might_sleep+0x163/0x2c0 [ 610.794661][T10104] should_fail_alloc_page+0x50/0x60 [ 610.799858][T10104] __alloc_pages_nodemask+0x1a1/0x910 [ 610.805691][T10104] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 610.811239][T10104] ? __alloc_pages_slowpath+0x2920/0x2920 [ 610.816964][T10104] ? kasan_unpoison_shadow+0x35/0x50 [ 610.822266][T10104] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 610.828526][T10104] alloc_pages_current+0x107/0x210 [ 610.833629][T10104] ? ___might_sleep+0x163/0x2c0 [ 610.838480][T10104] __vmalloc_node_range+0x4f8/0x810 [ 610.843687][T10104] ? bpf_map_area_alloc+0x20/0x30 [ 610.848709][T10104] __vmalloc_node_flags_caller+0x71/0x90 [ 610.854331][T10104] ? bpf_map_area_alloc+0x20/0x30 [ 610.859352][T10104] __bpf_map_area_alloc+0xde/0xf0 [ 610.864369][T10104] bpf_map_area_alloc+0x20/0x30 [ 610.869210][T10104] htab_map_alloc+0x8d3/0x11c0 [ 610.873995][T10104] ? htab_map_update_elem+0xca0/0xca0 [ 610.879359][T10104] __do_sys_bpf+0x478/0x3810 [ 610.883961][T10104] ? bpf_prog_load+0x18f0/0x18f0 [ 610.888888][T10104] ? __kasan_check_write+0x14/0x20 [ 610.893994][T10104] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 610.899528][T10104] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 610.904807][T10104] ? wait_for_completion+0x440/0x440 [ 610.910120][T10104] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 610.916498][T10104] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 610.921978][T10104] ? do_syscall_64+0x26/0x790 [ 610.926655][T10104] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 610.932713][T10104] ? do_syscall_64+0x26/0x790 [ 610.937394][T10104] __x64_sys_bpf+0x73/0xb0 [ 610.941808][T10104] do_syscall_64+0xfa/0x790 [ 610.946331][T10104] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 610.952222][T10104] RIP: 0033:0x45a919 [ 610.956111][T10104] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 610.975708][T10104] RSP: 002b:00007f565edffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 610.984109][T10104] RAX: ffffffffffffffda RBX: 00007f565edffc90 RCX: 000000000045a919 [ 610.992071][T10104] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 611.000044][T10104] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 611.008007][T10104] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f565ee006d4 04:51:21 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x15, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18}, 0xfc) 04:51:21 executing program 4: socketpair(0x1f, 0x18000000, 0x0, &(0x7f00000000c0)) [ 611.015966][T10104] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 04:51:21 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0x4000a0) 04:51:21 executing program 4: socketpair(0x1f, 0x18010000, 0x0, &(0x7f00000000c0)) 04:51:21 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x16, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18}, 0xfc) 04:51:21 executing program 2: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) r2 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) write$cgroup_subtree(r5, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="0b08da6e96e9af8e50e8aeea267d45fc47d2e6f37dfc3aec5247f245d2e51d3c3e73be1a04b9f7f28b07d631f6b73ce58543acc3f03b49636b862d4f99bb20b6d70fc0f4e863d2868516b94ad8ffb9ed41cb944234444dc51b2251cebcd04e3734bd34ac8718dab51d12778b5071f0635ba4e3395e65d1dee3c671bf9357c2a5b365639d917494b38c9f70bd691356de5da68ff827e64236afbd4ec381715dbc8d06c0999516342a02189274e0a4da97c7e098ed6cc696451a824516c5c7e59d734d0923daffb51e63b4e0011fe1e3f98ef6d615c96d8e74095831238f13b6bd7985e2b2c8db7f9d10e021f338e6038f31832d715885b0612c0c", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:21 executing program 3 (fault-call:7 fault-nth:31): socketpair(0x0, 0x0, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 04:51:21 executing program 1: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:21 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0xa000a0) 04:51:21 executing program 4: socketpair(0x1f, 0x19000000, 0x0, &(0x7f00000000c0)) 04:51:21 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x17, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18}, 0xfc) 04:51:21 executing program 2: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) r2 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) write$cgroup_subtree(r5, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:22 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0x1000000) 04:51:22 executing program 4: socketpair(0x1f, 0x19010000, 0x0, &(0x7f00000000c0)) [ 611.659345][T10142] FAULT_INJECTION: forcing a failure. [ 611.659345][T10142] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 611.712688][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 611.718545][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 611.724421][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 611.730192][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 611.759678][T10142] CPU: 0 PID: 10142 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 611.768403][T10142] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 611.778481][T10142] Call Trace: [ 611.781792][T10142] dump_stack+0x197/0x210 [ 611.786166][T10142] should_fail.cold+0xa/0x15 [ 611.790796][T10142] ? fault_create_debugfs_attr+0x180/0x180 [ 611.796630][T10142] ? ___might_sleep+0x163/0x2c0 [ 611.801857][T10142] should_fail_alloc_page+0x50/0x60 [ 611.807079][T10142] __alloc_pages_nodemask+0x1a1/0x910 [ 611.812464][T10142] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 611.818032][T10142] ? __alloc_pages_slowpath+0x2920/0x2920 [ 611.823786][T10142] ? kasan_unpoison_shadow+0x35/0x50 [ 611.829089][T10142] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 611.835355][T10142] alloc_pages_current+0x107/0x210 [ 611.840479][T10142] ? ___might_sleep+0x163/0x2c0 [ 611.845358][T10142] __vmalloc_node_range+0x4f8/0x810 [ 611.850592][T10142] ? bpf_map_area_alloc+0x20/0x30 [ 611.855637][T10142] __vmalloc_node_flags_caller+0x71/0x90 [ 611.861288][T10142] ? bpf_map_area_alloc+0x20/0x30 [ 611.866333][T10142] __bpf_map_area_alloc+0xde/0xf0 [ 611.871384][T10142] bpf_map_area_alloc+0x20/0x30 [ 611.876252][T10142] htab_map_alloc+0x8d3/0x11c0 [ 611.881066][T10142] ? htab_map_update_elem+0xca0/0xca0 [ 611.886466][T10142] __do_sys_bpf+0x478/0x3810 [ 611.891086][T10142] ? bpf_prog_load+0x18f0/0x18f0 [ 611.896043][T10142] ? __kasan_check_write+0x14/0x20 [ 611.901175][T10142] ? __mutex_unlock_slowpath+0xf0/0x6a0 04:51:22 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x18, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18}, 0xfc) 04:51:22 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0x2000000) 04:51:22 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x19, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18}, 0xfc) [ 611.906738][T10142] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 611.912046][T10142] ? wait_for_completion+0x440/0x440 [ 611.917363][T10142] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 611.923650][T10142] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 611.929124][T10142] ? do_syscall_64+0x26/0x790 [ 611.933825][T10142] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 611.939912][T10142] ? do_syscall_64+0x26/0x790 [ 611.944620][T10142] __x64_sys_bpf+0x73/0xb0 [ 611.949057][T10142] do_syscall_64+0xfa/0x790 [ 611.953594][T10142] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 611.959503][T10142] RIP: 0033:0x45a919 [ 611.963410][T10142] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 611.983028][T10142] RSP: 002b:00007f565edffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 611.983046][T10142] RAX: ffffffffffffffda RBX: 00007f565edffc90 RCX: 000000000045a919 [ 611.983056][T10142] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 04:51:22 executing program 4: socketpair(0x1f, 0x1a000000, 0x0, &(0x7f00000000c0)) [ 611.983065][T10142] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 611.983076][T10142] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f565ee006d4 [ 611.983086][T10142] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 04:51:22 executing program 3 (fault-call:7 fault-nth:32): socketpair(0x0, 0x0, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 04:51:22 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0x3000000) 04:51:22 executing program 1: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x2c, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000400)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) sendmsg$kcm(r3, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r3, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="0b08da6e96e9af8e50e8aeea267d45fc47d2e6f37dfc3aec5247f245d2e51d3c3e73be1a04b9f7f28b07d631f6b73ce58543acc3f03b49636b862d4f99bb20b6d70fc0f4e863d2868516b94ad8ffb9ed41cb944234444dc51b2251cebcd04e3734bd34ac8718dab51d12778b5071f0635ba4e3395e65d1dee3c671bf9357c2a5b365639d917494b38c9f70bd691356de5da68ff827e64236afbd4ec381715dbc8d06c0999516342a02189274e0a4da97c7e098ed6cc696451a824516c5c7e59d734d0923daffb51e63b4e0011fe1e3f98ef6d615c96d8e74095831238f13b6bd7985e2b2c8db7f9d10e021f338e6038f31832d715885b0612c0c", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:22 executing program 2: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) r2 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) write$cgroup_subtree(r5, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:22 executing program 4: socketpair(0x1f, 0x1a010000, 0x0, &(0x7f00000000c0)) 04:51:22 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x1a, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18}, 0xfc) 04:51:22 executing program 4: socketpair(0x1f, 0x1b000000, 0x0, &(0x7f00000000c0)) [ 612.352701][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 612.358693][ C0] protocol 88fb is buggy, dev hsr_slave_1 04:51:22 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0x4000000) 04:51:22 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x1b, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18}, 0xfc) [ 612.484461][T10186] FAULT_INJECTION: forcing a failure. [ 612.484461][T10186] name fail_page_alloc, interval 1, probability 0, space 0, times 0 04:51:22 executing program 1: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x2c, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000400)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) sendmsg$kcm(r3, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r3, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) [ 612.576956][T10186] CPU: 0 PID: 10186 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 612.585685][T10186] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 612.595759][T10186] Call Trace: [ 612.599072][T10186] dump_stack+0x197/0x210 [ 612.603444][T10186] should_fail.cold+0xa/0x15 [ 612.608059][T10186] ? fault_create_debugfs_attr+0x180/0x180 [ 612.613897][T10186] ? ___might_sleep+0x163/0x2c0 [ 612.618779][T10186] should_fail_alloc_page+0x50/0x60 04:51:23 executing program 4: socketpair(0x1f, 0x1b010000, 0x0, &(0x7f00000000c0)) [ 612.623994][T10186] __alloc_pages_nodemask+0x1a1/0x910 [ 612.629396][T10186] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 612.634977][T10186] ? __alloc_pages_slowpath+0x2920/0x2920 [ 612.640735][T10186] ? kasan_unpoison_shadow+0x35/0x50 [ 612.646044][T10186] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 612.652313][T10186] alloc_pages_current+0x107/0x210 [ 612.657454][T10186] ? ___might_sleep+0x163/0x2c0 [ 612.663836][T10186] __vmalloc_node_range+0x4f8/0x810 [ 612.669074][T10186] ? bpf_map_area_alloc+0x20/0x30 [ 612.674120][T10186] __vmalloc_node_flags_caller+0x71/0x90 [ 612.679765][T10186] ? bpf_map_area_alloc+0x20/0x30 [ 612.684814][T10186] __bpf_map_area_alloc+0xde/0xf0 [ 612.689864][T10186] bpf_map_area_alloc+0x20/0x30 [ 612.694737][T10186] htab_map_alloc+0x8d3/0x11c0 [ 612.699553][T10186] ? htab_map_update_elem+0xca0/0xca0 [ 612.704956][T10186] __do_sys_bpf+0x478/0x3810 [ 612.709576][T10186] ? bpf_prog_load+0x18f0/0x18f0 [ 612.714531][T10186] ? __kasan_check_write+0x14/0x20 [ 612.719672][T10186] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 612.725237][T10186] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 612.730546][T10186] ? wait_for_completion+0x440/0x440 [ 612.735862][T10186] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 612.742142][T10186] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 612.747619][T10186] ? do_syscall_64+0x26/0x790 [ 612.752312][T10186] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 612.758396][T10186] ? do_syscall_64+0x26/0x790 [ 612.763104][T10186] __x64_sys_bpf+0x73/0xb0 [ 612.767544][T10186] do_syscall_64+0xfa/0x790 04:51:23 executing program 4: socketpair(0x1f, 0x1c000000, 0x0, &(0x7f00000000c0)) [ 612.772071][T10186] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 612.780490][T10186] RIP: 0033:0x45a919 [ 612.784406][T10186] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 612.804029][T10186] RSP: 002b:00007f565edffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 612.812463][T10186] RAX: ffffffffffffffda RBX: 00007f565edffc90 RCX: 000000000045a919 [ 612.820459][T10186] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 612.828439][T10186] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 612.836496][T10186] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f565ee006d4 [ 612.836506][T10186] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 04:51:23 executing program 3 (fault-call:7 fault-nth:33): socketpair(0x0, 0x0, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 04:51:23 executing program 2: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) r2 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:23 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x1c, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18}, 0xfc) 04:51:23 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0x8000000) 04:51:23 executing program 1: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x2c, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000400)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) sendmsg$kcm(r3, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r3, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:23 executing program 4: socketpair(0x1f, 0x1c010000, 0x0, &(0x7f00000000c0)) 04:51:23 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0xa000000) 04:51:23 executing program 4: socketpair(0x1f, 0x1d000000, 0x0, &(0x7f00000000c0)) 04:51:23 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x1d, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18}, 0xfc) [ 613.203776][T10224] FAULT_INJECTION: forcing a failure. [ 613.203776][T10224] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 613.298850][T10224] CPU: 1 PID: 10224 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 613.307565][T10224] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 613.317627][T10224] Call Trace: [ 613.320932][T10224] dump_stack+0x197/0x210 [ 613.325290][T10224] should_fail.cold+0xa/0x15 [ 613.329907][T10224] ? fault_create_debugfs_attr+0x180/0x180 [ 613.335724][T10224] ? ___might_sleep+0x163/0x2c0 [ 613.340598][T10224] should_fail_alloc_page+0x50/0x60 [ 613.345809][T10224] __alloc_pages_nodemask+0x1a1/0x910 [ 613.351196][T10224] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 613.356754][T10224] ? __alloc_pages_slowpath+0x2920/0x2920 [ 613.362494][T10224] ? kasan_unpoison_shadow+0x35/0x50 [ 613.367796][T10224] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 613.374048][T10224] alloc_pages_current+0x107/0x210 [ 613.379148][T10224] ? ___might_sleep+0x163/0x2c0 [ 613.384012][T10224] __vmalloc_node_range+0x4f8/0x810 [ 613.389230][T10224] ? bpf_map_area_alloc+0x20/0x30 [ 613.394271][T10224] __vmalloc_node_flags_caller+0x71/0x90 [ 613.399912][T10224] ? bpf_map_area_alloc+0x20/0x30 [ 613.404944][T10224] __bpf_map_area_alloc+0xde/0xf0 [ 613.409988][T10224] bpf_map_area_alloc+0x20/0x30 [ 613.414937][T10224] htab_map_alloc+0x8d3/0x11c0 [ 613.419725][T10224] ? htab_map_update_elem+0xca0/0xca0 [ 613.425109][T10224] __do_sys_bpf+0x478/0x3810 [ 613.429716][T10224] ? bpf_prog_load+0x18f0/0x18f0 [ 613.434655][T10224] ? __kasan_check_write+0x14/0x20 [ 613.439771][T10224] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 613.445323][T10224] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 613.450612][T10224] ? wait_for_completion+0x440/0x440 [ 613.455992][T10224] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 613.462263][T10224] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 613.467736][T10224] ? do_syscall_64+0x26/0x790 [ 613.472412][T10224] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 613.478473][T10224] ? do_syscall_64+0x26/0x790 [ 613.478496][T10224] __x64_sys_bpf+0x73/0xb0 [ 613.478513][T10224] do_syscall_64+0xfa/0x790 [ 613.478534][T10224] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 613.497967][T10224] RIP: 0033:0x45a919 [ 613.501866][T10224] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 613.521477][T10224] RSP: 002b:00007f565edffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 613.529889][T10224] RAX: ffffffffffffffda RBX: 00007f565edffc90 RCX: 000000000045a919 [ 613.529900][T10224] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 04:51:23 executing program 2: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) r2 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:23 executing program 1: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) r1 = socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x2c, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:23 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x1e, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18}, 0xfc) [ 613.529908][T10224] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 613.529923][T10224] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f565ee006d4 [ 613.561788][T10224] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 04:51:24 executing program 3 (fault-call:7 fault-nth:34): socketpair(0x0, 0x0, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 04:51:24 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0x20000000) 04:51:24 executing program 4: socketpair(0x1f, 0x1d010000, 0x0, &(0x7f00000000c0)) 04:51:24 executing program 1: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) r1 = socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x2c, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:24 executing program 2: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) r2 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:24 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x21, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18}, 0xfc) 04:51:24 executing program 4: socketpair(0x1f, 0x1e000000, 0x0, &(0x7f00000000c0)) 04:51:24 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0x2c010000) 04:51:24 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x22, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18}, 0xfc) [ 614.014068][T10267] FAULT_INJECTION: forcing a failure. [ 614.014068][T10267] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 614.078828][T10267] CPU: 0 PID: 10267 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 614.087544][T10267] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 614.097613][T10267] Call Trace: [ 614.097646][T10267] dump_stack+0x197/0x210 [ 614.097678][T10267] should_fail.cold+0xa/0x15 [ 614.097705][T10267] ? fault_create_debugfs_attr+0x180/0x180 [ 614.097723][T10267] ? ___might_sleep+0x163/0x2c0 [ 614.097761][T10267] should_fail_alloc_page+0x50/0x60 [ 614.097791][T10267] __alloc_pages_nodemask+0x1a1/0x910 [ 614.131301][T10267] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 614.136881][T10267] ? __alloc_pages_slowpath+0x2920/0x2920 [ 614.142630][T10267] ? kasan_unpoison_shadow+0x35/0x50 [ 614.147937][T10267] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 614.154205][T10267] alloc_pages_current+0x107/0x210 [ 614.159333][T10267] ? ___might_sleep+0x163/0x2c0 [ 614.164219][T10267] __vmalloc_node_range+0x4f8/0x810 [ 614.169454][T10267] ? bpf_map_area_alloc+0x20/0x30 [ 614.174524][T10267] __vmalloc_node_flags_caller+0x71/0x90 [ 614.180179][T10267] ? bpf_map_area_alloc+0x20/0x30 [ 614.185230][T10267] __bpf_map_area_alloc+0xde/0xf0 [ 614.190277][T10267] bpf_map_area_alloc+0x20/0x30 [ 614.195150][T10267] htab_map_alloc+0x8d3/0x11c0 [ 614.199948][T10267] ? htab_map_update_elem+0xca0/0xca0 [ 614.205343][T10267] __do_sys_bpf+0x478/0x3810 [ 614.209948][T10267] ? bpf_prog_load+0x18f0/0x18f0 [ 614.214907][T10267] ? __kasan_check_write+0x14/0x20 [ 614.220039][T10267] ? __mutex_unlock_slowpath+0xf0/0x6a0 04:51:24 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0x40000000) [ 614.225603][T10267] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 614.230909][T10267] ? wait_for_completion+0x440/0x440 [ 614.236231][T10267] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 614.242521][T10267] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 614.248029][T10267] ? do_syscall_64+0x26/0x790 [ 614.252720][T10267] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 614.252738][T10267] ? do_syscall_64+0x26/0x790 [ 614.252768][T10267] __x64_sys_bpf+0x73/0xb0 [ 614.252789][T10267] do_syscall_64+0xfa/0x790 [ 614.252818][T10267] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 614.263527][T10267] RIP: 0033:0x45a919 [ 614.263545][T10267] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 614.263555][T10267] RSP: 002b:00007f565edffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 614.263572][T10267] RAX: ffffffffffffffda RBX: 00007f565edffc90 RCX: 000000000045a919 [ 614.263586][T10267] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 04:51:24 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x23, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18}, 0xfc) 04:51:24 executing program 1: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) r1 = socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x2c, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) [ 614.326185][T10267] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 614.334167][T10267] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f565ee006d4 [ 614.342148][T10267] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 04:51:25 executing program 4: socketpair(0x1f, 0x1e010000, 0x0, &(0x7f00000000c0)) 04:51:25 executing program 3 (fault-call:7 fault-nth:35): socketpair(0x0, 0x0, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 04:51:25 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x24, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18}, 0xfc) 04:51:25 executing program 2: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) r2 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="0b08da6e96e9af8e50e8aeea267d45fc47d2e6f37dfc3aec5247f245d2e51d3c3e73be1a04b9f7f28b07d631f6b73ce58543acc3f03b49636b862d4f99bb20b6d70fc0f4e863d2868516b94ad8ffb9ed41cb944234444dc51b2251cebcd04e3734bd34ac8718dab51d12778b5071f0635ba4e3395e65d1dee3c671bf9357c2a5b365639d917494b38c9f70bd691356de5da68ff827e64236afbd4ec381715dbc8d06c0999516342a02189274e0a4da97c7e098ed6cc696451a824516c5c7e59d734d0923daffb51e63b4e0011fe1e3f98ef6d615c96d8e74095831238f13b6bd7985e2b2c8db7f9d10e021f338e6038f31832d715885b0612c0c", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:25 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0xa0004000) 04:51:25 executing program 1: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x2c, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:25 executing program 4: socketpair(0x1f, 0x1f000000, 0x0, &(0x7f00000000c0)) 04:51:25 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0xa000a000) [ 614.841092][T10309] FAULT_INJECTION: forcing a failure. [ 614.841092][T10309] name fail_page_alloc, interval 1, probability 0, space 0, times 0 04:51:25 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x25, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18}, 0xfc) [ 614.953146][T10309] CPU: 1 PID: 10309 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 614.961862][T10309] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 614.971926][T10309] Call Trace: [ 614.975222][T10309] dump_stack+0x197/0x210 [ 614.975248][T10309] should_fail.cold+0xa/0x15 [ 614.975269][T10309] ? fault_create_debugfs_attr+0x180/0x180 [ 614.984162][T10309] ? ___might_sleep+0x163/0x2c0 [ 614.984192][T10309] should_fail_alloc_page+0x50/0x60 [ 614.984209][T10309] __alloc_pages_nodemask+0x1a1/0x910 [ 615.005991][T10309] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 615.011557][T10309] ? __alloc_pages_slowpath+0x2920/0x2920 [ 615.017292][T10309] ? kasan_unpoison_shadow+0x35/0x50 [ 615.022594][T10309] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 615.028849][T10309] alloc_pages_current+0x107/0x210 [ 615.033970][T10309] ? ___might_sleep+0x163/0x2c0 [ 615.038822][T10309] __vmalloc_node_range+0x4f8/0x810 [ 615.044027][T10309] ? bpf_map_area_alloc+0x20/0x30 [ 615.044043][T10309] __vmalloc_node_flags_caller+0x71/0x90 [ 615.044058][T10309] ? bpf_map_area_alloc+0x20/0x30 [ 615.044076][T10309] __bpf_map_area_alloc+0xde/0xf0 [ 615.064733][T10309] bpf_map_area_alloc+0x20/0x30 [ 615.069599][T10309] htab_map_alloc+0x8d3/0x11c0 [ 615.074391][T10309] ? htab_map_update_elem+0xca0/0xca0 [ 615.079859][T10309] __do_sys_bpf+0x478/0x3810 [ 615.084465][T10309] ? bpf_prog_load+0x18f0/0x18f0 [ 615.089407][T10309] ? __kasan_check_write+0x14/0x20 [ 615.094528][T10309] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 615.100085][T10309] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 615.105961][T10309] ? wait_for_completion+0x440/0x440 [ 615.111267][T10309] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 615.117531][T10309] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 615.122999][T10309] ? do_syscall_64+0x26/0x790 [ 615.127685][T10309] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 615.133762][T10309] ? do_syscall_64+0x26/0x790 [ 615.138457][T10309] __x64_sys_bpf+0x73/0xb0 [ 615.142886][T10309] do_syscall_64+0xfa/0x790 [ 615.147402][T10309] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 615.153315][T10309] RIP: 0033:0x45a919 [ 615.157228][T10309] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 615.176835][T10309] RSP: 002b:00007f565edffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 615.185251][T10309] RAX: ffffffffffffffda RBX: 00007f565edffc90 RCX: 000000000045a919 [ 615.193225][T10309] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 04:51:25 executing program 2: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) r2 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:25 executing program 4: socketpair(0x1f, 0x1f010000, 0x0, &(0x7f00000000c0)) 04:51:25 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x26, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18}, 0xfc) [ 615.201784][T10309] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 615.209777][T10309] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f565ee006d4 [ 615.217755][T10309] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 04:51:25 executing program 3 (fault-call:7 fault-nth:36): socketpair(0x0, 0x0, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 04:51:25 executing program 4: socketpair(0x1f, 0x20000000, 0x0, &(0x7f00000000c0)) 04:51:25 executing program 1: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x2c, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="0b08da6e96e9af8e50e8aeea267d45fc47d2e6f37dfc3aec5247f245d2e51d3c3e73be1a04b9f7f28b07d631f6b73ce58543acc3f03b49636b862d4f99bb20b6d70fc0f4e863d2868516b94ad8ffb9ed41cb944234444dc51b2251cebcd04e3734bd34ac8718dab51d12778b5071f0635ba4e3395e65d1dee3c671bf9357c2a5b365639d917494b38c9f70bd691356de5da68ff827e64236afbd4ec381715dbc8d06c0999516342a02189274e0a4da97c7e098ed6cc696451a824516c5c7e59d734d0923daffb51e63b4e0011fe1e3f98ef6d615c96d8e74095831238f13b6bd7985e2b2c8db7f9d10e021f338e6038f31832d715885b0612c0c", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:25 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0xdc050000) 04:51:25 executing program 2: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) r2 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:25 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x27, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18}, 0xfc) 04:51:25 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0xfc000000) 04:51:25 executing program 4: socketpair(0x1f, 0x20010000, 0x0, &(0x7f00000000c0)) 04:51:26 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x28, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18}, 0xfc) [ 615.594248][T10345] FAULT_INJECTION: forcing a failure. [ 615.594248][T10345] name fail_page_alloc, interval 1, probability 0, space 0, times 0 04:51:26 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0xfdffffff) [ 615.718205][T10345] CPU: 0 PID: 10345 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 615.726938][T10345] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 615.737013][T10345] Call Trace: [ 615.740329][T10345] dump_stack+0x197/0x210 [ 615.744702][T10345] should_fail.cold+0xa/0x15 [ 615.749329][T10345] ? fault_create_debugfs_attr+0x180/0x180 [ 615.755274][T10345] ? ___might_sleep+0x163/0x2c0 [ 615.760163][T10345] should_fail_alloc_page+0x50/0x60 04:51:26 executing program 4: socketpair(0x1f, 0x21000000, 0x0, &(0x7f00000000c0)) [ 615.765384][T10345] __alloc_pages_nodemask+0x1a1/0x910 [ 615.770779][T10345] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 615.776456][T10345] ? __alloc_pages_slowpath+0x2920/0x2920 [ 615.782206][T10345] ? kasan_unpoison_shadow+0x35/0x50 [ 615.787516][T10345] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 615.793780][T10345] alloc_pages_current+0x107/0x210 [ 615.798915][T10345] ? ___might_sleep+0x163/0x2c0 [ 615.803799][T10345] __vmalloc_node_range+0x4f8/0x810 [ 615.809040][T10345] ? bpf_map_area_alloc+0x20/0x30 [ 615.814085][T10345] __vmalloc_node_flags_caller+0x71/0x90 [ 615.819741][T10345] ? bpf_map_area_alloc+0x20/0x30 [ 615.824793][T10345] __bpf_map_area_alloc+0xde/0xf0 [ 615.829843][T10345] bpf_map_area_alloc+0x20/0x30 [ 615.834730][T10345] htab_map_alloc+0x8d3/0x11c0 [ 615.839544][T10345] ? htab_map_update_elem+0xca0/0xca0 [ 615.844935][T10345] __do_sys_bpf+0x478/0x3810 [ 615.849548][T10345] ? bpf_prog_load+0x18f0/0x18f0 [ 615.854503][T10345] ? __kasan_check_write+0x14/0x20 [ 615.859629][T10345] ? __mutex_unlock_slowpath+0xf0/0x6a0 04:51:26 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0xfe800000) [ 615.865194][T10345] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 615.870494][T10345] ? wait_for_completion+0x440/0x440 [ 615.875809][T10345] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 615.882098][T10345] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 615.887616][T10345] ? do_syscall_64+0x26/0x790 [ 615.892310][T10345] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 615.898399][T10345] ? do_syscall_64+0x26/0x790 [ 615.903781][T10345] __x64_sys_bpf+0x73/0xb0 [ 615.908224][T10345] do_syscall_64+0xfa/0x790 [ 615.912750][T10345] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 615.918654][T10345] RIP: 0033:0x45a919 [ 615.922563][T10345] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 615.942176][T10345] RSP: 002b:00007f565edffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 615.950600][T10345] RAX: ffffffffffffffda RBX: 00007f565edffc90 RCX: 000000000045a919 [ 615.958597][T10345] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 615.966582][T10345] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 615.974566][T10345] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f565ee006d4 [ 615.982548][T10345] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 04:51:26 executing program 3 (fault-call:7 fault-nth:37): socketpair(0x0, 0x0, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 04:51:26 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x29, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18}, 0xfc) 04:51:26 executing program 4: socketpair(0x1f, 0x21010000, 0x0, &(0x7f00000000c0)) 04:51:26 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0xfec00000) 04:51:26 executing program 2: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) r2 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0), 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:26 executing program 1: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x2c, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:26 executing program 4: socketpair(0x1f, 0x22000000, 0x0, &(0x7f00000000c0)) 04:51:26 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0xff000000) 04:51:26 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x2a, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18}, 0xfc) [ 616.366485][T10384] FAULT_INJECTION: forcing a failure. [ 616.366485][T10384] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 616.434472][T10384] CPU: 1 PID: 10384 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 616.443265][T10384] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 616.443271][T10384] Call Trace: [ 616.443297][T10384] dump_stack+0x197/0x210 [ 616.443324][T10384] should_fail.cold+0xa/0x15 [ 616.443347][T10384] ? fault_create_debugfs_attr+0x180/0x180 [ 616.471375][T10384] ? ___might_sleep+0x163/0x2c0 [ 616.476252][T10384] should_fail_alloc_page+0x50/0x60 [ 616.481461][T10384] __alloc_pages_nodemask+0x1a1/0x910 [ 616.481479][T10384] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 616.481496][T10384] ? __alloc_pages_slowpath+0x2920/0x2920 [ 616.481518][T10384] ? kasan_unpoison_shadow+0x35/0x50 [ 616.503403][T10384] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 616.509665][T10384] alloc_pages_current+0x107/0x210 [ 616.514783][T10384] ? ___might_sleep+0x163/0x2c0 [ 616.519655][T10384] __vmalloc_node_range+0x4f8/0x810 [ 616.524872][T10384] ? bpf_map_area_alloc+0x20/0x30 [ 616.529913][T10384] __vmalloc_node_flags_caller+0x71/0x90 [ 616.535552][T10384] ? bpf_map_area_alloc+0x20/0x30 [ 616.540588][T10384] __bpf_map_area_alloc+0xde/0xf0 [ 616.545642][T10384] bpf_map_area_alloc+0x20/0x30 [ 616.550497][T10384] htab_map_alloc+0x8d3/0x11c0 [ 616.555274][T10384] ? htab_map_update_elem+0xca0/0xca0 [ 616.555292][T10384] __do_sys_bpf+0x478/0x3810 [ 616.555316][T10384] ? bpf_prog_load+0x18f0/0x18f0 [ 616.570187][T10384] ? __kasan_check_write+0x14/0x20 [ 616.575325][T10384] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 616.580880][T10384] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 616.586177][T10384] ? wait_for_completion+0x440/0x440 [ 616.591482][T10384] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 616.597746][T10384] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 616.603214][T10384] ? do_syscall_64+0x26/0x790 [ 616.607898][T10384] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 616.613982][T10384] ? do_syscall_64+0x26/0x790 [ 616.618672][T10384] __x64_sys_bpf+0x73/0xb0 [ 616.623100][T10384] do_syscall_64+0xfa/0x790 [ 616.627626][T10384] entry_SYSCALL_64_after_hwframe+0x49/0xbe 04:51:26 executing program 2: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) r2 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0), 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) [ 616.633526][T10384] RIP: 0033:0x45a919 [ 616.637428][T10384] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 616.657028][T10384] RSP: 002b:00007f565edffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 616.657043][T10384] RAX: ffffffffffffffda RBX: 00007f565edffc90 RCX: 000000000045a919 [ 616.657051][T10384] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 04:51:27 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0xffff1f00) 04:51:27 executing program 4: socketpair(0x1f, 0x22010000, 0x0, &(0x7f00000000c0)) [ 616.657060][T10384] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 616.657067][T10384] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f565ee006d4 [ 616.657075][T10384] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 04:51:27 executing program 3 (fault-call:7 fault-nth:38): socketpair(0x0, 0x0, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 04:51:27 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x2b, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18}, 0xfc) 04:51:27 executing program 1: r0 = socket$kcm(0x2c, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x2c, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:27 executing program 2: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) r2 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0), 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:27 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0xfffffffd) 04:51:27 executing program 4: socketpair(0x1f, 0x23000000, 0x0, &(0x7f00000000c0)) 04:51:27 executing program 4: socketpair(0x1f, 0x23010000, 0x0, &(0x7f00000000c0)) 04:51:27 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x2c, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18}, 0xfc) [ 617.055042][T10421] FAULT_INJECTION: forcing a failure. [ 617.055042][T10421] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 617.082661][T10421] CPU: 0 PID: 10421 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 617.091361][T10421] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 617.101414][T10421] Call Trace: [ 617.101448][T10421] dump_stack+0x197/0x210 [ 617.101480][T10421] should_fail.cold+0xa/0x15 [ 617.101508][T10421] ? fault_create_debugfs_attr+0x180/0x180 [ 617.101526][T10421] ? ___might_sleep+0x163/0x2c0 [ 617.101560][T10421] should_fail_alloc_page+0x50/0x60 [ 617.101576][T10421] __alloc_pages_nodemask+0x1a1/0x910 [ 617.101591][T10421] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 617.101613][T10421] ? __alloc_pages_slowpath+0x2920/0x2920 [ 617.146192][T10421] ? kasan_unpoison_shadow+0x35/0x50 [ 617.151488][T10421] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 617.157741][T10421] alloc_pages_current+0x107/0x210 [ 617.162849][T10421] ? ___might_sleep+0x163/0x2c0 [ 617.167719][T10421] __vmalloc_node_range+0x4f8/0x810 [ 617.172927][T10421] ? bpf_map_area_alloc+0x20/0x30 [ 617.177944][T10421] __vmalloc_node_flags_caller+0x71/0x90 [ 617.183573][T10421] ? bpf_map_area_alloc+0x20/0x30 [ 617.188593][T10421] __bpf_map_area_alloc+0xde/0xf0 [ 617.193612][T10421] bpf_map_area_alloc+0x20/0x30 [ 617.198456][T10421] htab_map_alloc+0x8d3/0x11c0 [ 617.203247][T10421] ? htab_map_update_elem+0xca0/0xca0 [ 617.208613][T10421] __do_sys_bpf+0x478/0x3810 [ 617.213205][T10421] ? bpf_prog_load+0x18f0/0x18f0 [ 617.218159][T10421] ? __kasan_check_write+0x14/0x20 [ 617.223270][T10421] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 617.228807][T10421] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 617.234106][T10421] ? wait_for_completion+0x440/0x440 [ 617.239394][T10421] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 617.245645][T10421] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 617.251177][T10421] ? do_syscall_64+0x26/0x790 [ 617.255842][T10421] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 617.261907][T10421] ? do_syscall_64+0x26/0x790 [ 617.266587][T10421] __x64_sys_bpf+0x73/0xb0 [ 617.271005][T10421] do_syscall_64+0xfa/0x790 [ 617.275502][T10421] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 617.281407][T10421] RIP: 0033:0x45a919 [ 617.285307][T10421] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 617.304914][T10421] RSP: 002b:00007f565edffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 617.313323][T10421] RAX: ffffffffffffffda RBX: 00007f565edffc90 RCX: 000000000045a919 [ 617.321291][T10421] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 617.329264][T10421] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 617.337226][T10421] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f565ee006d4 [ 617.345202][T10421] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 04:51:27 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0x8000000000) 04:51:27 executing program 1: r0 = socket$kcm(0x2c, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x2c, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:27 executing program 2: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0xa, 0x300) r1 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:27 executing program 3 (fault-call:7 fault-nth:39): socketpair(0x0, 0x0, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 04:51:27 executing program 4: socketpair(0x1f, 0x24000000, 0x0, &(0x7f00000000c0)) 04:51:28 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0x4000a0ffffffff) 04:51:28 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x2d, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18}, 0xfc) [ 617.727131][T10443] FAULT_INJECTION: forcing a failure. [ 617.727131][T10443] name fail_page_alloc, interval 1, probability 0, space 0, times 0 04:51:28 executing program 1: r0 = socket$kcm(0x2c, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x2c, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="0b08da6e96e9af8e50e8aeea267d45fc47d2e6f37dfc3aec5247f245d2e51d3c3e73be1a04b9f7f28b07d631f6b73ce58543acc3f03b49636b862d4f99bb20b6d70fc0f4e863d2868516b94ad8ffb9ed41cb944234444dc51b2251cebcd04e3734bd34ac8718dab51d12778b5071f0635ba4e3395e65d1dee3c671bf9357c2a5b365639d917494b38c9f70bd691356de5da68ff827e64236afbd4ec381715dbc8d06c0999516342a02189274e0a4da97c7e098ed6cc696451a824516c5c7e59d734d0923daffb51e63b4e0011fe1e3f98ef6d615c96d8e74095831238f13b6bd7985e2b2c8db7f9d10e021f338e6038f31832d715885b0612c0c", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:28 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0xa000a0ffffffff) 04:51:28 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x2e, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18}, 0xfc) 04:51:28 executing program 4: socketpair(0x1f, 0x24010000, 0x0, &(0x7f00000000c0)) 04:51:28 executing program 2: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0xa, 0x300) r1 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="0b08da6e96e9af8e50e8aeea267d45fc47d2e6f37dfc3aec5247f245d2e51d3c3e73be1a04b9f7f28b07d631f6b73ce58543acc3f03b49636b862d4f99bb20b6d70fc0f4e863d2868516b94ad8ffb9ed41cb944234444dc51b2251cebcd04e3734bd34ac8718dab51d12778b5071f0635ba4e3395e65d1dee3c671bf9357c2a5b365639d917494b38c9f70bd691356de5da68ff827e64236afbd4ec381715dbc8d06c0999516342a02189274e0a4da97c7e098ed6cc696451a824516c5c7e59d734d0923daffb51e63b4e0011fe1e3f98ef6d615c96d8e74095831238f13b6bd7985e2b2c8db7f9d10e021f338e6038f31832d715885b0612c0c", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) [ 617.952692][ C1] net_ratelimit: 2 callbacks suppressed [ 617.952700][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 617.964110][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 617.969930][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 617.975685][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:51:28 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0x100000000000000) 04:51:28 executing program 4: socketpair(0x1f, 0x25000000, 0x0, &(0x7f00000000c0)) 04:51:28 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x2f, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18}, 0xfc) [ 618.103052][T10443] CPU: 0 PID: 10443 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 618.111773][T10443] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 618.121842][T10443] Call Trace: [ 618.125165][T10443] dump_stack+0x197/0x210 [ 618.129520][T10443] should_fail.cold+0xa/0x15 [ 618.134155][T10443] ? fault_create_debugfs_attr+0x180/0x180 [ 618.139985][T10443] ? ___might_sleep+0x163/0x2c0 [ 618.144877][T10443] should_fail_alloc_page+0x50/0x60 [ 618.150104][T10443] __alloc_pages_nodemask+0x1a1/0x910 [ 618.155495][T10443] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 618.161065][T10443] ? __alloc_pages_slowpath+0x2920/0x2920 [ 618.166816][T10443] ? kasan_unpoison_shadow+0x35/0x50 [ 618.172254][T10443] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 618.178526][T10443] alloc_pages_current+0x107/0x210 [ 618.183656][T10443] ? ___might_sleep+0x163/0x2c0 [ 618.188544][T10443] __vmalloc_node_range+0x4f8/0x810 [ 618.193775][T10443] ? bpf_map_area_alloc+0x20/0x30 [ 618.198827][T10443] __vmalloc_node_flags_caller+0x71/0x90 [ 618.204563][T10443] ? bpf_map_area_alloc+0x20/0x30 [ 618.209614][T10443] __bpf_map_area_alloc+0xde/0xf0 [ 618.214662][T10443] bpf_map_area_alloc+0x20/0x30 [ 618.219556][T10443] htab_map_alloc+0x8d3/0x11c0 [ 618.224374][T10443] ? htab_map_update_elem+0xca0/0xca0 [ 618.229770][T10443] __do_sys_bpf+0x478/0x3810 [ 618.234383][T10443] ? bpf_prog_load+0x18f0/0x18f0 [ 618.239337][T10443] ? __kasan_check_write+0x14/0x20 [ 618.244469][T10443] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 618.250037][T10443] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 618.255345][T10443] ? wait_for_completion+0x440/0x440 [ 618.255377][T10443] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 618.255419][T10443] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 618.255437][T10443] ? do_syscall_64+0x26/0x790 [ 618.255451][T10443] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 618.255469][T10443] ? do_syscall_64+0x26/0x790 [ 618.267759][T10443] __x64_sys_bpf+0x73/0xb0 [ 618.267783][T10443] do_syscall_64+0xfa/0x790 [ 618.297527][T10443] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 618.303519][T10443] RIP: 0033:0x45a919 [ 618.307422][T10443] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 618.337074][T10443] RSP: 002b:00007f565edffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 618.337091][T10443] RAX: ffffffffffffffda RBX: 00007f565edffc90 RCX: 000000000045a919 [ 618.337101][T10443] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 618.337110][T10443] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 618.337120][T10443] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f565ee006d4 [ 618.337129][T10443] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 04:51:28 executing program 3 (fault-call:7 fault-nth:40): socketpair(0x0, 0x0, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 04:51:28 executing program 4: socketpair(0x1f, 0x25010000, 0x0, &(0x7f00000000c0)) 04:51:28 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0x200000000000000) 04:51:28 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x2c, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f0000000400)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) sendmsg$kcm(r3, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r3, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) 04:51:28 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x30, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18}, 0xfc) 04:51:28 executing program 2: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0xa, 0x300) r1 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:29 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0x300000000000000) 04:51:29 executing program 4: socketpair(0x1f, 0x26000000, 0x0, &(0x7f00000000c0)) [ 618.672774][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 618.678714][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 618.684591][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 618.690355][ C0] protocol 88fb is buggy, dev hsr_slave_1 04:51:29 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x31, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18}, 0xfc) 04:51:29 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x2c, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f0000000400)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) sendmsg$kcm(r3, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r3, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="0b08da6e96e9af8e50e8aeea267d45fc47d2e6f37dfc3aec5247f245d2e51d3c3e73be1a04b9f7f28b07d631f6b73ce58543acc3f03b49636b862d4f99bb20b6d70fc0f4e863d2868516b94ad8ffb9ed41cb944234444dc51b2251cebcd04e3734bd34ac8718dab51d12778b5071f0635ba4e3395e65d1dee3c671bf9357c2a5b365639d917494b38c9f70bd691356de5da68ff827e64236afbd4ec381715dbc8d06c0999516342a02189274e0a4da97c7e098ed6cc696451a824516c5c7e59d734d0923daffb51e63b4e0011fe1e3f98ef6d615c96d8e74095831238f13b6bd7985e2b2c8db7f9d10e021f338e6038f31832d715885b0612c0c", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) 04:51:29 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0x400000000000000) 04:51:29 executing program 4: socketpair(0x1f, 0x26010000, 0x0, &(0x7f00000000c0)) [ 618.913769][T10504] FAULT_INJECTION: forcing a failure. [ 618.913769][T10504] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 619.007174][T10504] CPU: 0 PID: 10504 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 619.015918][T10504] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 619.025987][T10504] Call Trace: [ 619.029304][T10504] dump_stack+0x197/0x210 [ 619.033676][T10504] should_fail.cold+0xa/0x15 [ 619.038304][T10504] ? fault_create_debugfs_attr+0x180/0x180 [ 619.044137][T10504] ? ___might_sleep+0x163/0x2c0 [ 619.049029][T10504] should_fail_alloc_page+0x50/0x60 [ 619.054380][T10504] __alloc_pages_nodemask+0x1a1/0x910 [ 619.059769][T10504] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 619.065353][T10504] ? __alloc_pages_slowpath+0x2920/0x2920 [ 619.071104][T10504] ? kasan_unpoison_shadow+0x35/0x50 [ 619.076410][T10504] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 619.082686][T10504] alloc_pages_current+0x107/0x210 [ 619.087806][T10504] ? ___might_sleep+0x163/0x2c0 [ 619.092682][T10504] __vmalloc_node_range+0x4f8/0x810 [ 619.097926][T10504] ? bpf_map_area_alloc+0x20/0x30 [ 619.102971][T10504] __vmalloc_node_flags_caller+0x71/0x90 [ 619.108620][T10504] ? bpf_map_area_alloc+0x20/0x30 [ 619.113668][T10504] __bpf_map_area_alloc+0xde/0xf0 [ 619.118710][T10504] bpf_map_area_alloc+0x20/0x30 [ 619.123581][T10504] htab_map_alloc+0x8d3/0x11c0 [ 619.128392][T10504] ? htab_map_update_elem+0xca0/0xca0 [ 619.133781][T10504] __do_sys_bpf+0x478/0x3810 [ 619.138401][T10504] ? bpf_prog_load+0x18f0/0x18f0 [ 619.143361][T10504] ? __kasan_check_write+0x14/0x20 [ 619.148492][T10504] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 619.154056][T10504] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 619.159362][T10504] ? wait_for_completion+0x440/0x440 [ 619.164677][T10504] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 619.170957][T10504] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 619.176434][T10504] ? do_syscall_64+0x26/0x790 [ 619.181128][T10504] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 619.187203][T10504] ? do_syscall_64+0x26/0x790 [ 619.191906][T10504] __x64_sys_bpf+0x73/0xb0 [ 619.196346][T10504] do_syscall_64+0xfa/0x790 [ 619.200885][T10504] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 619.206789][T10504] RIP: 0033:0x45a919 [ 619.210698][T10504] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 619.230313][T10504] RSP: 002b:00007f565edffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 619.238740][T10504] RAX: ffffffffffffffda RBX: 00007f565edffc90 RCX: 000000000045a919 [ 619.246730][T10504] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 619.254709][T10504] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 619.254720][T10504] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f565ee006d4 [ 619.254730][T10504] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 04:51:29 executing program 3 (fault-call:7 fault-nth:41): socketpair(0x0, 0x0, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 04:51:29 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x32, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18}, 0xfc) 04:51:29 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0x800000000000000) 04:51:29 executing program 4: socketpair(0x1f, 0x27000000, 0x0, &(0x7f00000000c0)) 04:51:29 executing program 2: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) r2 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:29 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x2c, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f0000000400)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) sendmsg$kcm(r3, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r3, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) [ 619.488965][T10533] FAULT_INJECTION: forcing a failure. [ 619.488965][T10533] name fail_page_alloc, interval 1, probability 0, space 0, times 0 04:51:29 executing program 4: socketpair(0x1f, 0x27010000, 0x0, &(0x7f00000000c0)) 04:51:29 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0xa00000000000000) [ 619.556689][T10533] CPU: 0 PID: 10533 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 619.565411][T10533] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 619.575487][T10533] Call Trace: [ 619.578807][T10533] dump_stack+0x197/0x210 [ 619.583171][T10533] should_fail.cold+0xa/0x15 [ 619.587794][T10533] ? fault_create_debugfs_attr+0x180/0x180 [ 619.593624][T10533] ? ___might_sleep+0x163/0x2c0 [ 619.598519][T10533] should_fail_alloc_page+0x50/0x60 [ 619.603736][T10533] __alloc_pages_nodemask+0x1a1/0x910 [ 619.609132][T10533] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 619.614699][T10533] ? __alloc_pages_slowpath+0x2920/0x2920 [ 619.620444][T10533] ? kasan_unpoison_shadow+0x35/0x50 [ 619.625746][T10533] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 619.632129][T10533] alloc_pages_current+0x107/0x210 [ 619.637263][T10533] ? ___might_sleep+0x163/0x2c0 [ 619.642142][T10533] __vmalloc_node_range+0x4f8/0x810 [ 619.647387][T10533] ? bpf_map_area_alloc+0x20/0x30 [ 619.652444][T10533] __vmalloc_node_flags_caller+0x71/0x90 [ 619.658095][T10533] ? bpf_map_area_alloc+0x20/0x30 [ 619.663145][T10533] __bpf_map_area_alloc+0xde/0xf0 [ 619.668194][T10533] bpf_map_area_alloc+0x20/0x30 [ 619.673066][T10533] htab_map_alloc+0x8d3/0x11c0 [ 619.677882][T10533] ? htab_map_update_elem+0xca0/0xca0 [ 619.683275][T10533] __do_sys_bpf+0x478/0x3810 [ 619.687893][T10533] ? bpf_prog_load+0x18f0/0x18f0 [ 619.692840][T10533] ? __kasan_check_write+0x14/0x20 [ 619.697968][T10533] ? __mutex_unlock_slowpath+0xf0/0x6a0 04:51:30 executing program 4: socketpair(0x1f, 0x28000000, 0x0, &(0x7f00000000c0)) 04:51:30 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0x2000000000000000) 04:51:30 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x33, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18}, 0xfc) [ 619.703528][T10533] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 619.708833][T10533] ? wait_for_completion+0x440/0x440 [ 619.714154][T10533] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 619.720443][T10533] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 619.725920][T10533] ? do_syscall_64+0x26/0x790 [ 619.730609][T10533] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 619.736691][T10533] ? do_syscall_64+0x26/0x790 [ 619.741403][T10533] __x64_sys_bpf+0x73/0xb0 [ 619.745997][T10533] do_syscall_64+0xfa/0x790 [ 619.750529][T10533] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 619.756442][T10533] RIP: 0033:0x45a919 [ 619.760358][T10533] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 619.779978][T10533] RSP: 002b:00007f565edffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 619.788416][T10533] RAX: ffffffffffffffda RBX: 00007f565edffc90 RCX: 000000000045a919 [ 619.796404][T10533] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 619.804494][T10533] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 619.812509][T10533] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f565ee006d4 [ 619.820505][T10533] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 04:51:30 executing program 4: socketpair(0x1f, 0x28010000, 0x0, &(0x7f00000000c0)) 04:51:30 executing program 3 (fault-call:7 fault-nth:42): socketpair(0x0, 0x0, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 04:51:30 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0x2c01000000000000) 04:51:30 executing program 2: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) r2 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:30 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x34, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18}, 0xfc) 04:51:30 executing program 1: r0 = socket$kcm(0x2c, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x2c, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:30 executing program 4: socketpair(0x1f, 0x29000000, 0x0, &(0x7f00000000c0)) 04:51:30 executing program 4: socketpair(0x1f, 0x29010000, 0x0, &(0x7f00000000c0)) 04:51:30 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x35, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18}, 0xfc) 04:51:30 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0x4000000000000000) [ 620.340626][T10570] FAULT_INJECTION: forcing a failure. [ 620.340626][T10570] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 620.405947][T10570] CPU: 0 PID: 10570 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 620.415488][T10570] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 620.425559][T10570] Call Trace: [ 620.428875][T10570] dump_stack+0x197/0x210 [ 620.433257][T10570] should_fail.cold+0xa/0x15 [ 620.437877][T10570] ? fault_create_debugfs_attr+0x180/0x180 [ 620.443712][T10570] ? ___might_sleep+0x163/0x2c0 [ 620.448603][T10570] should_fail_alloc_page+0x50/0x60 [ 620.453825][T10570] __alloc_pages_nodemask+0x1a1/0x910 [ 620.459217][T10570] ? find_held_lock+0x35/0x130 [ 620.464001][T10570] ? __alloc_pages_slowpath+0x2920/0x2920 [ 620.469727][T10570] ? lock_downgrade+0x920/0x920 [ 620.474588][T10570] ? rwlock_bug.part.0+0x90/0x90 [ 620.479534][T10570] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 620.485779][T10570] alloc_pages_current+0x107/0x210 [ 620.490897][T10570] __get_free_pages+0xc/0x40 [ 620.495486][T10570] kasan_populate_vmalloc_pte+0x2f/0x1c0 [ 620.501123][T10570] apply_to_page_range+0x445/0x700 [ 620.506249][T10570] ? memset+0x40/0x40 [ 620.510244][T10570] kasan_populate_vmalloc+0x68/0x90 [ 620.515439][T10570] __vmalloc_node_range+0x47e/0x810 [ 620.520640][T10570] ? bpf_map_area_alloc+0x20/0x30 [ 620.525660][T10570] __vmalloc_node_flags_caller+0x71/0x90 [ 620.531284][T10570] ? bpf_map_area_alloc+0x20/0x30 [ 620.536306][T10570] __bpf_map_area_alloc+0xde/0xf0 [ 620.541329][T10570] bpf_map_area_alloc+0x20/0x30 [ 620.546173][T10570] htab_map_alloc+0x8d3/0x11c0 [ 620.550947][T10570] ? htab_map_update_elem+0xca0/0xca0 [ 620.556316][T10570] __do_sys_bpf+0x478/0x3810 [ 620.560907][T10570] ? bpf_prog_load+0x18f0/0x18f0 [ 620.565834][T10570] ? __kasan_check_write+0x14/0x20 [ 620.570940][T10570] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 620.576478][T10570] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 620.581756][T10570] ? wait_for_completion+0x440/0x440 [ 620.587040][T10570] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 620.593395][T10570] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 620.598841][T10570] ? do_syscall_64+0x26/0x790 [ 620.603509][T10570] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 620.609574][T10570] ? do_syscall_64+0x26/0x790 [ 620.614250][T10570] __x64_sys_bpf+0x73/0xb0 [ 620.618661][T10570] do_syscall_64+0xfa/0x790 [ 620.623157][T10570] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 620.629036][T10570] RIP: 0033:0x45a919 [ 620.632944][T10570] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 04:51:31 executing program 1: r0 = socket$kcm(0x2c, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x2c, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) [ 620.652548][T10570] RSP: 002b:00007f565edffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 620.660963][T10570] RAX: ffffffffffffffda RBX: 00007f565edffc90 RCX: 000000000045a919 [ 620.668942][T10570] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 620.676923][T10570] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 620.684898][T10570] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f565ee006d4 [ 620.692865][T10570] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 04:51:31 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0xdc05000000000000) 04:51:31 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x36, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18}, 0xfc) [ 620.912731][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 620.918588][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:51:31 executing program 3 (fault-call:7 fault-nth:43): socketpair(0x0, 0x0, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 04:51:31 executing program 2: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) r2 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:31 executing program 4: socketpair(0x1f, 0x2a000000, 0x0, &(0x7f00000000c0)) 04:51:31 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0xfc00000000000000) 04:51:31 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x37, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18}, 0xfc) 04:51:31 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0xfdffffff00000000) 04:51:31 executing program 4: socketpair(0x1f, 0x2a010000, 0x0, &(0x7f00000000c0)) 04:51:31 executing program 1: r0 = socket$kcm(0x2c, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x2c, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) [ 621.173635][T10604] FAULT_INJECTION: forcing a failure. [ 621.173635][T10604] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 621.255556][T10604] CPU: 0 PID: 10604 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 621.264283][T10604] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 621.274356][T10604] Call Trace: [ 621.277675][T10604] dump_stack+0x197/0x210 [ 621.282037][T10604] should_fail.cold+0xa/0x15 [ 621.286671][T10604] ? fault_create_debugfs_attr+0x180/0x180 [ 621.292511][T10604] ? ___might_sleep+0x163/0x2c0 [ 621.297407][T10604] should_fail_alloc_page+0x50/0x60 [ 621.302625][T10604] __alloc_pages_nodemask+0x1a1/0x910 [ 621.308019][T10604] ? find_held_lock+0x35/0x130 [ 621.312807][T10604] ? __alloc_pages_slowpath+0x2920/0x2920 [ 621.318561][T10604] ? lock_downgrade+0x920/0x920 [ 621.323433][T10604] ? rwlock_bug.part.0+0x90/0x90 [ 621.328387][T10604] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 621.334657][T10604] alloc_pages_current+0x107/0x210 [ 621.339795][T10604] __get_free_pages+0xc/0x40 [ 621.344406][T10604] kasan_populate_vmalloc_pte+0x2f/0x1c0 [ 621.350065][T10604] apply_to_page_range+0x445/0x700 04:51:31 executing program 2: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) r2 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="0b08da6e96e9af8e50e8aeea267d45fc47d2e6f37dfc3aec5247f245d2e51d3c3e73be1a04b9f7f28b07d631f6b73ce58543acc3f03b49636b862d4f99bb20b6d70fc0f4e863d2868516b94ad8ffb9ed41cb944234444dc51b2251cebcd04e3734bd34ac8718dab51d12778b5071f0635ba4e3395e65d1dee3c671bf9357c2a5b365639d917494b38c9f70bd691356de5da68ff827e64236afbd4ec381715dbc8d06c0999516342a02189274e0a4da97c7e098ed6cc696451a824516c5c7e59d734d0923daffb51e63b4e0011fe1e3f98ef6d615c96d8e74095831238f13b6bd7985e2b2c8db7f9d10e021f338e6038f31832d715885b0612c0c", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) [ 621.355210][T10604] ? memset+0x40/0x40 [ 621.359225][T10604] kasan_populate_vmalloc+0x68/0x90 [ 621.364450][T10604] __vmalloc_node_range+0x47e/0x810 [ 621.369685][T10604] ? bpf_map_area_alloc+0x20/0x30 [ 621.374731][T10604] __vmalloc_node_flags_caller+0x71/0x90 [ 621.380385][T10604] ? bpf_map_area_alloc+0x20/0x30 [ 621.385435][T10604] __bpf_map_area_alloc+0xde/0xf0 [ 621.390480][T10604] bpf_map_area_alloc+0x20/0x30 [ 621.395349][T10604] htab_map_alloc+0x8d3/0x11c0 [ 621.400158][T10604] ? htab_map_update_elem+0xca0/0xca0 04:51:31 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x38, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18}, 0xfc) [ 621.405558][T10604] __do_sys_bpf+0x478/0x3810 [ 621.410182][T10604] ? bpf_prog_load+0x18f0/0x18f0 [ 621.415146][T10604] ? __kasan_check_write+0x14/0x20 [ 621.420281][T10604] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 621.425847][T10604] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 621.431160][T10604] ? wait_for_completion+0x440/0x440 [ 621.436479][T10604] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 621.442764][T10604] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 621.448246][T10604] ? do_syscall_64+0x26/0x790 [ 621.452945][T10604] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 621.459031][T10604] ? do_syscall_64+0x26/0x790 [ 621.463737][T10604] __x64_sys_bpf+0x73/0xb0 [ 621.468177][T10604] do_syscall_64+0xfa/0x790 [ 621.472708][T10604] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 621.478613][T10604] RIP: 0033:0x45a919 [ 621.482520][T10604] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 04:51:31 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x39, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18}, 0xfc) 04:51:31 executing program 4: socketpair(0x1f, 0x2b000000, 0x0, &(0x7f00000000c0)) [ 621.502145][T10604] RSP: 002b:00007f565edffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 621.510580][T10604] RAX: ffffffffffffffda RBX: 00007f565edffc90 RCX: 000000000045a919 [ 621.519008][T10604] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 621.526997][T10604] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 621.534991][T10604] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f565ee006d4 [ 621.542986][T10604] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 04:51:32 executing program 3 (fault-call:7 fault-nth:44): socketpair(0x0, 0x0, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 04:51:32 executing program 2: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) r2 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="0b08da6e96e9af8e50e8aeea267d45fc47d2e6f37dfc3aec5247f245d2e51d3c3e73be1a04b9f7f28b07d631f6b73ce58543acc3f03b49636b862d4f99bb20b6d70fc0f4e863d2868516b94ad8ffb9ed41cb944234444dc51b2251cebcd04e3734bd34ac8718dab51d12778b5071f0635ba4e3395e65d1dee3c671bf9357c2a5b365639d917494b38c9f70bd691356de5da68ff827e64236afbd4ec381715dbc8d06c0999516342a02189274e0a4da97c7e098ed6cc696451a824516c5c7e59d734d0923daffb51e63b4e0011fe1e3f98ef6d615c96d8e74095831238f13b6bd7985e2b2c8db7f9d10e021f338e6038f31832d715885b0612c0c", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:32 executing program 1: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x2c, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:32 executing program 4: socketpair(0x1f, 0x2b010000, 0x0, &(0x7f00000000c0)) 04:51:32 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0xfe80000000000000) 04:51:32 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x3a, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18}, 0xfc) 04:51:32 executing program 4: socketpair(0x1f, 0x2c000000, 0x0, &(0x7f00000000c0)) 04:51:32 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0xfec0000000000000) [ 622.054468][T10651] FAULT_INJECTION: forcing a failure. [ 622.054468][T10651] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 622.086061][T10651] CPU: 0 PID: 10651 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 622.094795][T10651] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 04:51:32 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x3b, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18}, 0xfc) [ 622.104875][T10651] Call Trace: [ 622.108189][T10651] dump_stack+0x197/0x210 [ 622.112554][T10651] should_fail.cold+0xa/0x15 [ 622.117182][T10651] ? fault_create_debugfs_attr+0x180/0x180 [ 622.123014][T10651] ? ___might_sleep+0x163/0x2c0 [ 622.127911][T10651] should_fail_alloc_page+0x50/0x60 [ 622.133120][T10651] __alloc_pages_nodemask+0x1a1/0x910 [ 622.138495][T10651] ? find_held_lock+0x35/0x130 [ 622.143278][T10651] ? __alloc_pages_slowpath+0x2920/0x2920 [ 622.149027][T10651] ? lock_downgrade+0x920/0x920 04:51:32 executing program 4: socketpair(0x1f, 0x2c010000, 0x0, &(0x7f00000000c0)) [ 622.153893][T10651] ? rwlock_bug.part.0+0x90/0x90 [ 622.158846][T10651] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 622.165117][T10651] alloc_pages_current+0x107/0x210 [ 622.170250][T10651] __get_free_pages+0xc/0x40 [ 622.174855][T10651] kasan_populate_vmalloc_pte+0x2f/0x1c0 [ 622.180514][T10651] apply_to_page_range+0x445/0x700 [ 622.185655][T10651] ? memset+0x40/0x40 [ 622.189662][T10651] kasan_populate_vmalloc+0x68/0x90 [ 622.194891][T10651] __vmalloc_node_range+0x47e/0x810 [ 622.200126][T10651] ? bpf_map_area_alloc+0x20/0x30 [ 622.205220][T10651] __vmalloc_node_flags_caller+0x71/0x90 [ 622.210871][T10651] ? bpf_map_area_alloc+0x20/0x30 [ 622.215918][T10651] __bpf_map_area_alloc+0xde/0xf0 [ 622.220969][T10651] bpf_map_area_alloc+0x20/0x30 [ 622.225842][T10651] htab_map_alloc+0x8d3/0x11c0 [ 622.230655][T10651] ? htab_map_update_elem+0xca0/0xca0 [ 622.236063][T10651] __do_sys_bpf+0x478/0x3810 [ 622.240691][T10651] ? bpf_prog_load+0x18f0/0x18f0 [ 622.245652][T10651] ? __kasan_check_write+0x14/0x20 04:51:32 executing program 4: socketpair(0x1f, 0x2d000000, 0x0, &(0x7f00000000c0)) 04:51:32 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x3c, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18}, 0xfc) [ 622.250784][T10651] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 622.256350][T10651] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 622.261655][T10651] ? wait_for_completion+0x440/0x440 [ 622.266965][T10651] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 622.273255][T10651] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 622.278731][T10651] ? do_syscall_64+0x26/0x790 [ 622.283416][T10651] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 622.289498][T10651] ? do_syscall_64+0x26/0x790 [ 622.294200][T10651] __x64_sys_bpf+0x73/0xb0 [ 622.298643][T10651] do_syscall_64+0xfa/0x790 [ 622.303174][T10651] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 622.309080][T10651] RIP: 0033:0x45a919 [ 622.312993][T10651] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 622.332598][T10651] RSP: 002b:00007f565edffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 622.332615][T10651] RAX: ffffffffffffffda RBX: 00007f565edffc90 RCX: 000000000045a919 [ 622.332625][T10651] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 622.332634][T10651] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 622.332644][T10651] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f565ee006d4 [ 622.332653][T10651] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 04:51:33 executing program 3 (fault-call:7 fault-nth:45): socketpair(0x0, 0x0, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 04:51:33 executing program 2: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) r2 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:33 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0xff00000000000000) 04:51:33 executing program 1: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x2c, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:33 executing program 4: socketpair(0x1f, 0x2d010000, 0x0, &(0x7f00000000c0)) 04:51:33 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x3d, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18}, 0xfc) [ 622.795121][T10686] FAULT_INJECTION: forcing a failure. [ 622.795121][T10686] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 622.820304][T10686] CPU: 1 PID: 10686 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 622.829017][T10686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 622.839177][T10686] Call Trace: [ 622.842483][T10686] dump_stack+0x197/0x210 [ 622.846834][T10686] should_fail.cold+0xa/0x15 [ 622.851443][T10686] ? fault_create_debugfs_attr+0x180/0x180 [ 622.857262][T10686] ? ___might_sleep+0x163/0x2c0 [ 622.862133][T10686] should_fail_alloc_page+0x50/0x60 [ 622.867339][T10686] __alloc_pages_nodemask+0x1a1/0x910 [ 622.872724][T10686] ? find_held_lock+0x35/0x130 [ 622.877505][T10686] ? __alloc_pages_slowpath+0x2920/0x2920 [ 622.883243][T10686] ? lock_downgrade+0x920/0x920 [ 622.888103][T10686] ? rwlock_bug.part.0+0x90/0x90 [ 622.893048][T10686] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 622.899298][T10686] alloc_pages_current+0x107/0x210 [ 622.904428][T10686] __get_free_pages+0xc/0x40 [ 622.909027][T10686] kasan_populate_vmalloc_pte+0x2f/0x1c0 [ 622.914677][T10686] apply_to_page_range+0x445/0x700 [ 622.919805][T10686] ? memset+0x40/0x40 [ 622.923811][T10686] kasan_populate_vmalloc+0x68/0x90 [ 622.929023][T10686] __vmalloc_node_range+0x47e/0x810 [ 622.934242][T10686] ? bpf_map_area_alloc+0x20/0x30 [ 622.939275][T10686] __vmalloc_node_flags_caller+0x71/0x90 [ 622.945003][T10686] ? bpf_map_area_alloc+0x20/0x30 [ 622.950044][T10686] __bpf_map_area_alloc+0xde/0xf0 [ 622.955083][T10686] bpf_map_area_alloc+0x20/0x30 [ 622.959942][T10686] htab_map_alloc+0x8d3/0x11c0 [ 622.964722][T10686] ? htab_map_update_elem+0xca0/0xca0 [ 622.970105][T10686] __do_sys_bpf+0x478/0x3810 [ 622.974705][T10686] ? bpf_prog_load+0x18f0/0x18f0 [ 622.979654][T10686] ? __kasan_check_write+0x14/0x20 [ 622.984779][T10686] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 622.990334][T10686] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 622.995634][T10686] ? wait_for_completion+0x440/0x440 [ 623.000942][T10686] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 623.007207][T10686] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 623.012673][T10686] ? do_syscall_64+0x26/0x790 [ 623.017359][T10686] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 623.023432][T10686] ? do_syscall_64+0x26/0x790 [ 623.028126][T10686] __x64_sys_bpf+0x73/0xb0 [ 623.032555][T10686] do_syscall_64+0xfa/0x790 [ 623.037067][T10686] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 623.042965][T10686] RIP: 0033:0x45a919 [ 623.046867][T10686] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 623.066486][T10686] RSP: 002b:00007f565edffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 623.074904][T10686] RAX: ffffffffffffffda RBX: 00007f565edffc90 RCX: 000000000045a919 [ 623.082884][T10686] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 04:51:33 executing program 4: socketpair(0x1f, 0x2e000000, 0x0, &(0x7f00000000c0)) 04:51:33 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0xffff1f0000000000) 04:51:33 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0xffffffff00000000) 04:51:33 executing program 4: socketpair(0x1f, 0x2e010000, 0x0, &(0x7f00000000c0)) 04:51:33 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0xffffffffa0004000) 04:51:33 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0xffffffffa000a000) [ 623.090859][T10686] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 623.098833][T10686] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f565ee006d4 [ 623.106813][T10686] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 04:51:33 executing program 3 (fault-call:7 fault-nth:46): socketpair(0x0, 0x0, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 04:51:33 executing program 4: socketpair(0x1f, 0x2f000000, 0x0, &(0x7f00000000c0)) 04:51:33 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x3e, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18}, 0xfc) 04:51:33 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) write$cgroup_int(r1, &(0x7f0000000000)=0xffffffffffffffff, 0x12) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0x0) 04:51:33 executing program 1: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x2c, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:33 executing program 2: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) r2 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) sendmsg$kcm(r5, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r5, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="0b08da6e96e9af8e50e8aeea267d45fc47d2e6f37dfc3aec5247f245d2e51d3c3e73be1a04b9f7f28b07d631f6b73ce58543acc3f03b49636b862d4f99bb20b6d70fc0f4e863d2868516b94ad8ffb9ed41cb944234444dc51b2251cebcd04e3734bd34ac8718dab51d12778b5071f0635ba4e3395e65d1dee3c671bf9357c2a5b365639d917494b38c9f70bd691356de5da68ff827e64236afbd4ec381715dbc8d06c0999516342a02189274e0a4da97c7e098ed6cc696451a824516c5c7e59d734d0923daffb51e63b4e0011fe1e3f98ef6d615c96d8e74095831238f13b6bd7985e2b2c8db7f9d10e021f338e6038f31832d715885b0612c0c", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:33 executing program 4: socketpair(0x1f, 0x2f010000, 0x0, &(0x7f00000000c0)) 04:51:33 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x41, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18}, 0xfc) [ 623.512003][T10723] FAULT_INJECTION: forcing a failure. [ 623.512003][T10723] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 623.600399][T10723] CPU: 1 PID: 10723 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 623.609211][T10723] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 623.619273][T10723] Call Trace: [ 623.622571][T10723] dump_stack+0x197/0x210 [ 623.626922][T10723] should_fail.cold+0xa/0x15 [ 623.631529][T10723] ? fault_create_debugfs_attr+0x180/0x180 [ 623.637352][T10723] ? ___might_sleep+0x163/0x2c0 [ 623.642227][T10723] should_fail_alloc_page+0x50/0x60 [ 623.647431][T10723] __alloc_pages_nodemask+0x1a1/0x910 [ 623.652822][T10723] ? __alloc_pages_slowpath+0x2920/0x2920 [ 623.658671][T10723] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 623.664922][T10723] ? find_next_bit+0x107/0x130 [ 623.669702][T10723] pcpu_populate_chunk+0xf8/0x940 [ 623.674738][T10723] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 623.680463][T10723] ? find_next_bit+0xe7/0x130 [ 623.685158][T10723] pcpu_alloc+0xd5b/0x1380 [ 623.689597][T10723] ? pcpu_alloc_area+0x820/0x820 [ 623.694542][T10723] ? bpf_map_area_alloc+0x20/0x30 [ 623.699577][T10723] __alloc_percpu_gfp+0x28/0x30 [ 623.704431][T10723] htab_map_alloc+0xdb9/0x11c0 [ 623.709232][T10723] ? htab_map_update_elem+0xca0/0xca0 [ 623.714617][T10723] __do_sys_bpf+0x478/0x3810 [ 623.719224][T10723] ? bpf_prog_load+0x18f0/0x18f0 [ 623.724178][T10723] ? __kasan_check_write+0x14/0x20 [ 623.729298][T10723] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 623.734857][T10723] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 623.740152][T10723] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 623.746396][T10723] ? debug_smp_processor_id+0x33/0x18a [ 623.751866][T10723] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 623.758174][T10723] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 623.763669][T10723] ? do_syscall_64+0x26/0x790 [ 623.768356][T10723] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 623.774424][T10723] ? do_syscall_64+0x26/0x790 [ 623.779112][T10723] __x64_sys_bpf+0x73/0xb0 [ 623.783545][T10723] do_syscall_64+0xfa/0x790 [ 623.788068][T10723] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 623.793964][T10723] RIP: 0033:0x45a919 [ 623.797866][T10723] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 623.817580][T10723] RSP: 002b:00007f565edffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 623.825995][T10723] RAX: ffffffffffffffda RBX: 00007f565edffc90 RCX: 000000000045a919 [ 623.833969][T10723] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 623.841944][T10723] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 04:51:34 executing program 4: socketpair(0x1f, 0x30000000, 0x0, &(0x7f00000000c0)) 04:51:34 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x30, 0x8, 0xff, 0x1f, 0x0, 0x2, 0x40104, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7, 0x20}, 0x201, 0x2, 0x100, 0x0, 0x54e0ada7, 0x4, 0x81}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x4, 0x70, 0x8b, 0x81, 0x97, 0x80, 0x0, 0x0, 0x40, 0xe, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0x11}, 0x4002, 0x4, 0xc79, 0x1, 0xffffffffffffff7f, 0x27, 0x5}, r0, 0x4, r1, 0xc) socket$kcm(0xa, 0x5, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) sendmsg(r2, &(0x7f00000006c0)={&(0x7f0000000100)=@nfc={0x27, 0x1, 0x9, 0x5}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0xfffffffffffffd28, 0x84, 0x7}], 0x10}, 0x4004001) 04:51:34 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000340)='cgroup.controllers\x00', 0x0, 0x0) r3 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={r3, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) gettid() write$cgroup_pid(r2, &(0x7f0000000d00)=r3, 0x12) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000000)={r0}) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000d40)=ANY=[@ANYBLOB="100000000000070000000000000000006a70085a27c85f5b8afca75a45eaae81cb8c8d7183549c63f472d8f231f7ea0d2bf0c594ce7823684500bbec4a6ec6b7bddc4d9871e48054439ac89a7018f7a1b66e1fbc33373548a41bc9b0ee8368d3144ce308a760ff6dea180efd089a871b14c9bb2dcd914eac5404c7916a61feb5762366e26b65cd95604db833657ec3a3ab383e5bc6909f1f6897486d3bae8c7381240f0a2feafaa05a6dbe390314fad5e9dde08877cf267bf4e9ea248411a65a8534b01486c2442e15df2f28000042f97a1d9805c3e423d1717baa1fa3c299"], 0x10}, 0x0) r4 = socket$kcm(0x29, 0x5, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r5, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000e40)='cpuausafe_\xc3\xcaD\x81.\xf5:\xfc\xf1\x05V\xcb\x81\xe0\xb0\xbc\xbbyk\xef\xca\xa0\x10zL\x19X\x011>QD\xa3*\x8d\x8c\xaa\x16+\x8e\xbc\x19t\xb8\xd4\xe1F\xf2_\xfc\xced@\x8c\xad\xc8\x84u\xad\'\x98*\x063\xdb\xcb\x9aO\xf6\"\xfb\x9f\xaa\x83p\xc7QF\xc7\xbe\x87\x19&z\xe2\x9b\n\'\xa3\xd5\xf8\xab7c\x04\xeepr\x9e\x91\x00Ki\xc9c\xd5\x834\xf2H^&\xc7\x83\xe7{\x95\xb4\x96RG}\xdeTX\x93R\xe6o\xdd(C\xf3\x99\x926\xben\xae\x94)\x10', 0x26e1, 0x0) openat$cgroup_ro(r6, 0x0, 0x0, 0x0) sendmsg$kcm(r6, &(0x7f0000000680)={&(0x7f0000000580)=@nfc={0x27, 0x1, 0x2, 0x4}, 0x80, &(0x7f0000000c40)=[{&(0x7f0000000340)}, {&(0x7f0000000600)="15ec0d16cdda98407fe761a4d8e5c945d058fa2c02538f6fdc94039d4abc902e11d54996219475e926a8d5ee9137c1233c59fa7c5904c9b199475ccde396e8f954329b379ac1164b90d9913afe4de2d34aada74ff3e8f549e7c2b422bbf4efcc", 0x60}, {&(0x7f0000000740)="388ba7341f2e6e304b613f3488de8844cbb8065928b0df0450715743aea3d1bb6b3f0d280290e598edb3560eebeb042fa0aa9bd1517e883b7a2e5daa42c670504fae1b484de614da234cd62574ac3ead0cdc506af9df5dd90175957e5faced1f6cb693c2cbcae88b7f0b3500e8c2b83919834f72ba49", 0x76}, {&(0x7f00000007c0)="d55eac4216eab9a0e092e357a0b1b6f5f659e9ed746cb9169073b9970f0f621e5ab163a001a061613c2a5e2c79e09d6f349993a5aa0be418cb7cedfb3e7489a0e58a02259f9cfd10a90e9d517e569a9b2f65c7de13041e57965f59890378e17c3dc7315ca932cb59de5598fbd79cc038fdfb", 0x72}, {&(0x7f0000000840)="9666242554ab3f756b686d834ad7f8b7327e13e4a297eb69dd9b5a0be61408c70f35aad69e77259ad866bd85092c2599909aba3e454187660914f027b6df174642de8f4a0b1f4758368e4efa91488efa87af28345b4923c9953d45beffadbcc661db6b22bb520dfca9de2ed008aefb6563ba435bc582f3904733bdd7d8de2a56711c28a5891d0c5e6fa5381a226b6da10c58d9d28608c7dda2593fc8d9ec51126180346e44da863b84de51b684f78b82d121c3d5f7c1e871e6526721cd80f56fc5f48610996446525d7d6fbc1b97357d3e5f817af004acf6221a59ca3e82ba4df4b0", 0xe2}, {&(0x7f0000000940)="1965d059a3081dd0769ac512455c28f8d9c6a2b017db3d015a6873354a7badc5777a6611c4efedc85c7140f0ad34ffbd942b26d60f40534c90a850b25e8066731274806c7be5179c1425dd10a5563e4b879ecd70c6f8f4462d697e940df3be07f6dacec3d7f88610af3349e17979516057af21ea708c9cdd64923ca1d6a21029a531e57eb7f839adcb1c163c99671256db80", 0x92}, {&(0x7f0000000a00)="406e04918d83a92e734ab5ee33d29498a5141a8782fb12dd5b36ce8cadf1f75c588f290d5672d0ad0274a3d78750181d879d721bb2c162b12e50b691c09b16a72b27dbf8a3ca30defd1440f1a0464be7c8fc9f2c2de38e32ab1ad2652e2edddc89a4bd045aedb658e3d0ecab4d811294efb7768198a4079590f335eab917874e9a6106beeb067f29d6d0e290e9d605ce718ca0a25c09d59686a50bf1f05a0481f888806e077d240978b1ecb8d39fb076f5ca56722f444dc2088f04c590ca1a08ab4bde7a2829fb683cb597d48b16afec03bf26a3d79b4aedeb495703cd768efbd5f4e26392cab0069ecdfca0cc1a8958f4d674d51c", 0xf5}, {&(0x7f0000000b00)="bb44a8150e0f81d9c3de4db5922b4be66f058a7b7659e1e97a4a9a292a1d1d636cb88b3c543de784c05bf432cdc4daa228675615e4e4804557e9d8b708dd21f9e25ebec7a11d8d5ddb874a2fe2149ccdd4eaa2c38d6a7a457833d5d65d06857439c3963382e87a08bea0dbca839fffb7d83537dfc49dd416f7ac102ba56646902b6ad9b388f0da515cc9a3c793fa253c03d4cebb263ef6d8051e599241bc2742fecd91cb02cf286cef3e0d961122fe5ba720095243", 0xb5}, {&(0x7f0000000bc0)="3e1420b5eb45dda58368b599aff5b90a41334d10bf23f4af149ba86a95e96e23257bc278403a6f5891348f5e773c2d8a29051a8f160ce5c69ab1c0d16adf3a7ee99d5054a38377e5055b6228c7a32ac9ac41661c26ce233b1c2e571c957b8a67f05ff37393a3d1a224bb8d2849e620dadec07803", 0x74}], 0x9}, 0x4000800) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r7, 0x0, 0x0, 0x0) sendmsg$kcm(r4, &(0x7f0000000300)={&(0x7f0000000180)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000200)="01f3d0b6ba22486e0586e0e4118e20842f6e9513b38cfd3c4f8a1613f3d34f93aaf590b398e2f1fa8d9c3096500bb512c8f7081633919cf707d1a9af8ea345dcf406b591a76948b44a7320263f71d265894c2866e8229dd0e13bfbda9d58c41faa4a5065ff1f51c87b279e07ac1c730f89cc3d11373794818c3c19c76074300ef79a3d0186fb28b622af3b60570cbe7d7d1a3a20be2d063e6c3bd85edc01f0c36457a161aa36bc6366f43f046e1993a64d7af79f2284df755358631b50e15ea21ba24764ddf8173070", 0xc9}], 0x10000379, &(0x7f00000003c0)=ANY=[@ANYRESOCT=r7], 0x17}, 0x20040003) 04:51:34 executing program 4: socketpair(0x1f, 0x30010000, 0x0, &(0x7f00000000c0)) [ 623.849923][T10723] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f565ee006d4 [ 623.857928][T10723] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 04:51:34 executing program 3 (fault-call:7 fault-nth:47): socketpair(0x0, 0x0, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 04:51:34 executing program 1: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={0x0, 0x0, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x2c, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:34 executing program 2: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) r2 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) sendmsg$kcm(r5, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r5, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:34 executing program 4: socketpair(0x1f, 0x31000000, 0x0, &(0x7f00000000c0)) 04:51:34 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) r1 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r1, 0xffffffffffffffff, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) mkdirat$cgroup(r2, &(0x7f0000000180)='syz0\x00', 0x1ff) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) openat$cgroup(r2, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) write$cgroup_pid(r2, &(0x7f0000000100)=r1, 0x12) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r1, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000180)='.\x00'}, 0x30) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r4, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r4) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00'}, 0x10) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x2d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="100076c0310000010000000000e2980030d718ad4ffaee4357708432c8834b76a0021b9871f347730dbf942ab54b8ef34300f1ce390366c3"], 0x10}, 0x0) 04:51:34 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x300, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18}, 0xfc) 04:51:34 executing program 4: socketpair(0x1f, 0x31010000, 0x0, &(0x7f00000000c0)) 04:51:34 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0xffffff1f, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18}, 0xfc) 04:51:34 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @multicast2}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0x0) [ 624.452319][T10766] FAULT_INJECTION: forcing a failure. [ 624.452319][T10766] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 624.512866][T10766] CPU: 1 PID: 10766 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 624.521582][T10766] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 624.531641][T10766] Call Trace: [ 624.534942][T10766] dump_stack+0x197/0x210 [ 624.539296][T10766] should_fail.cold+0xa/0x15 [ 624.543905][T10766] ? fault_create_debugfs_attr+0x180/0x180 [ 624.549720][T10766] ? ___might_sleep+0x163/0x2c0 [ 624.554589][T10766] should_fail_alloc_page+0x50/0x60 [ 624.559795][T10766] __alloc_pages_nodemask+0x1a1/0x910 [ 624.565177][T10766] ? __alloc_pages_slowpath+0x2920/0x2920 [ 624.570899][T10766] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 624.577139][T10766] ? find_next_bit+0x107/0x130 [ 624.581923][T10766] pcpu_populate_chunk+0xf8/0x940 [ 624.586953][T10766] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 624.592681][T10766] ? find_next_bit+0xe7/0x130 [ 624.597379][T10766] pcpu_alloc+0xd5b/0x1380 [ 624.601989][T10766] ? pcpu_alloc_area+0x820/0x820 [ 624.606938][T10766] ? bpf_map_area_alloc+0x20/0x30 [ 624.611998][T10766] __alloc_percpu_gfp+0x28/0x30 [ 624.616858][T10766] htab_map_alloc+0xdb9/0x11c0 [ 624.621654][T10766] ? htab_map_update_elem+0xca0/0xca0 [ 624.627034][T10766] __do_sys_bpf+0x478/0x3810 [ 624.631653][T10766] ? bpf_prog_load+0x18f0/0x18f0 [ 624.636601][T10766] ? __kasan_check_write+0x14/0x20 [ 624.641718][T10766] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 624.647278][T10766] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 624.652648][T10766] ? wait_for_completion+0x440/0x440 [ 624.657955][T10766] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 624.664221][T10766] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 624.669690][T10766] ? do_syscall_64+0x26/0x790 [ 624.674374][T10766] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 624.680448][T10766] ? do_syscall_64+0x26/0x790 [ 624.686096][T10766] __x64_sys_bpf+0x73/0xb0 [ 624.690662][T10766] do_syscall_64+0xfa/0x790 [ 624.695177][T10766] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 624.701073][T10766] RIP: 0033:0x45a919 [ 624.704982][T10766] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 624.724601][T10766] RSP: 002b:00007f565edffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 624.733023][T10766] RAX: ffffffffffffffda RBX: 00007f565edffc90 RCX: 000000000045a919 [ 624.741006][T10766] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 624.748985][T10766] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 04:51:34 executing program 1: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={0x0, 0x0, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x2c, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:34 executing program 4: socketpair(0x1f, 0x32000000, 0x0, &(0x7f00000000c0)) 04:51:35 executing program 4: socketpair(0x1f, 0x32010000, 0x0, &(0x7f00000000c0)) [ 624.756965][T10766] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f565ee006d4 [ 624.764939][T10766] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 04:51:35 executing program 3 (fault-call:7 fault-nth:48): socketpair(0x0, 0x0, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 04:51:35 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x10}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r1, 0xc0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xfffffffffffffff8, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x6, 0x3}, 0x0, 0x0, &(0x7f0000000200)={0x3, 0xd, 0x22e, 0x3ff}, &(0x7f0000000240)=0xc0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=0xb4a}}, 0x10) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="7bc1cbbf3bf2cdc03d4129e3cb10000000000000"], 0x10}, 0x0) 04:51:35 executing program 4: socketpair(0x1f, 0x33000000, 0x0, &(0x7f00000000c0)) 04:51:35 executing program 2: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) r2 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) sendmsg$kcm(r5, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r5, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:35 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0xffffff80, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18}, 0xfc) 04:51:35 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000000)={0xa, 0x1ff, 0x4, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r3, &(0x7f0000000340), &(0x7f0000000400)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, 0x0, &(0x7f00000000c0)=""/85}, 0x20) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@pppoe={0x18, 0x0, {0x3, @random="a1a812585420", 'batadv0\x00'}}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c5", 0x1}], 0x1, &(0x7f0000000000)=ANY=[@ANYPTR=&(0x7f0000000180)=ANY=[@ANYPTR=&(0x7f00000000c0)=ANY=[@ANYRESOCT=r2, @ANYRESDEC=r3]]], 0x8}, 0x2) 04:51:35 executing program 4: socketpair(0x1f, 0x33010000, 0x0, &(0x7f00000000c0)) 04:51:35 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0xffffff82, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18}, 0xfc) [ 625.083538][T10800] FAULT_INJECTION: forcing a failure. [ 625.083538][T10800] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 625.132069][T10800] CPU: 1 PID: 10800 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 625.140778][T10800] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 625.140789][T10800] Call Trace: [ 625.154124][T10800] dump_stack+0x197/0x210 [ 625.158469][T10800] should_fail.cold+0xa/0x15 [ 625.163079][T10800] ? fault_create_debugfs_attr+0x180/0x180 [ 625.168891][T10800] ? ___might_sleep+0x163/0x2c0 [ 625.173760][T10800] should_fail_alloc_page+0x50/0x60 [ 625.178969][T10800] __alloc_pages_nodemask+0x1a1/0x910 [ 625.184350][T10800] ? __alloc_pages_slowpath+0x2920/0x2920 [ 625.190085][T10800] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 625.196322][T10800] ? find_next_bit+0x107/0x130 [ 625.196346][T10800] pcpu_populate_chunk+0xf8/0x940 [ 625.196361][T10800] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 625.196374][T10800] ? find_next_bit+0xe7/0x130 [ 625.196396][T10800] pcpu_alloc+0xd5b/0x1380 [ 625.220957][T10800] ? pcpu_alloc_area+0x820/0x820 [ 625.225907][T10800] ? bpf_map_area_alloc+0x20/0x30 [ 625.231043][T10800] __alloc_percpu_gfp+0x28/0x30 [ 625.235912][T10800] htab_map_alloc+0xdb9/0x11c0 [ 625.240707][T10800] ? htab_map_update_elem+0xca0/0xca0 [ 625.246094][T10800] __do_sys_bpf+0x478/0x3810 [ 625.250700][T10800] ? bpf_prog_load+0x18f0/0x18f0 [ 625.255648][T10800] ? __kasan_check_write+0x14/0x20 [ 625.260779][T10800] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 625.266329][T10800] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 625.271632][T10800] ? wait_for_completion+0x440/0x440 [ 625.276919][T10800] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 625.276949][T10800] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 625.276962][T10800] ? do_syscall_64+0x26/0x790 [ 625.276976][T10800] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 625.276988][T10800] ? do_syscall_64+0x26/0x790 [ 625.277013][T10800] __x64_sys_bpf+0x73/0xb0 [ 625.308477][T10800] do_syscall_64+0xfa/0x790 [ 625.312999][T10800] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 625.319330][T10800] RIP: 0033:0x45a919 04:51:35 executing program 4: socketpair(0x1f, 0x34000000, 0x0, &(0x7f00000000c0)) [ 625.323227][T10800] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 625.342832][T10800] RSP: 002b:00007f565edffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 625.342847][T10800] RAX: ffffffffffffffda RBX: 00007f565edffc90 RCX: 000000000045a919 [ 625.342856][T10800] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 625.342865][T10800] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 04:51:35 executing program 1: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={0x0, 0x0, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x2c, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:35 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0xffffffc0, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18}, 0xfc) [ 625.342875][T10800] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f565ee006d4 [ 625.342884][T10800] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 04:51:35 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="1000000000000000840000010000000001048751b5be5a9c1d9ad29e74d5f7ee7ddccf2078a4726077da2fa033f1b6a06bf194220c1fb18a213b89f079ecd92c20088759ff764b9393616257d45b5913f90be2fddab55b6170000e85f0de49be55cc"], 0x10}, 0x0) r1 = socket$kcm(0x29, 0x6, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r3, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000200)={0x4, 0x70, 0x7, 0x3, 0x0, 0x6, 0x0, 0x1, 0x10, 0x8, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x72940b3c, 0x4, @perf_config_ext={0x8}, 0x1, 0x1, 0x4, 0x0, 0x7ff, 0x2, 0x6}, r3, 0x10, 0xffffffffffffffff, 0x4) close(r2) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xfffffc61) openat$cgroup_ro(r2, &(0x7f0000000a00)='cpuset.effective_cpus\x00', 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x17d7b778}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f000000c140)={&(0x7f000000a8c0)=@can={0x1d, 0x0}, 0x80, &(0x7f000000c040)=[{&(0x7f000000a940)=""/74, 0x4a}, {&(0x7f000000a9c0)=""/164, 0xa4}, {0x0}, {&(0x7f000000bb80)=""/76, 0x4c}, {&(0x7f000000bc00)=""/84, 0x54}, {0x0}, {&(0x7f000000be80)=""/202, 0xca}], 0x7, &(0x7f000000c100)=""/6, 0x6}, 0x2000) perf_event_open$cgroup(&(0x7f0000000180)={0x2, 0x70, 0x81, 0x7a, 0xef, 0x6, 0x0, 0xbe31, 0x800, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x2, @perf_config_ext={0x8, 0x1}, 0x14865, 0x0, 0x101, 0xb, 0x7fff, 0x101, 0x3000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0xc) ioctl$TUNSETIFINDEX(r2, 0x400454da, &(0x7f0000000300)=r4) sendmsg$kcm(r1, &(0x7f0000001fc0)={&(0x7f0000001880)=@can={0x1d, r4}, 0x80, &(0x7f0000001e00)=[{&(0x7f0000001900)="53cdf3e6d8a98e2165434394c5c58d2f21e819c7472b9f5154bf6a2414cdd6550f85c0dd37467bdfb3d3c46f", 0x2c}, {&(0x7f0000001940)="2e58c3ef51b6cdc3a173548f6958dbb184071bdde887febb251d45f69c05df8d1a654af72f805d9ac9db59848a888fc5ca3832b3483603e612642a7b575f8ba25059f8f5802fb101dd4a268b49e7a4f968109dea550ffcc90d48297532056b1a017e37c21168e192ca09d1182af3076c6031febd3b041fa76cb35cc6199b5f78", 0x80}, {&(0x7f00000019c0)="78bc82e99d2f58094fd0f19ac6d252205411edde92b10bd2721b764c275d829d821404c83916acdcecee2fb4ec80043ff0290c4a6974b985b7372dd288a204c372cad9320c5b10a275e1f450e328faab33f4cd5ecd58266a781fa7c5e3d48af884cd09a53821b0f91e206f71b1ef06c7eb22a1deddb43c17c70c7883b001d581ad57e4eaddfcd04444a1165ae230567c4c2828db50671597efd9a8f26753f17786de752939d0c0ba16b34c3beadd0d4e85b6173f56cee6d41034d1b7ada7fc1052f441f781bbe2c21b1e57efac7dacc8bfa06bbff138d4549d23aa843defaa8c9d358ee1a4f3890db68f2a", 0xeb}, {&(0x7f0000001ac0)="156806af2961d617c728de2c9d6ecf2dde30a5b2a71d58d79d633821148269540f889165a7703ad1903e46e43ac960e3d893c0dcfc43b03cba1ef7b3be1fe2b6f208f3d8945014cc723d9fb57e5ce0e161329949b8b107289b975179ab2b9c026f0f4b4e2656a48c6a3527afe14cadb91d", 0x71}, {&(0x7f0000001b40)="c85a183fa33dfbd4363b54b07df947a51bf302ed32dbff00589afd3f23e5b2cd10ac452733cb5429457ea93b30e513d6d91ed34dd2b5f89daf4f693ce827735de40c4865e93489777ef41fbb20e45e5e87034b9e14044fdb79d96a0cc62615cce2b791ab8e50f92501a80dbc2cbdee893bbcd7358ea6316c12d81e04409b1a756d2f60648c64bef6fe5b09450b887424344906c23880aabc6eb8f54fbc0c97870cc32bb1704cb267bb6238085f9178dbb68e30bd0118bb97adb6d3c24c0409c117a94e84f81b882d8833327080c3e9cfd8c650f9653051fc1ed82161edb41a5bba261b1d9d8b6793bceabc12df1f6e9d685f", 0xf2}, {&(0x7f0000001c40)="61b1ecd9232479eee7cccd38c485fd96ba05194aa81fffda72653fd05a0b2412155872215e98d74d000d4c6d5409afca1fca2eb4451a027e130fbf177a20ffadea0382fcce21adffa3afec09e57ae4f04897edee937763e81c1b41bcb2646ed06254313c62c8aab4a5b16704c024fb983325be4d2ac871d4b249b6abbf6bcec2565c71a9b2", 0x85}, {&(0x7f0000001d00)="d915d37318b8a779d24848c7f40874818dc44350bd9675fc7c3d66e966affabd9166e94e6d1ac77c4f34f6f85996029e41c3afc7639211868180841e6909", 0x3e}, {&(0x7f0000001d40)="86bad3374913801d37138759337f8b0ba4758109e122d9963f32b2c623ddfc1ef977b07db9da071cc07bd7094936c9f46443bd903de2467cb704028c179a4285d116bbc137bb1fbd83c56f42773301804d743e7395153bdc9e3fe3aa8bf8939a4f62828196c64209c8169203158be041d9a19d82217cec6ad4488b95277c34185cc8701fa2bb96fe63aead98d090bc4af1d642ae72e51a18f7793a9b4c95b83a0ee39cd4f107abcc378b6c911246a3fb4a", 0xb1}], 0x8, &(0x7f0000001e80)=[{0x10, 0xf89ee53395edcd84, 0x9}, {0x68, 0x105, 0x10000, "eedac851b0eef147668b5d7270f7973031f19bf5eba84f992380aa86f3bc5a0821cfdf1bf0eeec990c2ecbcc2aadd063655c29b40ea566590e21617fa7822d2c2536f2073bc176aa6cd7b9b18a4aeba55e73"}, {0xa8, 0x118, 0x3, "8c3d8ebc0b2e6571432dc1b740f25bb1d92e34cd590643607c7007e842ae2ef9e373663a94772cba6187a4ec7e39d4db54307b4204c4370b41651d8cf88e31c30a2773161b0bbc7c692828d37afbf79306e7efb3640340fa9d93c8b8a0bf0753fd913347a7079ba3b6c5288edb271d47eb3cd2d111bf7889182a9ac8ab089f1f3241215a9b26071d79de3da8f8041c043e58e904696047"}], 0x120}, 0x1) r5 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r5, 0xffffffffffffffff, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) mkdirat$cgroup(r6, &(0x7f0000000180)='syz0\x00', 0x1ff) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40086602, 0x400007) r7 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000000)={0xa, 0x1ff, 0x4, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r7, &(0x7f0000000340), &(0x7f0000000400)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r7, 0x0, &(0x7f00000000c0)=""/85}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', r7}, 0x10) write$cgroup_subtree(r6, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) ioctl$TUNSETFILTEREBPF(r6, 0x6611, 0x0) openat$cgroup(r6, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) write$cgroup_pid(r6, &(0x7f0000000100)=r5, 0x12) r8 = perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x7f, 0x1, 0x1a, 0x4, 0x0, 0x1f, 0x2240, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0xe}, 0x102, 0x9, 0x9, 0x0, 0x4, 0xb73e, 0x9c}, r5, 0xc, 0xffffffffffffffff, 0x10) ioctl$PERF_EVENT_IOC_QUERY_BPF(r8, 0xc008240a, &(0x7f0000000400)={0x7, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) 04:51:35 executing program 3 (fault-call:7 fault-nth:49): socketpair(0x0, 0x0, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 04:51:35 executing program 2: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) r2 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) sendmsg$kcm(r5, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r5, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:35 executing program 4: socketpair(0x1f, 0x34010000, 0x0, &(0x7f00000000c0)) 04:51:36 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0xffffffc2, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18}, 0xfc) 04:51:36 executing program 4: socketpair(0x1f, 0x35000000, 0x0, &(0x7f00000000c0)) [ 625.784707][T10837] FAULT_INJECTION: forcing a failure. [ 625.784707][T10837] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 625.812222][T10837] CPU: 0 PID: 10837 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 625.820941][T10837] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 625.831016][T10837] Call Trace: [ 625.834311][T10837] dump_stack+0x197/0x210 [ 625.834342][T10837] should_fail.cold+0xa/0x15 [ 625.834366][T10837] ? fault_create_debugfs_attr+0x180/0x180 [ 625.834386][T10837] ? ___might_sleep+0x163/0x2c0 [ 625.853950][T10837] should_fail_alloc_page+0x50/0x60 [ 625.859161][T10837] __alloc_pages_nodemask+0x1a1/0x910 [ 625.864565][T10837] ? __alloc_pages_slowpath+0x2920/0x2920 [ 625.870334][T10837] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 625.876596][T10837] ? find_next_bit+0x107/0x130 04:51:36 executing program 4: socketpair(0x1f, 0x35010000, 0x0, &(0x7f00000000c0)) [ 625.881391][T10837] pcpu_populate_chunk+0xf8/0x940 [ 625.886434][T10837] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 625.892174][T10837] ? find_next_bit+0xe7/0x130 [ 625.896888][T10837] pcpu_alloc+0xd5b/0x1380 [ 625.901341][T10837] ? pcpu_alloc_area+0x820/0x820 [ 625.906293][T10837] ? bpf_map_area_alloc+0x20/0x30 [ 625.911349][T10837] __alloc_percpu_gfp+0x28/0x30 [ 625.916220][T10837] htab_map_alloc+0xdb9/0x11c0 [ 625.921030][T10837] ? htab_map_update_elem+0xca0/0xca0 [ 625.926420][T10837] __do_sys_bpf+0x478/0x3810 [ 625.931036][T10837] ? bpf_prog_load+0x18f0/0x18f0 [ 625.935994][T10837] ? __kasan_check_write+0x14/0x20 [ 625.941117][T10837] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 625.946663][T10837] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 625.946685][T10837] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 625.946703][T10837] ? debug_smp_processor_id+0x33/0x18a [ 625.946724][T10837] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 625.946772][T10837] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 625.975305][T10837] ? do_syscall_64+0x26/0x790 04:51:36 executing program 4: socketpair(0x1f, 0x36000000, 0x0, &(0x7f00000000c0)) [ 625.980001][T10837] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 625.986080][T10837] ? do_syscall_64+0x26/0x790 [ 625.990787][T10837] __x64_sys_bpf+0x73/0xb0 [ 625.995232][T10837] do_syscall_64+0xfa/0x790 [ 625.999763][T10837] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 626.005675][T10837] RIP: 0033:0x45a919 [ 626.009586][T10837] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 04:51:36 executing program 1: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, 0x0}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x2c, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) [ 626.029206][T10837] RSP: 002b:00007f565edffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 626.037640][T10837] RAX: ffffffffffffffda RBX: 00007f565edffc90 RCX: 000000000045a919 [ 626.045618][T10837] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 626.045629][T10837] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 626.045640][T10837] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f565ee006d4 [ 626.045650][T10837] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 04:51:36 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x1, &(0x7f0000000380)=[{0xf, 0x84, 0x7, '\n'}], 0x18}, 0xfc) 04:51:36 executing program 2: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) r2 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) sendmsg$kcm(r5, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r5, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:36 executing program 3 (fault-call:7 fault-nth:50): socketpair(0x0, 0x0, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) [ 626.256550][T10859] FAULT_INJECTION: forcing a failure. [ 626.256550][T10859] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 626.273150][ C1] net_ratelimit: 2 callbacks suppressed [ 626.273224][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 626.285092][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 626.291414][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 626.297654][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 626.335804][T10859] CPU: 0 PID: 10859 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 626.344530][T10859] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 626.354596][T10859] Call Trace: [ 626.357906][T10859] dump_stack+0x197/0x210 [ 626.362266][T10859] should_fail.cold+0xa/0x15 [ 626.366877][T10859] ? fault_create_debugfs_attr+0x180/0x180 [ 626.372703][T10859] ? ___might_sleep+0x163/0x2c0 [ 626.377587][T10859] should_fail_alloc_page+0x50/0x60 [ 626.382798][T10859] __alloc_pages_nodemask+0x1a1/0x910 [ 626.388191][T10859] ? __alloc_pages_slowpath+0x2920/0x2920 [ 626.394043][T10859] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 626.400297][T10859] ? find_next_bit+0x107/0x130 [ 626.405091][T10859] pcpu_populate_chunk+0xf8/0x940 [ 626.410129][T10859] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 626.415860][T10859] ? find_next_bit+0xe7/0x130 [ 626.420573][T10859] pcpu_alloc+0xd5b/0x1380 [ 626.425027][T10859] ? pcpu_alloc_area+0x820/0x820 [ 626.429984][T10859] ? bpf_map_area_alloc+0x20/0x30 [ 626.435047][T10859] __alloc_percpu_gfp+0x28/0x30 [ 626.439916][T10859] htab_map_alloc+0xdb9/0x11c0 [ 626.444726][T10859] ? htab_map_update_elem+0xca0/0xca0 [ 626.450122][T10859] __do_sys_bpf+0x478/0x3810 [ 626.454741][T10859] ? bpf_prog_load+0x18f0/0x18f0 [ 626.459698][T10859] ? __kasan_check_write+0x14/0x20 [ 626.464827][T10859] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 626.470380][T10859] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 626.475679][T10859] ? wait_for_completion+0x440/0x440 [ 626.480996][T10859] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 626.487279][T10859] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 626.492754][T10859] ? do_syscall_64+0x26/0x790 [ 626.497451][T10859] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 626.503530][T10859] ? do_syscall_64+0x26/0x790 [ 626.508232][T10859] __x64_sys_bpf+0x73/0xb0 [ 626.512669][T10859] do_syscall_64+0xfa/0x790 [ 626.517200][T10859] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 626.523105][T10859] RIP: 0033:0x45a919 [ 626.527015][T10859] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 626.546634][T10859] RSP: 002b:00007f565edffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 626.555068][T10859] RAX: ffffffffffffffda RBX: 00007f565edffc90 RCX: 000000000045a919 [ 626.563054][T10859] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 626.571040][T10859] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 626.579014][T10859] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f565ee006d4 04:51:36 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f00000000c0)={r0, r2}) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)}, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x410142, 0x0) ioctl$TUNSETPERSIST(r4, 0x400454cb, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r5, 0x0, 0x0, 0x0) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x1) 04:51:36 executing program 4: socketpair(0x1f, 0x36010000, 0x0, &(0x7f00000000c0)) 04:51:36 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x1, &(0x7f0000000380)=[{0x24, 0x84, 0x7, '\n'}], 0x18}, 0xfc) 04:51:36 executing program 1: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, 0x0}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x2c, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) [ 626.586983][T10859] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 04:51:37 executing program 4: socketpair(0x1f, 0x37000000, 0x0, &(0x7f00000000c0)) 04:51:37 executing program 2: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) r2 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) sendmsg$kcm(r5, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r5, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:37 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x1, &(0x7f0000000380)=[{0x28, 0x84, 0x7, '\n'}], 0x18}, 0xfc) 04:51:37 executing program 4: socketpair(0x1f, 0x37010000, 0x0, &(0x7f00000000c0)) 04:51:37 executing program 3 (fault-call:7 fault-nth:51): socketpair(0x0, 0x0, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 04:51:37 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x1, &(0x7f0000000380)=[{0x20000398, 0x84, 0x7, '\n'}], 0x18}, 0xfc) 04:51:37 executing program 1: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, 0x0}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x2c, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="0b08da6e96e9af8e50e8aeea267d45fc47d2e6f37dfc3aec5247f245d2e51d3c3e73be1a04b9f7f28b07d631f6b73ce58543acc3f03b49636b862d4f99bb20b6d70fc0f4e863d2868516b94ad8ffb9ed41cb944234444dc51b2251cebcd04e3734bd34ac8718dab51d12778b5071f0635ba4e3395e65d1dee3c671bf9357c2a5b365639d917494b38c9f70bd691356de5da68ff827e64236afbd4ec381715dbc8d06c0999516342a02189274e0a4da97c7e098ed6cc696451a824516c5c7e59d734d0923daffb51e63b4e0011fe1e3f98ef6d615c96d8e74095831238f13b6bd7985e2b2c8db7f9d10e021f338e6038f31832d715885b0612c0c", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) [ 626.950778][T10892] FAULT_INJECTION: forcing a failure. [ 626.950778][T10892] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 627.025140][T10892] CPU: 1 PID: 10892 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 627.033838][T10892] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 627.033846][T10892] Call Trace: [ 627.033870][T10892] dump_stack+0x197/0x210 [ 627.033895][T10892] should_fail.cold+0xa/0x15 [ 627.033918][T10892] ? fault_create_debugfs_attr+0x180/0x180 [ 627.061942][T10892] ? ___might_sleep+0x163/0x2c0 [ 627.066812][T10892] should_fail_alloc_page+0x50/0x60 04:51:37 executing program 4: socketpair(0x1f, 0x38000000, 0x0, &(0x7f00000000c0)) [ 627.066828][T10892] __alloc_pages_nodemask+0x1a1/0x910 [ 627.066851][T10892] ? __alloc_pages_slowpath+0x2920/0x2920 [ 627.083159][T10892] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 627.089409][T10892] ? find_next_bit+0x107/0x130 [ 627.094190][T10892] pcpu_populate_chunk+0xf8/0x940 [ 627.099225][T10892] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 627.104950][T10892] ? find_next_bit+0xe7/0x130 [ 627.109647][T10892] pcpu_alloc+0xd5b/0x1380 [ 627.114083][T10892] ? pcpu_alloc_area+0x820/0x820 [ 627.119032][T10892] ? bpf_map_area_alloc+0x20/0x30 [ 627.124076][T10892] __alloc_percpu_gfp+0x28/0x30 [ 627.128933][T10892] htab_map_alloc+0xdb9/0x11c0 [ 627.133721][T10892] ? htab_map_update_elem+0xca0/0xca0 [ 627.139105][T10892] __do_sys_bpf+0x478/0x3810 [ 627.143713][T10892] ? bpf_prog_load+0x18f0/0x18f0 [ 627.148658][T10892] ? __kasan_check_write+0x14/0x20 [ 627.153770][T10892] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 627.159324][T10892] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 627.164620][T10892] ? wait_for_completion+0x440/0x440 [ 627.169923][T10892] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 627.176177][T10892] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 627.181628][T10892] ? do_syscall_64+0x26/0x790 [ 627.186305][T10892] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 627.192366][T10892] ? do_syscall_64+0x26/0x790 [ 627.197152][T10892] __x64_sys_bpf+0x73/0xb0 [ 627.201566][T10892] do_syscall_64+0xfa/0x790 [ 627.206080][T10892] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 627.211974][T10892] RIP: 0033:0x45a919 [ 627.215864][T10892] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 627.235467][T10892] RSP: 002b:00007f565edffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 627.243885][T10892] RAX: ffffffffffffffda RBX: 00007f565edffc90 RCX: 000000000045a919 [ 627.251862][T10892] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 627.259838][T10892] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 627.267808][T10892] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f565ee006d4 [ 627.267818][T10892] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 [ 627.392675][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 627.393080][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 627.398500][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 627.404349][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 627.409997][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 627.416269][ C0] protocol 88fb is buggy, dev hsr_slave_0 04:51:38 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x19, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff}, [@map={0x18, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}, @exit, @call={0x85, 0x0, 0x0, 0x17}]}, &(0x7f0000000080)='GPL\x00', 0x7f, 0x1000, &(0x7f0000000740)=""/4096, 0x1f00, 0x3, [], 0x0, 0x12, r1, 0x8, &(0x7f00000000c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000180)={0x5, 0x3, 0xcd9, 0x6}, 0x10, 0xffffffffffffffff}, 0x78) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000240)={0xffffffffffffffff, r2}) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0x0) 04:51:38 executing program 4: socketpair(0x1f, 0x38010000, 0x0, &(0x7f00000000c0)) 04:51:38 executing program 2: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) r2 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) sendmsg$kcm(r5, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r5, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:38 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x1, &(0x7f0000000380)=[{0x18, 0x84, 0x2, '\n'}], 0x18}, 0xfc) 04:51:38 executing program 3 (fault-call:7 fault-nth:52): socketpair(0x0, 0x0, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 04:51:38 executing program 1: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}], 0x1}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x2c, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:38 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x1, &(0x7f0000000380)=[{0x18, 0x84, 0x5, '\n'}], 0x18}, 0xfc) 04:51:38 executing program 4: socketpair(0x1f, 0x39000000, 0x0, &(0x7f00000000c0)) [ 627.823407][T10924] FAULT_INJECTION: forcing a failure. [ 627.823407][T10924] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 627.912837][T10924] CPU: 0 PID: 10924 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 627.921577][T10924] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 627.931653][T10924] Call Trace: [ 627.934966][T10924] dump_stack+0x197/0x210 [ 627.939344][T10924] should_fail.cold+0xa/0x15 [ 627.943963][T10924] ? fault_create_debugfs_attr+0x180/0x180 [ 627.949777][T10924] ? ___might_sleep+0x163/0x2c0 [ 627.954643][T10924] should_fail_alloc_page+0x50/0x60 [ 627.959834][T10924] __alloc_pages_nodemask+0x1a1/0x910 [ 627.965207][T10924] ? __alloc_pages_slowpath+0x2920/0x2920 [ 627.970947][T10924] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 627.977179][T10924] ? find_next_bit+0x107/0x130 [ 627.981947][T10924] pcpu_populate_chunk+0xf8/0x940 [ 627.986964][T10924] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 627.992672][T10924] ? find_next_bit+0xe7/0x130 [ 627.997354][T10924] pcpu_alloc+0xd5b/0x1380 [ 628.001776][T10924] ? pcpu_alloc_area+0x820/0x820 [ 628.006705][T10924] ? bpf_map_area_alloc+0x20/0x30 [ 628.011739][T10924] __alloc_percpu_gfp+0x28/0x30 [ 628.016584][T10924] htab_map_alloc+0xdb9/0x11c0 [ 628.021371][T10924] ? htab_map_update_elem+0xca0/0xca0 [ 628.026753][T10924] __do_sys_bpf+0x478/0x3810 [ 628.031339][T10924] ? bpf_prog_load+0x18f0/0x18f0 [ 628.036268][T10924] ? __kasan_check_write+0x14/0x20 [ 628.041369][T10924] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 628.046909][T10924] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 628.052188][T10924] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 628.058431][T10924] ? debug_smp_processor_id+0x33/0x18a [ 628.063884][T10924] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 628.070056][T10924] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 628.075506][T10924] ? do_syscall_64+0x26/0x790 [ 628.080169][T10924] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 628.086225][T10924] ? do_syscall_64+0x26/0x790 [ 628.090906][T10924] __x64_sys_bpf+0x73/0xb0 [ 628.095341][T10924] do_syscall_64+0xfa/0x790 [ 628.099843][T10924] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 628.105725][T10924] RIP: 0033:0x45a919 [ 628.109624][T10924] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 628.129216][T10924] RSP: 002b:00007f565edffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 628.137743][T10924] RAX: ffffffffffffffda RBX: 00007f565edffc90 RCX: 000000000045a919 [ 628.145709][T10924] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 628.153671][T10924] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 628.161639][T10924] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f565ee006d4 [ 628.169620][T10924] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 04:51:38 executing program 2: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) r2 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) sendmsg$kcm(r5, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r5, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:38 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) close(r2) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xfffffc61) openat$cgroup_ro(r2, &(0x7f0000000a00)='cpuset.effective_cpus\x00', 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x17d7b778}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f000000c140)={&(0x7f000000a8c0)=@can={0x1d, 0x0}, 0x80, &(0x7f000000c040)=[{&(0x7f000000a940)=""/74, 0x4a}, {&(0x7f000000a9c0)=""/164, 0xa4}, {0x0}, {&(0x7f000000bb80)=""/76, 0x4c}, {&(0x7f000000bc00)=""/84, 0x54}, {0x0}, {&(0x7f000000be80)=""/202, 0xca}], 0x7, &(0x7f000000c100)=""/6, 0x6}, 0x2000) ioctl$TUNSETIFINDEX(r2, 0x400454da, &(0x7f0000000300)=r3) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x7, 0x4, 0x1f, 0x20, 0x201, 0x1, 0x7, [], r3, r1, 0x1, 0x3}, 0x3c) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000000)={0xffffffffffffffff, r0}) 04:51:38 executing program 4: socketpair(0x1f, 0x39010000, 0x0, &(0x7f00000000c0)) 04:51:38 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x1, &(0x7f0000000380)=[{0x18, 0x84, 0x6, '\n'}], 0x18}, 0xfc) 04:51:38 executing program 1: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}], 0x1}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x2c, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:38 executing program 3 (fault-call:7 fault-nth:53): socketpair(0x0, 0x0, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 04:51:38 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="a4", 0x1}], 0x1, &(0x7f0000000380)=ANY=[@ANYBLOB="10000000000000998420000007000050"], 0x10}, 0x0) 04:51:38 executing program 4: socketpair(0x1f, 0x3a000000, 0x0, &(0x7f00000000c0)) 04:51:38 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x1, &(0x7f0000000380)=[{0x18, 0x84, 0x8, '\n'}], 0x18}, 0xfc) 04:51:39 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x1, &(0x7f0000000380)=[{0x18, 0x84, 0x9, '\n'}], 0x18}, 0xfc) 04:51:39 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=ANY=[@ANYBLOB="1000000500007d368400000007000000"], 0x10}, 0x0) [ 628.718358][T10967] FAULT_INJECTION: forcing a failure. [ 628.718358][T10967] name fail_page_alloc, interval 1, probability 0, space 0, times 0 04:51:39 executing program 4: socketpair(0x1f, 0x3a010000, 0x0, &(0x7f00000000c0)) 04:51:39 executing program 2: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) r2 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) sendmsg$kcm(r5, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r5, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="0b08da6e96e9af8e50e8aeea267d45fc47d2e6f37dfc3aec5247f245d2e51d3c3e73be1a04b9f7f28b07d631f6b73ce58543acc3f03b49636b862d4f99bb20b6d70fc0f4e863d2868516b94ad8ffb9ed41cb944234444dc51b2251cebcd04e3734bd34ac8718dab51d12778b5071f0635ba4e3395e65d1dee3c671bf9357c2a5b365639d917494b38c9f70bd691356de5da68ff827e64236afbd4ec381715dbc8d06c0999516342a02189274e0a4da97c7e098ed6cc696451a824516c5c7e59d734d0923daffb51e63b4e0011fe1e3f98ef6d615c96d8e74095831238f13b6bd7985e2b2c8db7f9d10e021f338e6038f31832d715885b0612c0c", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:39 executing program 1: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}], 0x1}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x2c, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:39 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) recvmsg$kcm(r1, &(0x7f0000000600)={&(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000180)=""/224, 0xe0}, {&(0x7f0000000280)=""/186, 0xba}, {&(0x7f00000003c0)=""/228, 0xe4}, {&(0x7f0000000000)=""/57, 0x39}, {&(0x7f00000004c0)=""/137, 0x89}], 0x5, &(0x7f0000000340)=""/3, 0x3}, 0x101) 04:51:39 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x1, &(0x7f0000000380)=[{0x18, 0x84, 0xa, '\n'}], 0x18}, 0xfc) 04:51:39 executing program 4: socketpair(0x1f, 0x3b000000, 0x0, &(0x7f00000000c0)) [ 628.951748][T10967] CPU: 1 PID: 10967 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 628.960454][T10967] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 628.970518][T10967] Call Trace: [ 628.973831][T10967] dump_stack+0x197/0x210 [ 628.978180][T10967] should_fail.cold+0xa/0x15 [ 628.982785][T10967] ? fault_create_debugfs_attr+0x180/0x180 [ 628.988602][T10967] ? ___might_sleep+0x163/0x2c0 [ 628.993474][T10967] should_fail_alloc_page+0x50/0x60 [ 628.998675][T10967] __alloc_pages_nodemask+0x1a1/0x910 [ 629.004057][T10967] ? __alloc_pages_slowpath+0x2920/0x2920 [ 629.009798][T10967] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 629.016044][T10967] ? find_next_bit+0x107/0x130 [ 629.020824][T10967] pcpu_populate_chunk+0xf8/0x940 [ 629.025858][T10967] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 629.031588][T10967] ? find_next_bit+0xe7/0x130 [ 629.036290][T10967] pcpu_alloc+0xd5b/0x1380 [ 629.040736][T10967] ? pcpu_alloc_area+0x820/0x820 [ 629.045685][T10967] ? bpf_map_area_alloc+0x20/0x30 [ 629.050732][T10967] __alloc_percpu_gfp+0x28/0x30 [ 629.055594][T10967] htab_map_alloc+0xdb9/0x11c0 [ 629.060399][T10967] ? htab_map_update_elem+0xca0/0xca0 [ 629.065781][T10967] __do_sys_bpf+0x478/0x3810 [ 629.070393][T10967] ? bpf_prog_load+0x18f0/0x18f0 [ 629.075341][T10967] ? __kasan_check_write+0x14/0x20 [ 629.080462][T10967] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 629.086015][T10967] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 629.091310][T10967] ? wait_for_completion+0x440/0x440 [ 629.096613][T10967] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 629.102875][T10967] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 629.108345][T10967] ? do_syscall_64+0x26/0x790 [ 629.113036][T10967] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 629.119102][T10967] ? do_syscall_64+0x26/0x790 [ 629.123778][T10967] __x64_sys_bpf+0x73/0xb0 [ 629.128193][T10967] do_syscall_64+0xfa/0x790 [ 629.132701][T10967] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 629.132714][T10967] RIP: 0033:0x45a919 [ 629.132729][T10967] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 629.132737][T10967] RSP: 002b:00007f565edffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 629.142498][T10967] RAX: ffffffffffffffda RBX: 00007f565edffc90 RCX: 000000000045a919 [ 629.142508][T10967] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 629.142517][T10967] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 629.142527][T10967] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f565ee006d4 [ 629.142536][T10967] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 04:51:39 executing program 3 (fault-call:7 fault-nth:54): socketpair(0x0, 0x0, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 04:51:39 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x1, &(0x7f0000000380)=[{0x18, 0x84, 0xb, '\n'}], 0x18}, 0xfc) 04:51:39 executing program 4: socketpair(0x1f, 0x3b010000, 0x0, &(0x7f00000000c0)) 04:51:39 executing program 1: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}], 0x1}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x2c, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:39 executing program 2: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x2c, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="0b08da6e96e9af8e50e8aeea267d45fc47d2e6f37dfc3aec5247f245d2e51d3c3e73be1a04b9f7f28b07d631f6b73ce58543acc3f03b49636b862d4f99bb20b6d70fc0f4e863d2868516b94ad8ffb9ed41cb944234444dc51b2251cebcd04e3734bd34ac8718dab51d12778b5071f0635ba4e3395e65d1dee3c671bf9357c2a5b365639d917494b38c9f70bd691356de5da68ff827e64236afbd4ec381715dbc8d06c0999516342a02189274e0a4da97c7e098ed6cc696451a824516c5c7e59d734d0923daffb51e63b4e0011fe1e3f98ef6d615c96d8e74095831238f13b6bd7985e2b2c8db7f9d10e021f338e6038f31832d715885b0612c0c", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) [ 629.497763][T11007] FAULT_INJECTION: forcing a failure. [ 629.497763][T11007] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 629.520879][T11007] CPU: 1 PID: 11007 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 629.529691][T11007] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 629.539750][T11007] Call Trace: [ 629.543045][T11007] dump_stack+0x197/0x210 [ 629.543072][T11007] should_fail.cold+0xa/0x15 [ 629.543094][T11007] ? fault_create_debugfs_attr+0x180/0x180 [ 629.543109][T11007] ? ___might_sleep+0x163/0x2c0 [ 629.543133][T11007] should_fail_alloc_page+0x50/0x60 [ 629.567845][T11007] __alloc_pages_nodemask+0x1a1/0x910 [ 629.573236][T11007] ? __alloc_pages_slowpath+0x2920/0x2920 [ 629.578980][T11007] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 629.585226][T11007] ? find_next_bit+0x107/0x130 [ 629.590008][T11007] pcpu_populate_chunk+0xf8/0x940 [ 629.595040][T11007] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 629.600767][T11007] ? find_next_bit+0xe7/0x130 [ 629.605469][T11007] pcpu_alloc+0xd5b/0x1380 [ 629.605503][T11007] ? pcpu_alloc_area+0x820/0x820 [ 629.614846][T11007] ? bpf_map_area_alloc+0x20/0x30 [ 629.619886][T11007] __alloc_percpu_gfp+0x28/0x30 [ 629.624734][T11007] htab_map_alloc+0xdb9/0x11c0 [ 629.624770][T11007] ? htab_map_update_elem+0xca0/0xca0 [ 629.634886][T11007] __do_sys_bpf+0x478/0x3810 [ 629.639491][T11007] ? bpf_prog_load+0x18f0/0x18f0 04:51:40 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x1, &(0x7f0000000380)=[{0x18, 0x84, 0xc, '\n'}], 0x18}, 0xfc) [ 629.644438][T11007] ? __kasan_check_write+0x14/0x20 [ 629.649558][T11007] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 629.655111][T11007] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 629.660409][T11007] ? wait_for_completion+0x440/0x440 [ 629.665708][T11007] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 629.671974][T11007] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 629.677432][T11007] ? do_syscall_64+0x26/0x790 [ 629.682096][T11007] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 629.688147][T11007] ? do_syscall_64+0x26/0x790 [ 629.692831][T11007] __x64_sys_bpf+0x73/0xb0 [ 629.697256][T11007] do_syscall_64+0xfa/0x790 [ 629.701772][T11007] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 629.707668][T11007] RIP: 0033:0x45a919 [ 629.711568][T11007] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 629.731166][T11007] RSP: 002b:00007f565edffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 629.739567][T11007] RAX: ffffffffffffffda RBX: 00007f565edffc90 RCX: 000000000045a919 04:51:40 executing program 4: socketpair(0x1f, 0x3c000000, 0x0, &(0x7f00000000c0)) [ 629.747531][T11007] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 629.755481][T11007] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 629.763470][T11007] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f565ee006d4 [ 629.771429][T11007] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 04:51:40 executing program 4: socketpair(0x1f, 0x3c010000, 0x0, &(0x7f00000000c0)) 04:51:40 executing program 3 (fault-call:7 fault-nth:55): socketpair(0x0, 0x0, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 04:51:40 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0cfe2c201e0204383dff89aea92c0cb343c9cd47908b3cecab803dce65075511aa9ee423969f9763a34c"], 0x10}, 0x0) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@rxrpc=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e21, 0x2, @ipv4={[], [], @broadcast}, 0x1}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000740)="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", 0x1000}, {&(0x7f0000000180)="e8ba60c7ed574a9e41b55e06deef4e0f5c720397b24033485ba3bcc42430bb98d7c7e21b779d33dfb0521bc3b0a2674a9523d573f736f91076befb63e6efa541ce8866a414a8184afe063cdf858a970af9b2485b2401e88e0c2aa0dd8c42944dff1f293ab540556d51062a709eed7224", 0x70}, {&(0x7f0000000200)="2bc063853fcd4a76b4596d06b0162561f31486a110ddd2f2235bb711647cce47d96ac3dedb74fc49d5e953112c0bfb185d85b3d5241c970cd4ad51b7b1d5830291153b2fb348646c8a9117a665f3ffc077b95d3b12f4da31d7cedac04656ac674e12ccd9c4e2113abd246b2937a73c4806de87d27471e99d63c5f5b6af568520f779541ad9c451446f13936341e821195f22cce28b1d5d003e8261373d4ba1c8b050110d329187438dc8c2750b85db41c25d2da439e7a830ee05681ff45bfe71fc6133a3bc", 0xc5}], 0x3, &(0x7f0000000340)=[{0x48, 0x108, 0x0, "07a861ef27b6d854f2101e355b59aaf8ffb74ba10a6600252522cb77d565ed835bf50d5265b88f06da95dc3cf2decf80661e93ac4f"}, {0x78, 0x92, 0x5, "7f65fe3084bf0ac4991832ad3bf6ef00fc4cc26e3f3d8f97deaabb0249b07fa0ea4869c592ba34a0b58323a0bd914b295196a7e315908d86c469cd71889074010d29eba5eb10c9565c23ac85ac9618861b267e50efbfa19b435758cda8604fac62cd8dbc10c6ec70"}, {0x10, 0x117, 0x4f57}, {0x50, 0x115, 0x6, "7813d0054696456655e386f65c4c09a06f45c0bfc99aab3562bf5f195f64254cd507ead4ad01842f273b7a448c60c07a62e17fcaf6ee0b5545f6"}], 0x120}, 0x101) 04:51:40 executing program 1: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}], 0x1}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x2c, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="0b08da6e96e9af8e50e8aeea267d45fc47d2e6f37dfc3aec5247f245d2e51d3c3e73be1a04b9f7f28b07d631f6b73ce58543acc3f03b49636b862d4f99bb20b6d70fc0f4e863d2868516b94ad8ffb9ed41cb944234444dc51b2251cebcd04e3734bd34ac8718dab51d12778b5071f0635ba4e3395e65d1dee3c671bf9357c2a5b365639d917494b38c9f70bd691356de5da68ff827e64236afbd4ec381715dbc8d06c0999516342a02189274e0a4da97c7e098ed6cc696451a824516c5c7e59d734d0923daffb51e63b4e0011fe1e3f98ef6d615c96d8e74095831238f13b6bd7985e2b2c8db7f9d10e021f338e6038f31832d715885b0612c0c", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:40 executing program 2: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x2c, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:40 executing program 4: socketpair(0x1f, 0x3d000000, 0x0, &(0x7f00000000c0)) 04:51:40 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x1, &(0x7f0000000380)=[{0x18, 0x84, 0x10, '\n'}], 0x18}, 0xfc) [ 630.102017][T11033] FAULT_INJECTION: forcing a failure. [ 630.102017][T11033] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 630.163231][T11033] CPU: 1 PID: 11033 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 630.171947][T11033] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 630.182004][T11033] Call Trace: [ 630.185310][T11033] dump_stack+0x197/0x210 [ 630.189652][T11033] should_fail.cold+0xa/0x15 [ 630.194262][T11033] ? fault_create_debugfs_attr+0x180/0x180 [ 630.200079][T11033] ? ___might_sleep+0x163/0x2c0 [ 630.204951][T11033] should_fail_alloc_page+0x50/0x60 [ 630.210160][T11033] __alloc_pages_nodemask+0x1a1/0x910 [ 630.215553][T11033] ? __alloc_pages_slowpath+0x2920/0x2920 [ 630.221300][T11033] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 630.227557][T11033] ? find_next_bit+0x107/0x130 [ 630.232346][T11033] pcpu_populate_chunk+0xf8/0x940 [ 630.237383][T11033] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 630.243110][T11033] ? find_next_bit+0xe7/0x130 [ 630.247806][T11033] pcpu_alloc+0xd5b/0x1380 [ 630.252246][T11033] ? pcpu_alloc_area+0x820/0x820 [ 630.257194][T11033] ? bpf_map_area_alloc+0x20/0x30 [ 630.262243][T11033] __alloc_percpu_gfp+0x28/0x30 [ 630.267105][T11033] htab_map_alloc+0xdb9/0x11c0 [ 630.271883][T11033] ? htab_map_update_elem+0xca0/0xca0 [ 630.277271][T11033] __do_sys_bpf+0x478/0x3810 [ 630.281960][T11033] ? bpf_prog_load+0x18f0/0x18f0 [ 630.287004][T11033] ? __kasan_check_write+0x14/0x20 [ 630.292130][T11033] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 630.297686][T11033] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 630.302985][T11033] ? wait_for_completion+0x440/0x440 [ 630.308290][T11033] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 630.314559][T11033] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 630.320014][T11033] ? do_syscall_64+0x26/0x790 [ 630.324690][T11033] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 630.324703][T11033] ? do_syscall_64+0x26/0x790 [ 630.324725][T11033] __x64_sys_bpf+0x73/0xb0 [ 630.324742][T11033] do_syscall_64+0xfa/0x790 [ 630.324766][T11033] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 630.350260][T11033] RIP: 0033:0x45a919 04:51:40 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000000c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1f}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000180)="6cb346cee6c713d78161e5872c2ee7d349168e0f3138084f6e0a40ff0c25aed842307dac4232ce8587e4cd68f186eabce093490f73515d2d2ddcb7c5b1e46f55f6d890f2c4bbbbc83e09cc70c555b94728ef0d3ed3", 0x55}, {&(0x7f0000000200)="7a309bbc1171bc6be2c5bc627f893ce2d237e3ccbe077b0507353442a4a92496b6dfb9c80cde49f61e3e19a7dba64aebff7ed211e6a2905a697a09e163312fcc8fba36f94556bd20b21e98ea377ee06e490607157502f9482f99", 0x5a}, {&(0x7f0000000280)="9ee2714030217be94a8b0dae0deeb675fe233f58972f217b0f03ce9a102f8b8a015e0af629ebe5f23b17a298c3c3d5ccda9954e1434aae9aa04573590f752f81448dd908657fba5a803dca44d2f08bf9e2fc2f46dfb6ce6b141a6f891070eb48a1eb3df68829182122031ddaf1787d37", 0x70}], 0x3, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0x0) socketpair$tipc(0x1e, 0x7, 0x0, &(0x7f0000000000)) 04:51:40 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x1, &(0x7f0000000380)=[{0x18, 0x84, 0x7, "02"}], 0x18}, 0xfc) 04:51:40 executing program 4: socketpair(0x1f, 0x3d010000, 0x0, &(0x7f00000000c0)) [ 630.354167][T11033] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 630.373784][T11033] RSP: 002b:00007f565edffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 630.382216][T11033] RAX: ffffffffffffffda RBX: 00007f565edffc90 RCX: 000000000045a919 [ 630.390306][T11033] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 630.398294][T11033] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 630.406272][T11033] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f565ee006d4 [ 630.414255][T11033] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 04:51:40 executing program 2: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x2c, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="0b08da6e96e9af8e50e8aeea267d45fc47d2e6f37dfc3aec5247f245d2e51d3c3e73be1a04b9f7f28b07d631f6b73ce58543acc3f03b49636b862d4f99bb20b6d70fc0f4e863d2868516b94ad8ffb9ed41cb944234444dc51b2251cebcd04e3734bd34ac8718dab51d12778b5071f0635ba4e3395e65d1dee3c671bf9357c2a5b365639d917494b38c9f70bd691356de5da68ff827e64236afbd4ec381715dbc8d06c0999516342a02189274e0a4da97c7e098ed6cc696451a824516c5c7e59d734d0923daffb51e63b4e0011fe1e3f98ef6d615c96d8e74095831238f13b6bd7985e2b2c8db7f9d10e021f338e6038f31832d715885b0612c0c", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:40 executing program 1: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}], 0x1}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x2c, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:40 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f00000003c0)={&(0x7f0000000080)=@isdn={0x22, 0x0, 0x6e, 0x40, 0x3f}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000180)="3656237dd86dbdb0a03220d80d6f72b9abce2d336af07d677064f674d8d5ab16d13f4a3ddf70eba64bf2dcdeb234e383ee6e7ff6d069b1ab5871eea6ee484726cee9d16de6ecd2559b9245cda0838526e0c8319c1ee0e2cb081e0d3d0c01be15843ccefecbddd9bd875606a279d00cfb4dd752ddc65ab67d90e8728f830dd2833ca3ffb4a9ab9d2d1bbe96bbdf53aaea286008182ae01738185d65b9fb5c22acf37ebf96217066d36f9a27c6c38780ee", 0xb0}, {&(0x7f0000000240)="2f67c50b8deab70e367cc1abb0fd3907d73414150b4d441db758f74b9d8b2c7487bb1f213ee2607c11ab80ea65a3e57ec5f4b98f74dd2d22bb5b83771cbb1cf0b615b250a84e7015fdff0c69475411374cd3eff490426e789e", 0x59}, {&(0x7f00000002c0)="00f74b7213ab3e67887df28ca5336e4bdfaae0618f35f5ec14aff35f2c34449362c1eee71b6c33d8a21a6f904fa7af28140d483c93133b3ecf5a5473b6e688b8bc6531448382afa9628ebe3114a9d5261a27c809ecc0cc1c4cf6e320a076ccc07b98cfbc976cc64ed33ef159c07efbf99f751faedd61257480215565ad795add2caff7978a6eded5c55acbf881c16c57ca416a8d843864d52321f9ec7d733c846b105fe57f86e74213", 0xa9}], 0x3, &(0x7f0000000740)=[{0x40, 0x104, 0x80000001, "03b891de340ba81dc1857f3034b9248c4ccbe14d0fce28a012048629de3e731be2497b1ba15f4e9e8440aa29fc33"}, {0x1010, 0x111, 0x20, "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"}, {0xc8, 0x110, 0x7e, "5b738724452713c0898dfca16647ac92cf0dac987f5e23643dc1611ea966f1a36bcb5a677a4d4d1225d00ac5344852b08047e5a8183ed8818f8eff45ccbac4acc9a93252d7b173294ff511425f433a77e6226b8c1f7c4c215c8959a258d1a01b3f7764dfa1114deb653910722c53b22c76ad46311452fe4473dd9439eb9347404448075b104835fc9d22e2260594b005428a546090f1b3c1214f2c17e4bd43d9b04828af4185f019aaa742c416d9f03ccfef15fbc1"}, {0xb8, 0x10f, 0x4, "760c65bcfaa7e4d0538c25228622cfaa711680aaea173dc4ce982eebafeef3523d75b55c5e74395423f1446f21a690b38c9ab43579eda55fcc15dccf7b8618cbcbfd57629b12f7eaaec53ddcd70b4d152bccf7bb8d3bc281f5b2584293f284b958e072a400a9ffca3ad336bbf19b050f3e4181fcea85f6e56191b9f3f1ef2861061003d57c376364e09ee368cc22f13ac731829417fbdd0cd9c374e54eba603b2514"}, {0x110, 0x6, 0x1000, "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"}], 0x12e0}, 0x8000) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000440)={r2, 0x0, 0x1, 0x101, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0], 0x4}, 0x20) socket$kcm(0x29, 0x0, 0x0) 04:51:40 executing program 3 (fault-call:7 fault-nth:56): socketpair(0x0, 0x0, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 04:51:41 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x1, &(0x7f0000000380)=[{0x18, 0x84, 0x7, "03"}], 0x18}, 0xfc) 04:51:41 executing program 4: socketpair(0x1f, 0x3e000000, 0x0, &(0x7f00000000c0)) [ 630.823449][T11074] FAULT_INJECTION: forcing a failure. [ 630.823449][T11074] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 630.870057][T11074] CPU: 1 PID: 11074 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 630.878771][T11074] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 630.888831][T11074] Call Trace: [ 630.892137][T11074] dump_stack+0x197/0x210 [ 630.896489][T11074] should_fail.cold+0xa/0x15 [ 630.901084][T11074] ? fault_create_debugfs_attr+0x180/0x180 [ 630.906878][T11074] ? ___might_sleep+0x163/0x2c0 [ 630.911720][T11074] should_fail_alloc_page+0x50/0x60 [ 630.916910][T11074] __alloc_pages_nodemask+0x1a1/0x910 [ 630.922273][T11074] ? __alloc_pages_slowpath+0x2920/0x2920 [ 630.927991][T11074] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 630.934223][T11074] ? find_next_bit+0x107/0x130 [ 630.938978][T11074] pcpu_populate_chunk+0xf8/0x940 [ 630.943990][T11074] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 630.949696][T11074] ? find_next_bit+0xe7/0x130 [ 630.954379][T11074] pcpu_alloc+0xd5b/0x1380 [ 630.958788][T11074] ? pcpu_alloc_area+0x820/0x820 [ 630.963847][T11074] ? bpf_map_area_alloc+0x20/0x30 [ 630.968888][T11074] __alloc_percpu_gfp+0x28/0x30 [ 630.973731][T11074] htab_map_alloc+0xdb9/0x11c0 [ 630.978496][T11074] ? htab_map_update_elem+0xca0/0xca0 [ 630.983857][T11074] __do_sys_bpf+0x478/0x3810 [ 630.988446][T11074] ? bpf_prog_load+0x18f0/0x18f0 [ 630.993373][T11074] ? __kasan_check_write+0x14/0x20 [ 630.998490][T11074] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 631.004022][T11074] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 631.009309][T11074] ? wait_for_completion+0x440/0x440 [ 631.014590][T11074] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 631.020829][T11074] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 631.026274][T11074] ? do_syscall_64+0x26/0x790 [ 631.030951][T11074] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 631.037003][T11074] ? do_syscall_64+0x26/0x790 [ 631.041669][T11074] __x64_sys_bpf+0x73/0xb0 [ 631.046077][T11074] do_syscall_64+0xfa/0x790 [ 631.050567][T11074] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 631.056443][T11074] RIP: 0033:0x45a919 [ 631.060338][T11074] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 631.079950][T11074] RSP: 002b:00007f565edffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 631.088348][T11074] RAX: ffffffffffffffda RBX: 00007f565edffc90 RCX: 000000000045a919 [ 631.096319][T11074] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 631.104286][T11074] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 631.112241][T11074] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f565ee006d4 04:51:41 executing program 4: socketpair(0x1f, 0x3e010000, 0x0, &(0x7f00000000c0)) 04:51:41 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="86e0331d3cc91ac344b70d6f2a71e7430942e4184c9c21aed9357759fca7a5ee43896c15d0612fcda3925555677f42b2b0fe69e015ab122a586ef649b8d3b00a00aa6bd9c7373f615176bccf03b5eb80fb320e9baeeeb04f007f3765639f7acd0b815926bf975de25981dab5a585535ed83ae0ff7d8a17bf49363d9b579c4ad1fbdd5327469e54cc659d9fc71742bfda6be2eafe02b64f9d0dceac9d3f1848a011c2a287e73f59911edb2d91f6ea1c01024b5f92fdc9414285890ade08c41a5c20e924a481867542", 0xc8}, {&(0x7f0000000280)="41754a93675c60219ce2c03c99168a8cdb584ce30fdcc01363776a7a700cd812a4738e0904d3f32f46e3ce31de321d4e8ce8444fb4a350973622afe097dc2411f11560f6bcfa7e20c54ad14cfe5cb38314ee00d3c678d9704126859e3839c817695b6bfc3b6ba153c8b9dcadba9231170cc8cc766d31580916811ffd4396e542e35f90bdad6b84516011ec241281ab244799edf77bfe5a121eb29eb8dd5b2e6af3a5ae8b2d4219165fbecad897c402212afdcb", 0xb3}, {&(0x7f00000003c0)="5972731a673033fdee8cfa5f89ca8553dfd7aef177f0f470a5d9f011b264e230f12151f8df0bfb0bf5571dd387b2012a0d79bcc7b0c1b922a152c6006205a7f69656199e74d68541de4a70e1477a2558f1f9665bca192bd672699666b38321ef1fb5f0328b3e4d09c68609595df8eba9b29334552f98da2b48935baecc6fc7e42fe4febdec3140160b1380275ee07156359c0cc21fad4f71d0fe", 0x9a}, {&(0x7f0000000480)="f7bc4b02a05c43c576138f59e12814b615a05335e72b57cfd426025fad3754c3e57497da916eae3a954d70a28d6d00ad357461ff91ec2920213a8caa2f3fc2f358438d9ea28e2a2baf69ca8f1b4eb8813101bee2725ebad44d9213d287679b4a9ccfb7af2fe7c1ee987b2a195889aa407dc728033a871f2d9289a2f33845cd0f93cb2fbeb99fe631d9416b2c75dda6fc3260153f8dcf40a82e0c7a435bbbbd4d54bd838333385324921b3bfd57f84c53c0dee1d695d4a4b53420bc7f79a10d2c197503ab", 0xc4}], 0x4, &(0x7f0000000740)=[{0xa0, 0x10a, 0x3, "ee04da1eb7a781284c1cb563c522a1fd0aae4b3a7a73afc1b7b659d98945cace721344c2e1c8ff2fb7ca21e91c4442ba015a7ada1d9237617b0b251173ca342b531c6c9e821c805f8c9e1c353975f7c6f26167995e96d23fe1fe140421c65ec8b868c721753ddf18c86bbe2e75b25062d8c4f936b39b0ab8fe5f9e9b44a0b9b052c2ae64ed5f772a0c1c4da40a"}, {0x58, 0x291, 0x9, "26205620adaf203119bba71c70286ee4d797d58bbdff4f811fca8b0b435bed8f730fcb9e7830ba275e406ef9868a3ae5370069487b96d79ae3f1022bbc571e5d2854"}, {0xe8, 0x113, 0x5, "e9310e487ad92ad7b16c54db5a0ab7f5a40624a2664b333d08bee0252c1696b37d344173d2374cd4a327172708022b3569e4590820daec4b71c4086a5d60569f8471951491ca63bf6812f254e035e8ac6337ee74bc77264e551b72d15dd10d5bcd685224268f976ee36fa5f49bef8e2eac6b299170b2ed3526ace74cc6df626e202fd37f3f56d493c2b80d6005f8d249592ace5e1e3c089775fb54630aa7b2d58bba66fd76b8c1652c9bdfc25a7b69b97f0ee6086291a6b80c1de20179262259bc18cc3ab027cd8b940fafb11e43dcc956fdd39e23"}, {0x108, 0x107, 0x4, "3b740dea08de2c90fc9f36132d861814bb8b9a5cc24cd34a051732450681a4e09aa6e77176e6d295412ba65e72dc68ddce5e8b24468e48e8bea3e12b0d7b403b90370f3399800c47659e1dfd6df46cbfc4c0f7789d2e8f84a19126ab4b5f5b27be51a5e1b0006c2ead29539a9e3e02168abf41f00fb69ef77c346bbd0b94e5e57e2a2cad28f5959db33c59f59089045236a7e91db6ea4830947891bbe06f0f9e4fe662c5031bb67cbca739f0aa2d8ede9125ea50bd9b84988e941d32e87e983033c5644fdfd1e97134eb9268f3e52727116129d79b36ebb087578e027821f04da89b7d23ea2928ef6e7174e50477b7053b2228d7fbb0"}, {0xb0, 0x1, 0x8, "6fe2c4533b8092f902df6ec12047905b8f132db8d8a67a6537c76b722141e6c599a6206bd00d883cbdef451488c5532a97963df342f14bd8782e83854ef6cc6ffbde63d3a6bdf3624ad8074b7fec249fa6a84babbf9658445bad6366454efbddb09d98d8ff3868c18e3d6286e3156f020a05c4cfab0861a7e44e7ad800bbce8a6be8e176a8e9894718154bdb8a854fcf137328d2a6711d7f22a71f"}, {0x1010, 0x100, 0x0, "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"}, {0x108, 0x63, 0xffffffe0, "b859b01a417fb7fbeb09fcc9d806838fcfe3ded36f308522de57ccec35045cb63e4946c28ee3bab2e87d6efc2a32bb7f4760009ee5e44e110c8de9dc00153f735df757556bd439d86d0a9998c27768494327300d543a9f44fd6255850c3d3d3620a3cd50d2f3049c3fa3fc4524bc712df0fe309c9a263d74502766445a763d98d6313ed75c780fd4b28347be35624a54a3f2aa9606a684369599e0fc8f94488981e0f8de05128d094d00e4b483d24edf5034faa9b09cb67e336807972961c16b6215ad8f634a52624daf8ea30d682393822fe976a3a256d1d5839b76c093e5232cfd8127b1aa7a06270199fa2f1cd738a5"}, {0x48, 0xa924487c439ba8c1, 0x6ff, "c3656d3cf348759c87b78c15d900a179b1dce1bf07e2da2ea271a4c99b47b08ce7b9dd5ab8f3723ff9ffc3beb632556f1d"}, {0x60, 0x10a, 0x4, "ee03df8d973831119415b4fdc0e274d9af6d5298ed1312b87a15cdc57504877d524aad9b00c9886674e3f5b37b382d30847f10a0906cd6d35241afc600a4f591bc659459008bb061287457ed"}], 0x1558}, 0x40040000) [ 631.120206][T11074] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 04:51:41 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x1, &(0x7f0000000380)=[{0x18, 0x84, 0x7, "04"}], 0x18}, 0xfc) 04:51:41 executing program 1: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x2c, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:41 executing program 2: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:41 executing program 4: socketpair(0x1f, 0x3f000000, 0x0, &(0x7f00000000c0)) 04:51:41 executing program 5: bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x6e1e, 0x8d}, 0xc) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0x0) 04:51:41 executing program 4: socketpair(0x1f, 0x3f010000, 0x0, &(0x7f00000000c0)) 04:51:41 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0xfffd, @remote}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000000)="2289ae21", 0x4}], 0x1, &(0x7f0000000080)}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) close(r1) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) openat$cgroup_ro(r1, &(0x7f0000000a00)='cpuset.effective_cpus\x00', 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x17d7b778}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f000000c140)={&(0x7f000000a8c0)=@can={0x1d, 0x0}, 0x80, &(0x7f000000c040)=[{&(0x7f000000a940)=""/74, 0x4a}, {&(0x7f000000a9c0)=""/164, 0xa4}, {0x0}, {&(0x7f000000bb80)=""/76, 0x4c}, {&(0x7f000000bc00)=""/84, 0x54}, {0x0}, {&(0x7f000000be80)=""/202, 0xca}], 0x7, &(0x7f000000c100)=""/6, 0x6}, 0x2000) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f0000000300)=r2) sendmsg$kcm(r0, &(0x7f0000000680)={&(0x7f0000000040)=@hci={0x1f, r2, 0x1}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000180)="392dd1992d48d01785decfc0b487e28786fba0d1cd85182d5463607274fd65124190b3466fa529a7baa57c4514fba0c31cfe167298c61b3ce98067818013265b48c1de873b9cba683d8656d58fe6e6743de76eb47c", 0x55}, {&(0x7f0000000200)="1a104983f22ea0c8b1662adbaed1b465275285b0b4143a61f4cc542431c22dd2450bbcd6195a261e7f6a40726a50662e5a0f7a8f851ec4ecb59ec7683b02fcc34e9f00899efa8b547d202c4d2bf78f764d5b9908afc848465934cd666776966b85fc86793c6a6d631e54701b251c1f73e1566ef6f2347547a317d2a944b8e531beb055414c5970211913ec31e84a1a7f215a1b172a63279d267bc3", 0x9b}, {&(0x7f00000002c0)="ffcab40b10f64a7dda675aa93fe05624820496812e16ccb18662321d86978af7b225a9d2caa5d208578133a6c127c1f04b2542a7ee70807b202258b0d0f26a5edf2cdb8ea84e4dccbacb9ab127110977382318b3aa5037e5218a3e017f401901e7dc800b4e488a3ea45ae69eba8e0b6987726843a6c14b9b18cc3eff08e81f199503443a0d207ee5053c4390b7b290f62def5604ec4bac39fadb04b61adc57f12593fabed261d985b9b863b2acaa83fd642cc953800af03c8a4d92fe734203dace", 0xc1}, {&(0x7f0000000740)="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", 0x1000}, {&(0x7f00000003c0)="a223aec6075c08e7e2e5193ab7355f4dee742a9f10a4e3dd8870bb462cfde9a6ad209b8220acf8419eb33106743016067c8163d8c5e08bd62977fe94b92213d820a1d1311e3a85efe87a911843c7", 0x4e}, {&(0x7f0000000440)="13023ac8a93914a94cde68aba8fe060b9d291d4a7ace243e64fe9ab52b677634c58b8706c8a4ffdcdb85fc84b9d915b9ca16f4cefafaa9a83da7f8f3b6f742054593b90ecfa9a32b8afa13f75e52038551df67e3995314af7daea07d3d9391f67080a5aa73b3c723f12e5e6b7eafb5d328b68af77576545d10412637bb642b84674255a03ac3dee97787aa31cb55c05e8641cd90f2f957264f5c43480d675452018824650e03", 0xa6}, {&(0x7f0000000500)="49a9294f886e31bee3d8c5caf3dbfdb3a04fdf98d35f0f2d81a38e56ce53e104c84b0d425c03b9a014d0dabfa143fd13b748761b661875e6ee5097022d975459fe6678588acf17dbce669d01bb7bccb13fd7f441e444392300ae659282e6850e2b34b848d73ad2098f6ea40d534a59f695d63f806c27bd182d96d9520dfda93397f52cf8af64cd04b2b8057d6a2774642b2d26fdb3004508548c2d1995d82f49910293f263861f67a269ef6a1bf2202c66a752692424db3dbe0c1bbd5a89bbf4549f812ad5ecd06856e5f856b53706e949e4a3ae1297f59a52ab694cf4327ed65b43b8982b6f87", 0xe7}, {&(0x7f00000000c0)='=', 0x1}], 0x8}, 0x4001) 04:51:42 executing program 3 (fault-call:7 fault-nth:57): socketpair(0x0, 0x0, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 04:51:42 executing program 2: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:42 executing program 1: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x2c, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:42 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x1, &(0x7f0000000380)=[{0x18, 0x84, 0x7, "05"}], 0x18}, 0xfc) 04:51:42 executing program 4: socketpair(0x1f, 0x40000000, 0x0, &(0x7f00000000c0)) 04:51:42 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=ANY=[@ANYBLOB="1000010000000000840800000032c8e0"], 0x10}, 0x0) [ 631.865424][T11125] FAULT_INJECTION: forcing a failure. [ 631.865424][T11125] name fail_page_alloc, interval 1, probability 0, space 0, times 0 04:51:42 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x1, &(0x7f0000000380)=[{0x18, 0x84, 0x7, "06"}], 0x18}, 0xfc) [ 631.970766][T11125] CPU: 1 PID: 11125 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 631.979471][T11125] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 631.989530][T11125] Call Trace: [ 631.992835][T11125] dump_stack+0x197/0x210 [ 631.997184][T11125] should_fail.cold+0xa/0x15 [ 632.001784][T11125] ? fault_create_debugfs_attr+0x180/0x180 [ 632.007599][T11125] ? ___might_sleep+0x163/0x2c0 [ 632.012474][T11125] should_fail_alloc_page+0x50/0x60 04:51:42 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0x0) gettid() 04:51:42 executing program 4: socketpair(0x1f, 0x40010000, 0x0, &(0x7f00000000c0)) [ 632.017683][T11125] __alloc_pages_nodemask+0x1a1/0x910 [ 632.023073][T11125] ? __alloc_pages_slowpath+0x2920/0x2920 [ 632.028814][T11125] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 632.035070][T11125] ? find_next_bit+0x107/0x130 [ 632.035095][T11125] pcpu_populate_chunk+0xf8/0x940 [ 632.035108][T11125] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 632.035124][T11125] ? find_next_bit+0xe7/0x130 [ 632.055263][T11125] pcpu_alloc+0xd5b/0x1380 [ 632.059699][T11125] ? pcpu_alloc_area+0x820/0x820 [ 632.064647][T11125] ? bpf_map_area_alloc+0x20/0x30 [ 632.069695][T11125] __alloc_percpu_gfp+0x28/0x30 [ 632.074562][T11125] htab_map_alloc+0xdb9/0x11c0 [ 632.079351][T11125] ? htab_map_update_elem+0xca0/0xca0 [ 632.084744][T11125] __do_sys_bpf+0x478/0x3810 [ 632.089334][T11125] ? bpf_prog_load+0x18f0/0x18f0 [ 632.094286][T11125] ? __kasan_check_write+0x14/0x20 [ 632.099414][T11125] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 632.104971][T11125] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 632.110277][T11125] ? wait_for_completion+0x440/0x440 [ 632.115588][T11125] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 632.121857][T11125] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 632.127331][T11125] ? do_syscall_64+0x26/0x790 [ 632.132021][T11125] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 632.138096][T11125] ? do_syscall_64+0x26/0x790 [ 632.142795][T11125] __x64_sys_bpf+0x73/0xb0 [ 632.147232][T11125] do_syscall_64+0xfa/0x790 [ 632.151750][T11125] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 632.157652][T11125] RIP: 0033:0x45a919 04:51:42 executing program 4: socketpair(0x1f, 0x41000000, 0x0, &(0x7f00000000c0)) [ 632.161553][T11125] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 632.181169][T11125] RSP: 002b:00007f565edffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 632.189589][T11125] RAX: ffffffffffffffda RBX: 00007f565edffc90 RCX: 000000000045a919 [ 632.197572][T11125] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 632.205544][T11125] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 632.205553][T11125] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f565ee006d4 04:51:42 executing program 1: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x2c, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="0b08da6e96e9af8e50e8aeea267d45fc47d2e6f37dfc3aec5247f245d2e51d3c3e73be1a04b9f7f28b07d631f6b73ce58543acc3f03b49636b862d4f99bb20b6d70fc0f4e863d2868516b94ad8ffb9ed41cb944234444dc51b2251cebcd04e3734bd34ac8718dab51d12778b5071f0635ba4e3395e65d1dee3c671bf9357c2a5b365639d917494b38c9f70bd691356de5da68ff827e64236afbd4ec381715dbc8d06c0999516342a02189274e0a4da97c7e098ed6cc696451a824516c5c7e59d734d0923daffb51e63b4e0011fe1e3f98ef6d615c96d8e74095831238f13b6bd7985e2b2c8db7f9d10e021f338e6038f31832d715885b0612c0c", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:42 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=ANY=[@ANYBLOB="31f3dd2c000000098400006356367200"], 0x10}, 0x0) socketpair(0x1, 0x800, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000340)={&(0x7f0000000080)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000180)=""/111, 0x6f}, {&(0x7f0000000200)=""/54, 0x36}, {&(0x7f0000000240)=""/192, 0xc0}, {&(0x7f00000003c0)=""/229, 0xe5}, {&(0x7f0000000300)=""/43, 0x2b}, {&(0x7f00000004c0)=""/214, 0xd6}, {&(0x7f00000005c0)=""/207, 0xcf}, {&(0x7f0000000740)=""/91, 0x5b}, {&(0x7f00000007c0)=""/134, 0x86}], 0x9}, 0x10000) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) r3 = openat$cgroup(r2, &(0x7f0000000940)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r3, &(0x7f0000000980)='memory.stat\x00', 0x0, 0x0) [ 632.205561][T11125] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 04:51:42 executing program 3 (fault-call:7 fault-nth:58): socketpair(0x0, 0x0, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 04:51:42 executing program 2: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:42 executing program 4: socketpair(0x1f, 0x41010000, 0x0, &(0x7f00000000c0)) 04:51:42 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) socketpair(0x4, 0x1, 0x6, &(0x7f0000000040)) openat$cgroup_ro(r1, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000080)=@nl=@unspec, 0x2c, &(0x7f0000000700), 0x68c21013e190, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0xff99}, 0x1002) 04:51:42 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x1, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\a'}], 0x18}, 0xfc) [ 632.512699][ C1] net_ratelimit: 10 callbacks suppressed [ 632.512709][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 632.518478][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 632.529984][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 632.535789][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:51:43 executing program 4: socketpair(0x1f, 0x42000000, 0x0, &(0x7f00000000c0)) 04:51:43 executing program 1: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x2c, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:43 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0x0) [ 632.748377][T11169] FAULT_INJECTION: forcing a failure. [ 632.748377][T11169] name fail_page_alloc, interval 1, probability 0, space 0, times 0 04:51:43 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x1, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\b'}], 0x18}, 0xfc) [ 632.849458][T11169] CPU: 0 PID: 11169 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 632.858172][T11169] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 632.868226][T11169] Call Trace: [ 632.868251][T11169] dump_stack+0x197/0x210 [ 632.868280][T11169] should_fail.cold+0xa/0x15 [ 632.868304][T11169] ? fault_create_debugfs_attr+0x180/0x180 [ 632.868322][T11169] ? ___might_sleep+0x163/0x2c0 [ 632.868355][T11169] should_fail_alloc_page+0x50/0x60 [ 632.896359][T11169] __alloc_pages_nodemask+0x1a1/0x910 [ 632.901770][T11169] ? __alloc_pages_slowpath+0x2920/0x2920 [ 632.907529][T11169] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 632.913787][T11169] ? find_next_bit+0x107/0x130 [ 632.918677][T11169] pcpu_populate_chunk+0xf8/0x940 [ 632.923724][T11169] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 632.929453][T11169] ? find_next_bit+0xe7/0x130 [ 632.934179][T11169] pcpu_alloc+0xd5b/0x1380 [ 632.938815][T11169] ? pcpu_alloc_area+0x820/0x820 [ 632.943781][T11169] ? bpf_map_area_alloc+0x20/0x30 [ 632.948851][T11169] __alloc_percpu_gfp+0x28/0x30 [ 632.953717][T11169] htab_map_alloc+0xdb9/0x11c0 [ 632.953762][T11169] ? htab_map_update_elem+0xca0/0xca0 [ 632.953783][T11169] __do_sys_bpf+0x478/0x3810 [ 632.953815][T11169] ? bpf_prog_load+0x18f0/0x18f0 [ 632.963924][T11169] ? __kasan_check_write+0x14/0x20 [ 632.978529][T11169] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 632.984094][T11169] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 632.989406][T11169] ? wait_for_completion+0x440/0x440 [ 632.994733][T11169] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 633.001020][T11169] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 633.006494][T11169] ? do_syscall_64+0x26/0x790 [ 633.011180][T11169] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 633.017267][T11169] ? do_syscall_64+0x26/0x790 [ 633.022082][T11169] __x64_sys_bpf+0x73/0xb0 [ 633.026532][T11169] do_syscall_64+0xfa/0x790 [ 633.031068][T11169] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 633.036974][T11169] RIP: 0033:0x45a919 [ 633.040880][T11169] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 633.060500][T11169] RSP: 002b:00007f565edffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 633.068935][T11169] RAX: ffffffffffffffda RBX: 00007f565edffc90 RCX: 000000000045a919 [ 633.076928][T11169] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 633.084923][T11169] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 04:51:43 executing program 2: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:43 executing program 5: socket$kcm(0xa, 0x5, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000180)="000000005d0c30d57915af2885aee3a4a5e562b970e4d1bae1e31da55b70e00658ef3b6a316aa11a6fd67570a261d4bf27af6dd5dbb7826088eb6536e2f87b8228280b56ef1707a4ed6445ff9325428ae9b8847fb3ca42d04047a36a3305a94b782200acb31ccbc73c374e8fc3732aecab0c5ba63e8103f8b10f1329d844b00e113250b0f6553276b43615c4c563b3bfddc0d2be899e55eaa9063a6ce0945616a61081445973d4097c83c064180b317e4f784b42fae35ffe8edb1e56a718cd7ceed927d26d", 0xc5}], 0x1, &(0x7f0000000380)=[{0x10, 0x8a, 0x7}], 0x10}, 0x0) 04:51:43 executing program 4: socketpair(0x1f, 0x42010000, 0x0, &(0x7f00000000c0)) [ 633.092910][T11169] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f565ee006d4 [ 633.100890][T11169] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 04:51:43 executing program 3 (fault-call:7 fault-nth:59): socketpair(0x0, 0x0, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 04:51:43 executing program 4: socketpair(0x1f, 0x43000000, 0x0, &(0x7f00000000c0)) 04:51:43 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0x0) socket$kcm(0x29, 0xa, 0x0) 04:51:43 executing program 2: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="0b08da6e96e9af8e50e8aeea267d45fc47d2e6f37dfc3aec5247f245d2e51d3c3e73be1a04b9f7f28b07d631f6b73ce58543acc3f03b49636b862d4f99bb20b6d70fc0f4e863d2868516b94ad8ffb9ed41cb944234444dc51b2251cebcd04e3734bd34ac8718dab51d12778b5071f0635ba4e3395e65d1dee3c671bf9357c2a5b365639d917494b38c9f70bd691356de5da68ff827e64236afbd4ec381715dbc8d06c0999516342a02189274e0a4da97c7e098ed6cc696451a824516c5c7e59d734d0923daffb51e63b4e0011fe1e3f98ef6d615c96d8e74095831238f13b6bd7985e2b2c8db7f9d10e021f338e6038f31832d715885b0612c0c", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:43 executing program 1: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x2c, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:43 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x1, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\t'}], 0x18}, 0xfc) 04:51:43 executing program 4: socketpair(0x1f, 0x43010000, 0x0, &(0x7f00000000c0)) [ 633.612893][T11212] FAULT_INJECTION: forcing a failure. [ 633.612893][T11212] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 633.632712][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 633.632766][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 633.638515][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 633.644259][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 633.650028][ C1] protocol 88fb is buggy, dev hsr_slave_0 04:51:44 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=ANY=[@ANYBLOB="d5680000000001000000060000000000"], 0x10}, 0x0) [ 633.655750][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 633.712845][T11212] CPU: 0 PID: 11212 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 633.721572][T11212] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 633.731637][T11212] Call Trace: [ 633.734928][T11212] dump_stack+0x197/0x210 [ 633.739260][T11212] should_fail.cold+0xa/0x15 [ 633.743851][T11212] ? fault_create_debugfs_attr+0x180/0x180 [ 633.749647][T11212] ? ___might_sleep+0x163/0x2c0 [ 633.754502][T11212] should_fail_alloc_page+0x50/0x60 [ 633.759693][T11212] __alloc_pages_nodemask+0x1a1/0x910 [ 633.765061][T11212] ? __alloc_pages_slowpath+0x2920/0x2920 [ 633.770779][T11212] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 633.777010][T11212] ? find_next_bit+0x107/0x130 [ 633.781783][T11212] pcpu_populate_chunk+0xf8/0x940 [ 633.786794][T11212] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 633.792503][T11212] ? find_next_bit+0xe7/0x130 [ 633.797184][T11212] pcpu_alloc+0xd5b/0x1380 [ 633.801810][T11212] ? pcpu_alloc_area+0x820/0x820 [ 633.806758][T11212] ? bpf_map_area_alloc+0x20/0x30 [ 633.811806][T11212] __alloc_percpu_gfp+0x28/0x30 [ 633.816657][T11212] htab_map_alloc+0xdb9/0x11c0 [ 633.821435][T11212] ? htab_map_update_elem+0xca0/0xca0 [ 633.826803][T11212] __do_sys_bpf+0x478/0x3810 [ 633.831390][T11212] ? bpf_prog_load+0x18f0/0x18f0 [ 633.836336][T11212] ? __kasan_check_write+0x14/0x20 [ 633.841444][T11212] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 633.846994][T11212] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 633.852284][T11212] ? wait_for_completion+0x440/0x440 [ 633.857582][T11212] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 633.863833][T11212] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 633.869280][T11212] ? do_syscall_64+0x26/0x790 [ 633.873947][T11212] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 633.880011][T11212] ? do_syscall_64+0x26/0x790 [ 633.884686][T11212] __x64_sys_bpf+0x73/0xb0 [ 633.889107][T11212] do_syscall_64+0xfa/0x790 [ 633.893607][T11212] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 633.899484][T11212] RIP: 0033:0x45a919 [ 633.903386][T11212] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 633.922977][T11212] RSP: 002b:00007f565edffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 633.931374][T11212] RAX: ffffffffffffffda RBX: 00007f565edffc90 RCX: 000000000045a919 [ 633.939346][T11212] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 633.947306][T11212] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 633.955268][T11212] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f565ee006d4 04:51:44 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x1, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\v'}], 0x18}, 0xfc) 04:51:44 executing program 2: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) [ 633.963240][T11212] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 04:51:44 executing program 1: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x2c, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:44 executing program 4: socketpair(0x1f, 0x44000000, 0x0, &(0x7f00000000c0)) 04:51:44 executing program 3 (fault-call:7 fault-nth:60): socketpair(0x0, 0x0, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 04:51:44 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) sendmsg$sock(r0, &(0x7f00000002c0)={&(0x7f0000000040)=@l2={0x1f, 0xc, {0x1, 0x20, 0x8, 0x6, 0x8, 0xf6}, 0x7, 0x3}, 0x80, &(0x7f0000000200)=[{&(0x7f00000000c0)="b9fae2e051f64acf16fa183cbda3d8591f6b42980843fe84ef76cfcaa57d52de7aa3896497e56658fe13f89e1b8b921ba2344ccb22f873110735ca288b7296e6b336cdb8a2a9a1914dc97a9681f76121dc781837e1386484bb9888aaddce72eb4571a7772bb09c6cbeee0de19f742c1be366981bcfd679bcb60756648841e02abf0b94faa7", 0x85}, {&(0x7f0000000180)="51697c17e71dc80a0ac4f5fcb1ef9838db6a1e3ab41c0a69", 0x18}, {&(0x7f00000001c0)="4bf7381a10b943e38ed6ac6c2dce8504d76e33931b9132835b9c08cbe92f7b9682e2a329827d78b1ad0c01b00ef77b04b7536f", 0x33}], 0x3, &(0x7f0000000240)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14}}, @txtime={{0x18}}, @mark={{0x14, 0x1, 0x24, 0x3}}, @txtime={{0x18, 0x1, 0x3d, 0x400}}], 0x78}, 0x80000) 04:51:44 executing program 4: socketpair(0x1f, 0x44010000, 0x0, &(0x7f00000000c0)) 04:51:44 executing program 2: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) r1 = socket$kcm(0x11, 0xa, 0x300) r2 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) sendmsg$kcm(r5, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r5, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:44 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x1, &(0x7f0000000380)=[{0x18, 0x84, 0x7, "10"}], 0x18}, 0xfc) 04:51:44 executing program 1: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x2c, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:44 executing program 4: socketpair(0x1f, 0x45000000, 0x0, &(0x7f00000000c0)) 04:51:44 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000100)) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000080)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0x0) 04:51:44 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x1, &(0x7f0000000380)=[{0x18, 0x84, 0x7, "14"}], 0x18}, 0xfc) 04:51:44 executing program 2: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) r1 = socket$kcm(0x11, 0xa, 0x300) r2 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) sendmsg$kcm(r5, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r5, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) [ 634.611566][T11251] FAULT_INJECTION: forcing a failure. [ 634.611566][T11251] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 634.714911][T11251] CPU: 1 PID: 11251 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 634.723637][T11251] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 634.733714][T11251] Call Trace: [ 634.737029][T11251] dump_stack+0x197/0x210 [ 634.741381][T11251] should_fail.cold+0xa/0x15 [ 634.745992][T11251] ? fault_create_debugfs_attr+0x180/0x180 [ 634.751813][T11251] ? ___might_sleep+0x163/0x2c0 [ 634.756683][T11251] should_fail_alloc_page+0x50/0x60 [ 634.761891][T11251] __alloc_pages_nodemask+0x1a1/0x910 [ 634.767279][T11251] ? __alloc_pages_slowpath+0x2920/0x2920 [ 634.773026][T11251] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 634.779277][T11251] ? find_next_bit+0x107/0x130 [ 634.784143][T11251] pcpu_populate_chunk+0xf8/0x940 [ 634.789169][T11251] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 634.794898][T11251] ? find_next_bit+0xe7/0x130 [ 634.794924][T11251] pcpu_alloc+0xd5b/0x1380 [ 634.794950][T11251] ? pcpu_alloc_area+0x820/0x820 [ 634.794973][T11251] ? bpf_map_area_alloc+0x20/0x30 [ 634.813996][T11251] __alloc_percpu_gfp+0x28/0x30 [ 634.818861][T11251] htab_map_alloc+0xdb9/0x11c0 [ 634.823649][T11251] ? htab_map_update_elem+0xca0/0xca0 [ 634.829034][T11251] __do_sys_bpf+0x478/0x3810 [ 634.833638][T11251] ? bpf_prog_load+0x18f0/0x18f0 [ 634.838585][T11251] ? __kasan_check_write+0x14/0x20 [ 634.843704][T11251] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 634.849260][T11251] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 634.854557][T11251] ? wait_for_completion+0x440/0x440 04:51:45 executing program 5: socket$kcm(0xa, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000f00)=@in={0x2, 0x4e20, @dev}, 0x80, &(0x7f0000000400), 0x0, &(0x7f0000000180)=[{0xa8, 0x97, 0x90a, "c6d05cbd77235693618ab89a1496c5b1dd48c28ff858ea8f6a11edb97bc7b075c92c9894112614cbb7446073e366ca5f0f48b5dbf44054af4946afccfcf3798a610e7d3cf39e92530f6f72a4e734182896d19ba1f4f5778f85ec900fdab1838f22de82cdb77ea4ad86197c4be73516c85e255aa3ece6506c5619ec01774204d230917d98c67149f76991228b601eeec7558591d9ed36"}], 0xa8}, 0x48800) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socketpair(0x9, 0x6, 0x7, &(0x7f0000000ec0)) r1 = perf_event_open$cgroup(&(0x7f0000000100)={0x0, 0x70, 0x20, 0xaa, 0x2, 0x5, 0x0, 0xb1f3, 0x4, 0x9, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc0c, 0xf, @perf_bp={&(0x7f0000000080), 0xe}, 0x4000, 0x9, 0x2, 0x8, 0x0, 0x9, 0x6}, r0, 0xe, 0xffffffffffffffff, 0x6) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00') openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000480)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000680)={&(0x7f00000004c0)=@caif, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000540)="b7b262f17a81733a4229ddd07382944be1298b19cce6171f8fc5e139092286c9009a096517094d40d35fbae968e13b8b18", 0x31}, {&(0x7f0000000580)="47d8ec66ef8faf9741f39492df0e68f6de3dec26e99a6bd3ebd844b6955e7633a22b384642ef9a245c03216ca0c9eaf62cf780032707c7f472716083b2053b68f902702622c2173ad47121af57164a2c755e37d6cb34f2076fd4ef4780e8e7b21d15ca2bd11aecfdc6e62a38bf94eda606cfe405a2a615229b5eab86b8b3e937427351421c780f0645ee0e22eea6386ca3e6e63497e8e80b444bc29ca97fd5615b446c026f9f5429c9aa250906413e7966ce7e209c718de18e0c41d3fa889e54e30cd972c62bf36428fd751fca1a6095531fbc50bf889389a9880bc62556a84f6753a2eef0", 0xe5}, {&(0x7f0000000700)="5c48d7623cf8997d0ea03f655af91f119c5a5f0b75311449fa6af62d53ef751260698db23fbd829cac593c0debc5d6304024f491edf1c8de66a89fa7647aadd2e3548bab6c490d4784dae0f29709abd279f62ab88da2e7251d87d845b76564c8e34386c96e14ea8f855d615556ccb39d82ba329c27e275b9c75aa34bdcb0d47cfd71695bef41710769fb77beebb4a28ac22b7618554adce3b562cc49fec42cb1ba0f1e2071f35ea7717020c85ae7d62bcb527dca9b904307983e3173f9ec4ada44ac4c8acfaf89d3197ca642a9de3f0c83eb81cab88f", 0xd6}, {&(0x7f0000000800)="6b2e1f924f115b9fc9bedd0a21466a5af7877e8ada0ab465a67052cbe67478a686b613c90c4d5a98ded032e42c180392161b465b4a4dba22cb1f623db37aac3c28066732d2d523b3151650b6f8797b297a8e48291afc1d422489cee6a8ff390eb2fb402c2ba3a9ce9b55ac444fe3435fdae3e1d0424b205578a06dd5f863da2d9bf970b77942b4f400bf2b529708ff2f6bc7aba472", 0x95}, {&(0x7f00000008c0)="1fcf9ef63dfa326872c351e50564f591164d12ab90d954f7b3818de54783c0544227feba65741433a241b9ae85d8fe8ee49817e13f4108da3566f351c5b89f231b93d025ad5c57aae297428a7221aa9ded01d4e1e6bdb866cf14fca8ebf4b9af34f3cd73b761a6e9e3a8775c95dc06f3ad24415ea6355ed27a71d0c5a772acba4a4f7790f35889ddac3aa3f69ae050a373c95ef90453175f8dbb4efbb11891a55a7b7ab1ba8d7447fe18", 0xaa}, {&(0x7f0000000240)="73176547d426a47c2ce07abb49a2d8bfb36430f4e811d9544d5d8802ed55731c7e241ab74453e8463d5358ca03bac9c0b44c31d9617a02ed9f4b9602c8d30f2a18a7692cdbdc666f75717a6c01536ad68adf0e540b355d67e0036a26981a9a1985af3737d20f5b79daa78ca480af16bb36a41985a83a04746e40fc975ae607931a6715e0ed9348c8acf9ee1494d9c3595852f4b99c26bac9655f8fb27a1e59b58e9ce3a9e502e5103ce2b50b37ee0f3e", 0xb0}, {&(0x7f0000000a40)="cf8929b756a084130a1bf0ad7c68f12a188fe20fe5becba260a2932cff209f3169c5798c3a89eac09fc46f94f2592dbcd86ac16bef9bcafafe75948bcdc5aca2203e65ef3c0ceb559000b53b468c5d3ef2e54a293b8da6f0ed41c26925bcf602e7118db5", 0x64}, {&(0x7f0000000ac0)="4ca8dadbf2e91b522defd2f3321fbfa8541080772f7ed0e4ca8b0a103a5dbfe4d90eddccc7161a4d2a020c45a61af03161b249241d5ce53a72898f198fe01bb19a81d434263ffa3ef424a5c22ed7e3097df96ec1359637c7d4c005b8b75bb2e85987e5acdbb96404406f31ed8ae7b7cd1ae0782b2852b46fdfb54ec28caba2d994e8844c52060e4c53b4e4efbdc2c995ca575d1e91a88238bbb348db3fdf42a554795c1df37433a1bab2e235b990aa973895970138303dbd3352174a4884faf26de4", 0xc2}], 0x8, &(0x7f0000000f80)=[{0x58, 0x114, 0x1, "6420279215354d927d484fa88f6ec74746ac9141ff07ac786399a4f51f4bacf572bb6a8da9a12f003b9131c059028be1768a99659d57462cb0a426286f34eb5a523dbe"}, {0xf0, 0x88, 0xca24, "7ee0a7bfa7a57dbd00348e38307a3d30d491744a8147af3395bcc1956de324adf4d9a32b33dd367e177c346c0c6b4ee1deb3ba517f1814edfff5ae0bb35d42ae6c8f0596dea1e934da29324ed0e3b4885641fa1d9cba91b431011c1d46963cef23dde51ca15ee941579ec533bb6372f8381657ba6f8ec2a4541a86ce49d42972d82a194d2763ece6a927d0a72e927c9e945298529e21e65f13f57de80602bdddaa7158f26820f03a711f2dd3179a45ebcac3e975262e528ea0aaaafd51e47f503e1751dd3223cdac76eb31097cd65a3a2509212a532114cf3e"}, {0xc0, 0x116, 0x100, "6aa0b5aabe651af1012d2d93dd9251ad073e060000000000000045cf17412c9d5b030a518a67bcccb7e8427c2ce4c94d8068b7f347737a183004f58f2e22ef1ac68e3ddcc0de4c1e776ba8ea6b4684d616a8e7c4dd028b0e3e4adc625985fdb5575f69de56e2209ac3c8be3bd2494fb777c438944da7b3ae7c0b035b49c15d448f634670ae13b53e98dd03000000000000002b9f01aec5cf3c2f14e6ec665e3299a0157328d215a80d7a72ed"}, {0xe0, 0x3a, 0xd198, "b0734a98200a3de5b28df0a6f88ddb7f25713ca7569187763293d5652f147f0e3e48bf17960f2cd01a05d0689dd624897c8de27e60ae9885dc8a284e4bbfda881a912a0ac486dc3099eae7904eca5b93001908d1e53b7c6da72bd321944db3b79e1bca622e1e1bda41462117193ba7432d2925a78e6fde2c7a75477aff0702e0552e80042c3d2f59bc585076ce60f5eb88a7bea4f148c27707ece4720bb5ce12d18b4f0fe4b8bdaba64c0fadfd3ab4f82b74b8d6934dfca5296f09926ee24ffe76ad0173c571b90b8f1559"}], 0x2e8}, 0x20000000) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) 04:51:45 executing program 4: socketpair(0x1f, 0x45010000, 0x0, &(0x7f00000000c0)) [ 634.859858][T11251] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 634.866125][T11251] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 634.871594][T11251] ? do_syscall_64+0x26/0x790 [ 634.876276][T11251] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 634.882345][T11251] ? do_syscall_64+0x26/0x790 [ 634.887037][T11251] __x64_sys_bpf+0x73/0xb0 [ 634.891465][T11251] do_syscall_64+0xfa/0x790 [ 634.895977][T11251] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 634.901870][T11251] RIP: 0033:0x45a919 [ 634.905758][T11251] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 634.905766][T11251] RSP: 002b:00007f565edffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 634.905780][T11251] RAX: ffffffffffffffda RBX: 00007f565edffc90 RCX: 000000000045a919 [ 634.905788][T11251] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 634.905796][T11251] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 634.905805][T11251] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f565ee006d4 [ 634.905814][T11251] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 04:51:45 executing program 3 (fault-call:7 fault-nth:61): socketpair(0x0, 0x0, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 04:51:45 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000000c0)={r1, &(0x7f0000000180)="1fdc24e223e4a5bd3ec8045d88965d674dc6cd0f8bb447333c08f5a797939beb1ee6dcd55e1fa17aea20e86738ec54044b1feb0f685b0509a2b43f3b592503f38ac0ccdc55d7acf7f7696bf7baee7a7a0676b40cdfd322af166d1394940d19e41a31d8519c578cb331f1e4bd40d3a98233ef5545878a9ad4e3e96475abba6ee59754a4b2118d0dbbf53984a0cafbb9f887a3ed29b4716fd5600e65e96f998a45467a34f832ab7bda585c8e6a633cf549a7b518", &(0x7f0000000740)=""/4096, 0x4}, 0x20) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0xf}, 0x0) 04:51:45 executing program 4: socketpair(0x1f, 0x46000000, 0x0, &(0x7f00000000c0)) 04:51:45 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x1, &(0x7f0000000380)=[{0x18, 0x84, 0x7, "c6"}], 0x18}, 0xfc) 04:51:45 executing program 1: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x2c, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:45 executing program 2: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) r1 = socket$kcm(0x11, 0xa, 0x300) r2 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) sendmsg$kcm(r5, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r5, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:45 executing program 4: socketpair(0x1f, 0x46010000, 0x0, &(0x7f00000000c0)) [ 635.288771][T11292] FAULT_INJECTION: forcing a failure. [ 635.288771][T11292] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 635.309999][T11292] CPU: 1 PID: 11292 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 635.318716][T11292] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 635.318723][T11292] Call Trace: [ 635.318747][T11292] dump_stack+0x197/0x210 [ 635.318773][T11292] should_fail.cold+0xa/0x15 [ 635.341007][T11292] ? fault_create_debugfs_attr+0x180/0x180 [ 635.346828][T11292] ? ___might_sleep+0x163/0x2c0 [ 635.351705][T11292] should_fail_alloc_page+0x50/0x60 [ 635.356917][T11292] __alloc_pages_nodemask+0x1a1/0x910 [ 635.362308][T11292] ? __alloc_pages_slowpath+0x2920/0x2920 [ 635.368045][T11292] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 635.374316][T11292] ? find_next_bit+0x107/0x130 [ 635.379105][T11292] pcpu_populate_chunk+0xf8/0x940 [ 635.384140][T11292] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 635.389865][T11292] ? find_next_bit+0xe7/0x130 [ 635.394556][T11292] pcpu_alloc+0xd5b/0x1380 [ 635.398993][T11292] ? pcpu_alloc_area+0x820/0x820 [ 635.403938][T11292] ? bpf_map_area_alloc+0x20/0x30 [ 635.408969][T11292] __alloc_percpu_gfp+0x28/0x30 [ 635.413835][T11292] htab_map_alloc+0xdb9/0x11c0 [ 635.418625][T11292] ? htab_map_update_elem+0xca0/0xca0 [ 635.424009][T11292] __do_sys_bpf+0x478/0x3810 [ 635.428614][T11292] ? bpf_prog_load+0x18f0/0x18f0 [ 635.433581][T11292] ? __kasan_check_write+0x14/0x20 [ 635.438708][T11292] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 635.444268][T11292] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 635.449571][T11292] ? wait_for_completion+0x440/0x440 [ 635.454874][T11292] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 635.461142][T11292] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 635.466609][T11292] ? do_syscall_64+0x26/0x790 [ 635.471297][T11292] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 635.477374][T11292] ? do_syscall_64+0x26/0x790 [ 635.482058][T11292] __x64_sys_bpf+0x73/0xb0 [ 635.486470][T11292] do_syscall_64+0xfa/0x790 [ 635.486491][T11292] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 635.486503][T11292] RIP: 0033:0x45a919 [ 635.486518][T11292] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 635.486530][T11292] RSP: 002b:00007f565edffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 635.528856][T11292] RAX: ffffffffffffffda RBX: 00007f565edffc90 RCX: 000000000045a919 04:51:45 executing program 4: socketpair(0x1f, 0x47000000, 0x0, &(0x7f00000000c0)) 04:51:45 executing program 4: socketpair(0x1f, 0x47010000, 0x0, &(0x7f00000000c0)) 04:51:45 executing program 4: socketpair(0x1f, 0x48000000, 0x0, &(0x7f00000000c0)) 04:51:45 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x1, &(0x7f0000000380)=[{0x18, 0x84, 0x7, "ac"}], 0x18}, 0xfc) [ 635.536840][T11292] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 635.544823][T11292] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 635.552798][T11292] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f565ee006d4 [ 635.560771][T11292] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 04:51:46 executing program 2: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) r2 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) sendmsg$kcm(r5, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r5, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:46 executing program 3 (fault-call:7 fault-nth:62): socketpair(0x0, 0x0, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) [ 635.861073][T11318] FAULT_INJECTION: forcing a failure. [ 635.861073][T11318] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 635.881738][T11318] CPU: 1 PID: 11318 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 635.890441][T11318] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 635.900501][T11318] Call Trace: [ 635.903809][T11318] dump_stack+0x197/0x210 [ 635.908161][T11318] should_fail.cold+0xa/0x15 [ 635.912748][T11318] ? fault_create_debugfs_attr+0x180/0x180 [ 635.918626][T11318] ? ___might_sleep+0x163/0x2c0 [ 635.923487][T11318] should_fail_alloc_page+0x50/0x60 [ 635.928694][T11318] __alloc_pages_nodemask+0x1a1/0x910 [ 635.934080][T11318] ? __alloc_pages_slowpath+0x2920/0x2920 [ 635.939812][T11318] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 635.946059][T11318] ? find_next_bit+0x107/0x130 [ 635.950844][T11318] pcpu_populate_chunk+0xf8/0x940 [ 635.955875][T11318] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 635.961603][T11318] ? find_next_bit+0xe7/0x130 [ 635.966296][T11318] pcpu_alloc+0xd5b/0x1380 [ 635.970737][T11318] ? pcpu_alloc_area+0x820/0x820 [ 635.975688][T11318] ? bpf_map_area_alloc+0x20/0x30 [ 635.980750][T11318] __alloc_percpu_gfp+0x28/0x30 [ 635.985599][T11318] htab_map_alloc+0xdb9/0x11c0 [ 635.985630][T11318] ? htab_map_update_elem+0xca0/0xca0 [ 635.985647][T11318] __do_sys_bpf+0x478/0x3810 [ 635.985667][T11318] ? bpf_prog_load+0x18f0/0x18f0 [ 636.005384][T11318] ? __kasan_check_write+0x14/0x20 [ 636.010509][T11318] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 636.016067][T11318] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 636.021400][T11318] ? wait_for_completion+0x440/0x440 [ 636.026707][T11318] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 636.032978][T11318] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 636.038445][T11318] ? do_syscall_64+0x26/0x790 [ 636.043131][T11318] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 636.049206][T11318] ? do_syscall_64+0x26/0x790 [ 636.053926][T11318] __x64_sys_bpf+0x73/0xb0 [ 636.058360][T11318] do_syscall_64+0xfa/0x790 [ 636.062888][T11318] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 636.068787][T11318] RIP: 0033:0x45a919 [ 636.072692][T11318] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 636.072705][T11318] RSP: 002b:00007f565edffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 636.100699][T11318] RAX: ffffffffffffffda RBX: 00007f565edffc90 RCX: 000000000045a919 04:51:46 executing program 5: getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000000)={0xa, 0x1ff, 0x4, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r2, &(0x7f0000000340), &(0x7f0000000400)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, 0x0, &(0x7f00000000c0)=""/85}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r3, 0x0, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0xe, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7}, [@map={0x18, 0x8, 0x1, 0x0, r1}, @map_val={0x18, 0x7, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x80000000}, @map_val={0x18, 0xa, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x2}, @ldst={0x0, 0x0, 0x3, 0x2, 0x10}, @exit, @map={0x18, 0xb3a75c6d96012452}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}]}, &(0x7f0000000240)='syzkaller\x00', 0x101, 0x0, 0x0, 0x41000, 0x11, [], 0x0, 0x1c, r3, 0x8, &(0x7f0000000280)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x4, 0x1, 0xfffff6fe, 0xb7e2}, 0x10}, 0x78) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000052c0)={0xb, 0xe, &(0x7f0000004180)=ANY=[@ANYBLOB="180000000001000000000000fc00000085100000f9ffffff850000006b000001000000000400000100ffffffff85100000feffffff58420000fcffffff851000000800000081760200ffffff7f8500000057000000180000000300000000000000050000009500000000000000090000"], &(0x7f0000004200)='syzkaller\x00', 0x7, 0xff5, &(0x7f0000004240)=""/4085, 0x40f00, 0x0, [], 0x0, 0xd, r0, 0x8, &(0x7f0000005240)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000005280)={0x5, 0xa, 0x10001, 0x4}, 0x10, 0xffffffffffffffff, r4}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000005540)={r5, 0x0, 0x8a, 0x0, &(0x7f0000005340)="62542353a1d428296bc10968cc9e20f797656b682d175ba80535db64aa11eaebf65e7bce66616963db25f002ce2afe06a31b5f935fe05c234f5a2def68f6da4061f19edff14a36d80f9ab3ba6c70c4fdfa99a7be12223e3a012d39d0384565c65db7895abca85c6263177cd1f6a77a9b0081533ede312f036535199da124730a27ad28b72db3a5148c8f", &(0x7f0000005400), 0x8, 0x0, 0x77, 0x5e, &(0x7f0000005440)="18f0e1fd43560446fa2d21be4e24a4e585f3db737d1f662121fd5fae6145c6b74908a0fa14cbc0e51e825720689794b63e16a773e0c07bad4a20503e6deeec3fad18ff4b1b36b690e7936da0b98d2e1862cd5ede58f2a4c5b02eb8631cd5eccd9fcb457c7d04d8cc8246e406eb776c6ff6d02d08140c33", &(0x7f00000054c0)="f98c8fb66256b40a5fd7261a2ceb9a4f50d9311c4ccb0d32d47f6cad807a6031ecdceb980688c6b98b4e4a8d99da01c3e961da18047c30e561aa9f738569c12ac1fe794e31cfe2960419e5282053108cb3153063e2255928badda9771b94"}, 0x40) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r6, 0x0, 0x0, 0x0) sendmsg$inet(r6, &(0x7f0000004140)={&(0x7f0000002cc0)={0x2, 0x4e22, @local}, 0x10, &(0x7f0000004040)=[{&(0x7f0000002d00)="c7d03788f2310ac102204337f25f75a6908b28339b2ed3194791bf183ef09de964fa4a0672fe707f0c6d404d1bd099d24b294408c5b0c230e0981a5cf71d6748d81d1da450e4f6ce2a077ebd4e90e26f6c65eed8fe47f41de48a60e7fbc05fcfdb1a0219d1b22a8eb13c7fff0a2b1de2b996f668ce0f9657220a10ee0d8eb669389dd56960ab94edb638aa270f9abdc7581b2c929f73786dafffd65921ec192c53d15b47338fce57a438b08c2bc284611dcecaa639a35d17f7c4df39bee4c7d2611c0467f3c074d7d5c8089961062530", 0xd0}, {&(0x7f0000002e00)="44cf1a59f94ab7acab5f71d46bb6038900f2a02b55327fc0420a6f865d87e5a2ff214cd5277280eb616064b4fbf3781c955822dcaf59a2fc061c20f926d74fa851665f831f34c9a56f185824860554643310b9569964aa27c9964c9e69844757c3d940d59cf5aeec012ab5cb4216ab482616056ff124bc3ad0bdea61572f916ed0ea411691148fd8b13ad8b7935c38137667aee4f0ea90a83c6dfb04679fbfbf88e43080e116a6c8613017670ef8790d7c75907f1186cfda75454d17ac19f7e1c5290a29d573309237cdbdb8f3c01d5e9389b1042fe2a4890ecda036e6d3909b8461be", 0xe3}, {&(0x7f0000002f00)="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", 0x1000}, {&(0x7f0000003f00)="a1404b06c27f08b4c173fa02a13db4bf36fa72ca263c3ba656ce14f8c29e2f6138fbc69c712378430423", 0x2a}, {&(0x7f0000003f40)="549f9f4a349ec36a989cef550d33ff", 0xf}, {&(0x7f0000003f80)="89cf92a5842cf4fd2c8d54b31a611a6507510c4937a364223279a1762ec9782402a89f1c3eba3e6a152fc6e9414db87c306c2537", 0x34}, {&(0x7f0000003fc0)="08e0bfb3faeff03c21a37056df2b0598736518e60123f8be3531a4b5327be6cf0f66f5ddfddbd4687ff7e8fb8d6b7b8fcada0412013736ec9d30b61874f27ea65a54", 0x42}], 0x7, &(0x7f00000040c0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x88c}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x2}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xf5}}], 0x48}, 0x800) r7 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r7, &(0x7f0000000600)={&(0x7f0000000080)=@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, &(0x7f0000000580), 0x0, &(0x7f0000007bc0)=[{0x80, 0x115, 0x1, "37a65bf1e2b880cba75430ac8d70efdea4f572208f2d2e2dd37f6aae471e7942d72658178630e9349205c6a435a564ffe10f84cc34b6bb952e3e6c274c76c98347c35ae51ed65f12e48d1d0879b59845f65a7555f0a28fb27f167af3e4f01883df904e81335f4f55d2649d1b3d0db2"}, {0xe0, 0x115, 0x7ff, "8426adb2a56e8df6b20f1bdf282af45a6fbbd6335a8c7f2a0445241188d8c6cb436bd8f87302bf8b17b74086d47b0ba0b855540a42070bbd25f44a213e4eb65427d8c938b423529da2d3a40bc070dbee90edf130844a7b9ccb0f3db4d1c01385dcc5a69a124e3c9d1834113f8b112b5a8efae86a72af0fabcbfaec72392de101ae2ef2c036b1e832a6127dfad92a59cc4df0e60a6a6ad04e190405f7baccd58d00e5d2d5b53b5c7fccdc38899090ebfb3ca5ee981442597a96f5b75fec9ac81e63465a196f278e383cf9e85ccf21"}, {0xc8, 0x117, 0x77a5, "5d553a916403a6d756941aff5bdae37d032f9f7d9b15e14fc6e5245706ca3bff496a9e258239c064d2c144d4245243ba05c0926b7cce47fef0125c7a3560271a2b4460abeb574f43d3141aae43661282f0e1ca6b91f399905c90d8ac58b78385025180e36d3b9c38102e7e772d1bc47829535ae9f91a37c3c544dab4f356de04e2e68a08d92a3d420ab566c867d94211343e6e94003cf69376fee74326deee9d8ed69fc53590bed1cb4dc81328fbdf4e1dd9a1666a7058b3"}, {0x10d8, 0x113, 0x100, "205e7d991f9acdb273732dc0d46444f022b00c2bb2d686292fa2056e90fb1c17b9a811fa8b617af386ac0b95e7c1588e1a4a3bab0f02eeaf6bfffa031ce8b443e9cc559db2e90788c78b7eda5fb186e71ed5f2857b4c063b8f89081151829a4dc4b98e2327ed3d3bdd37b36f924f30425a279dbf46e2461109db0ed8e9442cbab7f298cb46b46d41990cbf3affb8626925a0ef94392e8a6f9fe5f5c402065bbe4f810b1d70edde59dfb706d85766ee9b217aeef6e5509c93a440ada34a1922df10a7ccdc31533a8cc40f36072ed741fac3af5d98cf89e06a0d8bebcbeafb09b1ffd8356a953689fefa6665c2189976581a899a01d8d60aed08721c1e9cd32dc83f34a80dd7114da2eea69469f2efade267128e01e49b3698c2b027fe80e8e920b5c94b1e7aef749e5e41e29180bb55aa12a11283aa9b0c46ee731e45c3c8c207bd0c0a725df83494c1e9f9d42d75b50233cfd6c0078338218ccd8239a7353f87ccf0aaa7c1d7cbd218c71399a13c7ed6f2b251a2668067d4319496a00a5b6d9488b5400ce7d51b820af138def9a8b7b3a3e56ddc77dd994040a7c41c903a49c76ccc774628542de64a8263f8f4a183f7d330d1d2029544e5231bb75043f68b71d5e1dec0b82a25c1e6e8fab364dd849ead57a5bdef8ecd6feceb2a614b8f822c5112f231ace93723d0200ddbacb4669ba4996991fa6de3e2b57eec6714997ce393b7c2aa30574e3809ccea4672f7bc27e376f86e51b1c641f9ccaa764f7df7860ca55598b74a639e7204c25c3cee7cea5dac5cc21d61329a7d4dde70671f808a3ad072ddd073ae3541cdc13b1e652f2d7715c0c9225d12361d6a6b0d937fefd660b069f65bd435ab94b98d579deb256138d81b5d7e4701fb751d36a394be53377e03addd03e174ee803d2a7e6162e988dec461500fd584878105f554c6aeeba07ff98220c67f6561cbbe8224ce1621689c5f51f3922f8fbc6f5394b57b8eee48b16254f9c040d1211cd78b499f7338e69873a124a3fe3b2e9df4c0e4f790983c914623ec725dd0667bac26291aadf9a8cd41a72b5f3759d609c5e510e20872b51cb0b7d97ed9c6c399bc5644ce03349e5d81ada7facdeaf278b770355f94d6cdceb0532ac18b3e8a502fd3d84e9177ba356a3d242297b471295dcfac5746a07cc29216f1f8a65f2c00e20ff70ade779a14d5d24bb4db60b6a75eec5e0f4c2d6e62202398da6fff00dcb2d35efc406257e8efb24d92926df85cbcb80d3f870cdb2a84f7954cf3e5603c57aeb65eea6865d891875878102762619f82ee46236aa794e936be48446a46707bda22ca7cb01e7056ba89a3fea0f22e4df829590d9eee58460712ca5e02a78382ed36f1f965e1fb0304ba7a281402b6b37795a40d08c09cd98088f9be814620d5d2ba8caf433b22fe229ac90b9d100e40c9b663647465744587d07f8c1da4596dbed9b1660046e6ee83b96ec2beeade510c9a3a59740a7f3c4265d21f8ed0da736ad413e4338425746e43b88ffb2b767a911e68d0bdc9cd289bea0e5abb849237397c61bde145162c24105edc8815aaed49249087c20b51d67f03a20213698392a55e56cb7311e55a8f7449a1b0f8cc862923dbf3c76ffd3d886998f630e0fc1f18f4fcbc716987874614f67e8d63ad1bc816d6de74a3364b6f58cb2745693023dba1537651e2bd55b2591b5b7a88b0db886da2ba5210cfda4d155ed9aa35acbba596157f6fd7c674a38659cc5977c5ba2681f44530e4e4a8e0089cee16953fe131d8f88e95e785fd2a8f5e7e46024b152a9968774fc334a41fe8192f6c69cf906497cd85cc11c5c5381aff0f498cf7ee223968a0aeb1a83ae743fa40e4dbc16a9bac0e72400d7d2061e6640d4e2bc59b576264ab21c4ca4860e0a089f677d79ca4abcc61798a0b7454fb216730c44a77471c85d473fdf6cd06a2e9259f22d201311827c525208cff7e7ad08cf58c20f3c804f32c9842c139845000882c0128a05f77b453aefdd93a62aa014c685a3dcccc6f3a9c3834fc9e783eba56ab8e45bc13d3f44d798978099623342cdeedc81d81eaed81e4b303e0ed8dc91a5b573a843a84ae04123bff8228e0a8ccd107f164c9e41d215a9a5bbe0af0793f2c96cf7370846c5dab08756c015919c4517835c2cf78fc62362ad0bcbb73d3c8c4b67d2538f5161896c01aef2ec2e7ba219ab6c8babea56b732557ccd8027901b7cd0fe4241332ce81a9b4adf5616c0e429a8f38ff40ba1633dde6fda85ba5e5536e019755e411a8e743c3ede22aeb3d9904b8a052070f41c7edcf9345d4883e0c8a320950f883851b59ec79877565a8107e73df9c6b719bcfa45dcf64509a5f5dcfff8bc8dce926b1bdb62f7c3cdffcb3a27cb9bfc848721d7b2575247004bcd1fa9177492e2d1ce24e6120afd71b436c567b8fe1a45ab758cb60f80c3825479562806d7cd8b66192ca0e9255372e7a1328de63a7157776740f7887ebc0d6d9acce260959c5a08f8be221a1d2006e07a2d9b1988a4663e100e153e5c4cc815f2d829b106323ee4e45f3808315d7ce4e5174920593daaf6829669a68058c9b91efcd565c5ecf3d14423a99fb5232ced3797c873566185962b2665295b6915082a4817cc011f7ce50fdb8da118d07d9ebe79f842b31be5c616c1ce7e2d6fc5958a669951c381f8cdc528cb307ae44e3d1cb03785426b8993237c394d4bd81b54983d1e80e8baadeb2a84dc4beb5c85ee88a226b57ee2c880aea7c0617101cc6d6748a3f20648b2ac1fc28f07a7045d835811c71d894ce02a01ad81b67c399fdba653e58ada8086a80d7e5cade72ddc51ad4b65549726f044fa4540392e356bf5b7b3bc93ddb5c6925734e49da32ec0c3e33ea9bf3799462d9c487809ae08d571a95e896c56b7e94dd6a79ebe908f8f9604cf69f1dfb51a4d30148d46d10def22aa58bf9cc8a42dfc2a329e9c248ad596d98e0321f407cf097af9df8a3ebcc71fb6948f0f8bad276046b28d254efcf56a2fada434c390e5a057ace74968460cf9da165c5bc2147d7f321860b16a5bdb77af35d314fdadd8b0001a9598b0a27469b9edbe89d6875871adbec7189352990f7e4130ae74e46c0118f8f4b6d195badb2578cbac13c00d56f4dae69e941fc5a60da2c2b922774cdf1aeccbb354ef984e4c0b325c1d117541dfa0651a2dc28410d38d91df41819a33a2434b52f2f0c3c23ead4421d255b96b50d5b847fcfc35372fdf7f4880623ce86a199c36e4b37a9de38c461e422a7b0452725a73071fbd0c37011787769c636eda8ca71f7222d408fc2cd631cf5b1b3369e0fdb29a43f58055383efa0e101b854d11cb1d4831e86053cbfea8be5e10b7b79d03fcba45ad314d41be07a3f1eb376e6be0d9621702e832496eaa76f285c9ff8fa518a6d53ae2012336b5897d0af005abcef10a3414ea64849b9901f17f2ce3a9ba5abbdd9fabf1725114eb6c1d839812e81271b86ab347961d31cdf1d96beca6aa0d874f2469552dcb8eb7f9861418c35903fe59b5501c9704964b2b4501f7e62d46a7a32ca50e83907677a6a498be18eda0f239171c5de21e7a99ef6cc4c87e9f36bf88ef4c745552b304aae6580311372949c9599c7fd3d17591430e4cbaf911334b4246d2afaa99cf6b32548ca1d438c6ac96eb53602c9be207fd3460ed273a9e3d4e74814451716d58bfa00578ba1a2be80639ad4411cc1cafd4a272ba21bf7e3c1905db9efd7b3641f47bad003fa6a1f58fc7468fd6ae04cf9d3fb1ef0d1a8168f1ad07b79c4b4e5f813fb5ee8cd6862695f7d54ac0b00f59a77925329437f37befcaee7877a69fa0c0fafa26b323f90782fd46407071ecb212cc54362538371f77128a60ebdad0d2a3a22118c3f0025394490e8fb1799d932568b83c8984b35fd9d15485ffbc024423db452c9d7eddf91c0cd682bd0d66fdd0185257753181038b38956d8e90836f05f085cdbd2560cc6a6414c5300176730201eb22f9bfcb490f6f574f328cf3fcee12293976ac7622d39082ddd1f6b6e0d074342d06fe569930b7bee0f1fbdd63a220d6a4287a2d9f0100a32e988353c3022b00db20f217181d3d698cc35a5c7edcbd1c8c4658a421a6a6e957e51bcd50bcf8ce2f6ab2bdc1a29c0e57975e149122fc0a3e962c9ca43cfa99348dde0aa97ab4a996ec3f60ca2c165d1d79cace1f753cb646fda1802564401eaa672054edc188b2973abfde4ea4b43a87fe8815dead5a3ac0270eaa4e126f54c3df9641c3587da1b0cdec96e79e865a31b677030aae257e640b7a8ee764c435d92198cdf3c340beeed6e83abb98c80e58e3c1f8c31b53b0654f97b3496e4e802b7ac05e854861dd2c67caacbff0c3b93280beb96009262aae8bfdbe24fe5f8bfe43d8d81f41f01a1f56cd44295f889f067e587e5d9579324d1ab7e09fb05d15a0ff6c95ccd076f945336f39a68e4d8508815b980eb96a3e22024a4bd061a9bd3d5e38fb9f8d296805ad89a3e668894693f1b476ffa539aaa258216f44bd05fc2ae3896601d583d931793459eb28be4efab5fb36ca49703d53b108177703d96a6ed9866a92c1f7e6d8067bed992b3fef1c259d6259596e98e24ddca56e05fb340135f347b31e5f4937daa8679beb2a16f11f1df5d3031e5c2e8754032cdf73c12ae1c5d0ba83d358029bfef67ea2533cbd8fb1498efebd777212dfffbda8df087edad0841b8f7f89d5ad76b72a6be8bf7c064b930227798aa12c7a2e30f90f437abc1e51ded8c162a4333f5d87f652e58bba561cfbfa871ca78e34c66026361b4c13d5565e75e7c0a78eabbb6bd845ba943182db9bbd6634a67aa43b940a9312b509f7ceaa00948d27d1cd935b4fc8f8ffca5235d9b1b652eeb223ac7776fb57289aa8955773d956a190beca900c7bf6fe26b0fd1832ac2801bb96d35aebdbecd77e09ce48e54a5b5e55c82034b47d662dc92605475fee743d30aa9d94401497d427f2fe1f42278df394fbae580a0442db6f4a946aaf189ddf54675ca496845ea4df29b77097acb5486df82e2f432c813ae5bfd545e74a1a55b41c245acec10d93ddd49f0b17a144a221f11ea461e366f706f0af2165ba3fa0d447c4d989b0bc8f12581efb7fc93a588db351bcb7533109e1bf28fff447256e2ec226c25c2c3c07147849d03cb975f39fc8e05f28248f0f1e1ca861a2265d004f31e519ba687135649018140d9a929c6127642c67c3d5a373b357d7c02b4309159fe291badbb73cc8927177d9cbc5b9bc064d0bf00601d57119062ac0a6267169715e7aed121cf65abc7dcd8f2bf16b60e54d51a870d46e23161877a3137c5da891a881ee61bab466b4c58260c7e421b6d481061d96a89988aee29348fcd9e624f4405b5e062f3654c55c69fe785a0713be427552d57f149005e400e0c5006640757f2208ad9b6ac14052a73dce1210c191b55f9aaddd2331302df879a083928ed76f149fa5e4acfa5ea3bd70bef20a594be3bff3a0b1dbad082b1209dbf7b1ac90e03120887e12cfb269bcc35c59b15d1530d91588e9bbc85df7488da43b98c38f86993e20a359df922837d12c0c0a86f65c510269d4778107923f9d983bbf168f685d2bbb3e81b1d592309932df76487327e8e490576192d58e6c0ee66343ee726673320b5215aac7678c12815da51d14ed26c0a7b65e8936583b23b3c27c1f9c8957f4cb25ee55f1b0290c303b4e2b3bfcf84ad75185169c9e7748c3b6a645635c080174bf43321df6667caf9e6a94ef844cc754f455f741dd8f16268a159def4950ee1ddda7c402141a27881478330e7d62ac926f5c1e034a305c4848b70ca31107dbe36a715ee44b5f02751f5cbb1781eb0aeb38b1bf25add00336d5e1fcc799cc07e6f298855a2332195659086a79d3b2274c75438c1ccc0aa408c2986cf9edb923f8b7cb3015a204c42b435fb366e586e9656987cf2554db28fcb8d0f90c84a4255c461f190e73af82d11aad77566de7be5fd2bf7d74d534e906d39e61421208ee3c344ce41b362c35fbc386c39a95fefab20cedf0898d4a52996ca82e7f94e2aa9"}], 0x1300}, 0x20880) sendmsg(r7, &(0x7f0000000000)={&(0x7f0000000100)=@x25={0x9, @null=' \x00'}, 0x6e, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380), 0x10}, 0x0) socket$kcm(0x29, 0x5, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r6, &(0x7f0000000180)='cgroup.events\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x2400, 0x82ef) openat$cgroup_ro(r8, 0x0, 0x0, 0x0) recvmsg$kcm(r8, &(0x7f0000002c80)={&(0x7f0000000640)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000001b80)=""/241, 0xf1}], 0x1, &(0x7f0000001c80)=""/4096, 0x1000}, 0x20) 04:51:46 executing program 1: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x2c, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="0b08da6e96e9af8e50e8aeea267d45fc47d2e6f37dfc3aec5247f245d2e51d3c3e73be1a04b9f7f28b07d631f6b73ce58543acc3f03b49636b862d4f99bb20b6d70fc0f4e863d2868516b94ad8ffb9ed41cb944234444dc51b2251cebcd04e3734bd34ac8718dab51d12778b5071f0635ba4e3395e65d1dee3c671bf9357c2a5b365639d917494b38c9f70bd691356de5da68ff827e64236afbd4ec381715dbc8d06c0999516342a02189274e0a4da97c7e098ed6cc696451a824516c5c7e59d734d0923daffb51e63b4e0011fe1e3f98ef6d615c96d8e74095831238f13b6bd7985e2b2c8db7f9d10e021f338e6038f31832d715885b0612c0c", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:46 executing program 4: socketpair(0x1f, 0x48010000, 0x0, &(0x7f00000000c0)) 04:51:46 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x1, &(0x7f0000000380)=[{0x18, 0x84, 0x7, "c0"}], 0x18}, 0xfc) 04:51:46 executing program 4: socketpair(0x1f, 0x49000000, 0x0, &(0x7f00000000c0)) 04:51:46 executing program 2: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) r2 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) sendmsg$kcm(r5, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r5, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="0b08da6e96e9af8e50e8aeea267d45fc47d2e6f37dfc3aec5247f245d2e51d3c3e73be1a04b9f7f28b07d631f6b73ce58543acc3f03b49636b862d4f99bb20b6d70fc0f4e863d2868516b94ad8ffb9ed41cb944234444dc51b2251cebcd04e3734bd34ac8718dab51d12778b5071f0635ba4e3395e65d1dee3c671bf9357c2a5b365639d917494b38c9f70bd691356de5da68ff827e64236afbd4ec381715dbc8d06c0999516342a02189274e0a4da97c7e098ed6cc696451a824516c5c7e59d734d0923daffb51e63b4e0011fe1e3f98ef6d615c96d8e74095831238f13b6bd7985e2b2c8db7f9d10e021f338e6038f31832d715885b0612c0c", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) [ 636.108676][T11318] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 636.116650][T11318] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 636.124622][T11318] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f565ee006d4 [ 636.124632][T11318] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 04:51:46 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x1, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0xf}, 0xfc) 04:51:46 executing program 4: socketpair(0x1f, 0x49010000, 0x0, &(0x7f00000000c0)) 04:51:46 executing program 1: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x2c, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:46 executing program 3 (fault-call:7 fault-nth:63): socketpair(0x0, 0x0, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 04:51:46 executing program 4: socketpair(0x1f, 0x4a000000, 0x0, &(0x7f00000000c0)) 04:51:46 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x1, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x24}, 0xfc) 04:51:46 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=ANY=[@ANYBLOB="1000004ffacfee56222b250000000000"], 0x10}, 0x0) 04:51:46 executing program 2: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) r2 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) sendmsg$kcm(r5, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r5, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="0b08da6e96e9af8e50e8aeea267d45fc47d2e6f37dfc3aec5247f245d2e51d3c3e73be1a04b9f7f28b07d631f6b73ce58543acc3f03b49636b862d4f99bb20b6d70fc0f4e863d2868516b94ad8ffb9ed41cb944234444dc51b2251cebcd04e3734bd34ac8718dab51d12778b5071f0635ba4e3395e65d1dee3c671bf9357c2a5b365639d917494b38c9f70bd691356de5da68ff827e64236afbd4ec381715dbc8d06c0999516342a02189274e0a4da97c7e098ed6cc696451a824516c5c7e59d734d0923daffb51e63b4e0011fe1e3f98ef6d615c96d8e74095831238f13b6bd7985e2b2c8db7f9d10e021f338e6038f31832d715885b0612c0c", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) [ 636.516760][T11353] FAULT_INJECTION: forcing a failure. [ 636.516760][T11353] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 636.589114][T11353] CPU: 1 PID: 11353 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 636.597847][T11353] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 636.607919][T11353] Call Trace: [ 636.611235][T11353] dump_stack+0x197/0x210 [ 636.615596][T11353] should_fail.cold+0xa/0x15 [ 636.620205][T11353] ? fault_create_debugfs_attr+0x180/0x180 [ 636.626030][T11353] ? ___might_sleep+0x163/0x2c0 [ 636.630922][T11353] should_fail_alloc_page+0x50/0x60 [ 636.636134][T11353] __alloc_pages_nodemask+0x1a1/0x910 [ 636.641634][T11353] ? __alloc_pages_slowpath+0x2920/0x2920 [ 636.647377][T11353] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 636.653630][T11353] ? find_next_bit+0x107/0x130 [ 636.658416][T11353] pcpu_populate_chunk+0xf8/0x940 [ 636.663456][T11353] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 636.669188][T11353] ? find_next_bit+0xe7/0x130 [ 636.673886][T11353] pcpu_alloc+0xd5b/0x1380 [ 636.678325][T11353] ? pcpu_alloc_area+0x820/0x820 [ 636.683274][T11353] ? bpf_map_area_alloc+0x20/0x30 [ 636.689278][T11353] __alloc_percpu_gfp+0x28/0x30 [ 636.694143][T11353] htab_map_alloc+0xdb9/0x11c0 [ 636.698935][T11353] ? htab_map_update_elem+0xca0/0xca0 [ 636.704323][T11353] __do_sys_bpf+0x478/0x3810 [ 636.708922][T11353] ? bpf_prog_load+0x18f0/0x18f0 [ 636.713881][T11353] ? __kasan_check_write+0x14/0x20 [ 636.713898][T11353] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 636.713914][T11353] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 636.713930][T11353] ? wait_for_completion+0x440/0x440 [ 636.713956][T11353] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 636.741461][T11353] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 636.746934][T11353] ? do_syscall_64+0x26/0x790 [ 636.751616][T11353] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 636.757689][T11353] ? do_syscall_64+0x26/0x790 [ 636.762391][T11353] __x64_sys_bpf+0x73/0xb0 [ 636.766840][T11353] do_syscall_64+0xfa/0x790 [ 636.771344][T11353] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 636.777236][T11353] RIP: 0033:0x45a919 04:51:47 executing program 4: socketpair(0x1f, 0x4a010000, 0x0, &(0x7f00000000c0)) 04:51:47 executing program 1: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x2c, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) [ 636.781145][T11353] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 636.800762][T11353] RSP: 002b:00007f565edffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 636.809189][T11353] RAX: ffffffffffffffda RBX: 00007f565edffc90 RCX: 000000000045a919 [ 636.817172][T11353] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 636.825146][T11353] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 04:51:47 executing program 4: socketpair(0x1f, 0x4b000000, 0x0, &(0x7f00000000c0)) 04:51:47 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000180)=ANY=[@ANYBLOB="fcff0000000000008400000047000000bc8bc593a1fd818978cc3039c7dfa1e281f685bde5dc73dc401135f20a15dd9a9f6e29113ef5ff30763330f42e4154e8b876b213f737cb2fe3436a22b1a246f3c59adf3640917ca3c2bea773392429d6f20a3b82a3a1f393d1edf256ee4d5b7f0ee03b8d10e0bea565fb32b1a92862ddb887815bcfe22da8d090e9413fcd8053936ff8ce369d3602a5e9be19d7e502922bfc923c84f22479a817ed8e032d7f3cc0f4a228bb5f662afdbe8b52bd0497b2"], 0x10}, 0x0) [ 636.833118][T11353] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f565ee006d4 [ 636.841091][T11353] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 04:51:47 executing program 2: r0 = socket$kcm(0x2c, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) r2 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) sendmsg$kcm(r5, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r5, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:47 executing program 3 (fault-call:7 fault-nth:64): socketpair(0x0, 0x0, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 04:51:47 executing program 4: socketpair(0x1f, 0x4b010000, 0x0, &(0x7f00000000c0)) 04:51:47 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x1, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x28}, 0xfc) 04:51:47 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x40, 0x0) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000080)) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=ANY=[@ANYBLOB="1000c0d5837d8aaa30250000"], 0x10}, 0x0) 04:51:47 executing program 1: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x2c, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:47 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x1, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x20000398}, 0xfc) [ 637.249886][T11394] FAULT_INJECTION: forcing a failure. [ 637.249886][T11394] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 637.282771][T11394] CPU: 1 PID: 11394 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 637.291488][T11394] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 637.302606][T11394] Call Trace: [ 637.305912][T11394] dump_stack+0x197/0x210 [ 637.310358][T11394] should_fail.cold+0xa/0x15 [ 637.314962][T11394] ? fault_create_debugfs_attr+0x180/0x180 [ 637.314979][T11394] ? ___might_sleep+0x163/0x2c0 [ 637.315005][T11394] should_fail_alloc_page+0x50/0x60 [ 637.315017][T11394] __alloc_pages_nodemask+0x1a1/0x910 [ 637.315036][T11394] ? __alloc_pages_slowpath+0x2920/0x2920 [ 637.341913][T11394] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 637.348143][T11394] ? find_next_bit+0x107/0x130 [ 637.352909][T11394] pcpu_populate_chunk+0xf8/0x940 [ 637.358705][T11394] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 637.364417][T11394] ? find_next_bit+0xe7/0x130 [ 637.369094][T11394] pcpu_alloc+0xd5b/0x1380 [ 637.373508][T11394] ? pcpu_alloc_area+0x820/0x820 [ 637.378434][T11394] ? bpf_map_area_alloc+0x20/0x30 [ 637.383450][T11394] __alloc_percpu_gfp+0x28/0x30 [ 637.388299][T11394] htab_map_alloc+0xdb9/0x11c0 [ 637.393060][T11394] ? htab_map_update_elem+0xca0/0xca0 [ 637.398416][T11394] __do_sys_bpf+0x478/0x3810 [ 637.402992][T11394] ? bpf_prog_load+0x18f0/0x18f0 [ 637.407912][T11394] ? __kasan_check_write+0x14/0x20 [ 637.413047][T11394] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 637.418603][T11394] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 637.423891][T11394] ? wait_for_completion+0x440/0x440 [ 637.429184][T11394] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 637.435440][T11394] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 637.440899][T11394] ? do_syscall_64+0x26/0x790 [ 637.445577][T11394] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 637.451645][T11394] ? do_syscall_64+0x26/0x790 [ 637.456342][T11394] __x64_sys_bpf+0x73/0xb0 [ 637.460768][T11394] do_syscall_64+0xfa/0x790 [ 637.465263][T11394] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 637.471151][T11394] RIP: 0033:0x45a919 [ 637.475044][T11394] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 04:51:47 executing program 4: socketpair(0x1f, 0x4c000000, 0x0, &(0x7f00000000c0)) 04:51:47 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x10}, 0x0) [ 637.496478][T11394] RSP: 002b:00007f565edffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 637.504885][T11394] RAX: ffffffffffffffda RBX: 00007f565edffc90 RCX: 000000000045a919 [ 637.512846][T11394] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 637.520807][T11394] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 637.528764][T11394] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f565ee006d4 [ 637.536734][T11394] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 04:51:48 executing program 2: r0 = socket$kcm(0x2c, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) r2 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) sendmsg$kcm(r5, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r5, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:48 executing program 4: socketpair(0x1f, 0x4c010000, 0x0, &(0x7f00000000c0)) 04:51:48 executing program 1: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x2c, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:48 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x1, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18}, 0xfc) 04:51:48 executing program 3 (fault-call:7 fault-nth:65): socketpair(0x0, 0x0, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 04:51:48 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=ANY=[@ANYBLOB="380000000000000084e868bf00000000"], 0x10}, 0x0) 04:51:48 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x1, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18, 0x2}, 0xfc) 04:51:48 executing program 4: socketpair(0x1f, 0x4d000000, 0x0, &(0x7f00000000c0)) 04:51:48 executing program 2: r0 = socket$kcm(0x2c, 0x3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) r2 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) sendmsg$kcm(r5, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r5, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="0b08da6e96e9af8e50e8aeea267d45fc47d2e6f37dfc3aec5247f245d2e51d3c3e73be1a04b9f7f28b07d631f6b73ce58543acc3f03b49636b862d4f99bb20b6d70fc0f4e863d2868516b94ad8ffb9ed41cb944234444dc51b2251cebcd04e3734bd34ac8718dab51d12778b5071f0635ba4e3395e65d1dee3c671bf9357c2a5b365639d917494b38c9f70bd691356de5da68ff827e64236afbd4ec381715dbc8d06c0999516342a02189274e0a4da97c7e098ed6cc696451a824516c5c7e59d734d0923daffb51e63b4e0011fe1e3f98ef6d615c96d8e74095831238f13b6bd7985e2b2c8db7f9d10e021f338e6038f31832d715885b0612c0c", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:48 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) socket$kcm(0x29, 0xf, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0x0) 04:51:48 executing program 1: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x2c, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:48 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x1, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18, 0x4}, 0xfc) 04:51:48 executing program 4: socketpair(0x1f, 0x4d010000, 0x0, &(0x7f00000000c0)) [ 638.098196][T11435] FAULT_INJECTION: forcing a failure. [ 638.098196][T11435] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 638.218782][T11435] CPU: 0 PID: 11435 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 638.227513][T11435] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 638.237590][T11435] Call Trace: [ 638.240898][T11435] dump_stack+0x197/0x210 [ 638.245258][T11435] should_fail.cold+0xa/0x15 [ 638.249878][T11435] ? fault_create_debugfs_attr+0x180/0x180 [ 638.255703][T11435] ? ___might_sleep+0x163/0x2c0 [ 638.260597][T11435] should_fail_alloc_page+0x50/0x60 [ 638.265820][T11435] __alloc_pages_nodemask+0x1a1/0x910 [ 638.271576][T11435] ? __alloc_pages_slowpath+0x2920/0x2920 [ 638.277328][T11435] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 638.283588][T11435] ? find_next_bit+0x107/0x130 [ 638.288381][T11435] pcpu_populate_chunk+0xf8/0x940 [ 638.293423][T11435] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 638.299165][T11435] ? find_next_bit+0xe7/0x130 [ 638.303885][T11435] pcpu_alloc+0xd5b/0x1380 [ 638.308348][T11435] ? pcpu_alloc_area+0x820/0x820 [ 638.313306][T11435] ? bpf_map_area_alloc+0x20/0x30 04:51:48 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000000)={0xa, 0x1ff, 0x4, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r2, &(0x7f0000000340), &(0x7f0000000400)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r2, 0x0, &(0x7f00000000c0)=""/85}, 0x20) r3 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000000)={0xa, 0x1ff, 0x4, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r3, &(0x7f0000000340), &(0x7f0000000400)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r3, 0x0, &(0x7f00000000c0)=""/85}, 0x20) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r4, 0x0, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000000)={0xa, 0x1ff, 0x4, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r5, &(0x7f0000000340), &(0x7f0000000400)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r5, 0x0, &(0x7f00000000c0)=""/85}, 0x20) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r6, 0x0, 0x0, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000000)="96f64bc156fd6708c5060e7e3fd67113280ddfc4c27f3b6189eed00b74", 0x1d}], 0x1, &(0x7f0000000280)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[], @ANYRES16=0x0, @ANYBLOB="24d68ac8a179f3fb7dfb86e8572ed456479d54b631efc0aa0b136a5844ed3ed4cdb736639db4a3327af0dd0c4eb564171fc892b217033c157c7c4708b05bea7b44b39e4caea18faa98c3221b209dfddb2d9f57e08f51e94c3bb7cea5eea9a3cdf1f7c3a9d3c4538477cb1f0d28edf5622fead245e9b5557ff240a7c935509e4dda0f75987aa8eb6f9dac07ec4370d59dda82535134c38226c7", @ANYRESOCT], 0xba}, 0x0) 04:51:48 executing program 4: socketpair(0x1f, 0x4e000000, 0x0, &(0x7f00000000c0)) 04:51:48 executing program 4: socketpair(0x1f, 0x4e010000, 0x0, &(0x7f00000000c0)) [ 638.319327][T11435] __alloc_percpu_gfp+0x28/0x30 [ 638.324200][T11435] htab_map_alloc+0xdb9/0x11c0 [ 638.329013][T11435] ? htab_map_update_elem+0xca0/0xca0 [ 638.334415][T11435] __do_sys_bpf+0x478/0x3810 [ 638.339043][T11435] ? bpf_prog_load+0x18f0/0x18f0 [ 638.344001][T11435] ? __kasan_check_write+0x14/0x20 [ 638.349136][T11435] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 638.354694][T11435] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 638.360011][T11435] ? wait_for_completion+0x440/0x440 [ 638.365326][T11435] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 638.371609][T11435] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 638.377089][T11435] ? do_syscall_64+0x26/0x790 [ 638.381791][T11435] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 638.387876][T11435] ? do_syscall_64+0x26/0x790 [ 638.392587][T11435] __x64_sys_bpf+0x73/0xb0 [ 638.397029][T11435] do_syscall_64+0xfa/0x790 [ 638.401556][T11435] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 638.407541][T11435] RIP: 0033:0x45a919 [ 638.412409][T11435] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 638.432037][T11435] RSP: 002b:00007f565edffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 638.432054][T11435] RAX: ffffffffffffffda RBX: 00007f565edffc90 RCX: 000000000045a919 [ 638.432064][T11435] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 638.432073][T11435] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 638.432082][T11435] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f565ee006d4 [ 638.432091][T11435] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 04:51:48 executing program 3 (fault-call:7 fault-nth:66): socketpair(0x0, 0x0, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 04:51:48 executing program 4: socketpair(0x1f, 0x4f000000, 0x0, &(0x7f00000000c0)) 04:51:49 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x1, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18, 0x5}, 0xfc) 04:51:49 executing program 1: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x2c, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) [ 638.687636][T11469] FAULT_INJECTION: forcing a failure. [ 638.687636][T11469] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 638.783406][T11469] CPU: 0 PID: 11469 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 638.792149][T11469] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 638.802234][T11469] Call Trace: [ 638.805702][T11469] dump_stack+0x197/0x210 [ 638.810074][T11469] should_fail.cold+0xa/0x15 [ 638.814700][T11469] ? fault_create_debugfs_attr+0x180/0x180 [ 638.820524][T11469] ? ___might_sleep+0x163/0x2c0 [ 638.825406][T11469] should_fail_alloc_page+0x50/0x60 04:51:49 executing program 2: recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0xa, 0x300) r1 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) 04:51:49 executing program 4: socketpair(0x1f, 0x4f010000, 0x0, &(0x7f00000000c0)) 04:51:49 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x1, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18, 0x6}, 0xfc) 04:51:49 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=ANY=[@ANYBLOB="10000000000000910000000700000000"], 0x10}, 0x0) [ 638.830624][T11469] __alloc_pages_nodemask+0x1a1/0x910 [ 638.836028][T11469] ? __alloc_pages_slowpath+0x2920/0x2920 [ 638.841785][T11469] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 638.848043][T11469] ? find_next_bit+0x107/0x130 [ 638.852826][T11469] pcpu_populate_chunk+0xf8/0x940 [ 638.857859][T11469] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 638.863596][T11469] ? find_next_bit+0xe7/0x130 [ 638.868321][T11469] pcpu_alloc+0xd5b/0x1380 [ 638.872783][T11469] ? pcpu_alloc_area+0x820/0x820 [ 638.877739][T11469] ? bpf_map_area_alloc+0x20/0x30 04:51:49 executing program 4: socketpair(0x1f, 0x50000000, 0x0, &(0x7f00000000c0)) [ 638.882796][T11469] __alloc_percpu_gfp+0x28/0x30 [ 638.887665][T11469] htab_map_alloc+0xdb9/0x11c0 [ 638.892476][T11469] ? htab_map_update_elem+0xca0/0xca0 [ 638.897866][T11469] __do_sys_bpf+0x478/0x3810 [ 638.902483][T11469] ? bpf_prog_load+0x18f0/0x18f0 [ 638.907441][T11469] ? __kasan_check_write+0x14/0x20 [ 638.912570][T11469] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 638.918138][T11469] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 638.923442][T11469] ? wait_for_completion+0x440/0x440 04:51:49 executing program 5: r0 = gettid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)={0x2, 0x2, 0x4, 0x5}, &(0x7f0000000380)=0x7, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=0x10000}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={r0, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='/dev/net/tun\x00', r1}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r1}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r1}, 0xc) r2 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r2, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0x0) [ 638.928759][T11469] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 638.935045][T11469] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 638.940525][T11469] ? do_syscall_64+0x26/0x790 [ 638.946092][T11469] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 638.952174][T11469] ? do_syscall_64+0x26/0x790 [ 638.956879][T11469] __x64_sys_bpf+0x73/0xb0 [ 638.961323][T11469] do_syscall_64+0xfa/0x790 [ 638.965857][T11469] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 638.971768][T11469] RIP: 0033:0x45a919 04:51:49 executing program 4: socketpair(0x1f, 0x50010000, 0x0, &(0x7f00000000c0)) [ 638.975679][T11469] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 638.996614][T11469] RSP: 002b:00007f565edffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 639.005046][T11469] RAX: ffffffffffffffda RBX: 00007f565edffc90 RCX: 000000000045a919 [ 639.013039][T11469] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 639.021026][T11469] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 639.029010][T11469] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f565ee006d4 [ 639.036997][T11469] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 04:51:49 executing program 4: socketpair(0x1f, 0x51000000, 0x0, &(0x7f00000000c0)) 04:51:49 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0x0) 04:51:49 executing program 3 (fault-call:7 fault-nth:67): socketpair(0x0, 0x0, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 04:51:49 executing program 2: recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0xa, 0x300) r1 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) 04:51:49 executing program 1: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x2c, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:49 executing program 4: socketpair(0x1f, 0x51010000, 0x0, &(0x7f00000000c0)) 04:51:49 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x1, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18, 0x7}, 0xfc) 04:51:49 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f00000001c0)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000200)='cpuset.effective_cpus\x00', 0x26e1, 0x0) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000080)) r3 = openat$cgroup_ro(r2, 0x0, 0x0, 0x0) socketpair(0x0, 0x5, 0x8, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000000)='}ppp1@self)\x00') r5 = openat$cgroup_ro(r0, &(0x7f00000004c0)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000500)={r4, r5}) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r6, 0x0, 0x0, 0x0) ioctl$TUNSETFILTEREBPF(r3, 0x800454e1, &(0x7f0000000180)=r6) r7 = gettid() r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r8, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0x0, 0xf8, 0x7, 0x7, 0x0, 0x8, 0x40004, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1f, 0x4, @perf_bp={&(0x7f0000000240), 0xa}, 0x12828, 0xffffffffffff0000, 0x15783807, 0x6, 0x40, 0x8001, 0x5dc6}, r7, 0x0, r8, 0x1) [ 639.423281][T11510] FAULT_INJECTION: forcing a failure. [ 639.423281][T11510] name fail_page_alloc, interval 1, probability 0, space 0, times 0 04:51:49 executing program 4: socketpair(0x1f, 0x52000000, 0x0, &(0x7f00000000c0)) 04:51:49 executing program 2: recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0xa, 0x300) r1 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) [ 639.500276][T11510] CPU: 0 PID: 11510 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 639.509006][T11510] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 639.521777][T11510] Call Trace: [ 639.525092][T11510] dump_stack+0x197/0x210 [ 639.529466][T11510] should_fail.cold+0xa/0x15 [ 639.534098][T11510] ? fault_create_debugfs_attr+0x180/0x180 [ 639.539927][T11510] ? ___might_sleep+0x163/0x2c0 [ 639.544809][T11510] should_fail_alloc_page+0x50/0x60 [ 639.544827][T11510] __alloc_pages_nodemask+0x1a1/0x910 [ 639.544853][T11510] ? __alloc_pages_slowpath+0x2920/0x2920 [ 639.544882][T11510] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 639.555410][T11510] ? find_next_bit+0x107/0x130 [ 639.555440][T11510] pcpu_populate_chunk+0xf8/0x940 [ 639.555457][T11510] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 639.555472][T11510] ? find_next_bit+0xe7/0x130 [ 639.555503][T11510] pcpu_alloc+0xd5b/0x1380 [ 639.555540][T11510] ? pcpu_alloc_area+0x820/0x820 [ 639.596946][T11510] ? bpf_map_area_alloc+0x20/0x30 [ 639.602019][T11510] __alloc_percpu_gfp+0x28/0x30 [ 639.606897][T11510] htab_map_alloc+0xdb9/0x11c0 [ 639.611710][T11510] ? htab_map_update_elem+0xca0/0xca0 [ 639.618057][T11510] __do_sys_bpf+0x478/0x3810 [ 639.623633][T11510] ? bpf_prog_load+0x18f0/0x18f0 [ 639.628587][T11510] ? __kasan_check_write+0x14/0x20 [ 639.633722][T11510] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 639.639271][T11510] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 639.644560][T11510] ? wait_for_completion+0x440/0x440 [ 639.649846][T11510] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 639.656090][T11510] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 639.661535][T11510] ? do_syscall_64+0x26/0x790 [ 639.666200][T11510] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 639.672252][T11510] ? do_syscall_64+0x26/0x790 [ 639.676979][T11510] __x64_sys_bpf+0x73/0xb0 [ 639.681401][T11510] do_syscall_64+0xfa/0x790 [ 639.685896][T11510] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 639.691814][T11510] RIP: 0033:0x45a919 [ 639.695698][T11510] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 639.715291][T11510] RSP: 002b:00007f565edffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 639.723689][T11510] RAX: ffffffffffffffda RBX: 00007f565edffc90 RCX: 000000000045a919 [ 639.731752][T11510] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 639.739712][T11510] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 04:51:50 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x1, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18, 0x8}, 0xfc) [ 639.747672][T11510] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f565ee006d4 [ 639.755637][T11510] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 04:51:50 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x1, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18, 0x9}, 0xfc) [ 639.872669][ C1] net_ratelimit: 10 callbacks suppressed [ 639.872678][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 639.873027][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 639.878419][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 639.884397][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 639.890922][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 639.897189][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 639.902370][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 639.908446][ C0] protocol 88fb is buggy, dev hsr_slave_1 04:51:50 executing program 3 (fault-call:7 fault-nth:68): socketpair(0x0, 0x0, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 04:51:50 executing program 4: socketpair(0x1f, 0x52010000, 0x0, &(0x7f00000000c0)) 04:51:50 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x3800000) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0x0) 04:51:50 executing program 1: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x2c, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:50 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x1, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18, 0xa}, 0xfc) [ 640.097030][T11540] FAULT_INJECTION: forcing a failure. [ 640.097030][T11540] name fail_page_alloc, interval 1, probability 0, space 0, times 0 04:51:50 executing program 4: socketpair(0x1f, 0x53000000, 0x0, &(0x7f00000000c0)) 04:51:50 executing program 2: r0 = socket$kcm(0x2c, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) r2 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) sendmsg$kcm(r5, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r5, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) [ 640.209247][T11540] CPU: 0 PID: 11540 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 640.217971][T11540] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 640.228040][T11540] Call Trace: [ 640.231351][T11540] dump_stack+0x197/0x210 [ 640.235718][T11540] should_fail.cold+0xa/0x15 [ 640.240344][T11540] ? fault_create_debugfs_attr+0x180/0x180 [ 640.246178][T11540] ? ___might_sleep+0x163/0x2c0 [ 640.251069][T11540] should_fail_alloc_page+0x50/0x60 [ 640.256297][T11540] __alloc_pages_nodemask+0x1a1/0x910 [ 640.261701][T11540] ? __alloc_pages_slowpath+0x2920/0x2920 [ 640.267457][T11540] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 640.273714][T11540] ? find_next_bit+0x107/0x130 [ 640.278519][T11540] pcpu_populate_chunk+0xf8/0x940 [ 640.283568][T11540] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 640.289297][T11540] ? find_next_bit+0xe7/0x130 [ 640.294007][T11540] pcpu_alloc+0xd5b/0x1380 [ 640.298460][T11540] ? pcpu_alloc_area+0x820/0x820 [ 640.303413][T11540] ? bpf_map_area_alloc+0x20/0x30 [ 640.308469][T11540] __alloc_percpu_gfp+0x28/0x30 [ 640.313344][T11540] htab_map_alloc+0xdb9/0x11c0 [ 640.318154][T11540] ? htab_map_update_elem+0xca0/0xca0 [ 640.323549][T11540] __do_sys_bpf+0x478/0x3810 [ 640.328159][T11540] ? bpf_prog_load+0x18f0/0x18f0 [ 640.333118][T11540] ? __kasan_check_write+0x14/0x20 [ 640.338261][T11540] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 640.343837][T11540] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 640.349143][T11540] ? wait_for_completion+0x440/0x440 04:51:50 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x0, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0x0) 04:51:50 executing program 4: socketpair(0x1f, 0x53010000, 0x0, &(0x7f00000000c0)) [ 640.354455][T11540] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 640.360742][T11540] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 640.366219][T11540] ? do_syscall_64+0x26/0x790 [ 640.370911][T11540] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 640.376997][T11540] ? do_syscall_64+0x26/0x790 [ 640.381699][T11540] __x64_sys_bpf+0x73/0xb0 [ 640.386130][T11540] do_syscall_64+0xfa/0x790 [ 640.390660][T11540] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 640.396744][T11540] RIP: 0033:0x45a919 [ 640.400649][T11540] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 640.420268][T11540] RSP: 002b:00007f565edffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 640.428792][T11540] RAX: ffffffffffffffda RBX: 00007f565edffc90 RCX: 000000000045a919 [ 640.436784][T11540] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 640.444770][T11540] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 04:51:50 executing program 4: socketpair(0x1f, 0x54000000, 0x0, &(0x7f00000000c0)) [ 640.452753][T11540] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f565ee006d4 [ 640.460743][T11540] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 04:51:50 executing program 4: socketpair(0x1f, 0x54010000, 0x0, &(0x7f00000000c0)) 04:51:50 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='mem\xff\xff\xb9)|$\x18\xf7*\x8f\xae[\xac\xaf\x7f \x9a', 0x26e1, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000000)={'vcan0\x00', @remote}) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 04:51:51 executing program 3 (fault-call:7 fault-nth:69): socketpair(0x0, 0x0, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 04:51:51 executing program 1: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x2c, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:51 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x1, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18, 0xe}, 0xfc) 04:51:51 executing program 4: socketpair(0x1f, 0x55000000, 0x0, &(0x7f00000000c0)) 04:51:51 executing program 2: r0 = socket$kcm(0x2c, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) r2 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) sendmsg$kcm(r5, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r5, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:51 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)=""/56, 0x38}, {&(0x7f0000000180)=""/147, 0x93}], 0x2}, 0x4001) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0x0) [ 640.826631][T11579] FAULT_INJECTION: forcing a failure. [ 640.826631][T11579] name failslab, interval 1, probability 0, space 0, times 0 [ 640.895631][T11579] CPU: 0 PID: 11579 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 640.904438][T11579] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 640.914505][T11579] Call Trace: [ 640.917827][T11579] dump_stack+0x197/0x210 [ 640.922226][T11579] should_fail.cold+0xa/0x15 [ 640.926850][T11579] ? fault_create_debugfs_attr+0x180/0x180 [ 640.932782][T11579] ? ___might_sleep+0x163/0x2c0 [ 640.937669][T11579] __should_failslab+0x121/0x190 04:51:51 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x1, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18, 0x60}, 0xfc) [ 640.942637][T11579] should_failslab+0x9/0x14 [ 640.947157][T11579] kmem_cache_alloc_node_trace+0x274/0x750 [ 640.953939][T11579] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 640.959680][T11579] ? apply_to_page_range+0x562/0x700 [ 640.965007][T11579] __get_vm_area_node+0x12b/0x4f0 [ 640.970061][T11579] __vmalloc_node_range+0xd4/0x810 [ 640.975188][T11579] ? pcpu_mem_zalloc+0x8a/0xf0 [ 640.979990][T11579] __vmalloc+0x44/0x50 [ 640.984081][T11579] ? pcpu_mem_zalloc+0x8a/0xf0 [ 640.988865][T11579] pcpu_mem_zalloc+0x8a/0xf0 [ 640.993480][T11579] pcpu_create_chunk+0x12d/0x7f0 [ 640.999582][T11579] pcpu_alloc+0x10f3/0x1380 [ 641.004111][T11579] ? pcpu_alloc_area+0x820/0x820 [ 641.004131][T11579] ? bpf_map_area_alloc+0x20/0x30 [ 641.004169][T11579] __alloc_percpu_gfp+0x28/0x30 [ 641.004191][T11579] htab_map_alloc+0xdb9/0x11c0 [ 641.004234][T11579] ? htab_map_update_elem+0xca0/0xca0 [ 641.019003][T11579] __do_sys_bpf+0x478/0x3810 [ 641.019031][T11579] ? bpf_prog_load+0x18f0/0x18f0 [ 641.038649][T11579] ? __kasan_check_write+0x14/0x20 [ 641.043781][T11579] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 641.049347][T11579] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 641.054668][T11579] ? wait_for_completion+0x440/0x440 [ 641.059989][T11579] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 641.066309][T11579] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 641.071792][T11579] ? do_syscall_64+0x26/0x790 [ 641.076474][T11579] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 641.076491][T11579] ? do_syscall_64+0x26/0x790 [ 641.076523][T11579] __x64_sys_bpf+0x73/0xb0 [ 641.076544][T11579] do_syscall_64+0xfa/0x790 [ 641.076569][T11579] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 641.076588][T11579] RIP: 0033:0x45a919 [ 641.076606][T11579] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 641.076616][T11579] RSP: 002b:00007f565edffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 04:51:51 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x10}}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) 04:51:51 executing program 4: socketpair(0x1f, 0x55010000, 0x0, &(0x7f00000000c0)) [ 641.076633][T11579] RAX: ffffffffffffffda RBX: 00007f565edffc90 RCX: 000000000045a919 [ 641.076649][T11579] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 641.126491][T11579] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 641.126504][T11579] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f565ee006d4 [ 641.126516][T11579] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 04:51:51 executing program 1: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x2c, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:51 executing program 4: socketpair(0x1f, 0x56000000, 0x0, &(0x7f00000000c0)) 04:51:51 executing program 5: socket$kcm(0xa, 0x5, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000000)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@generic={0x8, "e82a79032c2a4682ed2fffe62318af85032c6b1e2898091167db5286899d0c2194d2e9763f308ecd3b698771af0ac166b6c26eef9534c422c950ce405f5bf1fc3f8d205fa86742384f314714855da56fcb8eae0f85091a6bcb466747f09c63c28bcd23cd15bdf543f901ddd75c4801cbc652c0724c16e97917d9a8dba7ff"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000740)=[{0xf0, 0xff, 0x5e, "e192b7418b2694d601d52a10b3f9f4e09228af3ebdfc3f4d5e6c36c637ff218a74cda14c72f3165a4f6904565d06c9c132d03dc2c1ad5a8351462eb28b855d56f673682af16fdb28331a86c65d262ece8e871b3e2312a0806a5311e060bf0423b36d03e5951885ad63d79291169bb4aba50fb572f55195ffc64d7d3edc736d5c511637050fb73fd901ede0a6e618eef0b9713d082ea7202b34bb1b98960827fe31a8e8978209b0a984f843586d879f68b454212dde7b2e9320a9c41a98dcaec4d4b494c95ea06f8484fb48dd7470dfb4afc4056c1a68d56caf2ccd043018f462"}, {0xe0, 0x101, 0x5, "5c69d5bd04137ae2b03bfe50c9b764fc62bcd41df12c8c61560b982387d10da5e7f976bfeece3a029b9c1db6cc3dd9cfb657f5424aa7fea6954024325a90092850588063ad6aed9aab3e20d2540254e7b11679610deeab15a0b905df6f664601523c24e37180f6fd300885ad59796db80830fa615f720f142dce7d96def314b64262846117b75af849c61a6cbc288e0159440b8d58de755b855d1d46b22f84a4d59d4240341969a610e1565afb2aef4de5b0c252681e515adbdac631c31a58e769c5e837c875a94e8c7cb1dc"}, {0xb0, 0x88, 0x1, "c9b8ed7dd63b0a078f1e7e20097206c2e9d29cbe4362cd99cb07e878dd5b94f86335c831d739906d76c094a957b7a1916ebf5cfc9581308ff71907c6f1466d0ed4e09872aaede6fe7c86c5b38a157d4c1d88a1e42cf7cbee1346f419418a454b74aace294a2c3cd657449bfdbf3d33e70ac1316363f14718864c22523558c0f56cb861fefe931f6bebcdfe8bbf55080d3655977c1a3139ce5dc6f556cbd9"}, {0xa8, 0x110, 0xb4, "c9bc2aee42f29abe53ebcbbde43c5f4a7c7962a6eb8b84fc44bcb930c60c919258b74bd54e8aaeb31e460b77ca0375b2576123a0962a8dd1d1025032822f45761343d6f121f7a66d99feed67b22d6d69c8ca85ed5a7be2ac3321943689b36ef7c65b2b6c2200ad7e2ae3ce6b3ad0550c5d5b9476ce58d920d8ab75823bce87acadcf90cc4c4e6aa03ef6d8f864c52991592bb17eb5d33a"}, {0x60, 0x97164045c19c76f4, 0x2, "90af2262f50d76edd98006a840a15d8f39d95100b251ff859c7c50ea5b236989213ef5107916e8922099eb022549cb15b39fd1af346d3c54c25a92e4e3b6f70f396b3ad71cf45f4ec84a83674e"}, {0x40, 0x103, 0x6, "a0a203477445bf6b16b9a7fe56ae4a5c72fb565d2a05efbefe7496419830ff771d254eed64afa3fddd0f10d826303b65"}, {0x60, 0x10a, 0xc2a0, "6c23267add1104c8ee7c4594208d27bed956b0a9abf0e74ea70ea53664300bd33b1695cb5ac6e3afcb4d2b9ca5b5732c724e8e515f17b5c83bd1e9834b985c32dc4729809bbe752baaa09bc89037fe"}, {0x100, 0x119, 0x4, "9ea8457b04289b12bcac9357426279f45e21c6d308bc55dc90e9cdcb2aeca92f79da5072e4b1f8e00f252761aad096fbc3249d71956252364857d3d300c51e19a22bd9aaee22238e0fac96cea082b7440d910c3002be855252aceba9a73e7c48401b6f8f9e4c34c7c60a2d0114e926fc9f1d10718e286b91168d695e00f65c051ca924d89488aed1aea1c502aefc315ba002c9946369643dd43a8601d8569d057d91872e39f8ad791ee8f2cf67272166fa5038cb86555f493bd7fa1eba5509e8333a6679086f3404fa87b00ad1fde729ffef5fbe07d47907b91160292ef317272ab2b8e92c7e545df1aa"}, {0xb8, 0xf8, 0x5, "f2a230b1336143f0910b4244686bdac87f26745ddc2fbdf5d70b55e8673f45094b87b028f6960faadcf804344050ebc9361c8382f5209feed5e4fc49e7179e20bdf404a264cc116c834269d083e787e8b7a105c2801f388b7f65e8ec3648e93ada8d1e61f738ed9eaa3529e67d78cc3b6f07ab8b914dc378fd516f10f62aa4bb7b72b0d2e82134521695c00d6ab5229ad3d3eb9118619b030bd56f06e925c4f721"}], 0x5e0}, 0x0) 04:51:51 executing program 3 (fault-call:7 fault-nth:70): socketpair(0x0, 0x0, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 04:51:51 executing program 2: r0 = socket$kcm(0x2c, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) r2 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) sendmsg$kcm(r5, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r5, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:51 executing program 4: socketpair(0x1f, 0x56010000, 0x0, &(0x7f00000000c0)) 04:51:51 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000080)) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000000)={r1}) 04:51:51 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x1, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18, 0xe0}, 0xfc) 04:51:52 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x1, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18, 0xfc}, 0xfc) 04:51:52 executing program 1: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x2c, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:52 executing program 4: socketpair(0x1f, 0x57000000, 0x0, &(0x7f00000000c0)) [ 641.723559][T11626] FAULT_INJECTION: forcing a failure. [ 641.723559][T11626] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 641.776083][T11626] CPU: 1 PID: 11626 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 641.785756][T11626] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 641.795822][T11626] Call Trace: [ 641.799133][T11626] dump_stack+0x197/0x210 [ 641.803476][T11626] should_fail.cold+0xa/0x15 [ 641.808087][T11626] ? fault_create_debugfs_attr+0x180/0x180 [ 641.813906][T11626] ? ___might_sleep+0x163/0x2c0 [ 641.818770][T11626] should_fail_alloc_page+0x50/0x60 [ 641.823975][T11626] __alloc_pages_nodemask+0x1a1/0x910 [ 641.823995][T11626] ? __alloc_pages_slowpath+0x2920/0x2920 [ 641.824018][T11626] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 641.824031][T11626] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 641.824055][T11626] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 641.852940][T11626] alloc_pages_current+0x107/0x210 [ 641.858070][T11626] __get_free_pages+0xc/0x40 [ 641.862683][T11626] kasan_populate_vmalloc_pte+0x2f/0x1c0 [ 641.868335][T11626] apply_to_page_range+0x445/0x700 [ 641.873464][T11626] ? memset+0x40/0x40 [ 641.877464][T11626] kasan_populate_vmalloc+0x68/0x90 [ 641.882677][T11626] __vmalloc_node_range+0x47e/0x810 [ 641.887901][T11626] __vmalloc+0x44/0x50 [ 641.891983][T11626] ? pcpu_mem_zalloc+0x8a/0xf0 [ 641.896756][T11626] pcpu_mem_zalloc+0x8a/0xf0 [ 641.901360][T11626] pcpu_create_chunk+0x12d/0x7f0 [ 641.906325][T11626] pcpu_alloc+0x10f3/0x1380 [ 641.910875][T11626] ? pcpu_alloc_area+0x820/0x820 [ 641.915829][T11626] ? bpf_map_area_alloc+0x20/0x30 [ 641.920902][T11626] __alloc_percpu_gfp+0x28/0x30 [ 641.925765][T11626] htab_map_alloc+0xdb9/0x11c0 [ 641.930557][T11626] ? htab_map_update_elem+0xca0/0xca0 [ 641.935937][T11626] __do_sys_bpf+0x478/0x3810 [ 641.940551][T11626] ? bpf_prog_load+0x18f0/0x18f0 [ 641.945532][T11626] ? __kasan_check_write+0x14/0x20 [ 641.950658][T11626] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 641.956214][T11626] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 641.961510][T11626] ? wait_for_completion+0x440/0x440 [ 641.966814][T11626] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 641.973078][T11626] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 641.978547][T11626] ? do_syscall_64+0x26/0x790 [ 641.983238][T11626] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 641.989320][T11626] ? do_syscall_64+0x26/0x790 [ 641.994032][T11626] __x64_sys_bpf+0x73/0xb0 [ 641.994052][T11626] do_syscall_64+0xfa/0x790 [ 641.994079][T11626] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 642.008862][T11626] RIP: 0033:0x45a919 [ 642.008879][T11626] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 642.008887][T11626] RSP: 002b:00007f565edffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 642.008906][T11626] RAX: ffffffffffffffda RBX: 00007f565edffc90 RCX: 000000000045a919 [ 642.048743][T11626] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 642.056726][T11626] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 642.064707][T11626] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f565ee006d4 04:51:52 executing program 2: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) r2 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) sendmsg$kcm(r5, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r5, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:52 executing program 4: socketpair(0x1f, 0x57010000, 0x0, &(0x7f00000000c0)) 04:51:52 executing program 4: socketpair(0x1f, 0x58000000, 0x0, &(0x7f00000000c0)) 04:51:52 executing program 4: socketpair(0x1f, 0x58010000, 0x0, &(0x7f00000000c0)) [ 642.072684][T11626] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 04:51:52 executing program 3 (fault-call:7 fault-nth:71): socketpair(0x0, 0x0, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 04:51:52 executing program 5: r0 = socket$kcm(0xa, 0x4, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0x0) 04:51:52 executing program 4: socketpair(0x1f, 0x59000000, 0x0, &(0x7f00000000c0)) 04:51:52 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x1, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18, 0x12c}, 0xfc) 04:51:52 executing program 2: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) r2 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) sendmsg$kcm(r5, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r5, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="0b08da6e96e9af8e50e8aeea267d45fc47d2e6f37dfc3aec5247f245d2e51d3c3e73be1a04b9f7f28b07d631f6b73ce58543acc3f03b49636b862d4f99bb20b6d70fc0f4e863d2868516b94ad8ffb9ed41cb944234444dc51b2251cebcd04e3734bd34ac8718dab51d12778b5071f0635ba4e3395e65d1dee3c671bf9357c2a5b365639d917494b38c9f70bd691356de5da68ff827e64236afbd4ec381715dbc8d06c0999516342a02189274e0a4da97c7e098ed6cc696451a824516c5c7e59d734d0923daffb51e63b4e0011fe1e3f98ef6d615c96d8e74095831238f13b6bd7985e2b2c8db7f9d10e021f338e6038f31832d715885b0612c0c", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:52 executing program 4: socketpair(0x1f, 0x59010000, 0x0, &(0x7f00000000c0)) [ 642.342030][T11662] FAULT_INJECTION: forcing a failure. [ 642.342030][T11662] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 642.358445][T11662] CPU: 0 PID: 11662 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 642.367166][T11662] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 642.377239][T11662] Call Trace: [ 642.380557][T11662] dump_stack+0x197/0x210 [ 642.384908][T11662] should_fail.cold+0xa/0x15 [ 642.384934][T11662] ? fault_create_debugfs_attr+0x180/0x180 [ 642.384955][T11662] ? ___might_sleep+0x163/0x2c0 [ 642.384996][T11662] should_fail_alloc_page+0x50/0x60 [ 642.395363][T11662] __alloc_pages_nodemask+0x1a1/0x910 [ 642.395383][T11662] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 642.395405][T11662] ? __alloc_pages_slowpath+0x2920/0x2920 [ 642.395445][T11662] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 642.395471][T11662] alloc_pages_current+0x107/0x210 [ 642.395485][T11662] ? ___might_sleep+0x163/0x2c0 [ 642.395510][T11662] __vmalloc_node_range+0x4f8/0x810 [ 642.443550][T11662] __vmalloc+0x44/0x50 [ 642.447646][T11662] ? pcpu_mem_zalloc+0x8a/0xf0 [ 642.452427][T11662] pcpu_mem_zalloc+0x8a/0xf0 [ 642.457045][T11662] pcpu_create_chunk+0x12d/0x7f0 [ 642.462019][T11662] pcpu_alloc+0x10f3/0x1380 [ 642.466572][T11662] ? pcpu_alloc_area+0x820/0x820 [ 642.471528][T11662] ? bpf_map_area_alloc+0x20/0x30 [ 642.476581][T11662] __alloc_percpu_gfp+0x28/0x30 [ 642.481455][T11662] htab_map_alloc+0xdb9/0x11c0 [ 642.486265][T11662] ? htab_map_update_elem+0xca0/0xca0 [ 642.491655][T11662] __do_sys_bpf+0x478/0x3810 [ 642.496269][T11662] ? bpf_prog_load+0x18f0/0x18f0 [ 642.501224][T11662] ? __kasan_check_write+0x14/0x20 [ 642.506367][T11662] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 642.511936][T11662] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 642.517248][T11662] ? wait_for_completion+0x440/0x440 [ 642.522660][T11662] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 642.528952][T11662] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 642.534436][T11662] ? do_syscall_64+0x26/0x790 [ 642.539156][T11662] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 642.545225][T11662] ? do_syscall_64+0x26/0x790 [ 642.549986][T11662] __x64_sys_bpf+0x73/0xb0 [ 642.554440][T11662] do_syscall_64+0xfa/0x790 [ 642.558944][T11662] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 642.564835][T11662] RIP: 0033:0x45a919 [ 642.568740][T11662] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 04:51:53 executing program 1: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x2c, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="0b08da6e96e9af8e50e8aeea267d45fc47d2e6f37dfc3aec5247f245d2e51d3c3e73be1a04b9f7f28b07d631f6b73ce58543acc3f03b49636b862d4f99bb20b6d70fc0f4e863d2868516b94ad8ffb9ed41cb944234444dc51b2251cebcd04e3734bd34ac8718dab51d12778b5071f0635ba4e3395e65d1dee3c671bf9357c2a5b365639d917494b38c9f70bd691356de5da68ff827e64236afbd4ec381715dbc8d06c0999516342a02189274e0a4da97c7e098ed6cc696451a824516c5c7e59d734d0923daffb51e63b4e0011fe1e3f98ef6d615c96d8e74095831238f13b6bd7985e2b2c8db7f9d10e021f338e6038f31832d715885b0612c0c", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) [ 642.588355][T11662] RSP: 002b:00007f565edffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 642.596779][T11662] RAX: ffffffffffffffda RBX: 00007f565edffc90 RCX: 000000000045a919 [ 642.604749][T11662] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 642.612737][T11662] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 642.620714][T11662] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f565ee006d4 [ 642.628683][T11662] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 04:51:53 executing program 4: socketpair(0x1f, 0x5a000000, 0x0, &(0x7f00000000c0)) 04:51:53 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x1, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18, 0x1a4}, 0xfc) 04:51:53 executing program 2: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) r2 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) sendmsg$kcm(r5, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r5, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:53 executing program 3 (fault-call:7 fault-nth:72): socketpair(0x0, 0x0, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 04:51:53 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x109000, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\xb6e\x80\x00\xdb\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\x05b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA-\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89\x90\x83\xe1$\x89\x9bjpQ$\x150\xdf\x86\xa8d\xd79\xa7\rX^\x99\x18\xfb\x94\xe5}>\xc6\xc8\x1b\x1f\x7f\xea\xbc;Y\x9ah\x91\'\x00\xee\x88\x14N\xb7\xcb\xde\xedt)\xb9\xfb\x11ye\xf5\x8f\xf1Yb\xba\xd6\xd6e\xbdUB\xcf6\xc8\xa2\x10\xb75\x90\x8b\x1f\x16\x82\xf5=0\x9c\xe5H\xe6pH\xd6\xb8\x9c\xd7\x98\x83\xa4p\xf02\x00\v\x82Y\xe8\xb0\x97\r&\x99\xb9&1\xd7n\x8e/\xf8\x18\x83\'\x1d\x89@\xcf\xd0;\xc0\xeb\x04\xd8\xee\xd8Oo\xc7\xed\xdb\x94\x0f\xbfP>\x19\xa9W\xdc\x1cds\xd3(\x16Uk\xbf*\x04\xec;\xf2\xee`XF\xcd\vR\xbc!l\r\xe9y\xc0\xd7\xc4\xb7\xa2\xd3\xc7\x05\xa0\x96h\x06=\v\xe6\xe5\x04\xd6\xaf\xbd\xf2\xd3\xda\xe6e\xb1\x11UWw\xd83\xd4\xc0/Q\x9df4\x1e\x9c\xb3V_\xcdZ\xb7\xa2a_f\x9f\x93m\xac\xf2\xdd\xe1D($\xb2ZI~\x1c?\xedq\x8a\x9d\xa5V\x02\xcf;H\xa8\xedy\xde\xbb\x05\x13at\x13\x01k<\x05\xbe\xdc\xf5x\xd2\xdcM\x88\xf5\xe4\x96%\xc5\xc4\xc6\xea?\xc0k\x86\x8e<\x17\x9b\xd2\xd16][\xdb\xe3\xbb\xfd^\x85\xa7\xd2\xb2\xd2\xc6[\xd0<\xf8\x996\xe0/\xaf\xee\xe9\x05L\xcf\x16\xc4\xd6', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r3, 0x0, 0x0, 0x0) recvmsg(r3, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f00000007c0)=""/85, 0x55}], 0x1, &(0x7f0000000840)=""/242, 0xf2}, 0x40000000) close(r2) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xfffffc61) openat$cgroup_ro(r2, &(0x7f0000000a00)='cpuset.effective_cpus\x00', 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x17d7b778}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f000000c140)={&(0x7f000000a8c0)=@can={0x1d, 0x0}, 0x80, &(0x7f000000c040), 0x2bd, &(0x7f00000000c0)=""/6, 0x6}, 0x2000) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r5, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000bc0)={r5, 0xc0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=0x2, 0x0, 0x0, 0x0, &(0x7f00000009c0)={0x7, 0x5}, 0x0, 0x0, &(0x7f0000000a40)={0x3, 0x7, 0x1, 0x401}, &(0x7f0000000a80)=0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)=0x1}}, 0x10) ioctl$TUNSETIFINDEX(r2, 0x400454da, &(0x7f0000000300)=r4) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f0000000080)=r4) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0xfffd, @dev={0xac, 0x14, 0x14, 0x1}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000180)="b48dac28360a50716dc09fe77c3ab7db0b3180924e093c53a65445f11a2457a65648fffdcf121d270aa017a67d9969a22fb5889decbf43a9849949f1023f3113b3a599341bdc1c7edfd4da576b6500df26a77ee96da82dfd83feae10b8ce1f9b646fe620f6d4e87e4275921c06e9ae68bf10c6a0868c999345303a1d77e13f7560d352ecb89c247bec5b5298f6ed6ac27132e5ffd2388cea5f2f0ab98a492c37a551d65d91576dea3f959fbf7bb2e69f54f584a6c0597a891888d605c4d7cde1e2cdfac4f5f993279c4d46d5d066edf1ad849fe2f7"}, {&(0x7f0000000280)="fd9d0dddcc225691b8a234db60f9b8af53b20108274488f96aaf86fac61e6c82adf302eb8bf98caf40136e5f2219efce7d11105c58b1d3fe96f1da90617be86ef711d0fce22f96a4595de523ba0041f051991f3729c11415ec7ce7cb2bb79766e3bab813c963641d13b0642e98b0e6ed363893d9b53ec4914fe2bea175363f11065a0c5dd8c3a805b2935a0632f847461155acfd711ae4b04bd955aeed3676e9702fda575b3800f012942ad8f0e26a726d28499fb0295be5a29900f085930d999cec8e2b9a3d5e2e5ef0c619dd0099415a110118f2f586ec3f9ce0f8f9c2dd"}, {&(0x7f0000000380)="65f61e521b5eee46b12bda6d4ee0be948610a5ed511b2a3f2d1d64c1b1f0eea39fcd4b6157dca7ad444f376a617156fa54441b0cff9b54e58e81ecb890110a63fc592916dd2135b392a5cc85a9b35f0e70ff95c269327d95f08c04be8f22b8a825bc818245bed48128cc327c36c4468d1fbf8ad19cfee365b68cb24689ac4ce5e976e5679540dfa7e6faf39f29af5235e8da1b13ea2cc086aedfeb9bded74326b9e37d5f14791efb0bf5abc6a7add1a64188978f9fb3363225a8106e4ced9a5746c721c9c03af94bd724c10a5d818a87d558f0c5db2fa69b311698338cee0cb7194cdee23c0f8a3ccd1ccda211ed6e"}, {&(0x7f0000000480)="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"}, {&(0x7f0000000000)="a090cf8ba3738bf149dd43520db317477ad51dbe3aa0ce1930e30c2b08511071ec0693d4cbc3dd"}, {&(0x7f0000000580)="aa0d42ccb14f6e5267a4e0bdcd6e998dd61a21e76ebc5b9862274eca054af06db179c722d98ada6cd6d219e482b9d5a58a162006afd2a279a6d314348341cd233de1b5780bbe0ca041cb276fa478c8e535c04d28cd57c347b922287ecd8a2d94bea73787d4cf0fccc9567a4b1ba087c29b8a27f2b22eb69887f8e17db73a2e982dce167c003f5ba61827999095b3830b6e32c21381e51354b6363cda40c030bbea8e88fd22040e100494da0f322c93c5bee9a6577b2dde612df4542c175ec7a9082632fdab83703074d71e76be549edb0ba10507"}], 0x1000000000000144, &(0x7f0000000080)=ANY=[], 0x69}, 0x0) 04:51:53 executing program 4: socketpair(0x1f, 0x5a010000, 0x0, &(0x7f00000000c0)) 04:51:53 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x1, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18, 0x1f4}, 0xfc) [ 642.919942][T11687] FAULT_INJECTION: forcing a failure. [ 642.919942][T11687] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 642.942684][T11687] CPU: 1 PID: 11687 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 642.951388][T11687] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 642.961447][T11687] Call Trace: [ 642.964855][T11687] dump_stack+0x197/0x210 [ 642.969204][T11687] should_fail.cold+0xa/0x15 [ 642.973814][T11687] ? fault_create_debugfs_attr+0x180/0x180 [ 642.979633][T11687] ? ___might_sleep+0x163/0x2c0 [ 642.984500][T11687] should_fail_alloc_page+0x50/0x60 [ 642.989699][T11687] __alloc_pages_nodemask+0x1a1/0x910 [ 642.995058][T11687] ? find_held_lock+0x35/0x130 [ 642.999811][T11687] ? __alloc_pages_slowpath+0x2920/0x2920 [ 643.005537][T11687] ? lock_downgrade+0x920/0x920 [ 643.010381][T11687] ? rwlock_bug.part.0+0x90/0x90 [ 643.015312][T11687] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 643.021557][T11687] alloc_pages_current+0x107/0x210 [ 643.026665][T11687] __get_free_pages+0xc/0x40 [ 643.031239][T11687] kasan_populate_vmalloc_pte+0x2f/0x1c0 [ 643.036863][T11687] apply_to_page_range+0x445/0x700 [ 643.041967][T11687] ? memset+0x40/0x40 [ 643.045939][T11687] kasan_populate_vmalloc+0x68/0x90 [ 643.051126][T11687] __vmalloc_node_range+0x47e/0x810 [ 643.056320][T11687] __vmalloc+0x44/0x50 [ 643.060373][T11687] ? pcpu_mem_zalloc+0x8a/0xf0 [ 643.065131][T11687] pcpu_mem_zalloc+0x8a/0xf0 [ 643.069710][T11687] pcpu_create_chunk+0x12d/0x7f0 [ 643.074652][T11687] pcpu_alloc+0x10f3/0x1380 [ 643.079157][T11687] ? pcpu_alloc_area+0x820/0x820 [ 643.084095][T11687] ? bpf_map_area_alloc+0x20/0x30 [ 643.089115][T11687] __alloc_percpu_gfp+0x28/0x30 [ 643.093957][T11687] htab_map_alloc+0xdb9/0x11c0 [ 643.098737][T11687] ? htab_map_update_elem+0xca0/0xca0 [ 643.104103][T11687] __do_sys_bpf+0x478/0x3810 [ 643.108684][T11687] ? bpf_prog_load+0x18f0/0x18f0 [ 643.113606][T11687] ? __kasan_check_write+0x14/0x20 [ 643.118704][T11687] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 643.124246][T11687] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 643.129516][T11687] ? wait_for_completion+0x440/0x440 [ 643.134810][T11687] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 643.141060][T11687] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 643.146501][T11687] ? do_syscall_64+0x26/0x790 [ 643.151174][T11687] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 643.157224][T11687] ? do_syscall_64+0x26/0x790 [ 643.161887][T11687] __x64_sys_bpf+0x73/0xb0 [ 643.166301][T11687] do_syscall_64+0xfa/0x790 [ 643.170789][T11687] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 643.176663][T11687] RIP: 0033:0x45a919 [ 643.180543][T11687] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 643.200127][T11687] RSP: 002b:00007f565edffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 643.208521][T11687] RAX: ffffffffffffffda RBX: 00007f565edffc90 RCX: 000000000045a919 [ 643.216477][T11687] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 643.224432][T11687] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 643.232397][T11687] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f565ee006d4 [ 643.240362][T11687] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 [ 643.248597][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 643.254424][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:51:53 executing program 1: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x2c, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="0b08da6e96e9af8e50e8aeea267d45fc47d2e6f37dfc3aec5247f245d2e51d3c3e73be1a04b9f7f28b07d631f6b73ce58543acc3f03b49636b862d4f99bb20b6d70fc0f4e863d2868516b94ad8ffb9ed41cb944234444dc51b2251cebcd04e3734bd34ac8718dab51d12778b5071f0635ba4e3395e65d1dee3c671bf9357c2a5b365639d917494b38c9f70bd691356de5da68ff827e64236afbd4ec381715dbc8d06c0999516342a02189274e0a4da97c7e098ed6cc696451a824516c5c7e59d734d0923daffb51e63b4e0011fe1e3f98ef6d615c96d8e74095831238f13b6bd7985e2b2c8db7f9d10e021f338e6038f31832d715885b0612c0c", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:53 executing program 4: socketpair(0x1f, 0x5b000000, 0x0, &(0x7f00000000c0)) 04:51:53 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000000000)) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0x0) 04:51:53 executing program 2: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={0x0, 0x0, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) r2 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) sendmsg$kcm(r5, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r5, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:53 executing program 4: socketpair(0x1f, 0x5b010000, 0x0, &(0x7f00000000c0)) 04:51:53 executing program 3 (fault-call:7 fault-nth:73): socketpair(0x0, 0x0, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 04:51:54 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000640)={&(0x7f0000000080)=@nfc, 0x80, &(0x7f0000000540)=[{}, {&(0x7f0000000180)=""/173, 0xad}, {&(0x7f0000000240)=""/156, 0x9c}, {&(0x7f00000003c0)=""/133, 0x85}, {&(0x7f0000000300)=""/118, 0x76}, {&(0x7f0000000480)=""/129, 0x81}], 0x6, &(0x7f00000005c0)=""/125, 0x7d}, 0x0) 04:51:54 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x1, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18, 0x3e8}, 0xfc) 04:51:54 executing program 1: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x2c, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:54 executing program 4: socketpair(0x1f, 0x5c000000, 0x0, &(0x7f00000000c0)) 04:51:54 executing program 2: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={0x0, 0x0, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) r2 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) sendmsg$kcm(r5, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r5, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) [ 643.778386][T11719] FAULT_INJECTION: forcing a failure. [ 643.778386][T11719] name failslab, interval 1, probability 0, space 0, times 0 [ 643.810700][T11719] CPU: 0 PID: 11719 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 643.819429][T11719] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 643.829504][T11719] Call Trace: [ 643.832823][T11719] dump_stack+0x197/0x210 [ 643.837178][T11719] should_fail.cold+0xa/0x15 [ 643.841806][T11719] ? fault_create_debugfs_attr+0x180/0x180 [ 643.847635][T11719] ? ___might_sleep+0x163/0x2c0 [ 643.852503][T11719] __should_failslab+0x121/0x190 [ 643.857453][T11719] should_failslab+0x9/0x14 [ 643.862138][T11719] kmem_cache_alloc_node_trace+0x274/0x750 [ 643.867967][T11719] ? do_raw_spin_unlock+0x178/0x270 [ 643.873207][T11719] __kmalloc_node+0x3d/0x70 [ 643.877739][T11719] __vmalloc_node_range+0x1db/0x810 [ 643.882986][T11719] __vmalloc+0x44/0x50 [ 643.887066][T11719] ? pcpu_mem_zalloc+0x8a/0xf0 [ 643.891849][T11719] pcpu_mem_zalloc+0x8a/0xf0 [ 643.896459][T11719] pcpu_create_chunk+0x196/0x7f0 [ 643.901425][T11719] pcpu_alloc+0x10f3/0x1380 [ 643.906053][T11719] ? pcpu_alloc_area+0x820/0x820 [ 643.911002][T11719] ? bpf_map_area_alloc+0x20/0x30 [ 643.916173][T11719] __alloc_percpu_gfp+0x28/0x30 [ 643.921044][T11719] htab_map_alloc+0xdb9/0x11c0 04:51:54 executing program 4: socketpair(0x1f, 0x5c010000, 0x0, &(0x7f00000000c0)) [ 643.925854][T11719] ? htab_map_update_elem+0xca0/0xca0 [ 643.931246][T11719] __do_sys_bpf+0x478/0x3810 [ 643.935859][T11719] ? bpf_prog_load+0x18f0/0x18f0 [ 643.940814][T11719] ? __kasan_check_write+0x14/0x20 [ 643.945944][T11719] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 643.951503][T11719] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 643.956811][T11719] ? wait_for_completion+0x440/0x440 [ 643.962125][T11719] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 643.968416][T11719] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 643.973887][T11719] ? do_syscall_64+0x26/0x790 04:51:54 executing program 4: socketpair(0x1f, 0x5d000000, 0x0, &(0x7f00000000c0)) [ 643.978576][T11719] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 643.984656][T11719] ? do_syscall_64+0x26/0x790 [ 643.989360][T11719] __x64_sys_bpf+0x73/0xb0 [ 643.993801][T11719] do_syscall_64+0xfa/0x790 [ 643.998336][T11719] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 644.004239][T11719] RIP: 0033:0x45a919 [ 644.008144][T11719] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 04:51:54 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x8, @multicast2}, 0x1, 0x0, 0x3, 0x1}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000200)="65225756a0e1a3eff4d6bb3d8edc6f71f8dd02c02436ca07e0cd1ca8130b7c80753e542fcc3a74e635277a2f36a53f2573ae1ad083d47b9af968d25edb24fb542b37eb772620e1f7263b1a65d0999fd22f46575b8c172f9751e1099312b7401058e96cf5d1d49447dca352940ee22f3a7f231a7b33791c5b47f4e99a7b0412c389ab2fb93357c61f2740caf590ea6835148685723254e71acbc882d8fcdc0e2cc08e292cfbd779d02e", 0xa9}, {&(0x7f00000000c0)="3131779b11b957eb2cafd1255837e92034700cd37b24d1ddc6ae2afa9de1835ab09985d75a006bc137830d2d77ed6ef5b614223abb32d0956f4d", 0x3a}, {&(0x7f00000002c0)="01c95ea4a1d32989db8cd1fbdc11a028f9d8cd3aa88a93019968846ae14a3dd39cbda738ede27640aaad0ab0c4", 0x2d}], 0x3, &(0x7f00000003c0)=[{0xd0, 0x19, 0x8, "397ac723f1a844bcd22b5d2b606d79b204ddae31710ebc70671e291fa9ae8844dc799db0d11356e6abdd216d84dbb1a7ba235f5d3357d2009ebf72d6461e8f108faf674d2a3ec29bfaaf6eecb02a100c33d0266b2c1763e15114cedc4e61733a8264888eb555608b6124bfdde4b8e33b2d793979f995d8ac2305c9f14a61b0a296429cc1694f60e7e9025e9754d4e7ad8da2ca10e8d399a13428682006e0ae2a3834c257b46c8dc0306e9b2cfd41052d735285536aee314531eecbd111"}], 0xd0}, 0x40801) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0x0) [ 644.027761][T11719] RSP: 002b:00007f565edffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 644.036185][T11719] RAX: ffffffffffffffda RBX: 00007f565edffc90 RCX: 000000000045a919 [ 644.044173][T11719] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 644.052157][T11719] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 644.060141][T11719] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f565ee006d4 [ 644.068132][T11719] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 04:51:54 executing program 4: socketpair(0x1f, 0x5d010000, 0x0, &(0x7f00000000c0)) 04:51:54 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x1, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18, 0x4e0}, 0xfc) 04:51:54 executing program 2: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={0x0, 0x0, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) r2 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) sendmsg$kcm(r5, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r5, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:54 executing program 3 (fault-call:7 fault-nth:74): socketpair(0x0, 0x0, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 04:51:54 executing program 1: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x2c, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:54 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0xe1, 0x83, 0x1, 0x0, 0x0, 0x5, 0x20, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xe74, 0x5, @perf_config_ext={0x3ff, 0x63}, 0x4, 0x7eb, 0x8, 0x6, 0x8, 0x1, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xc5e021c177a65cb7) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000180)={0x4, 0x70, 0x35, 0x2, 0x8, 0x7f, 0x0, 0x20, 0x52000, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x8, @perf_bp={&(0x7f0000000000), 0x4}, 0x10080, 0x4, 0x7, 0x5, 0x5, 0x74c5, 0x3}, 0xffffffffffffffff, 0x5, r1, 0x4) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r2) r3 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r3, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000240)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x4}, 0x0) 04:51:54 executing program 4: socketpair(0x1f, 0x5e000000, 0x0, &(0x7f00000000c0)) 04:51:54 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x1, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18, 0x500}, 0xfc) 04:51:54 executing program 4: socketpair(0x1f, 0x5e010000, 0x0, &(0x7f00000000c0)) 04:51:54 executing program 2: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, 0x0}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) r2 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) sendmsg$kcm(r5, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r5, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:55 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x1, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18, 0x5a8}, 0xfc) 04:51:55 executing program 1: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x2c, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) [ 644.640002][T11767] FAULT_INJECTION: forcing a failure. [ 644.640002][T11767] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 644.696762][T11767] CPU: 1 PID: 11767 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 644.705493][T11767] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 644.715546][T11767] Call Trace: [ 644.718842][T11767] dump_stack+0x197/0x210 [ 644.723194][T11767] should_fail.cold+0xa/0x15 [ 644.727794][T11767] ? fault_create_debugfs_attr+0x180/0x180 [ 644.733615][T11767] ? ___might_sleep+0x163/0x2c0 [ 644.738573][T11767] should_fail_alloc_page+0x50/0x60 [ 644.743780][T11767] __alloc_pages_nodemask+0x1a1/0x910 [ 644.749156][T11767] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 644.754707][T11767] ? __alloc_pages_slowpath+0x2920/0x2920 [ 644.760440][T11767] ? kasan_unpoison_shadow+0x35/0x50 [ 644.765734][T11767] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 644.771978][T11767] alloc_pages_current+0x107/0x210 [ 644.777093][T11767] __vmalloc_node_range+0x4f8/0x810 [ 644.782302][T11767] __vmalloc+0x44/0x50 [ 644.786370][T11767] ? pcpu_mem_zalloc+0x8a/0xf0 [ 644.786386][T11767] pcpu_mem_zalloc+0x8a/0xf0 [ 644.786401][T11767] pcpu_create_chunk+0x196/0x7f0 [ 644.786418][T11767] pcpu_alloc+0x10f3/0x1380 [ 644.805189][T11767] ? pcpu_alloc_area+0x820/0x820 [ 644.810135][T11767] ? bpf_map_area_alloc+0x20/0x30 [ 644.815183][T11767] __alloc_percpu_gfp+0x28/0x30 [ 644.820048][T11767] htab_map_alloc+0xdb9/0x11c0 [ 644.824821][T11767] ? htab_map_update_elem+0xca0/0xca0 [ 644.830368][T11767] __do_sys_bpf+0x478/0x3810 [ 644.834959][T11767] ? bpf_prog_load+0x18f0/0x18f0 [ 644.839887][T11767] ? __kasan_check_write+0x14/0x20 [ 644.845034][T11767] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 644.850579][T11767] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 644.855929][T11767] ? wait_for_completion+0x440/0x440 [ 644.861204][T11767] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 644.867435][T11767] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 644.872880][T11767] ? do_syscall_64+0x26/0x790 [ 644.877545][T11767] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 644.883591][T11767] ? do_syscall_64+0x26/0x790 [ 644.888300][T11767] __x64_sys_bpf+0x73/0xb0 [ 644.892707][T11767] do_syscall_64+0xfa/0x790 [ 644.897225][T11767] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 644.903123][T11767] RIP: 0033:0x45a919 [ 644.907011][T11767] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 644.926600][T11767] RSP: 002b:00007f565edffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 644.935010][T11767] RAX: ffffffffffffffda RBX: 00007f565edffc90 RCX: 000000000045a919 04:51:55 executing program 4: socketpair(0x1f, 0x5f000000, 0x0, &(0x7f00000000c0)) [ 644.942963][T11767] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 644.950920][T11767] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 644.958877][T11767] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f565ee006d4 [ 644.966919][T11767] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 04:51:55 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x1, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18, 0x5dc}, 0xfc) 04:51:55 executing program 3 (fault-call:7 fault-nth:75): socketpair(0x0, 0x0, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 04:51:55 executing program 2: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, 0x0}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) r2 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) sendmsg$kcm(r5, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r5, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:55 executing program 4: socketpair(0x1f, 0x5f010000, 0x0, &(0x7f00000000c0)) [ 645.254914][T11791] FAULT_INJECTION: forcing a failure. [ 645.254914][T11791] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 645.289679][T11791] CPU: 0 PID: 11791 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 645.298417][T11791] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 645.298426][T11791] Call Trace: [ 645.298456][T11791] dump_stack+0x197/0x210 [ 645.298491][T11791] should_fail.cold+0xa/0x15 [ 645.312892][ C1] net_ratelimit: 2 callbacks suppressed [ 645.312919][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 645.316249][T11791] ? fault_create_debugfs_attr+0x180/0x180 [ 645.316271][T11791] ? ___might_sleep+0x163/0x2c0 [ 645.316318][T11791] should_fail_alloc_page+0x50/0x60 [ 645.321331][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 645.326425][T11791] __alloc_pages_nodemask+0x1a1/0x910 [ 645.326444][T11791] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 645.326465][T11791] ? __alloc_pages_slowpath+0x2920/0x2920 [ 645.326498][T11791] ? kasan_unpoison_shadow+0x35/0x50 [ 645.326520][T11791] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 645.332849][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 645.338016][T11791] alloc_pages_current+0x107/0x210 [ 645.338050][T11791] __vmalloc_node_range+0x4f8/0x810 [ 645.343088][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 645.352435][T11791] __vmalloc+0x44/0x50 [ 645.352456][T11791] ? pcpu_mem_zalloc+0x8a/0xf0 [ 645.352476][T11791] pcpu_mem_zalloc+0x8a/0xf0 [ 645.352497][T11791] pcpu_create_chunk+0x196/0x7f0 [ 645.426377][T11791] pcpu_alloc+0x10f3/0x1380 [ 645.430902][T11791] ? pcpu_alloc_area+0x820/0x820 [ 645.430920][T11791] ? bpf_map_area_alloc+0x20/0x30 [ 645.430955][T11791] __alloc_percpu_gfp+0x28/0x30 [ 645.445737][T11791] htab_map_alloc+0xdb9/0x11c0 [ 645.450551][T11791] ? htab_map_update_elem+0xca0/0xca0 [ 645.455944][T11791] __do_sys_bpf+0x478/0x3810 [ 645.460570][T11791] ? bpf_prog_load+0x18f0/0x18f0 [ 645.465528][T11791] ? __kasan_check_write+0x14/0x20 [ 645.470658][T11791] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 645.476225][T11791] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 645.481535][T11791] ? wait_for_completion+0x440/0x440 [ 645.486835][T11791] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 645.493109][T11791] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 645.498568][T11791] ? do_syscall_64+0x26/0x790 04:51:55 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=ANY=[@ANYBLOB="10000000000000840000000700000000"], 0x10}, 0x0) 04:51:55 executing program 1: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x2c, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:55 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x1, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18, 0x600}, 0xfc) 04:51:55 executing program 4: socketpair(0x1f, 0x60000000, 0x0, &(0x7f00000000c0)) [ 645.503247][T11791] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 645.509313][T11791] ? do_syscall_64+0x26/0x790 [ 645.514008][T11791] __x64_sys_bpf+0x73/0xb0 [ 645.518447][T11791] do_syscall_64+0xfa/0x790 [ 645.522975][T11791] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 645.528871][T11791] RIP: 0033:0x45a919 [ 645.532771][T11791] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 645.552390][T11791] RSP: 002b:00007f565edffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 645.560804][T11791] RAX: ffffffffffffffda RBX: 00007f565edffc90 RCX: 000000000045a919 [ 645.560815][T11791] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 645.560825][T11791] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 645.560836][T11791] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f565ee006d4 [ 645.560846][T11791] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 04:51:56 executing program 2: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, 0x0}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) r2 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) sendmsg$kcm(r5, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r5, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="0b08da6e96e9af8e50e8aeea267d45fc47d2e6f37dfc3aec5247f245d2e51d3c3e73be1a04b9f7f28b07d631f6b73ce58543acc3f03b49636b862d4f99bb20b6d70fc0f4e863d2868516b94ad8ffb9ed41cb944234444dc51b2251cebcd04e3734bd34ac8718dab51d12778b5071f0635ba4e3395e65d1dee3c671bf9357c2a5b365639d917494b38c9f70bd691356de5da68ff827e64236afbd4ec381715dbc8d06c0999516342a02189274e0a4da97c7e098ed6cc696451a824516c5c7e59d734d0923daffb51e63b4e0011fe1e3f98ef6d615c96d8e74095831238f13b6bd7985e2b2c8db7f9d10e021f338e6038f31832d715885b0612c0c", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:56 executing program 4: socketpair(0x1f, 0x60010000, 0x0, &(0x7f00000000c0)) 04:51:56 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000080)="c41bbd", 0x1}], 0x1, &(0x7f0000000380)=[{0xfe00, 0x84, 0x7}], 0x10}, 0x0) openat$cgroup_ro(r1, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) socket$kcm(0x29, 0xf732efed1521e5a9, 0x0) 04:51:56 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x1, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18, 0x700}, 0xfc) 04:51:56 executing program 3 (fault-call:7 fault-nth:76): socketpair(0x0, 0x0, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 04:51:56 executing program 1: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x2c, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="0b08da6e96e9af8e50e8aeea267d45fc47d2e6f37dfc3aec5247f245d2e51d3c3e73be1a04b9f7f28b07d631f6b73ce58543acc3f03b49636b862d4f99bb20b6d70fc0f4e863d2868516b94ad8ffb9ed41cb944234444dc51b2251cebcd04e3734bd34ac8718dab51d12778b5071f0635ba4e3395e65d1dee3c671bf9357c2a5b365639d917494b38c9f70bd691356de5da68ff827e64236afbd4ec381715dbc8d06c0999516342a02189274e0a4da97c7e098ed6cc696451a824516c5c7e59d734d0923daffb51e63b4e0011fe1e3f98ef6d615c96d8e74095831238f13b6bd7985e2b2c8db7f9d10e021f338e6038f31832d715885b0612c0c", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:56 executing program 4: socketpair(0x1f, 0x61000000, 0x0, &(0x7f00000000c0)) [ 645.946233][T11824] FAULT_INJECTION: forcing a failure. [ 645.946233][T11824] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 645.979198][T11824] CPU: 1 PID: 11824 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 645.987937][T11824] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 645.997998][T11824] Call Trace: [ 646.001309][T11824] dump_stack+0x197/0x210 [ 646.005664][T11824] should_fail.cold+0xa/0x15 [ 646.010279][T11824] ? fault_create_debugfs_attr+0x180/0x180 [ 646.016094][T11824] ? ___might_sleep+0x163/0x2c0 [ 646.020967][T11824] should_fail_alloc_page+0x50/0x60 [ 646.026169][T11824] __alloc_pages_nodemask+0x1a1/0x910 [ 646.031545][T11824] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 646.037100][T11824] ? __alloc_pages_slowpath+0x2920/0x2920 [ 646.042835][T11824] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 646.049083][T11824] alloc_pages_current+0x107/0x210 [ 646.054189][T11824] ? ___might_sleep+0x163/0x2c0 [ 646.059056][T11824] __vmalloc_node_range+0x4f8/0x810 [ 646.064275][T11824] __vmalloc+0x44/0x50 [ 646.068357][T11824] ? pcpu_mem_zalloc+0x8a/0xf0 [ 646.073128][T11824] pcpu_mem_zalloc+0x8a/0xf0 [ 646.077730][T11824] pcpu_create_chunk+0x196/0x7f0 [ 646.082678][T11824] pcpu_alloc+0x10f3/0x1380 [ 646.087208][T11824] ? pcpu_alloc_area+0x820/0x820 [ 646.092182][T11824] __alloc_percpu_gfp+0x28/0x30 [ 646.097301][T11824] htab_map_alloc+0xdb9/0x11c0 [ 646.102089][T11824] ? htab_map_update_elem+0xca0/0xca0 [ 646.107472][T11824] __do_sys_bpf+0x478/0x3810 [ 646.112074][T11824] ? bpf_prog_load+0x18f0/0x18f0 [ 646.117102][T11824] ? __kasan_check_write+0x14/0x20 [ 646.122222][T11824] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 646.127775][T11824] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 646.133070][T11824] ? wait_for_completion+0x440/0x440 [ 646.138373][T11824] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 646.144638][T11824] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 646.150106][T11824] ? do_syscall_64+0x26/0x790 [ 646.154788][T11824] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 646.160860][T11824] ? do_syscall_64+0x26/0x790 [ 646.165558][T11824] __x64_sys_bpf+0x73/0xb0 [ 646.169985][T11824] do_syscall_64+0xfa/0x790 [ 646.174498][T11824] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 646.180394][T11824] RIP: 0033:0x45a919 04:51:56 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) socket$kcm(0x29, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@rc={0x1f, {0x0, 0x1, 0x1f, 0x0, 0x9, 0x36}, 0x9}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="00000400000007000000ea000654abe51b6b934763fa10059222d35d3b0e73ddc9884e05b30d60a0fb67011497982346d534754302e853d8f635ac4f6625c71738fbc15cea21466325c86382af1e6af32779cb8c668d05d729a7edb4d1f64f5abcf5f4207c3681ae0e04201a2b1f7c14e9088369a026936d73b1a7ef9e14c23a277073d6b02739a88f6baf413a11d55f2a0ea2324d79be3f4ba5833146c7b3c9ed562d08f24f59913844166be02a8fa879b2372aa13c26206d28e87a49ad0ceb09e882804456f85e07fe95e744ebcf97fd8e89015564"], 0xd6}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat$cgroup(r1, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) 04:51:56 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x1, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18, 0x900}, 0xfc) 04:51:56 executing program 4: socketpair(0x1f, 0x61010000, 0x0, &(0x7f00000000c0)) 04:51:56 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000180)=ANY=[@ANYBLOB="10000000000000008400000007000000ca5712ab3bee23d4b041b8357cf6261662f451104b7cedc4b6c899fc3f1e4b6ef5c56c3b9f50a3fa66a7d22a7cf0ad3a3706df321d5ae44ffaac8d4ad919ac354c385570dfdb93e211ff897d90827215fd0fc30ce6f0717be2c6cc05143e1f6397bffa1b7bac7ac068a1234942777a3074fde171a84bfa8e6b81cdaf38f77801f04049a3c5e809b1eb78ac14c11753401f07353d7d3e9466f1b3416ffb7315d6d89e67dc41fb787750054f6e7b0e94268d1829411f99d6200ed9790b1bdc7370d7866f1b65460c"], 0x10}, 0x0) 04:51:56 executing program 4: socketpair(0x1f, 0x62000000, 0x0, &(0x7f00000000c0)) [ 646.184307][T11824] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 646.203915][T11824] RSP: 002b:00007f565edffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 646.212338][T11824] RAX: ffffffffffffffda RBX: 00007f565edffc90 RCX: 000000000045a919 [ 646.220316][T11824] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 646.228292][T11824] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 646.236266][T11824] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f565ee006d4 04:51:56 executing program 2: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}], 0x1}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) r2 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) sendmsg$kcm(r5, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r5, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:56 executing program 4: socketpair(0x1f, 0x62010000, 0x0, &(0x7f00000000c0)) 04:51:56 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000800)={0x3, 0x6, [@random="0135efedd26c", @remote, @dev={[], 0x26}, @broadcast, @broadcast, @broadcast]}) r1 = socket$kcm(0xa, 0x5, 0x0) socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000080)=@in6={0xa, 0x4e20, 0x10001, @rand_addr="5f479cf4e6e87e16406d91843d00a245", 0x6}, 0x80, &(0x7f0000000740)=[{&(0x7f00000002c0)="fc4c533ede60253af33f99ccdcb5f0daba17c1123ac9979c6815234263c20d84688cd1c36f3f86fc8dd0c72ebe51ac07168e0b0cc064677ce1454836f5455345bebfbf6471fa3f89ffad939481fa713c052b964def476391a25f0be49a0bdf5f10fa7bf1476bd2a2378239b6b21d25e283e4c2408341b504ab8caba61ca857b54aa4ab356678acc3abac4793260646b8c0ba09b2f4895117e977773b7058c06ae048991a58f27ec742c80b61a9078e173a74a004f738223d81498502e300c545ed9ab3d1adbce61b21de81192f7a9e7aa50d94d8c1c4ee71", 0xd8}, {&(0x7f0000000000)="bf5f91c7d512400c0c3dd43fe0b2", 0xe}, {&(0x7f00000003c0)="920c6d8b3c9b5ed2cfbb1185ed0ed40052281ae3d834f6cce87a19868050dca7fbbce6f3d3b7a42fb141ede0703116a1a1282d67dcf379", 0x37}, {&(0x7f0000000400)="28784ed26cf2ab0cd2c39e3e66e61321911d71c40c81938f960104df2de66ba3adb3c6865386edf476488651613266d73d3d6a970d525e455194ac0719e4f7c7f9b01be782b0a7b17fa6c398ca6bd44992fb973ac59ab67efcad0e5d87cbc4b0284fbf96a7d74d2d1ade203e36cae10d665bcdc29ebf924d0e618b00c261a30b49eb56c9fd44fb6cd2fbecb61458713ac160dcaf38b10c5b1575f8094f96bf6d782d1b782d37", 0xa6}, {&(0x7f00000004c0)="28a87f3b4374c07b1bb7a0436f0ca61a514f1b85e09571bcb3a770b6f36af3997007505604138dc6029ba503363183b9c801fe72fc1eec2d8291e4d7f852263e2f278e7c6ca5b3dcd5e530ccd00377d4f47c9b5108a2d8a249b3", 0x5a}, {&(0x7f0000000540)="0acaffd36d7ad9f6ffdc8bf33830f93ea0354a82fc0b0bb6609780d8b966abf400a9d00492891c2d89b040eec98a192169fbcd72", 0x34}, {&(0x7f0000000580)="40938c11307c0464ea084f200bab6d1a54ad8e6362c53e29e573b436e733945c39aa5b4620cb5e6883ec6286133b1969472f2c2d099508cd9d1ca073d89edfa2a7c42097660861571fb90389148c224db1a8079deb4a62ae9850dacbe2f567a85bc443dcf8e31566ebcf323d9959ba4ad3d7757124bac71f49e03a4ca5cc53b4a2bb208326c8ff346a75525edb0b59", 0x8f}, {&(0x7f0000000640)="e689a62a1fac274c2a5e79b9a06aaef6925409cba707ac3ebf9bf33da10269344129aecb16e7baf8176c2bcadb5f29288ccffeb36649fb4aa1f27902107312cc9149468ac20062c6d1a011147a8717ca3fbc3dc975688c4a0ec0871d5addda71711c6ee78e66fd1d1a", 0x69}], 0x8}, 0x81) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x10}, 0x0) [ 646.244244][T11824] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 04:51:56 executing program 1: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) socket$kcm(0x2c, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:56 executing program 3 (fault-call:7 fault-nth:77): socketpair(0x0, 0x0, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 04:51:56 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x1, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18, 0xa00}, 0xfc) 04:51:56 executing program 2: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}], 0x1}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) r2 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) sendmsg$kcm(r5, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r5, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:56 executing program 4: socketpair(0x1f, 0x63000000, 0x0, &(0x7f00000000c0)) [ 646.589617][T11858] FAULT_INJECTION: forcing a failure. [ 646.589617][T11858] name failslab, interval 1, probability 0, space 0, times 0 [ 646.658191][T11858] CPU: 0 PID: 11858 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 646.666928][T11858] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 646.677003][T11858] Call Trace: [ 646.680322][T11858] dump_stack+0x197/0x210 [ 646.684697][T11858] should_fail.cold+0xa/0x15 [ 646.689322][T11858] ? fault_create_debugfs_attr+0x180/0x180 [ 646.695156][T11858] ? ___might_sleep+0x163/0x2c0 [ 646.700032][T11858] __should_failslab+0x121/0x190 [ 646.704996][T11858] should_failslab+0x9/0x14 [ 646.709515][T11858] __kmalloc+0x2e0/0x770 [ 646.713903][T11858] ? memset+0x40/0x40 [ 646.717911][T11858] ? pcpu_get_vm_areas+0x3d5/0x3ee0 [ 646.723131][T11858] pcpu_get_vm_areas+0x3d5/0x3ee0 [ 646.728174][T11858] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 646.728193][T11858] ? __vmalloc_node_range+0x4d7/0x810 [ 646.728246][T11858] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 646.746051][T11858] pcpu_create_chunk+0x24e/0x7f0 [ 646.750987][T11858] pcpu_alloc+0x10f3/0x1380 [ 646.755521][T11858] ? pcpu_alloc_area+0x820/0x820 [ 646.760466][T11858] ? bpf_map_area_alloc+0x20/0x30 [ 646.765531][T11858] __alloc_percpu_gfp+0x28/0x30 [ 646.770404][T11858] htab_map_alloc+0xdb9/0x11c0 [ 646.775226][T11858] ? htab_map_update_elem+0xca0/0xca0 [ 646.780640][T11858] __do_sys_bpf+0x478/0x3810 [ 646.785264][T11858] ? bpf_prog_load+0x18f0/0x18f0 [ 646.790225][T11858] ? __kasan_check_write+0x14/0x20 [ 646.795360][T11858] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 646.800918][T11858] ? rcu_read_lock_bh_held+0xb0/0xb0 04:51:57 executing program 1: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) socket$kcm(0x2c, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:57 executing program 4: socketpair(0x1f, 0x63010000, 0x0, &(0x7f00000000c0)) 04:51:57 executing program 4: socketpair(0x1f, 0x64000000, 0x0, &(0x7f00000000c0)) [ 646.806226][T11858] ? wait_for_completion+0x440/0x440 [ 646.811544][T11858] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 646.817828][T11858] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 646.823320][T11858] ? do_syscall_64+0x26/0x790 [ 646.828014][T11858] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 646.834092][T11858] ? do_syscall_64+0x26/0x790 [ 646.838798][T11858] __x64_sys_bpf+0x73/0xb0 [ 646.843242][T11858] do_syscall_64+0xfa/0x790 [ 646.847767][T11858] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 646.853674][T11858] RIP: 0033:0x45a919 04:51:57 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x1, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18, 0xe00}, 0xfc) [ 646.857587][T11858] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 646.877297][T11858] RSP: 002b:00007f565edffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 646.885730][T11858] RAX: ffffffffffffffda RBX: 00007f565edffc90 RCX: 000000000045a919 [ 646.893818][T11858] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 04:51:57 executing program 4: socketpair(0x1f, 0x64010000, 0x0, &(0x7f00000000c0)) [ 646.901803][T11858] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 646.909787][T11858] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f565ee006d4 [ 646.917769][T11858] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 04:51:57 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) socketpair(0x3, 0x3, 0x7, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$kcm(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000180)="7aab8074ed6231c4ee3273fee50d85c499ddd15a7cb0a7201cb5f6465ed55c51cb380ae8eab61fe2168c03893c83ae2072275fedd325affd6577da1c653a7875868a68cbd02ba3fecad6603eae14bd4e7187e42ad903c850dc4787732d5f964c72b618d3b9b8f883d66dc88cf173b83b8007ee85ad9adeac33176416bd626792d1d07d0c823a80c19f6aaa14f4b85e6e2b601b83eab2c7ac4712a5a25b38aa6d69874ebbc35330aa7f7ab631d9d71094", 0xb0}, {&(0x7f0000000080)="9c92917f6f6150120b8f6fea103322b10f2cd080e2f2094d58b96e28f86a9a542ef373a3ee42507ab3", 0x29}, {&(0x7f0000000240)="f51c850c7f080f9ff9d46cbf3dcada5645fbc268e6e077c27791d6655bea77e558c25a3a527ba2a996a838d00f430c25bfb45813d8d11ea11dd8df4aafa428ce364db0ef8d5e985b37424d2eb695e2a5fdfee30f9a3d07103c522a94f40910cabec33699483429b9be", 0x69}, {&(0x7f00000000c0)="0ae0329cd4cfe7a5fd212df6928b32dd2cf20134ac3043edfb489c185b3d684bb964ac17dd7982e01ca3777255c4037da2dec17aef4df9f84b1a0be00fd01f", 0x3f}, {&(0x7f00000002c0)="4242c12f4d65f4c5955873cef609320faccf14683ca56f1165138f2c3c43e727a71dd28da539bd08dbbc417b130e82b9e819bfdcd377678046fd294a18d1142febf52dbbc4cc7a1fa7bf", 0x4a}], 0x5, &(0x7f0000000740)=[{0x98, 0x10e, 0x401, "2f2dd294f983e90cd5b4c3939bfe2617fcdf8a3661f8f7d17ee29d276a0d82eec77ded31650c55ec3b9a8dd3e1fabf1496b3f59b8cd90f661d1a219bae97d98a98da1e0ecf3781117461bf608176f92781ae2409f2d2042db5cb71920bf8bd0fc7c10b4c092da53c210c7077977e5174f001eb038f9e2a7fe31680505b935f53f1e4c4fe31"}, {0xc0, 0x0, 0x5, "f0bd351033aea98ec0fee315846acad2c35988e2c88db9258de2ec16ace7cb70c9084686ab3bf58fc3b7c84b9718361f699422492f35b846ccfa409c4c677f73d9b6efd6b4b07046bdf48f89a578f275015e93ae44a000f571249ac6cb5924025ef23041ae2f8f77967dc7fd39d04eb4a0695f331417060551ba487bfeb5d363db317640773755bb94793f3c124f5e5156c27c5a40673acf0866a120c7c3fd9f015d29cdff3df57c40fd6fbc"}, {0x108, 0x102, 0x3, "4548385e87b476c9a10a7d79da2a99c1fac1ea0691e7ccdf8a869920551ae346bcad5b73b18ed979eb6f7f87589870a7f3a58a94e367aaca1220fb0a993abc13d2aa4f3f986e94282db10171cac40fadd5eb08ae137e7990fc020828ff833fe9438b33befcc6251fa8d2e2ffacb376bc97caf04ca523aff51bf52988df02c6b51b282c9887b0f1953a6316fb1f55275b28ba7a792b838948b01c8c35f358216d141c5e9b6e116ac11c69e75623972ce67ec16f607194bf16732fe26ec350d1047ad2b958ac14632d96e40d1338553c4727b3d4662384216dc739776a5db3845f5ffcd96706e575cf57390e983e8f69c32123e9c7"}, {0x20, 0x9a, 0x9, "618dce90e791655340"}, {0x30, 0x109, 0x5, "ab06979eca2482ca06a18278aa8b7cdb3e8e2b3e10d8f8e6fbd937fd"}, {0xb8, 0x88, 0x20, "8a27b7af0035c6962238c76a60331d2b01b84adb90d893472fe7606a6e7400f0892383b64c087511ee7141ff2f8fd21ddcb89aa40bf8bca461d3ecfcbc1dba2d478fe62a73e39164e09b0b4318d70c84f58e55fac01e86ea95a08048032d21f3f4a0d9c1462706cafbd51b41b0f27c3594e0c37038eb24e60c0ca45c761e7b8b873c3829f56e8bc6933e8a82a4442c994d0078305d678af58df3ad15026feca1e0a0ef6640"}, {0x70, 0x103, 0x8, "67445998a147822f69b99247838e0ecdbc31a236cd6c57712f8b035e396bf204d66ca21fe93d76a5d596394cadcf3e70728bb857b0ebc2a778d8407fd6dadc73e11c5d64fed2ebf3b6ab46f5cc5fd79cf585fd3760ca74c7f2fa3dde50"}, {0x70, 0x1, 0x8f70, "964f1fd6fcbe357f312506299a8d0819eef1513a548a762244d9d1304f32be4ae4f28d0908bd8d5c3ff33c7c9fb049ec68cf6367e8cd4e429a806530f6630e2fdaa3b2acff3936f7ff1fbfcfcc5cd69d4e94c67dbd1ef5fcc8d9"}], 0x448}, 0x20000080) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0x0) 04:51:57 executing program 2: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}], 0x1}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) r2 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) sendmsg$kcm(r5, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r5, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="0b08da6e96e9af8e50e8aeea267d45fc47d2e6f37dfc3aec5247f245d2e51d3c3e73be1a04b9f7f28b07d631f6b73ce58543acc3f03b49636b862d4f99bb20b6d70fc0f4e863d2868516b94ad8ffb9ed41cb944234444dc51b2251cebcd04e3734bd34ac8718dab51d12778b5071f0635ba4e3395e65d1dee3c671bf9357c2a5b365639d917494b38c9f70bd691356de5da68ff827e64236afbd4ec381715dbc8d06c0999516342a02189274e0a4da97c7e098ed6cc696451a824516c5c7e59d734d0923daffb51e63b4e0011fe1e3f98ef6d615c96d8e74095831238f13b6bd7985e2b2c8db7f9d10e021f338e6038f31832d715885b0612c0c", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:57 executing program 4: socketpair(0x1f, 0x65000000, 0x0, &(0x7f00000000c0)) 04:51:57 executing program 1: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x0, 0x300) socket$kcm(0x2c, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:57 executing program 3 (fault-call:7 fault-nth:78): socketpair(0x0, 0x0, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 04:51:57 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x1, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18, 0x2000}, 0xfc) [ 647.225375][T11890] FAULT_INJECTION: forcing a failure. [ 647.225375][T11890] name failslab, interval 1, probability 0, space 0, times 0 [ 647.277782][T11890] CPU: 1 PID: 11890 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 647.286491][T11890] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 647.296548][T11890] Call Trace: [ 647.299851][T11890] dump_stack+0x197/0x210 [ 647.304199][T11890] should_fail.cold+0xa/0x15 [ 647.308801][T11890] ? fault_create_debugfs_attr+0x180/0x180 [ 647.314612][T11890] ? ___might_sleep+0x163/0x2c0 [ 647.319474][T11890] __should_failslab+0x121/0x190 [ 647.324421][T11890] should_failslab+0x9/0x14 [ 647.328926][T11890] __kmalloc+0x2e0/0x770 [ 647.333180][T11890] ? memset+0x40/0x40 [ 647.337175][T11890] ? pcpu_get_vm_areas+0x3ec/0x3ee0 [ 647.342390][T11890] pcpu_get_vm_areas+0x3ec/0x3ee0 [ 647.347425][T11890] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 647.353677][T11890] ? __vmalloc_node_range+0x4d7/0x810 [ 647.359077][T11890] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 647.365435][T11890] pcpu_create_chunk+0x24e/0x7f0 [ 647.370383][T11890] pcpu_alloc+0x10f3/0x1380 [ 647.374906][T11890] ? pcpu_alloc_area+0x820/0x820 [ 647.379852][T11890] ? bpf_map_area_alloc+0x20/0x30 [ 647.384904][T11890] __alloc_percpu_gfp+0x28/0x30 [ 647.389766][T11890] htab_map_alloc+0xdb9/0x11c0 [ 647.394557][T11890] ? htab_map_update_elem+0xca0/0xca0 [ 647.399944][T11890] __do_sys_bpf+0x478/0x3810 [ 647.404547][T11890] ? bpf_prog_load+0x18f0/0x18f0 [ 647.409490][T11890] ? __kasan_check_write+0x14/0x20 [ 647.414612][T11890] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 647.420164][T11890] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 647.425458][T11890] ? wait_for_completion+0x440/0x440 [ 647.430764][T11890] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 647.437022][T11890] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 647.442485][T11890] ? do_syscall_64+0x26/0x790 [ 647.447171][T11890] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 647.453243][T11890] ? do_syscall_64+0x26/0x790 [ 647.457935][T11890] __x64_sys_bpf+0x73/0xb0 [ 647.462357][T11890] do_syscall_64+0xfa/0x790 [ 647.466876][T11890] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 647.472772][T11890] RIP: 0033:0x45a919 [ 647.476678][T11890] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 647.496285][T11890] RSP: 002b:00007f565edffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 647.504699][T11890] RAX: ffffffffffffffda RBX: 00007f565edffc90 RCX: 000000000045a919 [ 647.512679][T11890] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 647.520651][T11890] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 04:51:57 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x1, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18, 0x2c01}, 0xfc) 04:51:57 executing program 1: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x2c, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:57 executing program 5: socket$kcm(0xa, 0x5, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@tipc=@id={0x1e, 0x3, 0x1, {0x4e21, 0x1}}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xfffffe36}], 0x1, &(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00'], 0x10}, 0x0) 04:51:57 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000340)={&(0x7f0000000080)=@x25={0x9, @remote={[], 0x1}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000180)="92d2676c555df5b0c539924a4386e6db93c9203c2d4c1fea4589257d03428732a8a522f74c10742f0998bafe1e2d1d3314b98db3c5c4f4c5e5a5331fcc646a090197e1237ef4ee42753d7dfd8c0acf1cf423f452a405c0df840fcd1dbad1ed4ecddd2f182fc977b0", 0x68}, {&(0x7f0000000000)="81568c4d67a5fe86424c5b2d125aacfe6b88fb9dfeee523f05f45bc0ce19c206b942c5f8d986d4b16c46653838d0a8b0d3b33e7299b2", 0x36}, {&(0x7f0000000200)}, {&(0x7f0000000240)="90ace8352a3625ad6e303b7b581ceddab3ee87e78404eba8de67a97e0de66b7b571dbad7cf9700949483df8dda0b4bb72a3ffd9dd652ea9118a9ffb6317bcacdb891064248c89bb8acb19c31514173a27807f6e87f3d748b8186dddd8d93b6584d13a9561773aebb737e93796a10d98584173daa0d81032cc81015c3f6b4ee69c18ea08a2c868f2635b56425ab7f7bc1", 0x90}], 0x4}, 0x4000) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@generic={0x11, "8299f856e8c4f8b6670ad5e79159a4f5177dff0ace659d54da1c1307a6847a86a85bce436bb2db8dc0742aa715a74beab2ede33aa229e327c3cc49b70e19ed2ff8852f61aceabc634abebdfa469ee1bd552fed86d9eb965bc846d9bdc20e61687ee9f8c9537509d08b72f3db71a479de945d464f6209f227f9775b7b5949"}, 0x80, &(0x7f0000000700), 0x1, &(0x7f0000000200)=ANY=[@ANYRESOCT], 0x17}, 0x0) 04:51:57 executing program 4: socketpair(0x1f, 0x65010000, 0x0, &(0x7f00000000c0)) [ 647.528630][T11890] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f565ee006d4 [ 647.536607][T11890] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 04:51:58 executing program 2: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}], 0x1}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) r2 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) sendmsg$kcm(r5, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r5, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:58 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x6, 0x9, 0x49, 0x9, 0x0, 0x7, 0x18d40, 0x32037d5b50046a53, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x7, 0x3, @perf_config_ext={0x1f, 0x1000}, 0x80, 0x0, 0x1, 0x6, 0x6, 0xe1, 0x1}, 0x0, 0x8, r1, 0x1) 04:51:58 executing program 4: socketpair(0x1f, 0x66000000, 0x0, &(0x7f00000000c0)) 04:51:58 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x1, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18, 0x3f00}, 0xfc) 04:51:58 executing program 4: socketpair(0x1f, 0x66010000, 0x0, &(0x7f00000000c0)) 04:51:58 executing program 3 (fault-call:7 fault-nth:79): socketpair(0x0, 0x0, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 04:51:58 executing program 1: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x2c, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:58 executing program 4: socketpair(0x1f, 0x67000000, 0x0, &(0x7f00000000c0)) 04:51:58 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030025000507d25a80648c63940d0b24fc60100002400a000200053582c137153e370900018003001700d1bd", 0x33fe0}], 0x1}, 0x0) socketpair(0x4ff8fc9876bb2325, 0x80000, 0x3f, &(0x7f0000000340)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000080)=@xdp, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000180)=""/128, 0x80}, {&(0x7f0000000200)=""/136, 0x88}, {&(0x7f00000002c0)=""/81, 0x51}, {&(0x7f0000000740)=""/4096, 0x1000}, {&(0x7f00000003c0)=""/219, 0xdb}], 0x5, &(0x7f0000000340)}, 0x60000160) 04:51:58 executing program 2: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}], 0x1}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) r2 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) sendmsg$kcm(r5, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r5, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:58 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x1, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18, 0x4000}, 0xfc) 04:51:58 executing program 4: socketpair(0x1f, 0x67010000, 0x0, &(0x7f00000000c0)) [ 648.202835][T11946] FAULT_INJECTION: forcing a failure. [ 648.202835][T11946] name failslab, interval 1, probability 0, space 0, times 0 [ 648.238757][T11946] CPU: 1 PID: 11946 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 04:51:58 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000080)}, 0x0) [ 648.247477][T11946] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 648.257535][T11946] Call Trace: [ 648.260846][T11946] dump_stack+0x197/0x210 [ 648.265191][T11946] should_fail.cold+0xa/0x15 [ 648.269804][T11946] ? fault_create_debugfs_attr+0x180/0x180 [ 648.275622][T11946] ? ___might_sleep+0x163/0x2c0 [ 648.280497][T11946] __should_failslab+0x121/0x190 [ 648.285449][T11946] should_failslab+0x9/0x14 [ 648.289962][T11946] kmem_cache_alloc+0x2aa/0x710 [ 648.294833][T11946] ? memset+0x40/0x40 04:51:58 executing program 4: socketpair(0x1f, 0x68000000, 0x0, &(0x7f00000000c0)) [ 648.298827][T11946] ? pcpu_get_vm_areas+0x3ec/0x3ee0 [ 648.304035][T11946] pcpu_get_vm_areas+0x49e/0x3ee0 [ 648.309066][T11946] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 648.315336][T11946] ? __vmalloc_node_range+0x4d7/0x810 [ 648.320726][T11946] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 648.326970][T11946] pcpu_create_chunk+0x24e/0x7f0 [ 648.331916][T11946] pcpu_alloc+0x10f3/0x1380 [ 648.336443][T11946] ? pcpu_alloc_area+0x820/0x820 [ 648.341388][T11946] ? bpf_map_area_alloc+0x20/0x30 [ 648.346433][T11946] __alloc_percpu_gfp+0x28/0x30 04:51:58 executing program 4: socketpair(0x1f, 0x68010000, 0x0, &(0x7f00000000c0)) [ 648.351297][T11946] htab_map_alloc+0xdb9/0x11c0 [ 648.356096][T11946] ? htab_map_update_elem+0xca0/0xca0 [ 648.361488][T11946] __do_sys_bpf+0x478/0x3810 [ 648.366092][T11946] ? bpf_prog_load+0x18f0/0x18f0 [ 648.371041][T11946] ? __kasan_check_write+0x14/0x20 [ 648.376165][T11946] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 648.381721][T11946] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 648.387015][T11946] ? wait_for_completion+0x440/0x440 [ 648.392320][T11946] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 04:51:58 executing program 4: socketpair(0x1f, 0x69000000, 0x0, &(0x7f00000000c0)) [ 648.398587][T11946] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 648.404137][T11946] ? do_syscall_64+0x26/0x790 [ 648.408820][T11946] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 648.414891][T11946] ? do_syscall_64+0x26/0x790 [ 648.419577][T11946] __x64_sys_bpf+0x73/0xb0 [ 648.424012][T11946] do_syscall_64+0xfa/0x790 [ 648.424033][T11946] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 648.424045][T11946] RIP: 0033:0x45a919 04:51:58 executing program 4: socketpair(0x1f, 0x69010000, 0x0, &(0x7f00000000c0)) [ 648.424060][T11946] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 648.424072][T11946] RSP: 002b:00007f565edffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 648.466324][T11946] RAX: ffffffffffffffda RBX: 00007f565edffc90 RCX: 000000000045a919 [ 648.474304][T11946] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 648.482283][T11946] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 648.490260][T11946] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f565ee006d4 [ 648.498238][T11946] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 [ 648.506485][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 648.512268][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 648.512766][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 648.518138][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 648.523881][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 648.529586][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:51:59 executing program 3 (fault-call:7 fault-nth:80): socketpair(0x0, 0x0, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 04:51:59 executing program 4: socketpair(0x1f, 0x6a000000, 0x0, &(0x7f00000000c0)) 04:51:59 executing program 1: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x2c, 0x0, 0x0) socket$kcm(0x2, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:59 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x1, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18, 0x6000}, 0xfc) 04:51:59 executing program 2: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}], 0x1}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) r2 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) sendmsg$kcm(r5, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r5, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="0b08da6e96e9af8e50e8aeea267d45fc47d2e6f37dfc3aec5247f245d2e51d3c3e73be1a04b9f7f28b07d631f6b73ce58543acc3f03b49636b862d4f99bb20b6d70fc0f4e863d2868516b94ad8ffb9ed41cb944234444dc51b2251cebcd04e3734bd34ac8718dab51d12778b5071f0635ba4e3395e65d1dee3c671bf9357c2a5b365639d917494b38c9f70bd691356de5da68ff827e64236afbd4ec381715dbc8d06c0999516342a02189274e0a4da97c7e098ed6cc696451a824516c5c7e59d734d0923daffb51e63b4e0011fe1e3f98ef6d615c96d8e74095831238f13b6bd7985e2b2c8db7f9d10e021f338e6038f31832d715885b0612c0c", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:59 executing program 4: socketpair(0x1f, 0x6a010000, 0x0, &(0x7f00000000c0)) [ 648.850214][T11983] FAULT_INJECTION: forcing a failure. [ 648.850214][T11983] name failslab, interval 1, probability 0, space 0, times 0 [ 648.896582][T11983] CPU: 0 PID: 11983 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 648.905302][T11983] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 648.915375][T11983] Call Trace: [ 648.918682][T11983] dump_stack+0x197/0x210 [ 648.923044][T11983] should_fail.cold+0xa/0x15 [ 648.927657][T11983] ? fault_create_debugfs_attr+0x180/0x180 [ 648.933492][T11983] ? ___might_sleep+0x163/0x2c0 [ 648.938366][T11983] __should_failslab+0x121/0x190 [ 648.943322][T11983] should_failslab+0x9/0x14 [ 648.947829][T11983] kmem_cache_alloc_trace+0x2d3/0x790 [ 648.953201][T11983] ? kmem_cache_alloc+0x364/0x710 [ 648.958236][T11983] ? memset+0x40/0x40 [ 648.962237][T11983] ? pcpu_get_vm_areas+0x3ec/0x3ee0 [ 648.967453][T11983] pcpu_get_vm_areas+0x4d6/0x3ee0 [ 648.972476][T11983] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 648.978727][T11983] ? __vmalloc_node_range+0x4d7/0x810 [ 648.984150][T11983] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 648.990430][T11983] pcpu_create_chunk+0x24e/0x7f0 04:51:59 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x1, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18, 0x80fe}, 0xfc) [ 648.995387][T11983] pcpu_alloc+0x10f3/0x1380 [ 648.999933][T11983] ? pcpu_alloc_area+0x820/0x820 [ 649.004901][T11983] ? bpf_map_area_alloc+0x20/0x30 [ 649.009982][T11983] __alloc_percpu_gfp+0x28/0x30 [ 649.014863][T11983] htab_map_alloc+0xdb9/0x11c0 [ 649.019677][T11983] ? htab_map_update_elem+0xca0/0xca0 [ 649.025083][T11983] __do_sys_bpf+0x478/0x3810 [ 649.029707][T11983] ? bpf_prog_load+0x18f0/0x18f0 [ 649.034647][T11983] ? __kasan_check_write+0x14/0x20 [ 649.039862][T11983] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 649.045419][T11983] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 649.050722][T11983] ? wait_for_completion+0x440/0x440 [ 649.056055][T11983] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 649.062323][T11983] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 649.067954][T11983] ? do_syscall_64+0x26/0x790 [ 649.072631][T11983] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 649.078715][T11983] ? do_syscall_64+0x26/0x790 [ 649.083426][T11983] __x64_sys_bpf+0x73/0xb0 [ 649.087852][T11983] do_syscall_64+0xfa/0x790 [ 649.092349][T11983] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 649.098226][T11983] RIP: 0033:0x45a919 [ 649.102103][T11983] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 649.121697][T11983] RSP: 002b:00007f565edffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 649.130113][T11983] RAX: ffffffffffffffda RBX: 00007f565edffc90 RCX: 000000000045a919 [ 649.138097][T11983] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 04:51:59 executing program 4: socketpair(0x1f, 0x6b000000, 0x0, &(0x7f00000000c0)) 04:51:59 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz0\x00', 0x200002, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000840)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfff}, 0x1216a, 0x8e, 0x400}, 0x0, 0xa, r1, 0x0) close(r2) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x541b, &(0x7f0000000040)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\xff-\x00\x00\xbf\xef\xa9\xac\x03x\xf4D3A}?\a\x8b\x9c[\xdd\x06\xa4\n\xf4\x94\xa8>\xb1\xb1\xa2_&') r3 = getpid() perf_event_open(&(0x7f0000000280)={0x3, 0x70, 0xff, 0x0, 0xc7, 0x0, 0x0, 0x2, 0x1000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x6, 0xa, @perf_bp={&(0x7f0000000640), 0x2}, 0x20000, 0x400000000008e5, 0x80000000, 0x8, 0xfff, 0xffff, 0xb50}, r3, 0x5, r2, 0x9) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r4, 0x0, 0x0, 0x0) r5 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r5, 0xffffffffffffffff, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) mkdirat$cgroup(r6, &(0x7f0000000180)='syz0\x00', 0x1ff) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40086602, 0x400007) write$cgroup_subtree(r4, &(0x7f0000000800)=ANY=[@ANYRESHEX], 0x12) openat$cgroup_ro(r4, &(0x7f0000000740)='cpuacct.usage_user\x00', 0x0, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r7, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000780)=0xa) ioctl$TUNSETFILTEREBPF(r6, 0x6611, 0x0) openat$cgroup(r6, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) write$cgroup_pid(r6, &(0x7f0000000100)=r5, 0x12) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r8, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000640)={r5, r8, 0x0, 0xe, &(0x7f0000000600)='memory.events\x00', 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000680)={r3, r4, 0x0, 0x15, &(0x7f0000000240)='posix_acl_accessself\x00', r9}, 0x30) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=ANY=[@ANYBLOB="10001000000000323fa2aa0084000000"], 0x10}, 0x0) recvmsg(r0, &(0x7f00000004c0)={&(0x7f00000002c0)=@generic, 0x80, &(0x7f0000000340)=[{&(0x7f00000003c0)=""/251, 0xfb}], 0x1}, 0x2000) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r10, 0x0, 0x0, 0x0) sendmsg$kcm(r10, &(0x7f0000000280)={&(0x7f0000000080)=@ethernet={0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xd}}, 0x77, &(0x7f00000005c0)=[{&(0x7f0000000180)="4cdc68f4724b1e281dfafce58fccbcd0c47e98d37d37b6ab774b6cf7abad5e4fbc6910d6e276f2df4a5c109c374e621191ae9b6ddea58d15b87cd2bcdb59768b50bb40acc5a8ab6ad193b22717d5ba30daf8286f33fa5ff2004b3c95811836d3cbaf7878011b46a3b9b79a2784c90e96bf94546caa8608441bd550bcef18caa7a5cb8477c429caa43fd8eca498c084", 0x8f}, {&(0x7f0000000000)="a88e77ff30", 0xffffffffffffffa9}], 0x2, &(0x7f0000000500)=[{0xfffffc41, 0x6, 0x6, "d062a1beda57fa0f7e92cd8179bdd1a7af68067ac240da7beebeec76925d6358b5ad83481870f3c66efab3fae5ef9a1378b944f23b62751560523b83504956ae9c57ea8b01d342cb71b8f1"}], 0x60}, 0x40000) [ 649.146082][T11983] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 649.154064][T11983] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f565ee006d4 [ 649.162052][T11983] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 04:51:59 executing program 1: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x2c, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:59 executing program 3 (fault-call:7 fault-nth:81): socketpair(0x0, 0x0, 0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x405a020000000000, &(0x7f0000000040)={0x20000000005, 0x1ff, 0x7880, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0xa003000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13]}, 0x3c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) 04:51:59 executing program 4: socketpair(0x1f, 0x6b010000, 0x0, &(0x7f00000000c0)) 04:51:59 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x1, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18, 0xa401}, 0xfc) 04:51:59 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0x5c, 0x7, 0x6, 0x4, 0x0, 0x1, 0x400, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000000), 0x10}, 0x152f268bde7469bd, 0x0, 0x400, 0x7, 0x0, 0x7ffa, 0x1}, r0, 0x5, 0xffffffffffffffff, 0x2) openat$cgroup_ro(r0, &(0x7f00000001c0)='cpuset.memory_pressure\x00', 0x0, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=ANY=[@ANYBLOB="10000700000000000020000000000000"], 0x10}, 0x0) 04:51:59 executing program 2: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_user\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) r2 = socket$kcm(0x2c, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x11b, 0x3, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x29, 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) sendmsg$kcm(r5, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r5, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:51:59 executing program 5: r0 = socket$kcm(0xa, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000840)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000800)='\x00'}, 0x30) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) getpid() perf_event_open(&(0x7f0000000780)={0x5, 0x70, 0xff, 0x87, 0x0, 0xa1, 0x0, 0x80000000, 0x8, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, @perf_bp={&(0x7f0000000740), 0x9}, 0x800, 0x6, 0x8, 0x4, 0x9, 0x6, 0xfff}, r1, 0x3, r2, 0x1) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000380)=[{0x10, 0x84, 0x7}], 0x10}, 0x0) sendmsg$inet(r0, &(0x7f0000000680)={&(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000080)="7f54ad897f5dc4c7b967fd3092f68f9d7638f37f106a943c898114ffa99a1a818b1a1b9b17e86f1db60701919cf4cf95beeefda690e6a247664b6e14c81117a079db455e500c", 0x46}, {&(0x7f0000000180)="2700590f4672813f0a5732c1c0e7f6e55a3250f5d4fdf06b338a71eebd3f530544d50133c67851a77367a44a876f100a1c85a203bc0fbc55f6c3caa0e90da5ad797b4c3ab2f6c0befd5e5d579259daaeb954b1bf4a4a72d7bf2ac8fd1dc768a6ad5b50e940f3485e7c5d7fb7c5792163ca78a25ba62f01471e7d3f7e2ca6f9e7e5bd2d4044bd605a514462f0cb2b1f1964c35000d3fc43849d931bb9d4669f95723c122c53ca05bcbacabe7e5a66e4fb0b81359781b0a22c9fd9d40c4dd9cde95af9c95d789a057cbf5d", 0xca}, {&(0x7f0000000280)="af199503b18e915f2893c3efb17289839cfd2abff7107276c21025540361280137e741b25ab60a9c7f5748f7e458e2e82d8cce65378758a56bedbe320bec73a7c9a1911c4f6babc3575b3f397c288400aa0b498bc99555123557dcfa7c5a90bcf6ea76278487aa4d4187fc", 0x6b}, {&(0x7f0000000300)="72b922278bfd0e0cbb4fb79447d5baeefd33de84cb9667ccb9374a94c8a049790612025e726c036be21ecfae33b40c6206fd0398d9329532d1c0fcdbe72ba769a4da3ea2970d8af28f12d497d8bc877ee3cf2fafeb5b6f9f89da1581c91f968fa7c5e63aa0de66e7d1f3", 0x6a}, {&(0x7f00000003c0)="60e80e7f177668e9f745199ee38c3e377d042bd06b4cdd5ac9fcfc1578de2cc2e125c589d063d513c6bacc5bd963d230647cc5159eee97c64023e977e0172da4e6d999e21275421de7ee90fe01dea27d8dfb80f5c7bc", 0x56}, {&(0x7f0000000440)="cb6d671ae4fa69e9c396884503a4bd9de28d66daebea426cbb8a49376f83", 0x1e}], 0x6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x168}, 0x1) [ 649.549408][T12013] FAULT_INJECTION: forcing a failure. [ 649.549408][T12013] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 649.597099][T12013] CPU: 1 PID: 12013 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 649.605803][T12013] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 649.615862][T12013] Call Trace: [ 649.619168][T12013] dump_stack+0x197/0x210 [ 649.623521][T12013] should_fail.cold+0xa/0x15 [ 649.628131][T12013] ? fault_create_debugfs_attr+0x180/0x180 [ 649.634053][T12013] ? ___might_sleep+0x163/0x2c0 [ 649.638927][T12013] should_fail_alloc_page+0x50/0x60 04:52:00 executing program 1: r0 = socket$kcm(0x2c, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000001640)=@can, 0x80, &(0x7f0000002980)=[{0x0}, {0x0}], 0x2}, 0x2000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x2c, 0x0, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x29, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000000)='cpuset.mems\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000400)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x161) sendmsg$kcm(r4, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@l2={0x1f, 0x43b2, {0x7e, 0x9, 0x80, 0x44, 0x0, 0x1}, 0x1, 0x5}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000500)="0d78cee4d61acbb87cf433dd955133ab67d6f5772d69fda72ddbc99493081e2fec8ce7928fec3468e127634a9c2b5382fe091e403b3e3fca911807dd7b1f2dd3f8d57a00ac5fb5aed1342eac3b5ffb72f5822140ef4e67728d2ced39c306cff1ccdcd5659a0a3f345e38c846d4a772097fb32b95c20088ba0470443c00f98d38984d6443a6b3ca5760a4101c7d47a0e74ab828660c40404fb1833e238b44c7d261152dfdbe41d16fe8afff65541333", 0xaf}, {&(0x7f0000000240)}, {&(0x7f00000005c0)="045bce49b78333f178d92278cff32bb1bb0c06d60f62d5be90ddf82507e4a2010403784a6e6c6c2a1ae07416b1bec9ec6d60b050e2503fbce9349c659aef6db347ed2caf72e86c687d5b8dfc36086e7aefb177808e6056e7417fdeec44c3a3f5f266f898e1203ced784d7cbfa1cd4d20f32b75fc163f3880dbdacc09b0219474f036c9035352781297389ab2c671386c9e751dbea969e7477cff9ee47a33b39d51e70963f58133f5bf41c5ae4015", 0xae}, {&(0x7f0000000680)="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", 0xfa}, {&(0x7f0000000780)="09ce690a64fe97d31685286aa89ca3b74268b9a238e4a30329f1cdbe3d74957db669796428fa4a3d19278e6f515010860e235c06cf8cc6f77fd824c584dc5031a216f1945677db702b9b44d561094f90880a8828653cad2eab6aa27751f38f", 0x5f}, {&(0x7f0000000800)="f8229f035d8908ecbfce", 0xa}, {&(0x7f0000000840)="637fd0d7f1382d78e9881267edb55fdbcef724bbbbbc48f455dbad72c62e7e9926a09802f564e8a2c11cb95c85edb49dba2854284e45568f5e7bfa756c1e77208d2f75b98bd6bd44cd878e0e4d7ae7859f9260e79d9eeffac22a57733d3f8a29b9c6cce816bdbc768f0419969279669ecb0c4e43aaded927558557c311", 0x7d}], 0x7}, 0x800) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) setsockopt$sock_attach_bpf(r0, 0x11b, 0x4, 0x0, 0x0) 04:52:00 executing program 4: socketpair(0x1f, 0x6c000000, 0x0, &(0x7f00000000c0)) [ 649.644216][T12013] __alloc_pages_nodemask+0x1a1/0x910 [ 649.649597][T12013] ? perf_trace_lock+0xeb/0x4c0 [ 649.654465][T12013] ? __alloc_pages_slowpath+0x2920/0x2920 [ 649.660195][T12013] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 649.666451][T12013] ? __kasan_check_read+0x11/0x20 [ 649.671490][T12013] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 649.677741][T12013] alloc_pages_current+0x107/0x210 [ 649.682882][T12013] __get_free_pages+0xc/0x40 [ 649.687472][T12013] kasan_populate_vmalloc_pte+0x2f/0x1c0 04:52:00 executing program 4: socketpair(0x1f, 0x6c010000, 0x0, &(0x7f00000000c0)) [ 649.693116][T12013] apply_to_page_range+0x445/0x700 [ 649.698241][T12013] ? memset+0x40/0x40 [ 649.702242][T12013] kasan_populate_vmalloc+0x68/0x90 [ 649.707454][T12013] pcpu_get_vm_areas+0x3c5f/0x3ee0 [ 649.712567][T12013] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 649.718845][T12013] pcpu_create_chunk+0x24e/0x7f0 [ 649.723791][T12013] pcpu_alloc+0x10f3/0x1380 [ 649.728308][T12013] ? pcpu_alloc_area+0x820/0x820 [ 649.733239][T12013] ? bpf_map_area_alloc+0x20/0x30 [ 649.733266][T12013] __alloc_percpu_gfp+0x28/0x30 [ 649.733283][T12013] htab_map_alloc+0xdb9/0x11c0 [ 649.733314][T12013] ? htab_map_update_elem+0xca0/0xca0 [ 649.747993][T12013] __do_sys_bpf+0x478/0x3810 [ 649.748016][T12013] ? bpf_prog_load+0x18f0/0x18f0 [ 649.748032][T12013] ? __kasan_check_write+0x14/0x20 [ 649.748048][T12013] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 649.748066][T12013] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 649.762924][T12013] ? wait_for_completion+0x440/0x440 [ 649.762951][T12013] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 649.762985][T12013] ? trace_hardirqs_on_thunk+0x1a/0x1c 04:52:00 executing program 4: socketpair(0x1f, 0x6d000000, 0x0, &(0x7f00000000c0)) [ 649.762998][T12013] ? do_syscall_64+0x26/0x790 [ 649.763015][T12013] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 649.806580][T12013] ? do_syscall_64+0x26/0x790 [ 649.811271][T12013] __x64_sys_bpf+0x73/0xb0 [ 649.815704][T12013] do_syscall_64+0xfa/0x790 [ 649.820222][T12013] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 649.826114][T12013] RIP: 0033:0x45a919 04:52:00 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x4d, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0xffe0}], 0x1, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0x18, 0xa805}, 0xfc) [ 649.830005][T12013] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 649.849607][T12013] RSP: 002b:00007f565edffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 649.858022][T12013] RAX: ffffffffffffffda RBX: 00007f565edffc90 RCX: 000000000045a919 [ 649.865999][T12013] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 649.873976][T12013] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 649.881950][T12013] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f565ee006d4 [ 649.889925][T12013] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 04:52:00 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000040)="c4", 0x1}], 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="1000000000000072feb3767b0c00b50ea6000700"], 0x10}, 0x0) [ 649.931074][T12013] BUG: unable to handle page fault for address: fffff91ffff40000 [ 649.938813][T12013] #PF: supervisor read access in kernel mode [ 649.944791][T12013] #PF: error_code(0x0000) - not-present page [ 649.950763][T12013] PGD 21ffe6067 P4D 21ffe6067 PUD aa56c067 PMD aa56d067 PTE 0 [ 649.958234][T12013] Oops: 0000 [#1] PREEMPT SMP KASAN [ 649.963434][T12013] CPU: 1 PID: 12013 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 649.972097][T12013] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 649.982166][T12013] RIP: 0010:check_memory_region+0x9c/0x1a0 [ 649.987970][T12013] Code: c9 4d 0f 49 c1 49 c1 f8 03 45 85 c0 0f 84 10 01 00 00 41 83 e8 01 4e 8d 44 c0 08 eb 0d 48 83 c0 08 4c 39 c0 0f 84 a7 00 00 00 <48> 83 38 00 74 ed 4c 8d 40 08 eb 09 48 83 c0 01 49 39 c0 74 53 80 [ 650.007575][T12013] RSP: 0018:ffffc9000c1efa80 EFLAGS: 00010206 [ 650.011144][ T4088] kobject: 'loop5' (00000000259b4c21): kobject_uevent_env [ 650.013639][T12013] RAX: fffff91ffff40000 RBX: fffff91ffff40f10 RCX: ffffffff819e46b9 [ 650.013647][T12013] RDX: 0000000000000001 RSI: 0000000000007880 RDI: ffffe8ffffa00000 [ 650.013654][T12013] RBP: ffffc9000c1efa98 R08: fffff91ffff40f10 R09: 0000000000000f10 [ 650.013668][T12013] R10: fffff91ffff40f0f R11: ffffe8ffffa0787f R12: fffff91ffff40000 [ 650.030700][ T4088] kobject: 'loop5' (00000000259b4c21): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 650.036676][T12013] R13: 0000000000007880 R14: 0000000000000000 R15: ffff88821fffd100 [ 650.036689][T12013] FS: 00007f565ee00700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 650.036698][T12013] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 650.036706][T12013] CR2: fffff91ffff40000 CR3: 0000000097d7c000 CR4: 00000000001406e0 [ 650.036719][T12013] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 650.102165][T12013] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 650.110136][T12013] Call Trace: [ 650.113428][T12013] memset+0x24/0x40 [ 650.117241][T12013] pcpu_alloc+0x589/0x1380 [ 650.121666][T12013] ? pcpu_alloc_area+0x820/0x820 [ 650.128354][T12013] ? bpf_map_area_alloc+0x20/0x30 [ 650.133388][T12013] __alloc_percpu_gfp+0x28/0x30 [ 650.138360][T12013] htab_map_alloc+0xdb9/0x11c0 [ 650.143135][T12013] ? htab_map_update_elem+0xca0/0xca0 [ 650.148509][T12013] __do_sys_bpf+0x478/0x3810 [ 650.153104][T12013] ? bpf_prog_load+0x18f0/0x18f0 [ 650.158043][T12013] ? __kasan_check_write+0x14/0x20 [ 650.163160][T12013] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 650.168709][T12013] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 650.174006][T12013] ? wait_for_completion+0x440/0x440 [ 650.179296][T12013] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 650.185536][T12013] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 650.190976][T12013] ? do_syscall_64+0x26/0x790 [ 650.195632][T12013] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 650.201824][T12013] ? do_syscall_64+0x26/0x790 [ 650.206485][T12013] __x64_sys_bpf+0x73/0xb0 [ 650.210884][T12013] do_syscall_64+0xfa/0x790 [ 650.215369][T12013] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 650.221239][T12013] RIP: 0033:0x45a919 [ 650.225113][T12013] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 650.244702][T12013] RSP: 002b:00007f565edffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 650.253118][T12013] RAX: ffffffffffffffda RBX: 00007f565edffc90 RCX: 000000000045a919 [ 650.261074][T12013] RDX: 000000000000003c RSI: 0000000020000040 RDI: 405a020000000000 [ 650.269025][T12013] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 650.276985][T12013] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f565ee006d4 [ 650.284932][T12013] R13: 00000000004c0efb R14: 00000000004d4a90 R15: 0000000000000004 [ 650.292887][T12013] Modules linked in: [ 650.296758][T12013] CR2: fffff91ffff40000 [ 650.300908][T12013] ---[ end trace 6cb4c101aeabbd62 ]--- [ 650.306351][T12013] RIP: 0010:check_memory_region+0x9c/0x1a0 [ 650.312142][T12013] Code: c9 4d 0f 49 c1 49 c1 f8 03 45 85 c0 0f 84 10 01 00 00 41 83 e8 01 4e 8d 44 c0 08 eb 0d 48 83 c0 08 4c 39 c0 0f 84 a7 00 00 00 <48> 83 38 00 74 ed 4c 8d 40 08 eb 09 48 83 c0 01 49 39 c0 74 53 80 [ 650.331760][T12013] RSP: 0018:ffffc9000c1efa80 EFLAGS: 00010206 [ 650.337806][T12013] RAX: fffff91ffff40000 RBX: fffff91ffff40f10 RCX: ffffffff819e46b9 [ 650.345754][T12013] RDX: 0000000000000001 RSI: 0000000000007880 RDI: ffffe8ffffa00000 [ 650.353715][T12013] RBP: ffffc9000c1efa98 R08: fffff91ffff40f10 R09: 0000000000000f10 [ 650.361673][T12013] R10: fffff91ffff40f0f R11: ffffe8ffffa0787f R12: fffff91ffff40000 [ 650.369639][T12013] R13: 0000000000007880 R14: 0000000000000000 R15: ffff88821fffd100 [ 650.377592][T12013] FS: 00007f565ee00700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 650.386496][T12013] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 650.393053][T12013] CR2: fffff91ffff40000 CR3: 0000000097d7c000 CR4: 00000000001406e0 [ 650.401003][T12013] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 650.408950][T12013] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 650.416905][T12013] Kernel panic - not syncing: Fatal exception [ 650.424360][T12013] Kernel Offset: disabled [ 650.428684][T12013] Rebooting in 86400 seconds..