00 00 00 [ 552.418197][T11951] RSP: 002b:00007f3ba2ab9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 552.418214][T11951] RAX: ffffffffffffffda RBX: 00007f3ba2ab9c90 RCX: 000000000045a6f9 [ 552.418233][T11951] RDX: 000000000000002c RSI: 0000000020000400 RDI: 0000000000000000 [ 552.418240][T11951] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 552.418247][T11951] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3ba2aba6d4 [ 552.418253][T11951] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000005 19:30:08 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x48, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) recvmsg(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000200)=[{&(0x7f00000002c0)=""/213, 0xd5}], 0x1}, 0x15120) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000180)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) ioctl$TUNGETVNETHDRSZ(r4, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r4, 0x0, 0xf800000000000000) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r4, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x80000001) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x13, 0x0, &(0x7f0000000080), &(0x7f00000000c0)='syzkaller\x00', 0x3, 0x0, 0x0, 0x21680, 0x1, [], r2, 0x17, r4, 0x8, &(0x7f00000003c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000400)={0x2, 0x6, 0x81}, 0x10, 0xffffffffffffffff, r0}, 0x78) sendmsg$inet(r1, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r1, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000040)=r6) 19:30:08 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r2 = gettid() write$cgroup_pid(r0, &(0x7f0000000280)=r2, 0x12) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)=@generic, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/117, 0x75}, {&(0x7f0000000640)=""/241, 0xf1}, {&(0x7f0000000440)=""/155, 0x9b}, {0x0}], 0x4, &(0x7f0000000040)=""/97, 0x61}, 0x80012106) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) r5 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000280), 0x10, &(0x7f00000002c0)}, 0x0) 19:30:08 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000180)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={r1, 0x15, 0x0, 0x7, &(0x7f0000000040)=[0x0, 0x0], 0x2}, 0x20) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu\x00', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000180)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) write$cgroup_type(r3, 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000100)='memory.events\x00', 0x0, 0x0) 19:30:08 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x20}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f000000e780)={&(0x7f000000d380)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f000000e680)=[{&(0x7f000000d400)=""/90, 0x5a}, {&(0x7f000000d480)=""/223, 0xdf}, {&(0x7f000000d580)=""/4096, 0x1000}, {&(0x7f000000e580)=""/232, 0xe8}], 0x4, &(0x7f000000e6c0)=""/138, 0x8a}, 0x60) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000000e7c0)=0xffffffffffffffff, 0x4) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r2, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r2, 0x0, 0xf800000000000000) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x80000001) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) 19:30:08 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x324) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x10, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') 19:30:08 executing program 0 (fault-call:3 fault-nth:8): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x5, r1, 0x0, [0x305f, 0xa]}, 0x2c) [ 560.383845][T11965] FAULT_INJECTION: forcing a failure. [ 560.383845][T11965] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 560.409094][T11965] CPU: 0 PID: 11965 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 560.417832][T11965] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 560.417839][T11965] Call Trace: [ 560.417865][T11965] dump_stack+0x197/0x210 [ 560.417890][T11965] should_fail.cold+0xa/0x15 [ 560.417910][T11965] ? fault_create_debugfs_attr+0x180/0x180 [ 560.417924][T11965] ? ___might_sleep+0x163/0x2c0 [ 560.417948][T11965] should_fail_alloc_page+0x50/0x60 [ 560.417961][T11965] __alloc_pages_nodemask+0x1a1/0x910 [ 560.417977][T11965] ? __alloc_pages_slowpath+0x2920/0x2920 [ 560.418004][T11965] __vmalloc_node_range+0x2fd/0x810 [ 560.418028][T11965] ? bpf_map_area_alloc+0x20/0x30 [ 560.418048][T11965] __vmalloc_node_flags_caller+0x71/0x90 19:30:09 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000180)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) mkdirat$cgroup(r2, &(0x7f0000000000)='syz0\x00', 0x1ff) write$cgroup_type(r1, 0x0, 0x0) [ 560.435739][T11965] ? bpf_map_area_alloc+0x20/0x30 [ 560.435758][T11965] __bpf_map_area_alloc+0xde/0xf0 [ 560.435776][T11965] bpf_map_area_alloc+0x20/0x30 [ 560.435791][T11965] htab_map_alloc+0x589/0x11c0 [ 560.435807][T11965] ? __kmalloc+0x608/0x770 [ 560.446180][T11965] ? bpf_get_file_flag+0x80/0x80 [ 560.446205][T11965] ? fput+0x1b/0x20 [ 560.446226][T11965] htab_of_map_alloc+0x71/0x100 [ 560.446238][T11965] ? htab_map_alloc+0x11c0/0x11c0 [ 560.446250][T11965] __do_sys_bpf+0x478/0x3810 [ 560.446274][T11965] ? bpf_prog_load+0x18f0/0x18f0 [ 560.446288][T11965] ? __kasan_check_write+0x14/0x20 [ 560.446304][T11965] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 560.446318][T11965] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 560.446334][T11965] ? wait_for_completion+0x440/0x440 [ 560.446357][T11965] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 560.446388][T11965] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 560.446406][T11965] ? do_syscall_64+0x26/0x790 [ 560.461805][T11965] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 560.461821][T11965] ? do_syscall_64+0x26/0x790 [ 560.461845][T11965] __x64_sys_bpf+0x73/0xb0 [ 560.461861][T11965] do_syscall_64+0xfa/0x790 [ 560.461879][T11965] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 560.461895][T11965] RIP: 0033:0x45a6f9 [ 560.473361][T11965] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 560.473370][T11965] RSP: 002b:00007f3ba2ab9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 19:30:09 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) write$cgroup_type(r1, 0x0, 0x0) 19:30:09 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x20}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f000000e780)={&(0x7f000000d380)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f000000e680)=[{&(0x7f000000d400)=""/90, 0x5a}, {&(0x7f000000d480)=""/223, 0xdf}, {&(0x7f000000d580)=""/4096, 0x1000}, {&(0x7f000000e580)=""/232, 0xe8}], 0x4, &(0x7f000000e6c0)=""/138, 0x8a}, 0x60) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000000e7c0)=0xffffffffffffffff, 0x4) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r2, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r2, 0x0, 0xf800000000000000) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x80000001) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) [ 560.473382][T11965] RAX: ffffffffffffffda RBX: 00007f3ba2ab9c90 RCX: 000000000045a6f9 [ 560.473389][T11965] RDX: 000000000000002c RSI: 0000000020000400 RDI: 0000000000000000 [ 560.473397][T11965] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 560.473405][T11965] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3ba2aba6d4 [ 560.473413][T11965] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000005 19:30:09 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x7, 0x209e20, 0x8000000001}, 0x414) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77f7fb, 0x0, 0x82e700, 0x0, 0x0, [0xffffffffa0018000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000], 0x0, 0xffffffffffffffff, 0x1}, 0x3c) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$sock(r0, &(0x7f0000000240)={&(0x7f0000000040)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha256\x00'}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="f223f3695c783168fc068e8c1a10cb0fee4172f3946e82c2d4bed5da3925cb3ec1c881fb0d6163cbc20e43cfcc37908745387e6cca5b9d7c", 0x38}, {&(0x7f0000000380)="87a3d52b13eb8640f253dde00388198d552dbe62af58458c971ee3eb4464f50fa77aeb223d5f211f198ddde24043db96aada20b03f91ee19ad28a6792fcb14c3067dfc99552e781fe8302e9a3fe4e146d594fe835d14bceed685e0bf2454b16dda71448fc29f8fbb4793cdd328f2529e774accacbd9bf8a74e81a6b7312e9c3c1c2dccbe9097ddac8853ad36da22e20933b8e0a8813d1fdaf0ef4ef83f9f460a60899d93d4c4e55e4d84a4dd13ec59330df73015badd42cbccb7f4ca397865397bdd42f1dd058ea110fb71cc4b1e3a09f3fd3b01af4fae96f22d", 0xda}, {&(0x7f0000000100)="98cee55c91022596417975cd2b71d2a28ff761c75ede5ff669dcfced75547e1e6fde6d810816438d6a86bfae7c17405d911d5d94e67f43d2d586431d4704f29f", 0x40}, {&(0x7f0000000480)="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", 0x1000}], 0x4, &(0x7f0000000200)=[@mark={{0x14}}, @txtime={{0x18, 0x1, 0x3d, 0x6c4}}], 0x30}, 0x20000004) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x209, &(0x7f0000001900)=[{&(0x7f0000000000)="2e0000003500050ad25a80648c6356c10324fc00100000000a000400030082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x800) openat$tun(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/net/tun\x00', 0xa0202, 0x0) 19:30:09 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000180)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000000)='memory.swap.current\x00', 0x0, 0x0) mkdirat$cgroup(r2, &(0x7f0000000040)='syz1\x00', 0x1ff) r3 = openat$cgroup_int(r0, &(0x7f00000001c0)='cpu.weight\x00', 0x2, 0x0) write$cgroup_type(r3, 0x0, 0x0) 19:30:09 executing program 0 (fault-call:3 fault-nth:9): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x5, r1, 0x0, [0x305f, 0xa]}, 0x2c) [ 560.789038][T11985] netlink: get zone limit has 8 unknown bytes [ 560.809375][T11987] netlink: get zone limit has 8 unknown bytes [ 560.940152][T11995] FAULT_INJECTION: forcing a failure. [ 560.940152][T11995] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 561.045145][T11995] CPU: 0 PID: 11995 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 561.053880][T11995] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 561.063951][T11995] Call Trace: [ 561.063979][T11995] dump_stack+0x197/0x210 [ 561.064002][T11995] should_fail.cold+0xa/0x15 [ 561.064022][T11995] ? fault_create_debugfs_attr+0x180/0x180 [ 561.064038][T11995] ? ___might_sleep+0x163/0x2c0 [ 561.064060][T11995] should_fail_alloc_page+0x50/0x60 [ 561.064073][T11995] __alloc_pages_nodemask+0x1a1/0x910 [ 561.064091][T11995] ? __alloc_pages_slowpath+0x2920/0x2920 [ 561.064119][T11995] __vmalloc_node_range+0x2fd/0x810 [ 561.108938][T11995] ? bpf_map_area_alloc+0x20/0x30 [ 561.114120][T11995] __vmalloc_node_flags_caller+0x71/0x90 [ 561.119778][T11995] ? bpf_map_area_alloc+0x20/0x30 [ 561.124828][T11995] __bpf_map_area_alloc+0xde/0xf0 [ 561.129880][T11995] bpf_map_area_alloc+0x20/0x30 [ 561.134840][T11995] htab_map_alloc+0x589/0x11c0 [ 561.139632][T11995] ? __kmalloc+0x608/0x770 [ 561.144070][T11995] ? bpf_get_file_flag+0x80/0x80 [ 561.149041][T11995] ? fput+0x1b/0x20 [ 561.152878][T11995] htab_of_map_alloc+0x71/0x100 [ 561.157747][T11995] ? htab_map_alloc+0x11c0/0x11c0 [ 561.163270][T11995] __do_sys_bpf+0x478/0x3810 [ 561.167917][T11995] ? bpf_prog_load+0x18f0/0x18f0 [ 561.172844][T11995] ? __kasan_check_write+0x14/0x20 [ 561.177952][T11995] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 561.183776][T11995] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 561.189078][T11995] ? wait_for_completion+0x440/0x440 [ 561.194402][T11995] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 561.200792][T11995] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 561.206273][T11995] ? do_syscall_64+0x26/0x790 [ 561.210942][T11995] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 561.217005][T11995] ? do_syscall_64+0x26/0x790 [ 561.221692][T11995] __x64_sys_bpf+0x73/0xb0 [ 561.226110][T11995] do_syscall_64+0xfa/0x790 [ 561.230614][T11995] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 561.236618][T11995] RIP: 0033:0x45a6f9 [ 561.240503][T11995] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 561.260113][T11995] RSP: 002b:00007f3ba2ab9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 561.268518][T11995] RAX: ffffffffffffffda RBX: 00007f3ba2ab9c90 RCX: 000000000045a6f9 [ 561.276479][T11995] RDX: 000000000000002c RSI: 0000000020000400 RDI: 0000000000000000 [ 561.284441][T11995] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 561.292401][T11995] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3ba2aba6d4 [ 561.300371][T11995] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000005 19:30:18 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x41f, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x000Y\b/\xe5I\xdd\xdd/fu7\xc6{\x06\xa2\bW]\x05\x7f\xfa\xc3\xed\xbdA~\xb1\xb0+\x1dw{\x12\xd8p\xf9\xd0s\xc2jP\xdd\xca\x9e\x1f\xe8\xe3\xce\xc7\x05\xf7s\xd6\x19\xadj\x90N\\\xf3\x86\xbb\xa9}\x9feIM\xbb\xb7b\vc\xe1c\xf6~}\x0f\xa9\x92x&T\xe7\xc8o\xaa\x86\xfa\xee\xda`H\x87\v\x04b\xc5\x9f%\xd6N\vR^\x13\x84\xddE\xe9', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) sendmsg$kcm(r3, &(0x7f0000000340)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r3, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.stat\x00', 0x0, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r4, &(0x7f0000000180)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000180)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) openat$cgroup_ro(r5, &(0x7f0000000080)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000180)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) mkdirat$cgroup(r6, &(0x7f0000000100)='syz1\x00', 0x1ff) openat$cgroup_ro(r4, &(0x7f0000000040)='cgroup.events\x00', 0x0, 0x0) r7 = openat$cgroup_int(r0, &(0x7f0000000180)='\x00'/11, 0x2, 0x0) write$cgroup_type(r7, 0x0, 0x0) 19:30:18 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x48, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) recvmsg(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000200)=[{&(0x7f00000002c0)=""/213, 0xd5}], 0x1}, 0x15120) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000180)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) ioctl$TUNGETVNETHDRSZ(r4, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r4, 0x0, 0xf800000000000000) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r4, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x80000001) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x13, 0x0, &(0x7f0000000080), &(0x7f00000000c0)='syzkaller\x00', 0x3, 0x0, 0x0, 0x21680, 0x1, [], r2, 0x17, r4, 0x8, &(0x7f00000003c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000400)={0x2, 0x6, 0x81}, 0x10, 0xffffffffffffffff, r0}, 0x78) sendmsg$inet(r1, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r1, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000040)=r6) 19:30:18 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x7, 0x209e20, 0x8000000001}, 0x414) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77f7fb, 0x0, 0x82e700, 0x0, 0x0, [0xffffffffa0018000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000], 0x0, 0xffffffffffffffff, 0x1}, 0x3c) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$sock(r0, &(0x7f0000000240)={&(0x7f0000000040)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha256\x00'}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="f223f3695c783168fc068e8c1a10cb0fee4172f3946e82c2d4bed5da3925cb3ec1c881fb0d6163cbc20e43cfcc37908745387e6cca5b9d7c", 0x38}, {&(0x7f0000000380)="87a3d52b13eb8640f253dde00388198d552dbe62af58458c971ee3eb4464f50fa77aeb223d5f211f198ddde24043db96aada20b03f91ee19ad28a6792fcb14c3067dfc99552e781fe8302e9a3fe4e146d594fe835d14bceed685e0bf2454b16dda71448fc29f8fbb4793cdd328f2529e774accacbd9bf8a74e81a6b7312e9c3c1c2dccbe9097ddac8853ad36da22e20933b8e0a8813d1fdaf0ef4ef83f9f460a60899d93d4c4e55e4d84a4dd13ec59330df73015badd42cbccb7f4ca397865397bdd42f1dd058ea110fb71cc4b1e3a09f3fd3b01af4fae96f22d", 0xda}, {&(0x7f0000000100)="98cee55c91022596417975cd2b71d2a28ff761c75ede5ff669dcfced75547e1e6fde6d810816438d6a86bfae7c17405d911d5d94e67f43d2d586431d4704f29f", 0x40}, {&(0x7f0000000480)="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", 0x1000}], 0x4, &(0x7f0000000200)=[@mark={{0x14}}, @txtime={{0x18, 0x1, 0x3d, 0x6c4}}], 0x30}, 0x20000004) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x209, &(0x7f0000001900)=[{&(0x7f0000000000)="2e0000003500050ad25a80648c6356c10324fc00100000000a000400030082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x800) openat$tun(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/net/tun\x00', 0xa0202, 0x0) 19:30:18 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x20}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f000000e780)={&(0x7f000000d380)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f000000e680)=[{&(0x7f000000d400)=""/90, 0x5a}, {&(0x7f000000d480)=""/223, 0xdf}, {&(0x7f000000d580)=""/4096, 0x1000}, {&(0x7f000000e580)=""/232, 0xe8}], 0x4, &(0x7f000000e6c0)=""/138, 0x8a}, 0x60) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000000e7c0)=0xffffffffffffffff, 0x4) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r2, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r2, 0x0, 0xf800000000000000) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x80000001) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) 19:30:18 executing program 0 (fault-call:3 fault-nth:10): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x5, r1, 0x0, [0x305f, 0xa]}, 0x2c) 19:30:18 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x324) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x4c01, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') [ 569.588431][T12014] FAULT_INJECTION: forcing a failure. [ 569.588431][T12014] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 569.613372][T12014] CPU: 0 PID: 12014 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 569.622117][T12014] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 569.632193][T12014] Call Trace: [ 569.635517][T12014] dump_stack+0x197/0x210 [ 569.639856][T12014] should_fail.cold+0xa/0x15 [ 569.644448][T12014] ? fault_create_debugfs_attr+0x180/0x180 [ 569.650257][T12014] ? ___might_sleep+0x163/0x2c0 [ 569.655123][T12014] should_fail_alloc_page+0x50/0x60 [ 569.660320][T12014] __alloc_pages_nodemask+0x1a1/0x910 [ 569.665704][T12014] ? __alloc_pages_slowpath+0x2920/0x2920 [ 569.671541][T12014] __vmalloc_node_range+0x2fd/0x810 [ 569.676748][T12014] ? bpf_map_area_alloc+0x20/0x30 [ 569.681769][T12014] __vmalloc_node_flags_caller+0x71/0x90 [ 569.687411][T12014] ? bpf_map_area_alloc+0x20/0x30 [ 569.692428][T12014] __bpf_map_area_alloc+0xde/0xf0 [ 569.697460][T12014] bpf_map_area_alloc+0x20/0x30 [ 569.702332][T12014] htab_map_alloc+0x589/0x11c0 [ 569.707105][T12014] ? __kmalloc+0x608/0x770 [ 569.711531][T12014] ? bpf_get_file_flag+0x80/0x80 [ 569.716499][T12014] ? fput+0x1b/0x20 [ 569.720362][T12014] htab_of_map_alloc+0x71/0x100 [ 569.726503][T12014] ? htab_map_alloc+0x11c0/0x11c0 [ 569.731649][T12014] __do_sys_bpf+0x478/0x3810 [ 569.736300][T12014] ? bpf_prog_load+0x18f0/0x18f0 [ 569.741418][T12014] ? __kasan_check_write+0x14/0x20 [ 569.746526][T12014] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 569.752095][T12014] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 569.757376][T12014] ? wait_for_completion+0x440/0x440 [ 569.762664][T12014] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 569.768911][T12014] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 569.774379][T12014] ? do_syscall_64+0x26/0x790 [ 569.779058][T12014] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 569.785117][T12014] ? do_syscall_64+0x26/0x790 [ 569.789795][T12014] __x64_sys_bpf+0x73/0xb0 [ 569.794243][T12014] do_syscall_64+0xfa/0x790 [ 569.798768][T12014] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 569.804688][T12014] RIP: 0033:0x45a6f9 [ 569.808594][T12014] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 569.828475][T12014] RSP: 002b:00007f3ba2ab9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 569.836889][T12014] RAX: ffffffffffffffda RBX: 00007f3ba2ab9c90 RCX: 000000000045a6f9 [ 569.844856][T12014] RDX: 000000000000002c RSI: 0000000020000400 RDI: 0000000000000000 [ 569.852837][T12014] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 569.860806][T12014] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3ba2aba6d4 [ 569.868947][T12014] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000005 19:30:18 executing program 0 (fault-call:3 fault-nth:11): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x5, r1, 0x0, [0x305f, 0xa]}, 0x2c) [ 569.912080][T12011] netlink: get zone limit has 8 unknown bytes 19:30:18 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x20}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f000000e780)={&(0x7f000000d380)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f000000e680)=[{&(0x7f000000d400)=""/90, 0x5a}, {&(0x7f000000d480)=""/223, 0xdf}, {&(0x7f000000d580)=""/4096, 0x1000}, {&(0x7f000000e580)=""/232, 0xe8}], 0x4, &(0x7f000000e6c0)=""/138, 0x8a}, 0x60) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000000e7c0)=0xffffffffffffffff, 0x4) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r2, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r2, 0x0, 0xf800000000000000) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r2, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) 19:30:18 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0x2, 0x4, 0x401, 0x0, 0xffffffffffffffff, 0x0, [0x2e]}, 0x3c) close(r1) r2 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r3, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r3, 0x0, 0xf800000000000000) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x5, 0x100000000}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r3, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x80000001) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000000)={'bridge0\x00', 0x600}) [ 570.028393][T12022] FAULT_INJECTION: forcing a failure. [ 570.028393][T12022] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 570.075665][T12022] CPU: 0 PID: 12022 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 570.084404][T12022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 570.094603][T12022] Call Trace: [ 570.097950][T12022] dump_stack+0x197/0x210 [ 570.102312][T12022] should_fail.cold+0xa/0x15 [ 570.106943][T12022] ? fault_create_debugfs_attr+0x180/0x180 [ 570.112779][T12022] ? ___might_sleep+0x163/0x2c0 [ 570.117677][T12022] should_fail_alloc_page+0x50/0x60 [ 570.124041][T12022] __alloc_pages_nodemask+0x1a1/0x910 [ 570.129425][T12022] ? __alloc_pages_slowpath+0x2920/0x2920 [ 570.135261][T12022] __vmalloc_node_range+0x2fd/0x810 [ 570.140825][T12022] ? bpf_map_area_alloc+0x20/0x30 [ 570.145852][T12022] __vmalloc_node_flags_caller+0x71/0x90 [ 570.151504][T12022] ? bpf_map_area_alloc+0x20/0x30 [ 570.156545][T12022] __bpf_map_area_alloc+0xde/0xf0 [ 570.161575][T12022] bpf_map_area_alloc+0x20/0x30 [ 570.166454][T12022] htab_map_alloc+0x589/0x11c0 [ 570.171216][T12022] ? __kmalloc+0x608/0x770 [ 570.175719][T12022] ? bpf_get_file_flag+0x80/0x80 [ 570.181443][T12022] ? fput+0x1b/0x20 [ 570.185255][T12022] htab_of_map_alloc+0x71/0x100 [ 570.190111][T12022] ? htab_map_alloc+0x11c0/0x11c0 [ 570.195137][T12022] __do_sys_bpf+0x478/0x3810 [ 570.199739][T12022] ? bpf_prog_load+0x18f0/0x18f0 [ 570.204674][T12022] ? __kasan_check_write+0x14/0x20 [ 570.210402][T12022] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 570.215952][T12022] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 570.221240][T12022] ? wait_for_completion+0x440/0x440 [ 570.226530][T12022] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 570.232785][T12022] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 570.238242][T12022] ? do_syscall_64+0x26/0x790 [ 570.242922][T12022] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 570.248987][T12022] ? do_syscall_64+0x26/0x790 [ 570.253686][T12022] __x64_sys_bpf+0x73/0xb0 [ 570.258134][T12022] do_syscall_64+0xfa/0x790 [ 570.263158][T12022] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 570.269047][T12022] RIP: 0033:0x45a6f9 [ 570.273148][T12022] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 570.292936][T12022] RSP: 002b:00007f3ba2ab9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 570.301439][T12022] RAX: ffffffffffffffda RBX: 00007f3ba2ab9c90 RCX: 000000000045a6f9 [ 570.309406][T12022] RDX: 000000000000002c RSI: 0000000020000400 RDI: 0000000000000000 [ 570.318413][T12022] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 19:30:18 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x20}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f000000e780)={&(0x7f000000d380)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f000000e680)=[{&(0x7f000000d400)=""/90, 0x5a}, {&(0x7f000000d480)=""/223, 0xdf}, {&(0x7f000000d580)=""/4096, 0x1000}, {&(0x7f000000e580)=""/232, 0xe8}], 0x4, &(0x7f000000e6c0)=""/138, 0x8a}, 0x60) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000000e7c0)=0xffffffffffffffff, 0x4) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r2, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r2, 0x0, 0xf800000000000000) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r2, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) [ 570.326382][T12022] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3ba2aba6d4 [ 570.334346][T12022] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000005 19:30:19 executing program 0 (fault-call:3 fault-nth:12): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x5, r1, 0x0, [0x305f, 0xa]}, 0x2c) 19:30:19 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000300)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0x4000}, {0x6}]}) getpid() r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='`(\xb6T\x83\x88\xa0tAt\x00\x00\x00\xef\xccJ\xed\x1c\x99P,\x8d\xe03\xe3\b\xe6\r\xdc\xed\xf70dK\a\xeb!\xaf\x9f\x00B\xeek\x8d\xa4\x81\xdaPwM\x18\xf7\xe5\x16\xb6\"\x03\xa42\x96\x83\xb2]h\xa3\xb0\x8e\xdc\x1f\xe6g;\xabN\x8b&U\xe9\a\xa6X+\x04\xa4Jv7\x9d\x11\xaa@\x06\xd5\xa5\xb8F\xe8\x1a\x176\xac\xda5\x94dD\x19\xf4\xfcq\xbe0p\xc9\xf1\"\xe1\x1fW>\xfb\xb3T\x14h.\xc1\xa5\xc8\xa6\x86\x1d\xdf2R\xe7\x92\xcd\xa5\xc9\\Q\x0fA[\xee\'\xd2CnF\x17\xcc\x9b\x9c\xcc{\xce\xdbh?r\x90\xa2D,\x0f\xdd\x02{\xf0Z\x93[\x8ca!\xcc\x04\x93\xbe\xfa\xe0S\xdbR\xacVR\x95\xbd\xdc\xd4o\x00\xef\x84\xd7\xd9Tc\xf9T\xc3\xedzO\x82\xca\xb1U\xc9\x03\xb7\x96@', 0x26e1, 0x0) openat$cgroup_ro(r3, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000240)={'veth0_to_bond\x00', @dev={[], 0x11}}) r4 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r5, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r5, 0x0, 0xf800000000000000) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r5, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r5, 0x2401, 0x80000001) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x5, 0x0, 0x40, 0xc0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x2004a, 0x401, 0x7, 0x5, 0x6, 0x0, 0x1}, 0x0, 0x3, r5, 0x4077112ba13cf63d) 19:30:19 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000180)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x0, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r2, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r2, 0x0, 0xf800000000000000) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x80000001) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0x9) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000180)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) mkdirat$cgroup(r3, &(0x7f0000000000)='syz1\x00', 0x1ff) [ 570.539067][T12041] FAULT_INJECTION: forcing a failure. [ 570.539067][T12041] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 570.736869][T12041] CPU: 0 PID: 12041 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 570.745598][T12041] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 570.755670][T12041] Call Trace: [ 570.758987][T12041] dump_stack+0x197/0x210 [ 570.763492][T12041] should_fail.cold+0xa/0x15 [ 570.768079][T12041] ? fault_create_debugfs_attr+0x180/0x180 [ 570.774010][T12041] ? ___might_sleep+0x163/0x2c0 [ 570.778870][T12041] should_fail_alloc_page+0x50/0x60 [ 570.784066][T12041] __alloc_pages_nodemask+0x1a1/0x910 [ 570.789563][T12041] ? __alloc_pages_slowpath+0x2920/0x2920 [ 570.799300][T12041] __vmalloc_node_range+0x2fd/0x810 [ 570.804775][T12041] ? bpf_map_area_alloc+0x20/0x30 [ 570.810691][T12041] __vmalloc_node_flags_caller+0x71/0x90 [ 570.816330][T12041] ? bpf_map_area_alloc+0x20/0x30 [ 570.821356][T12041] __bpf_map_area_alloc+0xde/0xf0 [ 570.826587][T12041] bpf_map_area_alloc+0x20/0x30 [ 570.831933][T12041] htab_map_alloc+0x589/0x11c0 [ 570.837260][T12041] ? __kmalloc+0x608/0x770 [ 570.841686][T12041] ? bpf_get_file_flag+0x80/0x80 [ 570.846619][T12041] ? fput+0x1b/0x20 [ 570.850691][T12041] htab_of_map_alloc+0x71/0x100 [ 570.855630][T12041] ? htab_map_alloc+0x11c0/0x11c0 [ 570.860660][T12041] __do_sys_bpf+0x478/0x3810 [ 570.865262][T12041] ? bpf_prog_load+0x18f0/0x18f0 [ 570.870191][T12041] ? __kasan_check_write+0x14/0x20 [ 570.875317][T12041] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 570.880876][T12041] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 570.886169][T12041] ? wait_for_completion+0x440/0x440 [ 570.893442][T12041] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 570.899802][T12041] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 570.905271][T12041] ? do_syscall_64+0x26/0x790 [ 570.909969][T12041] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 570.916056][T12041] ? do_syscall_64+0x26/0x790 [ 570.920730][T12041] __x64_sys_bpf+0x73/0xb0 [ 570.925160][T12041] do_syscall_64+0xfa/0x790 [ 570.929671][T12041] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 570.935580][T12041] RIP: 0033:0x45a6f9 [ 570.939480][T12041] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 570.959162][T12041] RSP: 002b:00007f3ba2ab9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 570.967579][T12041] RAX: ffffffffffffffda RBX: 00007f3ba2ab9c90 RCX: 000000000045a6f9 [ 570.975550][T12041] RDX: 000000000000002c RSI: 0000000020000400 RDI: 0000000000000000 [ 570.983618][T12041] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 570.991594][T12041] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3ba2aba6d4 [ 570.999576][T12041] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000005 19:30:26 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x48, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000180)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000200)=[{&(0x7f00000002c0)=""/213, 0xd5}], 0x1}, 0x15120) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000180)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) ioctl$TUNGETVNETHDRSZ(r4, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r4, 0x0, 0xf800000000000000) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r4, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x80000001) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x13, 0x0, &(0x7f0000000080), &(0x7f00000000c0)='syzkaller\x00', 0x3, 0x0, 0x0, 0x21680, 0x1, [], r2, 0x17, r4, 0x8, &(0x7f00000003c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000400)={0x2, 0x6, 0x81}, 0x10, 0xffffffffffffffff, r0}, 0x78) sendmsg$inet(0xffffffffffffffff, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000040)=r6) 19:30:26 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x324) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x5421, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') 19:30:26 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x20}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f000000e780)={&(0x7f000000d380)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f000000e680)=[{&(0x7f000000d400)=""/90, 0x5a}, {&(0x7f000000d480)=""/223, 0xdf}, {&(0x7f000000d580)=""/4096, 0x1000}, {&(0x7f000000e580)=""/232, 0xe8}], 0x4, &(0x7f000000e6c0)=""/138, 0x8a}, 0x60) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000000e7c0)=0xffffffffffffffff, 0x4) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r2, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r2, 0x0, 0xf800000000000000) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r2, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) 19:30:26 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) write$cgroup_type(r1, 0x0, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r3, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r3, 0x0, 0xf800000000000000) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r4, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r3, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x80000001) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x12, 0x80000000, 0x1, 0x9e, 0xe, 0x1, 0xfffffbff, [], 0x0, r3, 0x4, 0x4}, 0x3c) close(r5) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000180)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) r7 = openat$cgroup(r6, &(0x7f0000000240)='syz0\x00', 0x200002, 0x0) r8 = openat$cgroup_ro(r7, &(0x7f00000004c0)='cgroup.stat\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r8, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r8, 0x0, 0xf800000000000000) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r8, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r8, 0x2401, 0x80000001) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x40082406, &(0x7f0000000040)='./cgroup.cpu\x00') 19:30:26 executing program 0 (fault-call:3 fault-nth:13): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x5, r1, 0x0, [0x305f, 0xa]}, 0x2c) 19:30:26 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000300)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7302}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0x4000}, {0x6}]}) getpid() r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='`(\xb6T\x83\x88\xa0tAt\x00\x00\x00\xef\xccJ\xed\x1c\x99P,\x8d\xe03\xe3\b\xe6\r\xdc\xed\xf70dK\a\xeb!\xaf\x9f\x00B\xeek\x8d\xa4\x81\xdaPwM\x18\xf7\xe5\x16\xb6\"\x03\xa42\x96\x83\xb2]h\xa3\xb0\x8e\xdc\x1f\xe6g;\xabN\x8b&U\xe9\a\xa6X+\x04\xa4Jv7\x9d\x11\xaa@\x06\xd5\xa5\xb8F\xe8\x1a\x176\xac\xda5\x94dD\x19\xf4\xfcq\xbe0p\xc9\xf1\"\xe1\x1fW>\xfb\xb3T\x14h.\xc1\xa5\xc8\xa6\x86\x1d\xdf2R\xe7\x92\xcd\xa5\xc9\\Q\x0fA[\xee\'\xd2CnF\x17\xcc\x9b\x9c\xcc{\xce\xdbh?r\x90\xa2D,\x0f\xdd\x02{\xf0Z\x93[\x8ca!\xcc\x04\x93\xbe\xfa\xe0S\xdbR\xacVR\x95\xbd\xdc\xd4o\x00\xef\x84\xd7\xd9Tc\xf9T\xc3\xedzO\x82\xca\xb1U\xc9\x03\xb7\x96@', 0x26e1, 0x0) openat$cgroup_ro(r3, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000240)={'veth0_to_bond\x00', @dev={[], 0x11}}) r4 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r5, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r5, 0x0, 0xf800000000000000) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r5, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r5, 0x2401, 0x80000001) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x5, 0x0, 0x40, 0xc0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x2004a, 0x401, 0x7, 0x5, 0x6, 0x0, 0x1}, 0x0, 0x3, r5, 0x4077112ba13cf63d) [ 577.936955][T12062] FAULT_INJECTION: forcing a failure. [ 577.936955][T12062] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 578.010759][T12062] CPU: 0 PID: 12062 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 578.019493][T12062] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 578.029564][T12062] Call Trace: [ 578.032909][T12062] dump_stack+0x197/0x210 [ 578.037279][T12062] should_fail.cold+0xa/0x15 [ 578.041908][T12062] ? fault_create_debugfs_attr+0x180/0x180 [ 578.047740][T12062] ? ___might_sleep+0x163/0x2c0 [ 578.052627][T12062] should_fail_alloc_page+0x50/0x60 [ 578.057853][T12062] __alloc_pages_nodemask+0x1a1/0x910 [ 578.063258][T12062] ? __alloc_pages_slowpath+0x2920/0x2920 [ 578.069022][T12062] __vmalloc_node_range+0x2fd/0x810 [ 578.074261][T12062] ? bpf_map_area_alloc+0x20/0x30 [ 578.079338][T12062] __vmalloc_node_flags_caller+0x71/0x90 [ 578.085003][T12062] ? bpf_map_area_alloc+0x20/0x30 [ 578.090063][T12062] __bpf_map_area_alloc+0xde/0xf0 [ 578.095126][T12062] bpf_map_area_alloc+0x20/0x30 [ 578.100013][T12062] htab_map_alloc+0x589/0x11c0 [ 578.104801][T12062] ? __kmalloc+0x608/0x770 [ 578.109242][T12062] ? bpf_get_file_flag+0x80/0x80 [ 578.114212][T12062] ? fput+0x1b/0x20 [ 578.118047][T12062] htab_of_map_alloc+0x71/0x100 [ 578.122920][T12062] ? htab_map_alloc+0x11c0/0x11c0 [ 578.127965][T12062] __do_sys_bpf+0x478/0x3810 [ 578.132587][T12062] ? bpf_prog_load+0x18f0/0x18f0 [ 578.137567][T12062] ? __kasan_check_write+0x14/0x20 [ 578.142692][T12062] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 578.148256][T12062] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 578.153568][T12062] ? wait_for_completion+0x440/0x440 [ 578.158883][T12062] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 578.165156][T12062] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 578.170634][T12062] ? do_syscall_64+0x26/0x790 [ 578.175351][T12062] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 578.181438][T12062] ? do_syscall_64+0x26/0x790 [ 578.186142][T12062] __x64_sys_bpf+0x73/0xb0 [ 578.190577][T12062] do_syscall_64+0xfa/0x790 [ 578.195120][T12062] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 578.201181][T12062] RIP: 0033:0x45a6f9 [ 578.205096][T12062] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 578.224714][T12062] RSP: 002b:00007f3ba2ab9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 578.233143][T12062] RAX: ffffffffffffffda RBX: 00007f3ba2ab9c90 RCX: 000000000045a6f9 [ 578.241131][T12062] RDX: 000000000000002c RSI: 0000000020000400 RDI: 0000000000000000 [ 578.249116][T12062] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 19:30:26 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x16, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="8500000007000000c60000000000be00950000000000000057e0f076c05184463cf5275f5f6a"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r2, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r3}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000300)=')}\x00', r3}, 0x30) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000380)='\\@\x00') r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x802, 0x0) write$cgroup_subtree(r8, &(0x7f0000001400)=ANY=[], 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f00000013c0)={'ip6gre0\x00', 0x100}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x84, 0x19, 0x0, 0x0) r10 = getpid() r11 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) ioctl$TUNSETIFF(r11, 0x400454ca, &(0x7f0000000140)={'team_slave_0\x00'}) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x3, 0x5, 0xa5, 0x0, 0x0, 0x451f587ba3fcddb3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x0, 0x6}, 0x400, 0x8001, 0xfffff800, 0x0, 0x0, 0x1}, r10, 0xffffffffffffffff, r11, 0x8) r12 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r13 = openat$cgroup_ro(r12, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r13, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r13, 0x0, 0xf800000000000000) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r13, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r13, 0x2401, 0x80000001) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={r4, r13, 0x0, 0x1, &(0x7f00000003c0)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r10, r14, 0x0, 0xd, &(0x7f0000000540)='/dev/net/tun\x00', r6}, 0x30) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="006d257a7d5ec220"], 0xda00) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) ioctl$PERF_EVENT_IOC_QUERY_BPF(r9, 0xc008240a, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000000be11172ce1bf"]) r15 = gettid() perf_event_open(&(0x7f0000000280)={0xb5f7e14a04085be6, 0x70, 0x0, 0x80, 0x6, 0x5, 0x0, 0x5, 0x80000, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x5, @perf_config_ext={0x1, 0x7}, 0x1000, 0x15, 0x800, 0x3, 0x7, 0x4, 0x43}, 0xffffffffffffffff, 0x7, r0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0xfffffffffffffe8e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x2, 0xffffffffffffffff, 0x0, 0x9, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x2, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x100000001, 0x7fff}, 0x1024, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001540)={0x1, 0x47, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x80, 0xfffffffffffffffd, 0x0, 0x7}, r15, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r9, &(0x7f0000000200), 0x43400) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x1b, 0xff, 0x1, 0x5, 0x0, 0x9, 0x45e4f980cf40ac30, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x9, 0x8100}, 0x4, 0x800, 0x4239, 0x3, 0x1, 0x6, 0x40}, r15, 0x5, r7, 0x2) [ 578.257149][T12062] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3ba2aba6d4 [ 578.265135][T12062] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000005 19:30:26 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x20}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f000000e780)={&(0x7f000000d380)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f000000e680)=[{&(0x7f000000d400)=""/90, 0x5a}, {&(0x7f000000d480)=""/223, 0xdf}, {&(0x7f000000d580)=""/4096, 0x1000}, {&(0x7f000000e580)=""/232, 0xe8}], 0x4, &(0x7f000000e6c0)=""/138, 0x8a}, 0x60) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000000e7c0)=0xffffffffffffffff, 0x4) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r2, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r2, 0x0, 0xf800000000000000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r2, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) 19:30:27 executing program 0 (fault-call:3 fault-nth:14): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x5, r1, 0x0, [0x305f, 0xa]}, 0x2c) [ 578.476959][ T27] audit: type=1804 audit(1576006227.053:50): pid=12075 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir959784610/syzkaller.Jfsvcs/199/memory.events" dev="sda1" ino=16676 res=1 [ 578.611690][T12083] FAULT_INJECTION: forcing a failure. [ 578.611690][T12083] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 578.628110][T12083] CPU: 1 PID: 12083 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 578.636816][T12083] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 578.646869][T12083] Call Trace: [ 578.650161][T12083] dump_stack+0x197/0x210 [ 578.654527][T12083] should_fail.cold+0xa/0x15 [ 578.659109][T12083] ? fault_create_debugfs_attr+0x180/0x180 [ 578.665103][T12083] ? ___might_sleep+0x163/0x2c0 [ 578.669953][T12083] should_fail_alloc_page+0x50/0x60 [ 578.675322][T12083] __alloc_pages_nodemask+0x1a1/0x910 [ 578.680700][T12083] ? __alloc_pages_slowpath+0x2920/0x2920 [ 578.686428][T12083] __vmalloc_node_range+0x2fd/0x810 [ 578.691638][T12083] ? bpf_map_area_alloc+0x20/0x30 [ 578.696656][T12083] __vmalloc_node_flags_caller+0x71/0x90 [ 578.702423][T12083] ? bpf_map_area_alloc+0x20/0x30 [ 578.707445][T12083] __bpf_map_area_alloc+0xde/0xf0 [ 578.712552][T12083] bpf_map_area_alloc+0x20/0x30 [ 578.717408][T12083] htab_map_alloc+0x589/0x11c0 [ 578.722158][T12083] ? __kmalloc+0x608/0x770 [ 578.726564][T12083] ? bpf_get_file_flag+0x80/0x80 [ 578.731498][T12083] ? fput+0x1b/0x20 [ 578.735324][T12083] htab_of_map_alloc+0x71/0x100 [ 578.740164][T12083] ? htab_map_alloc+0x11c0/0x11c0 [ 578.745201][T12083] __do_sys_bpf+0x478/0x3810 [ 578.749783][T12083] ? bpf_prog_load+0x18f0/0x18f0 [ 578.754817][T12083] ? __kasan_check_write+0x14/0x20 [ 578.759939][T12083] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 578.765574][T12083] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 578.770861][T12083] ? wait_for_completion+0x440/0x440 [ 578.776148][T12083] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 578.782389][T12083] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 578.787836][T12083] ? do_syscall_64+0x26/0x790 [ 578.792502][T12083] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 578.799511][T12083] ? do_syscall_64+0x26/0x790 [ 578.804196][T12083] __x64_sys_bpf+0x73/0xb0 [ 578.808613][T12083] do_syscall_64+0xfa/0x790 [ 578.813192][T12083] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 578.819071][T12083] RIP: 0033:0x45a6f9 [ 578.822953][T12083] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 578.842555][T12083] RSP: 002b:00007f3ba2ab9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 578.850982][T12083] RAX: ffffffffffffffda RBX: 00007f3ba2ab9c90 RCX: 000000000045a6f9 19:30:27 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e271f60d25b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318e2ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7eaa49c62ba0fe52fa65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd31a08b32808b802000000000000ea334d83239dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc18cae2ed4b4390af9a9ceafd07ed00b000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x20}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f000000e780)={&(0x7f000000d380)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f000000e680)=[{&(0x7f000000d400)=""/90, 0x5a}, {&(0x7f000000d480)=""/223, 0xdf}, {&(0x7f000000d580)=""/4096, 0x1000}, {&(0x7f000000e580)=""/232, 0xe8}], 0x4, &(0x7f000000e6c0)=""/138, 0x8a}, 0x60) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000000e7c0)=0xffffffffffffffff, 0x4) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r2, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r2, 0x0, 0xf800000000000000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r2, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) [ 578.858940][T12083] RDX: 000000000000002c RSI: 0000000020000400 RDI: 0000000000000000 [ 578.866897][T12083] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 578.874870][T12083] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3ba2aba6d4 [ 578.882865][T12083] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000005 19:30:27 executing program 0 (fault-call:3 fault-nth:15): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x5, r1, 0x0, [0x305f, 0xa]}, 0x2c) 19:30:27 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x20}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f000000e780)={&(0x7f000000d380)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f000000e680)=[{&(0x7f000000d400)=""/90, 0x5a}, {&(0x7f000000d480)=""/223, 0xdf}, {&(0x7f000000d580)=""/4096, 0x1000}, {&(0x7f000000e580)=""/232, 0xe8}], 0x4, &(0x7f000000e6c0)=""/138, 0x8a}, 0x60) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000000e7c0)=0xffffffffffffffff, 0x4) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r2, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r2, 0x0, 0xf800000000000000) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r2, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) [ 579.021006][ T27] audit: type=1804 audit(1576006227.593:51): pid=12088 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir959784610/syzkaller.Jfsvcs/199/memory.events" dev="sda1" ino=16676 res=1 [ 579.068093][T12092] FAULT_INJECTION: forcing a failure. [ 579.068093][T12092] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 579.149695][T12092] CPU: 1 PID: 12092 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 579.158424][T12092] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 579.168486][T12092] Call Trace: [ 579.171948][T12092] dump_stack+0x197/0x210 [ 579.176316][T12092] should_fail.cold+0xa/0x15 [ 579.181646][T12092] ? fault_create_debugfs_attr+0x180/0x180 [ 579.187473][T12092] ? ___might_sleep+0x163/0x2c0 [ 579.192366][T12092] should_fail_alloc_page+0x50/0x60 [ 579.197582][T12092] __alloc_pages_nodemask+0x1a1/0x910 [ 579.202984][T12092] ? __alloc_pages_slowpath+0x2920/0x2920 [ 579.208755][T12092] __vmalloc_node_range+0x2fd/0x810 [ 579.214872][T12092] ? bpf_map_area_alloc+0x20/0x30 [ 579.220091][T12092] __vmalloc_node_flags_caller+0x71/0x90 [ 579.225723][T12092] ? bpf_map_area_alloc+0x20/0x30 [ 579.230860][T12092] __bpf_map_area_alloc+0xde/0xf0 [ 579.235901][T12092] bpf_map_area_alloc+0x20/0x30 [ 579.240877][T12092] htab_map_alloc+0x589/0x11c0 [ 579.245658][T12092] ? __kmalloc+0x608/0x770 [ 579.250094][T12092] ? bpf_get_file_flag+0x80/0x80 [ 579.255084][T12092] ? fput+0x1b/0x20 [ 579.258914][T12092] htab_of_map_alloc+0x71/0x100 [ 579.263766][T12092] ? htab_map_alloc+0x11c0/0x11c0 [ 579.268827][T12092] __do_sys_bpf+0x478/0x3810 [ 579.273426][T12092] ? bpf_prog_load+0x18f0/0x18f0 [ 579.278362][T12092] ? __kasan_check_write+0x14/0x20 [ 579.283480][T12092] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 579.289025][T12092] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 579.294489][T12092] ? wait_for_completion+0x440/0x440 [ 579.299963][T12092] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 579.306219][T12092] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 579.311676][T12092] ? do_syscall_64+0x26/0x790 [ 579.316381][T12092] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 579.322446][T12092] ? do_syscall_64+0x26/0x790 [ 579.327126][T12092] __x64_sys_bpf+0x73/0xb0 [ 579.331717][T12092] do_syscall_64+0xfa/0x790 [ 579.336227][T12092] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 579.342121][T12092] RIP: 0033:0x45a6f9 [ 579.346104][T12092] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 579.365808][T12092] RSP: 002b:00007f3ba2ab9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 579.374230][T12092] RAX: ffffffffffffffda RBX: 00007f3ba2ab9c90 RCX: 000000000045a6f9 [ 579.382302][T12092] RDX: 000000000000002c RSI: 0000000020000400 RDI: 0000000000000000 [ 579.390302][T12092] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 579.398534][T12092] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3ba2aba6d4 [ 579.406505][T12092] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000005 19:30:36 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x48, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000180)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000200)=[{&(0x7f00000002c0)=""/213, 0xd5}], 0x1}, 0x15120) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000180)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) ioctl$TUNGETVNETHDRSZ(r4, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r4, 0x0, 0xf800000000000000) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r4, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x80000001) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x13, 0x0, &(0x7f0000000080), &(0x7f00000000c0)='syzkaller\x00', 0x3, 0x0, 0x0, 0x21680, 0x1, [], r2, 0x17, r4, 0x8, &(0x7f00000003c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000400)={0x2, 0x6, 0x81}, 0x10, 0xffffffffffffffff, r0}, 0x78) sendmsg$inet(0xffffffffffffffff, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000040)=r6) 19:30:36 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x324) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x5450, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') 19:30:36 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x20}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f000000e780)={&(0x7f000000d380)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f000000e680)=[{&(0x7f000000d400)=""/90, 0x5a}, {&(0x7f000000d480)=""/223, 0xdf}, {&(0x7f000000d580)=""/4096, 0x1000}, {&(0x7f000000e580)=""/232, 0xe8}], 0x4, &(0x7f000000e6c0)=""/138, 0x8a}, 0x60) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000000e7c0)=0xffffffffffffffff, 0x4) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r2, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r2, 0x0, 0xf800000000000000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r2, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) 19:30:36 executing program 2: socket$kcm(0x2, 0x0, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r4, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r4, 0x0, 0xf800000000000000) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r4, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x80000001) perf_event_open$cgroup(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x6, 0x3f, 0x83, 0x0, 0x6, 0x9530a, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x4, 0x100000001}, 0x0, 0x1, 0x1, 0x7, 0x1, 0x7, 0x9}, 0xffffffffffffffff, 0x3, r4, 0x1e) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x1, 0x7, 0xde5, 0x0, 0x10, 0x1, 0x2, [], 0x0, 0xffffffffffffffff, 0x5, 0x3}, 0x3c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000300)={&(0x7f0000000040)='./file0\x00', r5}, 0x10) socket$kcm(0x29, 0x4, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f00000002c0)=0xa7) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) r6 = perf_event_open(&(0x7f0000000340)={0xaff886739fca9b64, 0x70, 0xae, 0x8b, 0x81, 0xfd, 0x0, 0x3, 0x20040, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fffffff, 0x0, @perf_config_ext={0x1f}, 0x200, 0x0, 0x93b, 0x6}, 0x0, 0xe, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000000)='\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x5}]}, 0x90ad) close(0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='em1\x00', r2}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) 19:30:36 executing program 0 (fault-call:3 fault-nth:16): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x5, r1, 0x0, [0x305f, 0xa]}, 0x2c) 19:30:36 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x20}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f000000e780)={&(0x7f000000d380)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f000000e680)=[{&(0x7f000000d400)=""/90, 0x5a}, {&(0x7f000000d480)=""/223, 0xdf}, {&(0x7f000000d580)=""/4096, 0x1000}, {&(0x7f000000e580)=""/232, 0xe8}], 0x4, &(0x7f000000e6c0)=""/138, 0x8a}, 0x60) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000000e7c0)=0xffffffffffffffff, 0x4) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r2, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r2, 0x0, 0xf800000000000000) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r2, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) [ 588.370791][T12113] FAULT_INJECTION: forcing a failure. [ 588.370791][T12113] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 588.434457][T12113] CPU: 0 PID: 12113 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 588.443334][T12113] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 588.453407][T12113] Call Trace: [ 588.456737][T12113] dump_stack+0x197/0x210 [ 588.461363][T12113] should_fail.cold+0xa/0x15 [ 588.466005][T12113] ? fault_create_debugfs_attr+0x180/0x180 [ 588.471844][T12113] ? ___might_sleep+0x163/0x2c0 [ 588.476751][T12113] should_fail_alloc_page+0x50/0x60 [ 588.481984][T12113] __alloc_pages_nodemask+0x1a1/0x910 [ 588.487420][T12113] ? __alloc_pages_slowpath+0x2920/0x2920 [ 588.493185][T12113] __vmalloc_node_range+0x2fd/0x810 [ 588.498430][T12113] ? bpf_map_area_alloc+0x20/0x30 [ 588.503485][T12113] __vmalloc_node_flags_caller+0x71/0x90 [ 588.509160][T12113] ? bpf_map_area_alloc+0x20/0x30 [ 588.514214][T12113] __bpf_map_area_alloc+0xde/0xf0 [ 588.519609][T12113] bpf_map_area_alloc+0x20/0x30 [ 588.524490][T12113] htab_map_alloc+0x589/0x11c0 [ 588.529292][T12113] ? __kmalloc+0x608/0x770 19:30:37 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x20}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f000000e780)={&(0x7f000000d380)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f000000e680)=[{&(0x7f000000d400)=""/90, 0x5a}, {&(0x7f000000d480)=""/223, 0xdf}, {&(0x7f000000d580)=""/4096, 0x1000}, {&(0x7f000000e580)=""/232, 0xe8}], 0x4, &(0x7f000000e6c0)=""/138, 0x8a}, 0x60) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000000e7c0)=0xffffffffffffffff, 0x4) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r2, 0x800454d7, &(0x7f0000000080)) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r2, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) [ 588.533848][T12113] ? bpf_get_file_flag+0x80/0x80 [ 588.539080][T12113] ? fput+0x1b/0x20 [ 588.542916][T12113] htab_of_map_alloc+0x71/0x100 [ 588.547777][T12113] ? htab_map_alloc+0x11c0/0x11c0 [ 588.552824][T12113] __do_sys_bpf+0x478/0x3810 [ 588.552843][T12113] ? bpf_prog_load+0x18f0/0x18f0 [ 588.552857][T12113] ? __kasan_check_write+0x14/0x20 [ 588.552871][T12113] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 588.552885][T12113] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 588.552900][T12113] ? wait_for_completion+0x440/0x440 [ 588.552920][T12113] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 588.552950][T12113] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 588.552962][T12113] ? do_syscall_64+0x26/0x790 [ 588.552976][T12113] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 588.552988][T12113] ? do_syscall_64+0x26/0x790 [ 588.553016][T12113] __x64_sys_bpf+0x73/0xb0 [ 588.615576][T12113] do_syscall_64+0xfa/0x790 [ 588.620787][T12113] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 588.626672][T12113] RIP: 0033:0x45a6f9 [ 588.630576][T12113] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 588.650190][T12113] RSP: 002b:00007f3ba2ab9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 588.658641][T12113] RAX: ffffffffffffffda RBX: 00007f3ba2ab9c90 RCX: 000000000045a6f9 [ 588.666629][T12113] RDX: 000000000000002c RSI: 0000000020000400 RDI: 0000000000000000 [ 588.674613][T12113] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 19:30:37 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) [ 588.682788][T12113] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3ba2aba6d4 [ 588.690774][T12113] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000005 [ 588.718726][T12114] device nr0 entered promiscuous mode 19:30:37 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e271f60d25b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318e2ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7eaa49c62ba0fe52fa65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd31a08b32808b802000000000000ea334d83239dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc18cae2ed4b4390af9a9ceafd07ed00b000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x20}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f000000e780)={&(0x7f000000d380)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f000000e680)=[{&(0x7f000000d400)=""/90, 0x5a}, {&(0x7f000000d480)=""/223, 0xdf}, {&(0x7f000000d580)=""/4096, 0x1000}, {&(0x7f000000e580)=""/232, 0xe8}], 0x4, &(0x7f000000e6c0)=""/138, 0x8a}, 0x60) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000000e7c0)=0xffffffffffffffff, 0x4) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r2, 0x800454d7, &(0x7f0000000080)) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r2, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) [ 588.843662][ T27] audit: type=1804 audit(1576006237.423:52): pid=12130 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir238255000/syzkaller.xkwO2c/126/memory.events" dev="sda1" ino=16580 res=1 19:30:37 executing program 0 (fault-call:3 fault-nth:17): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x5, r1, 0x0, [0x305f, 0xa]}, 0x2c) 19:30:37 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x63, 0x11, 0x18}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cpuset.memory_pressure\x00', 0x0, 0x0) [ 589.139476][T12140] FAULT_INJECTION: forcing a failure. [ 589.139476][T12140] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 589.166894][T12140] CPU: 1 PID: 12140 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 589.175629][T12140] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 589.185797][T12140] Call Trace: [ 589.189122][T12140] dump_stack+0x197/0x210 [ 589.193493][T12140] should_fail.cold+0xa/0x15 [ 589.198110][T12140] ? fault_create_debugfs_attr+0x180/0x180 [ 589.203938][T12140] ? ___might_sleep+0x163/0x2c0 [ 589.208882][T12140] should_fail_alloc_page+0x50/0x60 [ 589.214099][T12140] __alloc_pages_nodemask+0x1a1/0x910 [ 589.219499][T12140] ? __alloc_pages_slowpath+0x2920/0x2920 [ 589.225254][T12140] __vmalloc_node_range+0x2fd/0x810 [ 589.230480][T12140] ? bpf_map_area_alloc+0x20/0x30 [ 589.235539][T12140] __vmalloc_node_flags_caller+0x71/0x90 [ 589.241298][T12140] ? bpf_map_area_alloc+0x20/0x30 [ 589.246341][T12140] __bpf_map_area_alloc+0xde/0xf0 [ 589.251394][T12140] bpf_map_area_alloc+0x20/0x30 [ 589.256272][T12140] htab_map_alloc+0x589/0x11c0 [ 589.261052][T12140] ? __kmalloc+0x608/0x770 [ 589.265471][T12140] ? bpf_get_file_flag+0x80/0x80 [ 589.270405][T12140] ? fput+0x1b/0x20 [ 589.274306][T12140] htab_of_map_alloc+0x71/0x100 [ 589.279146][T12140] ? htab_map_alloc+0x11c0/0x11c0 [ 589.284318][T12140] __do_sys_bpf+0x478/0x3810 [ 589.288905][T12140] ? bpf_prog_load+0x18f0/0x18f0 [ 589.294616][T12140] ? __kasan_check_write+0x14/0x20 [ 589.299747][T12140] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 589.305395][T12140] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 589.310690][T12140] ? wait_for_completion+0x440/0x440 [ 589.315998][T12140] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 589.322277][T12140] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 589.327742][T12140] ? do_syscall_64+0x26/0x790 [ 589.332416][T12140] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 589.339099][T12140] ? do_syscall_64+0x26/0x790 [ 589.343782][T12140] __x64_sys_bpf+0x73/0xb0 [ 589.348289][T12140] do_syscall_64+0xfa/0x790 [ 589.352799][T12140] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 589.358682][T12140] RIP: 0033:0x45a6f9 [ 589.362568][T12140] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 589.382254][T12140] RSP: 002b:00007f3ba2a98c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 19:30:38 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x20}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f000000e780)={&(0x7f000000d380)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f000000e680)=[{&(0x7f000000d400)=""/90, 0x5a}, {&(0x7f000000d480)=""/223, 0xdf}, {&(0x7f000000d580)=""/4096, 0x1000}, {&(0x7f000000e580)=""/232, 0xe8}], 0x4, &(0x7f000000e6c0)=""/138, 0x8a}, 0x60) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000000e7c0)=0xffffffffffffffff, 0x4) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r2, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) [ 589.390660][T12140] RAX: ffffffffffffffda RBX: 00007f3ba2a98c90 RCX: 000000000045a6f9 [ 589.398620][T12140] RDX: 000000000000002c RSI: 0000000020000400 RDI: 0000000000000000 [ 589.406580][T12140] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 589.414623][T12140] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3ba2a996d4 [ 589.422666][T12140] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000005 [ 589.709874][T12120] device nr0 entered promiscuous mode 19:30:46 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x48, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000180)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000200)=[{&(0x7f00000002c0)=""/213, 0xd5}], 0x1}, 0x15120) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000180)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) ioctl$TUNGETVNETHDRSZ(r4, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r4, 0x0, 0xf800000000000000) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r4, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x80000001) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x13, 0x0, &(0x7f0000000080), &(0x7f00000000c0)='syzkaller\x00', 0x3, 0x0, 0x0, 0x21680, 0x1, [], r2, 0x17, r4, 0x8, &(0x7f00000003c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000400)={0x2, 0x6, 0x81}, 0x10, 0xffffffffffffffff, r0}, 0x78) sendmsg$inet(0xffffffffffffffff, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000040)=r6) 19:30:46 executing program 0 (fault-call:3 fault-nth:18): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x5, r1, 0x0, [0x305f, 0xa]}, 0x2c) 19:30:46 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$kcm(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) socket$kcm(0x2, 0x5, 0x84) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="006d665704021a47"], 0xda00) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) sendmsg$kcm(r0, 0x0, 0xc0) r3 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x2, 0xffffffffffffffff, 0x0, 0x9, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7fff}, 0x1024, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001540)={0x1, 0x47, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x80, 0xfffffffffffffffd, 0x0, 0x7}, r3, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) r4 = socket$kcm(0x2, 0x5, 0x0) socketpair(0x1, 0x4, 0x1f, &(0x7f0000000940)) setsockopt$sock_attach_bpf(r4, 0x1, 0x2, &(0x7f00000001c0), 0x4) 19:30:46 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x324) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x5451, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') 19:30:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e271f60d25b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318e2ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7eaa49c62ba0fe52fa65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd31a08b32808b802000000000000ea334d83239dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc18cae2ed4b4390af9a9ceafd07ed00b000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x20}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f000000e780)={&(0x7f000000d380)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f000000e680)=[{&(0x7f000000d400)=""/90, 0x5a}, {&(0x7f000000d480)=""/223, 0xdf}, {&(0x7f000000d580)=""/4096, 0x1000}, {&(0x7f000000e580)=""/232, 0xe8}], 0x4, &(0x7f000000e6c0)=""/138, 0x8a}, 0x60) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000000e7c0)=0xffffffffffffffff, 0x4) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, 0xffffffffffffffff, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={0xffffffffffffffff, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) 19:30:46 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000280)='Threaded\x00', 0x1) write$cgroup_int(r1, &(0x7f0000000000)=0x5, 0x12) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xf0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000180)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) openat$cgroup_ro(r3, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) sendmsg(r2, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @local={0xfe, 0x10}, 0x9}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x34000}], 0x1}, 0x60) [ 597.649027][T12165] FAULT_INJECTION: forcing a failure. [ 597.649027][T12165] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 597.663433][T12165] CPU: 0 PID: 12165 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 597.672144][T12165] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 597.682655][T12165] Call Trace: [ 597.682684][T12165] dump_stack+0x197/0x210 [ 597.682710][T12165] should_fail.cold+0xa/0x15 [ 597.682730][T12165] ? fault_create_debugfs_attr+0x180/0x180 [ 597.682745][T12165] ? ___might_sleep+0x163/0x2c0 [ 597.682771][T12165] should_fail_alloc_page+0x50/0x60 [ 597.682785][T12165] __alloc_pages_nodemask+0x1a1/0x910 [ 597.682802][T12165] ? __alloc_pages_slowpath+0x2920/0x2920 [ 597.682830][T12165] __vmalloc_node_range+0x2fd/0x810 [ 597.682852][T12165] ? bpf_map_area_alloc+0x20/0x30 [ 597.702068][T12165] __vmalloc_node_flags_caller+0x71/0x90 [ 597.702088][T12165] ? bpf_map_area_alloc+0x20/0x30 [ 597.702104][T12165] __bpf_map_area_alloc+0xde/0xf0 [ 597.702125][T12165] bpf_map_area_alloc+0x20/0x30 [ 597.712455][T12165] htab_map_alloc+0x589/0x11c0 [ 597.712470][T12165] ? __kmalloc+0x608/0x770 [ 597.712484][T12165] ? bpf_get_file_flag+0x80/0x80 [ 597.712506][T12165] ? fput+0x1b/0x20 [ 597.712524][T12165] htab_of_map_alloc+0x71/0x100 [ 597.712536][T12165] ? htab_map_alloc+0x11c0/0x11c0 [ 597.712550][T12165] __do_sys_bpf+0x478/0x3810 [ 597.712568][T12165] ? bpf_prog_load+0x18f0/0x18f0 [ 597.712586][T12165] ? __kasan_check_write+0x14/0x20 [ 597.740426][T12165] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 597.764655][T12165] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 597.764677][T12165] ? wait_for_completion+0x440/0x440 [ 597.764700][T12165] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 597.764726][T12165] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 597.764739][T12165] ? do_syscall_64+0x26/0x790 [ 597.764752][T12165] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 597.764765][T12165] ? do_syscall_64+0x26/0x790 [ 597.764783][T12165] __x64_sys_bpf+0x73/0xb0 19:30:46 executing program 0 (fault-call:3 fault-nth:19): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x5, r1, 0x0, [0x305f, 0xa]}, 0x2c) [ 597.764798][T12165] do_syscall_64+0xfa/0x790 [ 597.764814][T12165] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 597.764826][T12165] RIP: 0033:0x45a6f9 [ 597.764840][T12165] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 597.764847][T12165] RSP: 002b:00007f3ba2ab9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 597.764860][T12165] RAX: ffffffffffffffda RBX: 00007f3ba2ab9c90 RCX: 000000000045a6f9 19:30:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x20}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f000000e780)={&(0x7f000000d380)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f000000e680)=[{&(0x7f000000d400)=""/90, 0x5a}, {&(0x7f000000d480)=""/223, 0xdf}, {&(0x7f000000d580)=""/4096, 0x1000}, {&(0x7f000000e580)=""/232, 0xe8}], 0x4, &(0x7f000000e6c0)=""/138, 0x8a}, 0x60) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000000e7c0)=0xffffffffffffffff, 0x4) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, 0xffffffffffffffff, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={0xffffffffffffffff, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) [ 597.764867][T12165] RDX: 000000000000002c RSI: 0000000020000400 RDI: 0000000000000000 [ 597.764875][T12165] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 597.764889][T12165] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3ba2aba6d4 [ 597.778475][T12165] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000005 [ 597.862472][ T27] audit: type=1804 audit(1576006246.423:53): pid=12174 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir238255000/syzkaller.xkwO2c/128/memory.events" dev="sda1" ino=16688 res=1 [ 598.001542][T12187] FAULT_INJECTION: forcing a failure. [ 598.001542][T12187] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 598.061588][T12187] CPU: 1 PID: 12187 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 598.070311][T12187] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 598.080374][T12187] Call Trace: [ 598.083679][T12187] dump_stack+0x197/0x210 [ 598.088146][T12187] should_fail.cold+0xa/0x15 [ 598.092757][T12187] ? fault_create_debugfs_attr+0x180/0x180 [ 598.098578][T12187] ? ___might_sleep+0x163/0x2c0 [ 598.103470][T12187] should_fail_alloc_page+0x50/0x60 [ 598.108761][T12187] __alloc_pages_nodemask+0x1a1/0x910 [ 598.114166][T12187] ? __alloc_pages_slowpath+0x2920/0x2920 [ 598.119902][T12187] __vmalloc_node_range+0x2fd/0x810 [ 598.125135][T12187] ? bpf_map_area_alloc+0x20/0x30 [ 598.130165][T12187] __vmalloc_node_flags_caller+0x71/0x90 [ 598.135800][T12187] ? bpf_map_area_alloc+0x20/0x30 [ 598.140832][T12187] __bpf_map_area_alloc+0xde/0xf0 [ 598.145856][T12187] bpf_map_area_alloc+0x20/0x30 [ 598.150704][T12187] htab_map_alloc+0x589/0x11c0 [ 598.155477][T12187] ? __kmalloc+0x608/0x770 [ 598.159897][T12187] ? bpf_get_file_flag+0x80/0x80 [ 598.164857][T12187] ? fput+0x1b/0x20 [ 598.168675][T12187] htab_of_map_alloc+0x71/0x100 [ 598.173519][T12187] ? htab_map_alloc+0x11c0/0x11c0 [ 598.178722][T12187] __do_sys_bpf+0x478/0x3810 [ 598.183316][T12187] ? bpf_prog_load+0x18f0/0x18f0 [ 598.188251][T12187] ? __kasan_check_write+0x14/0x20 [ 598.193363][T12187] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 598.198911][T12187] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 598.204197][T12187] ? wait_for_completion+0x440/0x440 [ 598.210447][T12187] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 598.216722][T12187] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 598.222181][T12187] ? do_syscall_64+0x26/0x790 [ 598.226856][T12187] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 598.232954][T12187] ? do_syscall_64+0x26/0x790 [ 598.237723][T12187] __x64_sys_bpf+0x73/0xb0 [ 598.242148][T12187] do_syscall_64+0xfa/0x790 [ 598.246659][T12187] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 598.252547][T12187] RIP: 0033:0x45a6f9 [ 598.256440][T12187] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 598.276050][T12187] RSP: 002b:00007f3ba2a98c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 598.284457][T12187] RAX: ffffffffffffffda RBX: 00007f3ba2a98c90 RCX: 000000000045a6f9 [ 598.292429][T12187] RDX: 000000000000002c RSI: 0000000020000400 RDI: 0000000000000000 [ 598.300395][T12187] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 598.308365][T12187] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3ba2a996d4 [ 598.316331][T12187] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000005 19:30:46 executing program 2: 19:30:46 executing program 0 (fault-call:3 fault-nth:20): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x5, r1, 0x0, [0x305f, 0xa]}, 0x2c) 19:30:47 executing program 2: [ 598.510518][ T27] audit: type=1804 audit(1576006247.083:54): pid=12181 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir238255000/syzkaller.xkwO2c/128/memory.events" dev="sda1" ino=16688 res=1 [ 598.514387][T12195] FAULT_INJECTION: forcing a failure. [ 598.514387][T12195] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 598.633697][T12195] CPU: 0 PID: 12195 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 598.642512][T12195] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 598.652580][T12195] Call Trace: [ 598.655890][T12195] dump_stack+0x197/0x210 [ 598.660244][T12195] should_fail.cold+0xa/0x15 [ 598.664861][T12195] ? fault_create_debugfs_attr+0x180/0x180 [ 598.670779][T12195] ? ___might_sleep+0x163/0x2c0 [ 598.675662][T12195] should_fail_alloc_page+0x50/0x60 [ 598.680879][T12195] __alloc_pages_nodemask+0x1a1/0x910 [ 598.686288][T12195] ? __alloc_pages_slowpath+0x2920/0x2920 [ 598.692139][T12195] __vmalloc_node_range+0x2fd/0x810 [ 598.697380][T12195] ? bpf_map_area_alloc+0x20/0x30 [ 598.702441][T12195] __vmalloc_node_flags_caller+0x71/0x90 [ 598.708114][T12195] ? bpf_map_area_alloc+0x20/0x30 [ 598.713327][T12195] __bpf_map_area_alloc+0xde/0xf0 [ 598.713349][T12195] bpf_map_area_alloc+0x20/0x30 [ 598.713364][T12195] htab_map_alloc+0x589/0x11c0 [ 598.713374][T12195] ? __kmalloc+0x608/0x770 19:30:47 executing program 4: [ 598.713386][T12195] ? bpf_get_file_flag+0x80/0x80 [ 598.713408][T12195] ? fput+0x1b/0x20 [ 598.713425][T12195] htab_of_map_alloc+0x71/0x100 [ 598.713436][T12195] ? htab_map_alloc+0x11c0/0x11c0 [ 598.713451][T12195] __do_sys_bpf+0x478/0x3810 [ 598.713469][T12195] ? bpf_prog_load+0x18f0/0x18f0 [ 598.713482][T12195] ? __kasan_check_write+0x14/0x20 [ 598.713496][T12195] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 598.713515][T12195] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 598.776853][T12195] ? wait_for_completion+0x440/0x440 [ 598.782449][T12195] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 598.788808][T12195] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 598.794445][T12195] ? do_syscall_64+0x26/0x790 [ 598.799134][T12195] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 598.805291][T12195] ? do_syscall_64+0x26/0x790 [ 598.805316][T12195] __x64_sys_bpf+0x73/0xb0 [ 598.805331][T12195] do_syscall_64+0xfa/0x790 [ 598.805351][T12195] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 598.805362][T12195] RIP: 0033:0x45a6f9 [ 598.805376][T12195] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 598.805382][T12195] RSP: 002b:00007f3ba2ab9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 598.805400][T12195] RAX: ffffffffffffffda RBX: 00007f3ba2ab9c90 RCX: 000000000045a6f9 [ 598.848597][T12195] RDX: 000000000000002c RSI: 0000000020000400 RDI: 0000000000000000 [ 598.848606][T12195] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 598.848613][T12195] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3ba2aba6d4 [ 598.848620][T12195] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000005 19:30:55 executing program 1: r0 = socket$kcm(0x2, 0x3, 0x2) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000180)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000200)=[{&(0x7f00000002c0)=""/213, 0xd5}], 0x1}, 0x15120) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000180)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) ioctl$TUNGETVNETHDRSZ(r4, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r4, 0x0, 0xf800000000000000) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r4, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x80000001) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x13, 0x0, &(0x7f0000000080), &(0x7f00000000c0)='syzkaller\x00', 0x3, 0x0, 0x0, 0x21680, 0x1, [], r2, 0x17, r4, 0x8, &(0x7f00000003c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000400)={0x2, 0x6, 0x81}, 0x10, 0xffffffffffffffff}, 0x78) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000040)=r6) 19:30:55 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x5b, &(0x7f00000000c0)=[{&(0x7f0000000000)="5a00000022008151e00f80ecdb4cb904044865160b00090002000000000004140e00110002000000dc2976d153b4", 0x235}], 0x1}, 0x0) 19:30:55 executing program 0 (fault-call:3 fault-nth:21): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x5, r1, 0x0, [0x305f, 0xa]}, 0x2c) 19:30:55 executing program 4: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)={0xf, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a}, 0x20) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f00000001c0)={r0, &(0x7f0000000000), 0x0}, 0x78) 19:30:55 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x20}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f000000e780)={&(0x7f000000d380)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f000000e680)=[{&(0x7f000000d400)=""/90, 0x5a}, {&(0x7f000000d480)=""/223, 0xdf}, {&(0x7f000000d580)=""/4096, 0x1000}, {&(0x7f000000e580)=""/232, 0xe8}], 0x4, &(0x7f000000e6c0)=""/138, 0x8a}, 0x60) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000000e7c0)=0xffffffffffffffff, 0x4) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, 0xffffffffffffffff, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={0xffffffffffffffff, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) 19:30:55 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x324) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x5452, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') [ 606.938694][T12216] netlink: 'syz-executor.2': attribute type 9 has an invalid length. [ 606.948842][T12215] FAULT_INJECTION: forcing a failure. [ 606.948842][T12215] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 606.972454][T12216] netlink: 42 bytes leftover after parsing attributes in process `syz-executor.2'. [ 606.975650][T12215] CPU: 0 PID: 12215 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 606.990771][T12215] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 606.990780][T12215] Call Trace: [ 606.990810][T12215] dump_stack+0x197/0x210 [ 606.990837][T12215] should_fail.cold+0xa/0x15 [ 606.990855][T12215] ? fault_create_debugfs_attr+0x180/0x180 [ 606.990881][T12215] ? ___might_sleep+0x163/0x2c0 [ 607.023815][T12215] should_fail_alloc_page+0x50/0x60 [ 607.029024][T12215] __alloc_pages_nodemask+0x1a1/0x910 [ 607.034415][T12215] ? __alloc_pages_slowpath+0x2920/0x2920 [ 607.040145][T12215] __vmalloc_node_range+0x2fd/0x810 [ 607.045344][T12215] ? bpf_map_area_alloc+0x20/0x30 [ 607.050382][T12215] __vmalloc_node_flags_caller+0x71/0x90 [ 607.056038][T12215] ? bpf_map_area_alloc+0x20/0x30 [ 607.061623][T12215] __bpf_map_area_alloc+0xde/0xf0 [ 607.066771][T12215] bpf_map_area_alloc+0x20/0x30 [ 607.071883][T12215] htab_map_alloc+0x589/0x11c0 [ 607.076642][T12215] ? __kmalloc+0x608/0x770 [ 607.081085][T12215] ? bpf_get_file_flag+0x80/0x80 [ 607.086051][T12215] ? fput+0x1b/0x20 [ 607.090006][T12215] htab_of_map_alloc+0x71/0x100 [ 607.094901][T12215] ? htab_map_alloc+0x11c0/0x11c0 [ 607.099970][T12215] __do_sys_bpf+0x478/0x3810 [ 607.105359][T12215] ? bpf_prog_load+0x18f0/0x18f0 [ 607.110340][T12215] ? __kasan_check_write+0x14/0x20 [ 607.115547][T12215] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 607.121105][T12215] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 607.126776][T12215] ? wait_for_completion+0x440/0x440 [ 607.132085][T12215] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 607.138473][T12215] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 607.144093][T12215] ? do_syscall_64+0x26/0x790 [ 607.148797][T12215] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 607.154881][T12215] ? do_syscall_64+0x26/0x790 [ 607.159594][T12215] __x64_sys_bpf+0x73/0xb0 [ 607.164014][T12215] do_syscall_64+0xfa/0x790 [ 607.168546][T12215] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 607.174563][T12215] RIP: 0033:0x45a6f9 [ 607.178670][T12215] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 607.198312][T12215] RSP: 002b:00007f3ba2ab9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 607.206745][T12215] RAX: ffffffffffffffda RBX: 00007f3ba2ab9c90 RCX: 000000000045a6f9 [ 607.214716][T12215] RDX: 000000000000002c RSI: 0000000020000400 RDI: 0000000000000000 [ 607.222807][T12215] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 607.230797][T12215] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3ba2aba6d4 19:30:55 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f0000000040)=r0, 0x4) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}}, 0x80, 0x0}, 0xdc05) [ 607.238777][T12215] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000005 19:30:55 executing program 4: perf_event_open(&(0x7f0000000180)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x13f52175744e5178) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="001c949cf6"]) r1 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0), 0x161) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0c0583b, 0x20000001) socket$kcm(0x2, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x0, 0xa9, 0x8, 0x1, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r3, &(0x7f00000000c0), &(0x7f0000000100)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r3, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000040)={r3, &(0x7f0000000340), &(0x7f0000000440)=""/4096}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r3, &(0x7f0000000380)="d104e0daa98520375e62ab019cbd7cbb555873700b62a51e681f80d9d0fb1a6432bf695b347a29376ab5c0ee875ef6d96840e58f72120eebdf5af3d569e034d3d6916d8c0c1fae1e4ce204c0cdfe254b1b8414faf0986875109007f2728ade1c5647150fc022f13f0b39db5a73ec33db13412c56517027e9bde9ca23ca0f330627f50ce24f28663eddc8bcef337d684568ce54d5018d8101da1cd2832eb2216382c5e63ec735850e2e646f48df5e184bf521cacd6e1c5dff06cbe4dc9c28ecc41735315a1cecd16888eff71039487e7375cd58aeaf362ef78785d9fc7b2cca014a6a698de2fb63b28e7b"}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='cpuacct.usage_sys\x00\x84\x1ae\x9bs\x9d\x99\x12\xbc~\x81\xdfY\xb7\xf16\x98Trl\xb8\x0f%\xb4\xfe\xc6^.\xde`\xd8dI\xab', 0x0, 0x0) r4 = socket$kcm(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, 0x0, 0x0) r5 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000001480)=r0, 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f0000001000)='syz0\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x70, 0x0, 0xff, 0x80, 0x6, 0x0, 0x17cd, 0x12000, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000, 0x8}, 0x1, 0xa47a, 0x0, 0x3, 0xe1c, 0x4, 0x5}, r2, 0x7, r6, 0x4) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000540)}, {&(0x7f0000000240)}], 0x2, &(0x7f0000000980)}, 0x2000022) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r7, &(0x7f0000001440)='pids.events\x00', 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000000c0), 0x1802a140) 19:30:55 executing program 2: perf_event_open(&(0x7f0000000780)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000180)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='io.stat\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) r2 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r3, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r3, 0x0, 0xf800000000000000) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x1}, 0x0, 0x9, 0x0, 0x6}, 0x0, 0x13, r3, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x80000001) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000080)=0x9) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='\\De\xdaX\xd3E\xd3?t\xbd\xbf\x00', 0xc3, 0x0) 19:30:55 executing program 0 (fault-call:3 fault-nth:22): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x5, r1, 0x0, [0x305f, 0xa]}, 0x2c) [ 607.480349][T12232] FAULT_INJECTION: forcing a failure. [ 607.480349][T12232] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 607.516839][T12232] CPU: 0 PID: 12232 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 607.525568][T12232] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 607.535632][T12232] Call Trace: [ 607.535661][T12232] dump_stack+0x197/0x210 [ 607.535685][T12232] should_fail.cold+0xa/0x15 [ 607.535707][T12232] ? fault_create_debugfs_attr+0x180/0x180 [ 607.535723][T12232] ? ___might_sleep+0x163/0x2c0 [ 607.535743][T12232] should_fail_alloc_page+0x50/0x60 [ 607.535761][T12232] __alloc_pages_nodemask+0x1a1/0x910 [ 607.547967][T12232] ? __alloc_pages_slowpath+0x2920/0x2920 [ 607.558657][T12232] __vmalloc_node_range+0x2fd/0x810 [ 607.558685][T12232] ? bpf_map_area_alloc+0x20/0x30 [ 607.569329][T12232] __vmalloc_node_flags_caller+0x71/0x90 [ 607.569352][T12232] ? bpf_map_area_alloc+0x20/0x30 [ 607.580296][T12232] __bpf_map_area_alloc+0xde/0xf0 [ 607.591758][T12232] bpf_map_area_alloc+0x20/0x30 [ 607.591773][T12232] htab_map_alloc+0x589/0x11c0 [ 607.591793][T12232] ? __kmalloc+0x608/0x770 [ 607.601842][T12232] ? bpf_get_file_flag+0x80/0x80 [ 607.601864][T12232] ? fput+0x1b/0x20 [ 607.601883][T12232] htab_of_map_alloc+0x71/0x100 [ 607.611564][T12232] ? htab_map_alloc+0x11c0/0x11c0 [ 607.611579][T12232] __do_sys_bpf+0x478/0x3810 [ 607.611598][T12232] ? bpf_prog_load+0x18f0/0x18f0 [ 607.624761][T12232] ? __kasan_check_write+0x14/0x20 [ 607.624780][T12232] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 607.624800][T12232] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 607.624814][T12232] ? wait_for_completion+0x440/0x440 [ 607.624836][T12232] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 607.624861][T12232] ? trace_hardirqs_on_thunk+0x1a/0x1c 19:30:56 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x20}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f000000e780)={&(0x7f000000d380)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f000000e680)=[{&(0x7f000000d400)=""/90, 0x5a}, {&(0x7f000000d480)=""/223, 0xdf}, {&(0x7f000000d580)=""/4096, 0x1000}, {&(0x7f000000e580)=""/232, 0xe8}], 0x4, &(0x7f000000e6c0)=""/138, 0x8a}, 0x60) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000000e7c0)=0xffffffffffffffff, 0x4) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r1, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r1, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) [ 607.634755][T12232] ? do_syscall_64+0x26/0x790 [ 607.634770][T12232] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 607.634782][T12232] ? do_syscall_64+0x26/0x790 [ 607.634810][T12232] __x64_sys_bpf+0x73/0xb0 [ 607.634829][T12232] do_syscall_64+0xfa/0x790 [ 607.644355][T12232] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 607.644366][T12232] RIP: 0033:0x45a6f9 [ 607.644380][T12232] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 607.644387][T12232] RSP: 002b:00007f3ba2ab9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 607.644400][T12232] RAX: ffffffffffffffda RBX: 00007f3ba2ab9c90 RCX: 000000000045a6f9 [ 607.644407][T12232] RDX: 000000000000002c RSI: 0000000020000400 RDI: 0000000000000000 [ 607.644413][T12232] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 607.644421][T12232] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3ba2aba6d4 [ 607.644429][T12232] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000005 19:30:56 executing program 0 (fault-call:3 fault-nth:23): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x5, r1, 0x0, [0x305f, 0xa]}, 0x2c) [ 607.936347][T12251] FAULT_INJECTION: forcing a failure. [ 607.936347][T12251] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 607.955986][T12251] CPU: 0 PID: 12251 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 607.964746][T12251] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 607.974822][T12251] Call Trace: [ 607.978136][T12251] dump_stack+0x197/0x210 [ 607.982500][T12251] should_fail.cold+0xa/0x15 [ 607.987118][T12251] ? fault_create_debugfs_attr+0x180/0x180 [ 607.992955][T12251] ? ___might_sleep+0x163/0x2c0 [ 607.997841][T12251] should_fail_alloc_page+0x50/0x60 [ 608.003062][T12251] __alloc_pages_nodemask+0x1a1/0x910 [ 608.008463][T12251] ? __alloc_pages_slowpath+0x2920/0x2920 [ 608.014237][T12251] __vmalloc_node_range+0x2fd/0x810 [ 608.019560][T12251] ? bpf_map_area_alloc+0x20/0x30 [ 608.024613][T12251] __vmalloc_node_flags_caller+0x71/0x90 [ 608.030268][T12251] ? bpf_map_area_alloc+0x20/0x30 [ 608.035680][T12251] __bpf_map_area_alloc+0xde/0xf0 [ 608.040733][T12251] bpf_map_area_alloc+0x20/0x30 [ 608.045603][T12251] htab_map_alloc+0x589/0x11c0 [ 608.050468][T12251] ? __kmalloc+0x608/0x770 [ 608.054901][T12251] ? bpf_get_file_flag+0x80/0x80 [ 608.059870][T12251] ? fput+0x1b/0x20 [ 608.063695][T12251] htab_of_map_alloc+0x71/0x100 [ 608.068560][T12251] ? htab_map_alloc+0x11c0/0x11c0 [ 608.073610][T12251] __do_sys_bpf+0x478/0x3810 [ 608.078229][T12251] ? bpf_prog_load+0x18f0/0x18f0 [ 608.083195][T12251] ? __kasan_check_write+0x14/0x20 [ 608.088356][T12251] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 608.093920][T12251] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 608.099232][T12251] ? wait_for_completion+0x440/0x440 [ 608.104570][T12251] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 608.110940][T12251] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 608.116513][T12251] ? do_syscall_64+0x26/0x790 [ 608.121210][T12251] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 608.127411][T12251] ? do_syscall_64+0x26/0x790 [ 608.132114][T12251] __x64_sys_bpf+0x73/0xb0 [ 608.136554][T12251] do_syscall_64+0xfa/0x790 [ 608.141083][T12251] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 608.146990][T12251] RIP: 0033:0x45a6f9 [ 608.150907][T12251] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 608.170565][T12251] RSP: 002b:00007f3ba2ab9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 608.178995][T12251] RAX: ffffffffffffffda RBX: 00007f3ba2ab9c90 RCX: 000000000045a6f9 [ 608.186981][T12251] RDX: 000000000000002c RSI: 0000000020000400 RDI: 0000000000000000 [ 608.194987][T12251] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 608.202954][T12251] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3ba2aba6d4 [ 608.210916][T12251] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000005 19:31:04 executing program 1: r0 = socket$kcm(0x2, 0x3, 0x2) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000180)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000200)=[{&(0x7f00000002c0)=""/213, 0xd5}], 0x1}, 0x15120) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000180)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) ioctl$TUNGETVNETHDRSZ(r4, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r4, 0x0, 0xf800000000000000) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r4, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x80000001) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x13, 0x0, &(0x7f0000000080), &(0x7f00000000c0)='syzkaller\x00', 0x3, 0x0, 0x0, 0x21680, 0x1, [], r2, 0x17, r4, 0x8, &(0x7f00000003c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000400)={0x2, 0x6, 0x81}, 0x10, 0xffffffffffffffff}, 0x78) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000040)=r6) 19:31:04 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x20}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f000000e780)={&(0x7f000000d380)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f000000e680)=[{&(0x7f000000d400)=""/90, 0x5a}, {&(0x7f000000d480)=""/223, 0xdf}, {&(0x7f000000d580)=""/4096, 0x1000}, {&(0x7f000000e580)=""/232, 0xe8}], 0x4, &(0x7f000000e6c0)=""/138, 0x8a}, 0x60) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000000e7c0)=0xffffffffffffffff, 0x4) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r1, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r1, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) 19:31:04 executing program 2: r0 = getpid() r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000140)={'team_slave_0\x00'}) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x3, 0x5, 0xa5, 0x0, 0x0, 0x451f587ba3fcddb3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x0, 0x6}, 0x400, 0x8001, 0xfffff800, 0x0, 0x0, 0x1}, r0, 0xffffffffffffffff, r1, 0x8) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1dc, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0xa, 0x6, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='cgroup.type\x00', 0x2, 0x0) setsockopt$sock_attach_bpf(r2, 0x10d, 0xb, &(0x7f0000000000)=r3, 0xfd3e) openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) 19:31:04 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x324) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x5460, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') 19:31:04 executing program 0 (fault-call:3 fault-nth:24): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x5, r1, 0x0, [0x305f, 0xa]}, 0x2c) 19:31:04 executing program 4: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = gettid() r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0x200, 0x80, 0x5, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x0, 0x0, 0x98b, 0x0, 0x2, 0x40, 0x1f}, r0, 0x1, r1, 0x2) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000280)=r0, 0x12) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r3) r4 = perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x20, 0x1f, 0x5, 0x84, 0x0, 0x0, 0x8, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000240), 0x2}, 0x293d6, 0x0, 0x8d, 0x0, 0x2, 0x0, 0x40}, 0xffffffffffffffff, 0x1, r3, 0x9) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r6 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r6, &(0x7f0000000280)={0x0, 0x50, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087715082cf0400b0eb04002800160011000586f9835b3f2f009148790028f85acc7c45", 0x2e}], 0x1}, 0x0) r7 = gettid() r8 = gettid() perf_event_open(&(0x7f0000000380)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000340), 0x4}, 0x4280, 0x2, 0x8a8, 0x0, 0x0, 0x0, 0x3}, r8, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r5, &(0x7f0000000680)=ANY=[@ANYRESDEC=r6, @ANYRES16=0x0, @ANYRESDEC, @ANYRES64, @ANYRESOCT, @ANYRESHEX=r7, @ANYPTR=&(0x7f0000000540)=ANY=[@ANYRES32, @ANYRESDEC=r8, @ANYRES16=0x0, @ANYPTR=&(0x7f0000000400)=ANY=[@ANYRESOCT, @ANYPTR, @ANYPTR, @ANYPTR, @ANYBLOB="dd9a959b4135c61516e3e46115f6c0afb34b5a27589035fe17c82d937884e4d9c156dac79b8287bc300422f6d4f054ab7bfabbf1fbbd985887c8aa93d010056ade32372786695bd10b6fe455aa5f2ed5c0a2017df1da7b1b78f754b816843e4cd9bb0563f63852d06171cc493c0f08514f767f54efd5de2f9d7a05e5"], @ANYRES32]], 0x63) r9 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) write$cgroup_pid(r9, &(0x7f0000000100), 0xda4fff08) openat$cgroup_int(r9, &(0x7f0000000040)='io.max\x00', 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r8, r9, 0x0, 0x14, &(0x7f0000000000)='trusted\xbcwlan1,7++:/\x00', r10}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r4, 0x0, 0x1, &(0x7f0000000080)='\x00'}, 0x30) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r11) setsockopt$sock_attach_bpf(r12, 0x10f, 0x87, &(0x7f0000000180), 0x127) bpf$PROG_LOAD(0x5, 0x0, 0x0) [ 616.345899][T12274] FAULT_INJECTION: forcing a failure. [ 616.345899][T12274] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 616.411976][T12274] CPU: 0 PID: 12274 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 616.420808][T12274] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 616.430985][T12274] Call Trace: [ 616.434281][T12274] dump_stack+0x197/0x210 [ 616.438637][T12274] should_fail.cold+0xa/0x15 [ 616.443765][T12274] ? fault_create_debugfs_attr+0x180/0x180 [ 616.449571][T12274] ? ___might_sleep+0x163/0x2c0 [ 616.454432][T12274] should_fail_alloc_page+0x50/0x60 [ 616.459626][T12274] __alloc_pages_nodemask+0x1a1/0x910 [ 616.464994][T12274] ? __alloc_pages_slowpath+0x2920/0x2920 [ 616.470723][T12274] __vmalloc_node_range+0x2fd/0x810 [ 616.475935][T12274] ? bpf_map_area_alloc+0x20/0x30 [ 616.480951][T12274] __vmalloc_node_flags_caller+0x71/0x90 [ 616.486573][T12274] ? bpf_map_area_alloc+0x20/0x30 [ 616.491604][T12274] __bpf_map_area_alloc+0xde/0xf0 [ 616.496642][T12274] bpf_map_area_alloc+0x20/0x30 [ 616.501488][T12274] htab_map_alloc+0x589/0x11c0 [ 616.506251][T12274] ? __kmalloc+0x608/0x770 [ 616.510660][T12274] ? bpf_get_file_flag+0x80/0x80 [ 616.515593][T12274] ? fput+0x1b/0x20 [ 616.527911][T12274] htab_of_map_alloc+0x71/0x100 [ 616.532852][T12274] ? htab_map_alloc+0x11c0/0x11c0 [ 616.537872][T12274] __do_sys_bpf+0x478/0x3810 [ 616.542718][T12274] ? bpf_prog_load+0x18f0/0x18f0 [ 616.547674][T12274] ? __kasan_check_write+0x14/0x20 [ 616.552825][T12274] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 616.558375][T12274] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 616.563648][T12274] ? wait_for_completion+0x440/0x440 [ 616.568967][T12274] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 616.575216][T12274] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 616.580664][T12274] ? do_syscall_64+0x26/0x790 [ 616.585369][T12274] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 616.591426][T12274] ? do_syscall_64+0x26/0x790 [ 616.596100][T12274] __x64_sys_bpf+0x73/0xb0 [ 616.600515][T12274] do_syscall_64+0xfa/0x790 [ 616.605025][T12274] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 616.610904][T12274] RIP: 0033:0x45a6f9 [ 616.615584][T12274] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 616.635194][T12274] RSP: 002b:00007f3ba2ab9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 616.643601][T12274] RAX: ffffffffffffffda RBX: 00007f3ba2ab9c90 RCX: 000000000045a6f9 [ 616.651575][T12274] RDX: 000000000000002c RSI: 0000000020000400 RDI: 0000000000000000 19:31:05 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x20}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f000000e780)={&(0x7f000000d380)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f000000e680)=[{&(0x7f000000d400)=""/90, 0x5a}, {&(0x7f000000d480)=""/223, 0xdf}, {&(0x7f000000d580)=""/4096, 0x1000}, {&(0x7f000000e580)=""/232, 0xe8}], 0x4, &(0x7f000000e6c0)=""/138, 0x8a}, 0x60) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000000e7c0)=0xffffffffffffffff, 0x4) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r1, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r1, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) 19:31:05 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup(r0, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x1ff) r1 = perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124", 0x12}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10p\x1d9\xae\xb6`\xd8o\xe4\x9b\x8cO;<\xad]\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={0x0, r4, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0xfffffffffffffc34) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) socket$kcm(0x2, 0x0, 0x73) [ 616.659536][T12274] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 616.667680][T12274] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3ba2aba6d4 [ 616.675775][T12274] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000005 19:31:05 executing program 4: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x1, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x5, 0x0, 0x0, 0x41100, 0x8, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0), 0x8, 0x10, &(0x7f0000000100)={0x2, 0x0, 0x8000, 0x7}, 0x10}, 0x78) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(r3, 0x0, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="00d1c427bf"], 0x5) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r4) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r5, &(0x7f0000000500)={&(0x7f0000000280), 0x10, &(0x7f00000002c0)=[{&(0x7f0000001580)="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", 0x46c4}], 0x1}, 0x0) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0x9) 19:31:05 executing program 0 (fault-call:3 fault-nth:25): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x5, r1, 0x0, [0x305f, 0xa]}, 0x2c) [ 617.025018][T12303] FAULT_INJECTION: forcing a failure. [ 617.025018][T12303] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 617.059660][T12303] CPU: 0 PID: 12303 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 617.068402][T12303] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 617.078469][T12303] Call Trace: [ 617.081786][T12303] dump_stack+0x197/0x210 [ 617.086501][T12303] should_fail.cold+0xa/0x15 [ 617.091211][T12303] ? fault_create_debugfs_attr+0x180/0x180 [ 617.097034][T12303] ? ___might_sleep+0x163/0x2c0 [ 617.101918][T12303] should_fail_alloc_page+0x50/0x60 [ 617.107134][T12303] __alloc_pages_nodemask+0x1a1/0x910 [ 617.112621][T12303] ? __alloc_pages_slowpath+0x2920/0x2920 [ 617.118381][T12303] __vmalloc_node_range+0x2fd/0x810 [ 617.123608][T12303] ? bpf_map_area_alloc+0x20/0x30 [ 617.128639][T12303] __vmalloc_node_flags_caller+0x71/0x90 [ 617.134300][T12303] ? bpf_map_area_alloc+0x20/0x30 [ 617.139364][T12303] __bpf_map_area_alloc+0xde/0xf0 [ 617.144430][T12303] bpf_map_area_alloc+0x20/0x30 [ 617.149292][T12303] htab_map_alloc+0x589/0x11c0 [ 617.154061][T12303] ? __kmalloc+0x608/0x770 [ 617.158573][T12303] ? bpf_get_file_flag+0x80/0x80 [ 617.164140][T12303] ? fput+0x1b/0x20 [ 617.167957][T12303] htab_of_map_alloc+0x71/0x100 [ 617.172813][T12303] ? htab_map_alloc+0x11c0/0x11c0 [ 617.177850][T12303] __do_sys_bpf+0x478/0x3810 [ 617.182464][T12303] ? bpf_prog_load+0x18f0/0x18f0 [ 617.187433][T12303] ? __kasan_check_write+0x14/0x20 [ 617.192575][T12303] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 617.198147][T12303] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 617.203450][T12303] ? wait_for_completion+0x440/0x440 [ 617.208751][T12303] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 617.215032][T12303] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 617.220506][T12303] ? do_syscall_64+0x26/0x790 19:31:05 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x12}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) close(r2) r3 = socket$kcm(0x2, 0x2000000000003, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8916, &(0x7f0000000200)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\x02\x00UM\xbf\xef\xa9\xac\x03x\xf4D3A}?\x00\x8b\x9c[\xdd\x14\xa4\n\xf4\x94\xa8>\xb1\xb1\xa2_&') r4 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r4, &(0x7f0000005940)={&(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10, 0x0}, 0x0) close(r3) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) [ 617.225340][T12303] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 617.231430][T12303] ? do_syscall_64+0x26/0x790 [ 617.236139][T12303] __x64_sys_bpf+0x73/0xb0 [ 617.240651][T12303] do_syscall_64+0xfa/0x790 [ 617.245164][T12303] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 617.251074][T12303] RIP: 0033:0x45a6f9 [ 617.254984][T12303] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 19:31:05 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x20}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f000000e780)={&(0x7f000000d380)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f000000e680)=[{&(0x7f000000d400)=""/90, 0x5a}, {&(0x7f000000d480)=""/223, 0xdf}, {&(0x7f000000d580)=""/4096, 0x1000}, {&(0x7f000000e580)=""/232, 0xe8}], 0x4, &(0x7f000000e6c0)=""/138, 0x8a}, 0x60) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r2, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) [ 617.274615][T12303] RSP: 002b:00007f3ba2a98c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 617.283049][T12303] RAX: ffffffffffffffda RBX: 00007f3ba2a98c90 RCX: 000000000045a6f9 [ 617.283059][T12303] RDX: 000000000000002c RSI: 0000000020000400 RDI: 0000000000000000 [ 617.283065][T12303] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 617.283072][T12303] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3ba2a996d4 [ 617.283080][T12303] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000005 [ 617.734224][T12288] device nr0 entered promiscuous mode 19:31:14 executing program 1: r0 = socket$kcm(0x2, 0x3, 0x2) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000180)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000200)=[{&(0x7f00000002c0)=""/213, 0xd5}], 0x1}, 0x15120) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000180)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) ioctl$TUNGETVNETHDRSZ(r4, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r4, 0x0, 0xf800000000000000) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r4, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x80000001) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x13, 0x0, &(0x7f0000000080), &(0x7f00000000c0)='syzkaller\x00', 0x3, 0x0, 0x0, 0x21680, 0x1, [], r2, 0x17, r4, 0x8, &(0x7f00000003c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000400)={0x2, 0x6, 0x81}, 0x10, 0xffffffffffffffff}, 0x78) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000040)=r6) 19:31:14 executing program 0 (fault-call:3 fault-nth:26): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x5, r1, 0x0, [0x305f, 0xa]}, 0x2c) 19:31:14 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x324) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x6364, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') 19:31:14 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x20}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f000000e780)={&(0x7f000000d380)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f000000e680)=[{&(0x7f000000d400)=""/90, 0x5a}, {&(0x7f000000d480)=""/223, 0xdf}, {&(0x7f000000d580)=""/4096, 0x1000}, {&(0x7f000000e580)=""/232, 0xe8}], 0x4, &(0x7f000000e6c0)=""/138, 0x8a}, 0x60) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r2, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) 19:31:14 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000000)={0xa, 0x1ff, 0x4, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r2, &(0x7f0000000340), &(0x7f0000000400)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000c88000)={r2, &(0x7f0000847f95), &(0x7f000089b000)}, 0x20) r3 = bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r3, &(0x7f0000000340), &(0x7f0000000400)}, 0x20) write$cgroup_subtree(r1, &(0x7f0000000600)=ANY=[@ANYPTR=&(0x7f0000000840)=ANY=[@ANYRES16=r2, @ANYBLOB="c820ff993f0770457a43f6f48110dff38fd50e8dc66f424134b7ffa210b9d47bad0c0dd92502496efdc50b88e330938ce139cb2b4fec93e282b4a692388b5f13bc2e349bb4700c1d262780f7ef969cb53dad03392aa78573e94a0d5936193e80bec91ca8780116f5954c25af0fd2e00a7f679b1a581380d359079b"], @ANYPTR, @ANYBLOB="fc2dffe80a90f3c86a1c11c471f9426be683b7486be64df69a82490d1083b5469d9dddfb37b6b58c5e05b84131490655a85b3fde77089313867ddb0a3c8fd592f7c34854da83b39b00f76ec8bfab272a8a7c84ec05056350ea0ff3d76e6ff86cc89875"], 0x73) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x32600) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r5, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r5, 0x6609, 0x0) close(0xffffffffffffffff) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x7, 0x4, 0x0, 0x101}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r6, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={r7}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={r7, 0x5}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000007340)={&(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, 0x0}, 0x2040) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) 19:31:14 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup(r0, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x1ff) r1 = perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124", 0x12}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10p\x1d9\xae\xb6`\xd8o\xe4\x9b\x8cO;<\xad]\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={0x0, r4, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0xfffffffffffffc34) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) socket$kcm(0x2, 0x0, 0x73) [ 625.677768][T12334] FAULT_INJECTION: forcing a failure. [ 625.677768][T12334] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 625.691395][T12334] CPU: 0 PID: 12334 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 625.700082][T12334] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 625.710148][T12334] Call Trace: [ 625.713460][T12334] dump_stack+0x197/0x210 [ 625.717800][T12334] should_fail.cold+0xa/0x15 [ 625.722424][T12334] ? fault_create_debugfs_attr+0x180/0x180 [ 625.728508][T12334] ? ___might_sleep+0x163/0x2c0 [ 625.733385][T12334] should_fail_alloc_page+0x50/0x60 [ 625.738615][T12334] __alloc_pages_nodemask+0x1a1/0x910 [ 625.743999][T12334] ? __alloc_pages_slowpath+0x2920/0x2920 [ 625.749739][T12334] __vmalloc_node_range+0x2fd/0x810 [ 625.754975][T12334] ? bpf_map_area_alloc+0x20/0x30 [ 625.760001][T12334] __vmalloc_node_flags_caller+0x71/0x90 [ 625.765633][T12334] ? bpf_map_area_alloc+0x20/0x30 [ 625.770676][T12334] __bpf_map_area_alloc+0xde/0xf0 [ 625.775705][T12334] bpf_map_area_alloc+0x20/0x30 [ 625.780732][T12334] htab_map_alloc+0x589/0x11c0 [ 625.785490][T12334] ? __kmalloc+0x608/0x770 [ 625.789907][T12334] ? bpf_get_file_flag+0x80/0x80 [ 625.794848][T12334] ? fput+0x1b/0x20 [ 625.798679][T12334] htab_of_map_alloc+0x71/0x100 [ 625.803524][T12334] ? htab_map_alloc+0x11c0/0x11c0 [ 625.808553][T12334] __do_sys_bpf+0x478/0x3810 [ 625.813146][T12334] ? bpf_prog_load+0x18f0/0x18f0 [ 625.818081][T12334] ? __kasan_check_write+0x14/0x20 [ 625.823816][T12334] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 625.829383][T12334] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 625.834692][T12334] ? wait_for_completion+0x440/0x440 [ 625.840011][T12334] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 625.846288][T12334] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 625.851762][T12334] ? do_syscall_64+0x26/0x790 [ 625.856438][T12334] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 625.862766][T12334] ? do_syscall_64+0x26/0x790 [ 625.867991][T12334] __x64_sys_bpf+0x73/0xb0 [ 625.872408][T12334] do_syscall_64+0xfa/0x790 [ 625.876910][T12334] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 625.882797][T12334] RIP: 0033:0x45a6f9 [ 625.887004][T12334] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 625.906606][T12334] RSP: 002b:00007f3ba2ab9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 625.915018][T12334] RAX: ffffffffffffffda RBX: 00007f3ba2ab9c90 RCX: 000000000045a6f9 19:31:14 executing program 0 (fault-call:3 fault-nth:27): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x5, r1, 0x0, [0x305f, 0xa]}, 0x2c) [ 625.922988][T12334] RDX: 000000000000002c RSI: 0000000020000400 RDI: 0000000000000000 [ 625.930960][T12334] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 625.938934][T12334] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3ba2aba6d4 [ 625.946903][T12334] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000005 [ 626.036460][T12340] FAULT_INJECTION: forcing a failure. [ 626.036460][T12340] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 626.098374][T12340] CPU: 1 PID: 12340 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 626.107616][T12340] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 626.118229][T12340] Call Trace: [ 626.122070][T12340] dump_stack+0x197/0x210 [ 626.126522][T12340] should_fail.cold+0xa/0x15 [ 626.131140][T12340] ? fault_create_debugfs_attr+0x180/0x180 [ 626.136983][T12340] ? ___might_sleep+0x163/0x2c0 [ 626.141887][T12340] should_fail_alloc_page+0x50/0x60 [ 626.147105][T12340] __alloc_pages_nodemask+0x1a1/0x910 [ 626.152521][T12340] ? __alloc_pages_slowpath+0x2920/0x2920 [ 626.158277][T12340] __vmalloc_node_range+0x2fd/0x810 [ 626.163514][T12340] ? bpf_map_area_alloc+0x20/0x30 [ 626.168737][T12340] __vmalloc_node_flags_caller+0x71/0x90 [ 626.174671][T12340] ? bpf_map_area_alloc+0x20/0x30 [ 626.179860][T12340] __bpf_map_area_alloc+0xde/0xf0 [ 626.184930][T12340] bpf_map_area_alloc+0x20/0x30 [ 626.189828][T12340] htab_map_alloc+0x589/0x11c0 [ 626.195392][T12340] ? __kmalloc+0x608/0x770 [ 626.199829][T12340] ? bpf_get_file_flag+0x80/0x80 [ 626.204930][T12340] ? fput+0x1b/0x20 [ 626.208861][T12340] htab_of_map_alloc+0x71/0x100 [ 626.213730][T12340] ? htab_map_alloc+0x11c0/0x11c0 [ 626.218787][T12340] __do_sys_bpf+0x478/0x3810 [ 626.223406][T12340] ? bpf_prog_load+0x18f0/0x18f0 [ 626.228392][T12340] ? __kasan_check_write+0x14/0x20 [ 626.233545][T12340] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 626.239295][T12340] ? rcu_read_lock_bh_held+0xb0/0xb0 19:31:14 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e271f60d25b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318e2ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7eaa49c62ba0fe52fa65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd31a08b32808b802000000000000ea334d83239dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc18cae2ed4b4390af9a9ceafd07ed00b000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x20}, 0x10) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r2, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) [ 626.244781][T12340] ? wait_for_completion+0x440/0x440 [ 626.250098][T12340] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 626.256694][T12340] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 626.262187][T12340] ? do_syscall_64+0x26/0x790 [ 626.267052][T12340] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 626.273143][T12340] ? do_syscall_64+0x26/0x790 [ 626.277848][T12340] __x64_sys_bpf+0x73/0xb0 [ 626.282413][T12340] do_syscall_64+0xfa/0x790 [ 626.286949][T12340] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 626.292961][T12340] RIP: 0033:0x45a6f9 [ 626.296880][T12340] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 626.316601][T12340] RSP: 002b:00007f3ba2ab9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 626.316617][T12340] RAX: ffffffffffffffda RBX: 00007f3ba2ab9c90 RCX: 000000000045a6f9 [ 626.316624][T12340] RDX: 000000000000002c RSI: 0000000020000400 RDI: 0000000000000000 [ 626.316630][T12340] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 626.316637][T12340] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3ba2aba6d4 [ 626.316644][T12340] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000005 19:31:15 executing program 0 (fault-call:3 fault-nth:28): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x5, r1, 0x0, [0x305f, 0xa]}, 0x2c) 19:31:15 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x20}, 0x10) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r2, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) 19:31:15 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000000)={0xa, 0x1ff, 0x4, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r2, &(0x7f0000000340), &(0x7f0000000400)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000c88000)={r2, &(0x7f0000847f95), &(0x7f000089b000)}, 0x20) r3 = bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r3, &(0x7f0000000340), &(0x7f0000000400)}, 0x20) write$cgroup_subtree(r1, &(0x7f0000000600)=ANY=[@ANYPTR=&(0x7f0000000840)=ANY=[@ANYRES16=r2, @ANYBLOB="c820ff993f0770457a43f6f48110dff38fd50e8dc66f424134b7ffa210b9d47bad0c0dd92502496efdc50b88e330938ce139cb2b4fec93e282b4a692388b5f13bc2e349bb4700c1d262780f7ef969cb53dad03392aa78573e94a0d5936193e80bec91ca8780116f5954c25af0fd2e00a7f679b1a581380d359079b"], @ANYPTR, @ANYBLOB="fc2dffe80a90f3c86a1c11c471f9426be683b7486be64df69a82490d1083b5469d9dddfb37b6b58c5e05b84131490655a85b3fde77089313867ddb0a3c8fd592f7c34854da83b39b00f76ec8bfab272a8a7c84ec05056350ea0ff3d76e6ff86cc89875"], 0x73) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x32600) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r5, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r5, 0x6609, 0x0) close(0xffffffffffffffff) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x7, 0x4, 0x0, 0x101}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r6, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={r7}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={r7, 0x5}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000007340)={&(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, 0x0}, 0x2040) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x1a0ffffffff) [ 626.550043][T12352] FAULT_INJECTION: forcing a failure. [ 626.550043][T12352] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 626.575205][T12352] CPU: 1 PID: 12352 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 626.583935][T12352] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 626.594009][T12352] Call Trace: [ 626.597330][T12352] dump_stack+0x197/0x210 [ 626.601847][T12352] should_fail.cold+0xa/0x15 [ 626.606479][T12352] ? fault_create_debugfs_attr+0x180/0x180 [ 626.612318][T12352] ? ___might_sleep+0x163/0x2c0 [ 626.617215][T12352] should_fail_alloc_page+0x50/0x60 [ 626.622456][T12352] __alloc_pages_nodemask+0x1a1/0x910 [ 626.627862][T12352] ? __alloc_pages_slowpath+0x2920/0x2920 [ 626.633628][T12352] __vmalloc_node_range+0x2fd/0x810 [ 626.638916][T12352] ? bpf_map_area_alloc+0x20/0x30 [ 626.644010][T12352] __vmalloc_node_flags_caller+0x71/0x90 [ 626.649680][T12352] ? bpf_map_area_alloc+0x20/0x30 [ 626.654754][T12352] __bpf_map_area_alloc+0xde/0xf0 [ 626.659809][T12352] bpf_map_area_alloc+0x20/0x30 [ 626.664688][T12352] htab_map_alloc+0x589/0x11c0 [ 626.669554][T12352] ? __kmalloc+0x608/0x770 [ 626.674079][T12352] ? bpf_get_file_flag+0x80/0x80 [ 626.679041][T12352] ? fput+0x1b/0x20 [ 626.682886][T12352] htab_of_map_alloc+0x71/0x100 [ 626.687820][T12352] ? htab_map_alloc+0x11c0/0x11c0 [ 626.692876][T12352] __do_sys_bpf+0x478/0x3810 [ 626.697503][T12352] ? bpf_prog_load+0x18f0/0x18f0 [ 626.702472][T12352] ? __kasan_check_write+0x14/0x20 [ 626.707615][T12352] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 626.713188][T12352] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 626.718508][T12352] ? wait_for_completion+0x440/0x440 [ 626.723824][T12352] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 626.730152][T12352] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 626.735640][T12352] ? do_syscall_64+0x26/0x790 [ 626.740360][T12352] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 626.746451][T12352] ? do_syscall_64+0x26/0x790 [ 626.751165][T12352] __x64_sys_bpf+0x73/0xb0 [ 626.755613][T12352] do_syscall_64+0xfa/0x790 [ 626.760150][T12352] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 626.766063][T12352] RIP: 0033:0x45a6f9 [ 626.769975][T12352] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 626.789677][T12352] RSP: 002b:00007f3ba2ab9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 626.798110][T12352] RAX: ffffffffffffffda RBX: 00007f3ba2ab9c90 RCX: 000000000045a6f9 [ 626.806100][T12352] RDX: 000000000000002c RSI: 0000000020000400 RDI: 0000000000000000 [ 626.814092][T12352] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 626.822086][T12352] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3ba2aba6d4 [ 626.830075][T12352] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000005 19:31:15 executing program 0 (fault-call:3 fault-nth:29): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x5, r1, 0x0, [0x305f, 0xa]}, 0x2c) [ 627.041212][T12363] FAULT_INJECTION: forcing a failure. [ 627.041212][T12363] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 627.067518][T12363] CPU: 0 PID: 12363 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 627.076254][T12363] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 627.086341][T12363] Call Trace: [ 627.086370][T12363] dump_stack+0x197/0x210 [ 627.086393][T12363] should_fail.cold+0xa/0x15 [ 627.086412][T12363] ? fault_create_debugfs_attr+0x180/0x180 [ 627.086425][T12363] ? ___might_sleep+0x163/0x2c0 [ 627.086449][T12363] should_fail_alloc_page+0x50/0x60 [ 627.086466][T12363] __alloc_pages_nodemask+0x1a1/0x910 [ 627.098761][T12363] ? __alloc_pages_slowpath+0x2920/0x2920 [ 627.125816][T12363] __vmalloc_node_range+0x2fd/0x810 [ 627.131047][T12363] ? bpf_map_area_alloc+0x20/0x30 [ 627.136102][T12363] __vmalloc_node_flags_caller+0x71/0x90 [ 627.141768][T12363] ? bpf_map_area_alloc+0x20/0x30 [ 627.146831][T12363] __bpf_map_area_alloc+0xde/0xf0 [ 627.151879][T12363] bpf_map_area_alloc+0x20/0x30 [ 627.156740][T12363] htab_map_alloc+0x589/0x11c0 [ 627.161609][T12363] ? __kmalloc+0x608/0x770 [ 627.166013][T12363] ? bpf_get_file_flag+0x80/0x80 [ 627.171055][T12363] ? fput+0x1b/0x20 [ 627.174870][T12363] htab_of_map_alloc+0x71/0x100 [ 627.179727][T12363] ? htab_map_alloc+0x11c0/0x11c0 [ 627.184767][T12363] __do_sys_bpf+0x478/0x3810 [ 627.189364][T12363] ? bpf_prog_load+0x18f0/0x18f0 [ 627.194547][T12363] ? __kasan_check_write+0x14/0x20 [ 627.199905][T12363] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 627.205444][T12363] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 627.210851][T12363] ? wait_for_completion+0x440/0x440 [ 627.216155][T12363] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 627.222409][T12363] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 627.227861][T12363] ? do_syscall_64+0x26/0x790 [ 627.232524][T12363] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 627.238589][T12363] ? do_syscall_64+0x26/0x790 [ 627.243259][T12363] __x64_sys_bpf+0x73/0xb0 [ 627.247669][T12363] do_syscall_64+0xfa/0x790 [ 627.252163][T12363] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 627.258058][T12363] RIP: 0033:0x45a6f9 [ 627.262024][T12363] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 627.281716][T12363] RSP: 002b:00007f3ba2ab9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 627.290121][T12363] RAX: ffffffffffffffda RBX: 00007f3ba2ab9c90 RCX: 000000000045a6f9 [ 627.298083][T12363] RDX: 000000000000002c RSI: 0000000020000400 RDI: 0000000000000000 [ 627.306054][T12363] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 627.314010][T12363] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3ba2aba6d4 [ 627.322052][T12363] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000005 19:31:23 executing program 1: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$kcm(0x2, 0x3, 0x2) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000180)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000200)=[{&(0x7f00000002c0)=""/213, 0xd5}], 0x1}, 0x15120) r4 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000180)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) ioctl$TUNGETVNETHDRSZ(r5, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r5, 0x0, 0xf800000000000000) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r5, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r5, 0x2401, 0x80000001) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x13, 0x0, &(0x7f0000000080), &(0x7f00000000c0)='syzkaller\x00', 0x3, 0x0, 0x0, 0x21680, 0x1, [], r3, 0x17, r5, 0x8, &(0x7f00000003c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000400)={0x2, 0x6, 0x81}, 0x10, 0xffffffffffffffff, r0}, 0x78) sendmsg$inet(r1, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r1, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000040)=r7) 19:31:23 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x324) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8901, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') 19:31:23 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x20}, 0x10) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r2, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) 19:31:23 executing program 0 (fault-call:3 fault-nth:30): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x5, r1, 0x0, [0x305f, 0xa]}, 0x2c) 19:31:23 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="57d3c300b919746326937c317eac3400800200007d3089b916a3e377a2c30100000000210000c10c17940013"], 0x0, 0x43}, 0x20) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.\x93sage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) gettid() ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000380)={r2, r2}) r3 = socket$kcm(0x11, 0x6, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e20, @loopback}, 0x2, 0x4, 0x4, 0x1}}, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r1, 0x0, 0x1ff) socket$kcm(0x11, 0x26, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNGETSNDBUF(r4, 0x800454d3, &(0x7f0000000300)) openat$cgroup_int(r4, 0x0, 0x2, 0x0) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffda) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={r1, 0x12, 0x1, 0x100002, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8}, 0x20) socket$kcm(0xa, 0x6, 0x0) close(r5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') r7 = socket$kcm(0x2b, 0x3, 0x0) perf_event_open(&(0x7f0000000440)={0x1, 0xffffffd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x180, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xffff, 0x7}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) recvmsg(r7, &(0x7f00000035c0)={&(0x7f0000002400)=@can={0x1d, 0x0}, 0x80, &(0x7f00000034c0)=[{&(0x7f0000002480)=""/46, 0x2e}, {&(0x7f00000024c0)=""/4096, 0x1000}], 0x2, &(0x7f0000003500)=""/180, 0xb4}, 0x10060) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r9, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x31, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x2, [], r8, 0x7, r9, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffef4}, 0x70) 19:31:23 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup(r0, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x1ff) r1 = perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124", 0x12}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10p\x1d9\xae\xb6`\xd8o\xe4\x9b\x8cO;<\xad]\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={0x0, r4, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0xfffffffffffffc34) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) socket$kcm(0x2, 0x0, 0x73) [ 635.047350][T12381] FAULT_INJECTION: forcing a failure. [ 635.047350][T12381] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 635.073019][T12381] CPU: 1 PID: 12381 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 635.081781][T12381] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 635.091947][T12381] Call Trace: [ 635.095346][T12381] dump_stack+0x197/0x210 [ 635.099715][T12381] should_fail.cold+0xa/0x15 [ 635.104477][T12381] ? fault_create_debugfs_attr+0x180/0x180 [ 635.110405][T12381] ? ___might_sleep+0x163/0x2c0 [ 635.115294][T12381] should_fail_alloc_page+0x50/0x60 [ 635.120630][T12381] __alloc_pages_nodemask+0x1a1/0x910 [ 635.126212][T12381] ? __alloc_pages_slowpath+0x2920/0x2920 [ 635.132290][T12381] __vmalloc_node_range+0x2fd/0x810 [ 635.137861][T12381] ? bpf_map_area_alloc+0x20/0x30 [ 635.144485][T12381] __vmalloc_node_flags_caller+0x71/0x90 [ 635.150308][T12381] ? bpf_map_area_alloc+0x20/0x30 [ 635.155341][T12381] __bpf_map_area_alloc+0xde/0xf0 [ 635.160371][T12381] bpf_map_area_alloc+0x20/0x30 [ 635.166314][T12381] htab_map_alloc+0x589/0x11c0 [ 635.171292][T12381] ? __kmalloc+0x608/0x770 [ 635.175737][T12381] ? bpf_get_file_flag+0x80/0x80 [ 635.180691][T12381] ? fput+0x1b/0x20 [ 635.184509][T12381] htab_of_map_alloc+0x71/0x100 [ 635.189385][T12381] ? htab_map_alloc+0x11c0/0x11c0 [ 635.194718][T12381] __do_sys_bpf+0x478/0x3810 [ 635.199352][T12381] ? bpf_prog_load+0x18f0/0x18f0 [ 635.204306][T12381] ? __kasan_check_write+0x14/0x20 [ 635.209419][T12381] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 635.214980][T12381] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 635.220313][T12381] ? wait_for_completion+0x440/0x440 [ 635.225642][T12381] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 635.231921][T12381] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 635.237410][T12381] ? do_syscall_64+0x26/0x790 [ 635.243072][T12381] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 635.249145][T12381] ? do_syscall_64+0x26/0x790 [ 635.253845][T12381] __x64_sys_bpf+0x73/0xb0 [ 635.258264][T12381] do_syscall_64+0xfa/0x790 [ 635.262774][T12381] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 635.268664][T12381] RIP: 0033:0x45a6f9 [ 635.272557][T12381] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 635.292439][T12381] RSP: 002b:00007f3ba2ab9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 635.300850][T12381] RAX: ffffffffffffffda RBX: 00007f3ba2ab9c90 RCX: 000000000045a6f9 [ 635.308905][T12381] RDX: 000000000000002c RSI: 0000000020000400 RDI: 0000000000000000 [ 635.316875][T12381] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 635.325026][T12381] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3ba2aba6d4 [ 635.333082][T12381] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000005 19:31:24 executing program 0 (fault-call:3 fault-nth:31): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x5, r1, 0x0, [0x305f, 0xa]}, 0x2c) 19:31:24 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x8, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x8}, 0x0, 0x661, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x2, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0xf}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0xc, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000380)={r0}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000740)={r2}) 19:31:24 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r2, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) [ 635.608759][T12393] FAULT_INJECTION: forcing a failure. [ 635.608759][T12393] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 635.631078][T12393] CPU: 1 PID: 12393 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 635.640004][T12393] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 635.650091][T12393] Call Trace: [ 635.653403][T12393] dump_stack+0x197/0x210 [ 635.657748][T12393] should_fail.cold+0xa/0x15 [ 635.662505][T12393] ? fault_create_debugfs_attr+0x180/0x180 [ 635.669031][T12393] ? ___might_sleep+0x163/0x2c0 [ 635.673905][T12393] should_fail_alloc_page+0x50/0x60 [ 635.679719][T12393] __alloc_pages_nodemask+0x1a1/0x910 [ 635.685103][T12393] ? __alloc_pages_slowpath+0x2920/0x2920 [ 635.691215][T12393] __vmalloc_node_range+0x2fd/0x810 [ 635.696639][T12393] ? bpf_map_area_alloc+0x20/0x30 [ 635.702012][T12393] __vmalloc_node_flags_caller+0x71/0x90 [ 635.707903][T12393] ? bpf_map_area_alloc+0x20/0x30 [ 635.712926][T12393] __bpf_map_area_alloc+0xde/0xf0 [ 635.717968][T12393] bpf_map_area_alloc+0x20/0x30 [ 635.722848][T12393] htab_map_alloc+0x589/0x11c0 [ 635.727950][T12393] ? __kmalloc+0x608/0x770 [ 635.732369][T12393] ? bpf_get_file_flag+0x80/0x80 [ 635.737298][T12393] ? fput+0x1b/0x20 [ 635.741103][T12393] htab_of_map_alloc+0x71/0x100 [ 635.746144][T12393] ? htab_map_alloc+0x11c0/0x11c0 [ 635.751268][T12393] __do_sys_bpf+0x478/0x3810 [ 635.756032][T12393] ? bpf_prog_load+0x18f0/0x18f0 [ 635.760973][T12393] ? __kasan_check_write+0x14/0x20 [ 635.766076][T12393] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 635.771823][T12393] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 635.777198][T12393] ? wait_for_completion+0x440/0x440 [ 635.782579][T12393] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 635.788916][T12393] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 635.794970][T12393] ? do_syscall_64+0x26/0x790 [ 635.799635][T12393] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 635.805688][T12393] ? do_syscall_64+0x26/0x790 [ 635.810623][T12393] __x64_sys_bpf+0x73/0xb0 [ 635.815043][T12393] do_syscall_64+0xfa/0x790 [ 635.819621][T12393] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 635.826161][T12393] RIP: 0033:0x45a6f9 [ 635.830045][T12393] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 635.849818][T12393] RSP: 002b:00007f3ba2ab9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 635.858508][T12393] RAX: ffffffffffffffda RBX: 00007f3ba2ab9c90 RCX: 000000000045a6f9 [ 635.866581][T12393] RDX: 000000000000002c RSI: 0000000020000400 RDI: 0000000000000000 [ 635.876206][T12393] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 635.884183][T12393] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3ba2aba6d4 [ 635.892677][T12393] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000005 19:31:24 executing program 0 (fault-call:3 fault-nth:32): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x5, r1, 0x0, [0x305f, 0xa]}, 0x2c) 19:31:24 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x12}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) close(r1) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r2 = socket$kcm(0x2, 0x2000000000003, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8916, &(0x7f0000000200)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\x02\x00UM\xbf\xef\xa9\xac\x03x\xf4D3A}?\x00\x8b\x9c[\xdd\x14\xa4\n\xf4\x94\xa8>\xb1\xb1\xa2_&') gettid() openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x460982, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)={0x0, 0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)}}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r4) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r5, &(0x7f0000000180)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) openat$cgroup_ro(r5, &(0x7f0000000040)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x72ccd11d41a1d3aa) r6 = getpid() r7 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000140)={'team_slave_0\x00'}) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x3, 0x5, 0xa5, 0x0, 0x0, 0x451f587ba3fcddb3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x0, 0x6}, 0x400, 0x8001, 0xfffff800, 0x0, 0x0, 0x1}, r6, 0xffffffffffffffff, r7, 0x8) r8 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r9 = openat$cgroup_ro(r8, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r9, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r9, 0x0, 0xf800000000000000) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r9, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r9, 0x2401, 0x80000001) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x8, 0x0, 0x6, 0x2, 0x0, 0x800, 0x1000, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xc8, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x8000, 0x1, 0x7, 0x0, 0x8, 0x4, 0xf16}, r6, 0x2, r9, 0x6) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[], 0x0}, 0x20) close(r2) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x19, &(0x7f0000000240)='\'vboxnet1--ppp1em1system\x00'}, 0x30) close(r0) [ 636.057312][T12405] FAULT_INJECTION: forcing a failure. [ 636.057312][T12405] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 636.079571][T12405] CPU: 0 PID: 12405 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 636.088362][T12405] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 636.098611][T12405] Call Trace: [ 636.102385][T12405] dump_stack+0x197/0x210 [ 636.102412][T12405] should_fail.cold+0xa/0x15 [ 636.102434][T12405] ? fault_create_debugfs_attr+0x180/0x180 [ 636.102451][T12405] ? ___might_sleep+0x163/0x2c0 [ 636.102475][T12405] should_fail_alloc_page+0x50/0x60 [ 636.102485][T12405] __alloc_pages_nodemask+0x1a1/0x910 [ 636.102505][T12405] ? __alloc_pages_slowpath+0x2920/0x2920 [ 636.102533][T12405] __vmalloc_node_range+0x2fd/0x810 [ 636.144614][T12405] ? bpf_map_area_alloc+0x20/0x30 [ 636.149934][T12405] __vmalloc_node_flags_caller+0x71/0x90 [ 636.156041][T12405] ? bpf_map_area_alloc+0x20/0x30 [ 636.161444][T12405] __bpf_map_area_alloc+0xde/0xf0 [ 636.166874][T12405] bpf_map_area_alloc+0x20/0x30 [ 636.172822][T12405] htab_map_alloc+0x589/0x11c0 [ 636.180213][T12405] ? __kmalloc+0x608/0x770 [ 636.184657][T12405] ? bpf_get_file_flag+0x80/0x80 [ 636.189745][T12405] ? fput+0x1b/0x20 [ 636.189767][T12405] htab_of_map_alloc+0x71/0x100 [ 636.189778][T12405] ? htab_map_alloc+0x11c0/0x11c0 [ 636.189795][T12405] __do_sys_bpf+0x478/0x3810 [ 636.189810][T12405] ? finish_task_switch+0x147/0x750 [ 636.189825][T12405] ? bpf_prog_load+0x18f0/0x18f0 [ 636.189842][T12405] ? __schedule+0x93c/0x1f90 [ 636.189867][T12405] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 636.229522][T12405] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 636.235002][T12405] ? lockdep_hardirqs_on+0x421/0x5e0 [ 636.235024][T12405] ? retint_kernel+0x2b/0x2b [ 636.244937][T12405] ? trace_hardirqs_on_caller+0x6a/0x240 [ 636.250629][T12405] __x64_sys_bpf+0x73/0xb0 [ 636.255102][T12405] do_syscall_64+0xfa/0x790 [ 636.259799][T12405] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 636.266122][T12405] RIP: 0033:0x45a6f9 [ 636.270055][T12405] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 636.289972][T12405] RSP: 002b:00007f3ba2ab9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 636.298688][T12405] RAX: ffffffffffffffda RBX: 00007f3ba2ab9c90 RCX: 000000000045a6f9 [ 636.306677][T12405] RDX: 000000000000002c RSI: 0000000020000400 RDI: 0000000000000000 [ 636.314660][T12405] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 636.322623][T12405] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3ba2aba6d4 [ 636.330637][T12405] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000005 19:31:25 executing program 0 (fault-call:3 fault-nth:33): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x5, r1, 0x0, [0x305f, 0xa]}, 0x2c) [ 636.539132][T12414] FAULT_INJECTION: forcing a failure. [ 636.539132][T12414] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 636.567994][T12414] CPU: 1 PID: 12414 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 636.576728][T12414] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 636.586800][T12414] Call Trace: [ 636.590159][T12414] dump_stack+0x197/0x210 [ 636.594526][T12414] should_fail.cold+0xa/0x15 [ 636.599155][T12414] ? fault_create_debugfs_attr+0x180/0x180 [ 636.605160][T12414] ? ___might_sleep+0x163/0x2c0 [ 636.610019][T12414] should_fail_alloc_page+0x50/0x60 [ 636.615253][T12414] __alloc_pages_nodemask+0x1a1/0x910 [ 636.620623][T12414] ? __alloc_pages_slowpath+0x2920/0x2920 [ 636.626399][T12414] __vmalloc_node_range+0x2fd/0x810 [ 636.631595][T12414] ? bpf_map_area_alloc+0x20/0x30 [ 636.636625][T12414] __vmalloc_node_flags_caller+0x71/0x90 [ 636.642261][T12414] ? bpf_map_area_alloc+0x20/0x30 [ 636.647284][T12414] __bpf_map_area_alloc+0xde/0xf0 [ 636.652301][T12414] bpf_map_area_alloc+0x20/0x30 [ 636.657178][T12414] htab_map_alloc+0x589/0x11c0 [ 636.661950][T12414] ? __kmalloc+0x608/0x770 [ 636.666360][T12414] ? bpf_get_file_flag+0x80/0x80 [ 636.671287][T12414] ? fput+0x1b/0x20 [ 636.675105][T12414] htab_of_map_alloc+0x71/0x100 [ 636.679987][T12414] ? htab_map_alloc+0x11c0/0x11c0 [ 636.685029][T12414] __do_sys_bpf+0x478/0x3810 [ 636.689620][T12414] ? bpf_prog_load+0x18f0/0x18f0 [ 636.694595][T12414] ? __kasan_check_write+0x14/0x20 [ 636.699718][T12414] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 636.705275][T12414] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 636.710829][T12414] ? wait_for_completion+0x440/0x440 [ 636.716121][T12414] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 636.722358][T12414] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 636.727823][T12414] ? do_syscall_64+0x26/0x790 [ 636.732810][T12414] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 636.738893][T12414] ? do_syscall_64+0x26/0x790 [ 636.743570][T12414] __x64_sys_bpf+0x73/0xb0 [ 636.747994][T12414] do_syscall_64+0xfa/0x790 [ 636.752610][T12414] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 636.759509][T12414] RIP: 0033:0x45a6f9 [ 636.763486][T12414] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 636.783189][T12414] RSP: 002b:00007f3ba2ab9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 636.791610][T12414] RAX: ffffffffffffffda RBX: 00007f3ba2ab9c90 RCX: 000000000045a6f9 [ 636.799569][T12414] RDX: 000000000000002c RSI: 0000000020000400 RDI: 0000000000000000 [ 636.807532][T12414] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 636.815488][T12414] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3ba2aba6d4 [ 636.823448][T12414] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000005 19:31:32 executing program 1: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$kcm(0x2, 0x3, 0x2) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000180)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000200)=[{&(0x7f00000002c0)=""/213, 0xd5}], 0x1}, 0x15120) r4 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000180)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) ioctl$TUNGETVNETHDRSZ(r5, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r5, 0x0, 0xf800000000000000) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r5, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r5, 0x2401, 0x80000001) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x13, 0x0, &(0x7f0000000080), &(0x7f00000000c0)='syzkaller\x00', 0x3, 0x0, 0x0, 0x21680, 0x1, [], r3, 0x17, r5, 0x8, &(0x7f00000003c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000400)={0x2, 0x6, 0x81}, 0x10, 0xffffffffffffffff, r0}, 0x78) sendmsg$inet(r1, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r1, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000040)=r7) 19:31:32 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r1, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r1, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) 19:31:32 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup(r0, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x1ff) r1 = perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000027000500d25a80648c63940d0124", 0x12}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iyn\ft:\xe1\xbb\xd3[\x17\f\x10p\x1d9\xae\xb6`\xd8o\xe4\x9b\x8cO;<\xad]\x90+[-l\xfd\n\xbc\xf5\xd7\r\xf3\xfd5.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={0x0, r4, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0xfffffffffffffc34) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) socket$kcm(0x2, 0x0, 0x73) 19:31:32 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x324) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8902, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') 19:31:32 executing program 0 (fault-call:3 fault-nth:34): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x5, r1, 0x0, [0x305f, 0xa]}, 0x2c) 19:31:32 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002740)='cpuacct.usage_sys\x00', 0x0, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r2, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r2, 0x0, 0xf800000000000000) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x80000001) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000002780)=r2) r3 = socket$kcm(0x2b, 0x1, 0x0) sendmsg$kcm(r3, &(0x7f0000002700)={&(0x7f0000001440)=@rxrpc=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x4e22, @loopback}}, 0x80, &(0x7f00000024c0)=[{&(0x7f00000014c0)="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", 0x1000}], 0x1, &(0x7f0000002500)=[{0x98, 0xff, 0x7, "ccb42ae079861dec42874996e20c9134815fc2023fce86d8f4adf776b321a94214b0ad0829beffac0a5bcd0e675028f98c2cb61f352576de20384fb28c6750ce493d5965e62a2a21046f0c30239ad03421073414edacefbea617b7e2ecefcaec7b97c43c5f14447161b3698ac90215c914526619a869da6656841c306394d9d442ebd1be49d9"}, {0x20, 0x88, 0x2, "dd47580b62a488b1a62497c05f"}, {0xd8, 0xc7982d13560f6a7b, 0x80000001, "9cd1cd37c780f78e5c680df0c58a65b201ab3f84d0d847327b27ffb73691b3a62ccbafd675c39570a9d1a2c6084d3dbd410b610665823aef31752aeb61a464722d5b2a66d371df51ce5110f3a0a1b6f68760c24ed00cba06687654c23eddfe9fc1552d60cb076809fc5db2401d34e3f28540e237a176f35b878a6df912517ca92657abe032a0a3f37fb5cbc399e8dee22eaba1855908f695bcd9e5ec1112dbd8a69dde8124c4d13b00fdabf74fda69356369aa095311d788672728f944e2754f116121"}, {0x40, 0x118, 0x7, "fef4711981f16969f5ac520a4f6fe2d950fdf3a5056742f70a403ed8c538e20f96fd7ce8b32a49178d"}], 0x1d0}, 0x404c904) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = getpid() r5 = perf_event_open(&(0x7f0000001380)={0x4, 0x70, 0x1, 0x0, 0x58, 0x3, 0x0, 0x3, 0x80, 0x9, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x675, 0x4, @perf_bp={&(0x7f0000001340), 0x1}, 0x20000, 0x7fff, 0x7, 0x0, 0x4, 0x1, 0x81}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x40, 0x5, 0x5, 0x0, 0x0, 0x8000, 0x81010, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, @perf_bp={&(0x7f0000001280), 0x1}, 0x820, 0xfff, 0x5, 0x8, 0x9, 0x5, 0x8}, r4, 0x9, r5, 0x2) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000180)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000180)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) r8 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r9 = openat$cgroup_ro(r8, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r9, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r9, 0x0, 0xf800000000000000) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r9, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r9, 0x2401, 0x80000001) r10 = perf_event_open$cgroup(&(0x7f0000001200)={0x2, 0x70, 0xe1, 0x81, 0x1, 0xba, 0x0, 0x81, 0x4425, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000080), 0x10}, 0x1000, 0xff, 0x1, 0x7, 0x8, 0x800}, r7, 0x2, r9, 0x4) perf_event_open$cgroup(&(0x7f0000000100)={0x2, 0x70, 0x7, 0x9d, 0x6, 0xc, 0x0, 0x6, 0x24010, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x7, 0x5, @perf_bp={&(0x7f0000000040), 0xc}, 0x10000, 0x9, 0x4, 0x5, 0xbc, 0x40}, r6, 0x3, r10, 0x96fc28588b1c60bd) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000061115800000000009562228500690000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r11 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r11, &(0x7f0000000180)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) openat$cgroup(r11, &(0x7f0000001400)='syz0\x00', 0x200002, 0x0) [ 644.314411][T12429] FAULT_INJECTION: forcing a failure. [ 644.314411][T12429] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 644.339482][T12429] CPU: 0 PID: 12429 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 644.348232][T12429] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 644.348240][T12429] Call Trace: [ 644.348264][T12429] dump_stack+0x197/0x210 [ 644.348289][T12429] should_fail.cold+0xa/0x15 [ 644.348310][T12429] ? fault_create_debugfs_attr+0x180/0x180 [ 644.348326][T12429] ? ___might_sleep+0x163/0x2c0 [ 644.348352][T12429] should_fail_alloc_page+0x50/0x60 [ 644.348366][T12429] __alloc_pages_nodemask+0x1a1/0x910 [ 644.348386][T12429] ? __alloc_pages_slowpath+0x2920/0x2920 [ 644.348415][T12429] __vmalloc_node_range+0x2fd/0x810 [ 644.348443][T12429] ? bpf_map_area_alloc+0x20/0x30 [ 644.348464][T12429] __vmalloc_node_flags_caller+0x71/0x90 [ 644.370842][T12429] ? bpf_map_area_alloc+0x20/0x30 [ 644.370862][T12429] __bpf_map_area_alloc+0xde/0xf0 [ 644.370877][T12429] bpf_map_area_alloc+0x20/0x30 [ 644.370895][T12429] htab_map_alloc+0x589/0x11c0 [ 644.433573][T12429] ? __kmalloc+0x608/0x770 [ 644.437995][T12429] ? bpf_get_file_flag+0x80/0x80 [ 644.442939][T12429] ? fput+0x1b/0x20 [ 644.446756][T12429] htab_of_map_alloc+0x71/0x100 [ 644.451706][T12429] ? htab_map_alloc+0x11c0/0x11c0 [ 644.456814][T12429] __do_sys_bpf+0x478/0x3810 [ 644.461397][T12429] ? bpf_prog_load+0x18f0/0x18f0 [ 644.466343][T12429] ? __kasan_check_write+0x14/0x20 [ 644.471572][T12429] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 644.477121][T12429] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 644.482429][T12429] ? wait_for_completion+0x440/0x440 [ 644.487988][T12429] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 644.495338][T12429] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 644.500926][T12429] ? do_syscall_64+0x26/0x790 [ 644.505629][T12429] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 644.511702][T12429] ? do_syscall_64+0x26/0x790 [ 644.516393][T12429] __x64_sys_bpf+0x73/0xb0 [ 644.521101][T12429] do_syscall_64+0xfa/0x790 [ 644.525784][T12429] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 644.531681][T12429] RIP: 0033:0x45a6f9 [ 644.535669][T12429] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 644.556969][T12429] RSP: 002b:00007f3ba2ab9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 19:31:33 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x247, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000000002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000380)) r1 = perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x70, 0x9, 0x0, 0x4, 0x0, 0x0, 0x7, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x81, 0x0, @perf_config_ext={0x6, 0x9}, 0x2, 0x7ff, 0x12f, 0x4, 0x6, 0x3f, 0x100}, r0, 0x0, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000300)='memory.events\x00') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc020660b, 0x400178) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xff0b}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x1800000000000060, 0xe80, 0xfffffffffffffe64, &(0x7f0000000100)="0000003f0000007e5bc5795eca003f080000000000000000ffff08", 0x0, 0x100, 0xf2ffffff, 0xfffffe0c, 0xfffffffffffffe05, &(0x7f0000000280)="f2a134bd13c7bd41a2a738ad8e7625ed330eb46063bd287d832698132e59ef45f8f50845c0ac85604b448e24348e4ae93e68238b7b9d561b349d19b5f5784e031c55c5a4e48926a1526e38640a161fab39732052ee83bc3b9cb625962f3eaf1ed426e6f0442693c16b0ab6a89a5738f5bccd6ae1492f8471a7afec6b", &(0x7f0000000380)="712ae01ebf877f139c8f1b0fcd056310bfa3de7157976d3ff4c82f2e0d1885774c5b7c7c853e5424fbf469ab0726e9f41208f98d20b093ddbb7f52e015b875cea2900b2443348cdf466c18cfae89ce96f0437cb21ca3703f0b94273c7500"/106}, 0x28) 19:31:33 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r1, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r1, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) [ 644.565425][T12429] RAX: ffffffffffffffda RBX: 00007f3ba2ab9c90 RCX: 000000000045a6f9 [ 644.573437][T12429] RDX: 000000000000002c RSI: 0000000020000400 RDI: 0000000000000000 [ 644.581424][T12429] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 644.589408][T12429] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3ba2aba6d4 [ 644.597401][T12429] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000005 19:31:33 executing program 0 (fault-call:3 fault-nth:35): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x5, r1, 0x0, [0x305f, 0xa]}, 0x2c) 19:31:33 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r1, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r1, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) [ 644.808211][T12448] FAULT_INJECTION: forcing a failure. [ 644.808211][T12448] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 644.859605][T12448] CPU: 1 PID: 12448 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 644.868342][T12448] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 644.878493][T12448] Call Trace: [ 644.881830][T12448] dump_stack+0x197/0x210 [ 644.881858][T12448] should_fail.cold+0xa/0x15 [ 644.881881][T12448] ? fault_create_debugfs_attr+0x180/0x180 [ 644.881898][T12448] ? ___might_sleep+0x163/0x2c0 [ 644.881922][T12448] should_fail_alloc_page+0x50/0x60 [ 644.906958][T12448] __alloc_pages_nodemask+0x1a1/0x910 [ 644.912368][T12448] ? __alloc_pages_slowpath+0x2920/0x2920 [ 644.918143][T12448] __vmalloc_node_range+0x2fd/0x810 [ 644.923385][T12448] ? bpf_map_area_alloc+0x20/0x30 [ 644.928439][T12448] __vmalloc_node_flags_caller+0x71/0x90 [ 644.928457][T12448] ? bpf_map_area_alloc+0x20/0x30 [ 644.928474][T12448] __bpf_map_area_alloc+0xde/0xf0 [ 644.928492][T12448] bpf_map_area_alloc+0x20/0x30 [ 644.928508][T12448] htab_map_alloc+0x589/0x11c0 [ 644.928519][T12448] ? __kmalloc+0x608/0x770 [ 644.928540][T12448] ? bpf_get_file_flag+0x80/0x80 [ 644.963451][T12448] ? fput+0x1b/0x20 [ 644.967282][T12448] htab_of_map_alloc+0x71/0x100 [ 644.972139][T12448] ? htab_map_alloc+0x11c0/0x11c0 [ 644.972157][T12448] __do_sys_bpf+0x478/0x3810 [ 644.972177][T12448] ? bpf_prog_load+0x18f0/0x18f0 [ 644.972192][T12448] ? __kasan_check_write+0x14/0x20 [ 644.972214][T12448] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 644.997501][T12448] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 645.002817][T12448] ? wait_for_completion+0x440/0x440 [ 645.008119][T12448] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 645.008153][T12448] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 645.008174][T12448] ? do_syscall_64+0x26/0x790 [ 645.024539][T12448] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 645.030640][T12448] ? do_syscall_64+0x26/0x790 [ 645.035424][T12448] __x64_sys_bpf+0x73/0xb0 [ 645.039853][T12448] do_syscall_64+0xfa/0x790 [ 645.039875][T12448] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 645.039891][T12448] RIP: 0033:0x45a6f9 19:31:33 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r2, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) [ 645.055295][T12448] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 645.075002][T12448] RSP: 002b:00007f3ba2ab9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 645.075018][T12448] RAX: ffffffffffffffda RBX: 00007f3ba2ab9c90 RCX: 000000000045a6f9 [ 645.075025][T12448] RDX: 000000000000002c RSI: 0000000020000400 RDI: 0000000000000000 [ 645.075032][T12448] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 645.075039][T12448] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3ba2aba6d4 [ 645.075055][T12448] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000005 19:31:33 executing program 0 (fault-call:3 fault-nth:36): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x5, r1, 0x0, [0x305f, 0xa]}, 0x2c) [ 645.389135][T12461] FAULT_INJECTION: forcing a failure. [ 645.389135][T12461] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 645.417896][T12461] CPU: 1 PID: 12461 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 645.426723][T12461] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 645.437402][T12461] Call Trace: [ 645.440724][T12461] dump_stack+0x197/0x210 [ 645.445129][T12461] should_fail.cold+0xa/0x15 [ 645.449847][T12461] ? fault_create_debugfs_attr+0x180/0x180 [ 645.455682][T12461] ? ___might_sleep+0x163/0x2c0 [ 645.460552][T12461] should_fail_alloc_page+0x50/0x60 [ 645.465935][T12461] __alloc_pages_nodemask+0x1a1/0x910 [ 645.471321][T12461] ? __alloc_pages_slowpath+0x2920/0x2920 [ 645.477147][T12461] __vmalloc_node_range+0x2fd/0x810 [ 645.482343][T12461] ? bpf_map_area_alloc+0x20/0x30 [ 645.488233][T12461] __vmalloc_node_flags_caller+0x71/0x90 [ 645.493856][T12461] ? bpf_map_area_alloc+0x20/0x30 [ 645.498885][T12461] __bpf_map_area_alloc+0xde/0xf0 [ 645.503897][T12461] bpf_map_area_alloc+0x20/0x30 [ 645.508736][T12461] htab_map_alloc+0x589/0x11c0 [ 645.513508][T12461] ? __kmalloc+0x608/0x770 [ 645.517978][T12461] ? bpf_get_file_flag+0x80/0x80 [ 645.522943][T12461] ? fput+0x1b/0x20 [ 645.526763][T12461] htab_of_map_alloc+0x71/0x100 [ 645.531602][T12461] ? htab_map_alloc+0x11c0/0x11c0 [ 645.536792][T12461] __do_sys_bpf+0x478/0x3810 [ 645.541381][T12461] ? bpf_prog_load+0x18f0/0x18f0 [ 645.546312][T12461] ? __kasan_check_write+0x14/0x20 [ 645.551687][T12461] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 645.557233][T12461] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 645.562510][T12461] ? wait_for_completion+0x440/0x440 [ 645.567804][T12461] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 645.574146][T12461] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 645.579690][T12461] ? do_syscall_64+0x26/0x790 [ 645.584387][T12461] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 645.590440][T12461] ? do_syscall_64+0x26/0x790 [ 645.595112][T12461] __x64_sys_bpf+0x73/0xb0 [ 645.599525][T12461] do_syscall_64+0xfa/0x790 [ 645.604024][T12461] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 645.609914][T12461] RIP: 0033:0x45a6f9 [ 645.613799][T12461] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 645.633579][T12461] RSP: 002b:00007f3ba2ab9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 645.641987][T12461] RAX: ffffffffffffffda RBX: 00007f3ba2ab9c90 RCX: 000000000045a6f9 [ 645.649956][T12461] RDX: 000000000000002c RSI: 0000000020000400 RDI: 0000000000000000 [ 645.657920][T12461] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 645.666326][T12461] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3ba2aba6d4 [ 645.675299][T12461] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000005 19:31:42 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e271f60d25b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318e2ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7eaa49c62ba0fe52fa65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd31a08b32808b802000000000000ea334d83239dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc18cae2ed4b4390af9a9ceafd07ed00b000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r2, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) 19:31:42 executing program 1: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$kcm(0x2, 0x3, 0x2) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000180)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000200)=[{&(0x7f00000002c0)=""/213, 0xd5}], 0x1}, 0x15120) r4 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000180)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) ioctl$TUNGETVNETHDRSZ(r5, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r5, 0x0, 0xf800000000000000) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r5, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r5, 0x2401, 0x80000001) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x13, 0x0, &(0x7f0000000080), &(0x7f00000000c0)='syzkaller\x00', 0x3, 0x0, 0x0, 0x21680, 0x1, [], r3, 0x17, r5, 0x8, &(0x7f00000003c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000400)={0x2, 0x6, 0x81}, 0x10, 0xffffffffffffffff, r0}, 0x78) sendmsg$inet(r1, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r1, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000040)=r7) 19:31:42 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="850000004f0000003f00000000000000950000e600000000002ce85fbf62c21eb4d98183dd3c429de1c9486c70bfaa1243267d558865039af316a920c7e2b2ca81dde11ccf869c0d8d4add1f02645b52cd5fa052ac6f1ce71eb092d6aa8833238d4a939203656e384b45145c2ebc8b27040c493814ee51d4bcfc9ed7070afb5b5a17ff386243a11b2d2c53115d3c8e4c565bb4f9d3a29971f06cf45869c081787f6260b6f21854551f5ed4dac7a39847d928f5f33da8637f00c589cac9b859f624db94a7a9dd6187c46f63615afef93d594e53beebf5ae0ea05ad7af1c5072d32e37ef675a80f4729390d8b2ce649ffd2193b8e0c7c92f01909e61ed54e3b8757b7d43f4e593620ec1dd6ef2d2204c7db1b7c75e765f9cd1cb5334"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x5, 0x47, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r1, &(0x7f0000000540), &(0x7f0000000140)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r1, &(0x7f0000000000), &(0x7f0000000340), 0x1}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r1, &(0x7f0000000340)="2ee640ebb525860177a6f3b3645544f7f125a4af841a7953e22f84185b12aba908201cf2759c8677f246ab717dd60491126e844c7e94d0ccd01223f480a20d3d438ad0e8b8427a6c820851e393d9d961506ee1892c7470f3aaeeaa49878758372528d009cacf1747f56861d1cb2ba3eac51bbc638fa275674f380ddc1b4c90a39af37335c2f17d9ba7929d4252b0622e988bc91bbb48e0d9afac59de23e8f21fdf14d49280dafb4dd8d4c1be81f1baf445737df2aa3e0014642ca3122e92e272609c14144a0b51c839b562daf42dca81c670d852", &(0x7f0000000440)="c997c2302f06feb4e429ac04e02aed7e27d0941ccde49f764cb9397576e7af1c9c22e0bbac784d4425894d3b3f3fa1cdf47f4621fe78ebd35fbaa777837b5a8ba188c068c7bc056347bd7077c9219cb0b501fa6500a65949734352983a00b320ebb05bcbf7564847fa6135cea0c3b5e53cbeba48847558392827e92a9738af10b3c6101f00b9f5d9d004c8", 0x2}, 0x20) 19:31:42 executing program 0 (fault-call:3 fault-nth:37): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x5, r1, 0x0, [0x305f, 0xa]}, 0x2c) 19:31:42 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x381040, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) socketpair$unix(0x1, 0x5, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000340)}, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1dc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0xb66bfbb84210dff4, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$kcm(0xa, 0x0, 0x11) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000440)=ANY=[@ANYBLOB="c100000000000000000000000000f06ce1a37c514899245b6f592fc9e59a7ce26b7155f548300a260c66367662bf4b5f420cd6a60c4d68f3673ac059ea17ee8b90e92259acbbed6227e0f15c0899cde8a80d1d92f44e15c2ab092a8f9ed04f0be183d07fd7b7ee33ddb3a06aacb5aad74b807cb28657a49e12574e030c0d6bbe0dc6dde723eedbac60160dd9c659a58e0d38e03538d4474e447519d85bce44462b4e1d5fb3b3feb1cf4596"]) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x7, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000180)=@xdp={0x2c, 0x8, 0x0, 0x37}, 0x80, 0x0}, 0x647037b2cbd0c1d7) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00'}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0xb1}, {0x6}]}) 19:31:42 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x324) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8903, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') [ 653.696323][T12477] FAULT_INJECTION: forcing a failure. [ 653.696323][T12477] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 653.770724][T12477] CPU: 1 PID: 12477 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 653.779478][T12477] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 653.779485][T12477] Call Trace: [ 653.779510][T12477] dump_stack+0x197/0x210 [ 653.779536][T12477] should_fail.cold+0xa/0x15 [ 653.779559][T12477] ? fault_create_debugfs_attr+0x180/0x180 [ 653.779580][T12477] ? ___might_sleep+0x163/0x2c0 [ 653.812516][T12477] should_fail_alloc_page+0x50/0x60 [ 653.817989][T12477] __alloc_pages_nodemask+0x1a1/0x910 [ 653.824434][T12477] ? __alloc_pages_slowpath+0x2920/0x2920 [ 653.830202][T12477] __vmalloc_node_range+0x2fd/0x810 [ 653.830227][T12477] ? bpf_map_area_alloc+0x20/0x30 [ 653.830246][T12477] __vmalloc_node_flags_caller+0x71/0x90 [ 653.846092][T12477] ? bpf_map_area_alloc+0x20/0x30 [ 653.846112][T12477] __bpf_map_area_alloc+0xde/0xf0 [ 653.846130][T12477] bpf_map_area_alloc+0x20/0x30 [ 653.846146][T12477] htab_map_alloc+0x589/0x11c0 [ 653.846158][T12477] ? __kmalloc+0x608/0x770 19:31:42 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r2, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) 19:31:42 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x5, 0x47, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r1, &(0x7f0000000540), &(0x7f0000000140)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r1, &(0x7f0000000000), &(0x7f0000000340), 0x1}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r1, &(0x7f0000000340)="2ee640ebb525860177a6f3b3645544f7f125a4af841a7953e22f84185b12aba908201cf2759c8677f246ab717dd60491126e844c7e94d0ccd01223f480a20d3d438ad0e8b8427a6c820851e393d9d961506ee1892c7470f3aaeeaa49878758372528d009cacf1747f56861d1cb2ba3eac51bbc638fa275674f380ddc1b4c90a39af37335c2f17d9ba7929d4252b0622e988bc91bbb48e0d9afac59de23e8f21fdf14d49280dafb4dd8d4c1be81f1baf445737df2aa3e0014642ca3122e92e272609c14144a0b51c839b562daf42dca81c670d852", &(0x7f0000000440)="c997c2302f06feb4e429ac04e02aed7e27d0941ccde49f764cb9397576e7af1c9c22e0bbac784d4425894d3b3f3fa1cdf47f4621fe78ebd35fbaa777837b5a8ba188c068c7bc056347bd7077c9219cb0b501fa6500a65949734352983a00b320ebb05bcbf7564847fa6135cea0c3b5e53cbeba48847558392827e92a9738af10b3c6101f00b9f5d9d004c8", 0x2}, 0x20) [ 653.846173][T12477] ? bpf_get_file_flag+0x80/0x80 [ 653.846195][T12477] ? fput+0x1b/0x20 [ 653.846220][T12477] htab_of_map_alloc+0x71/0x100 [ 653.856273][T12477] ? htab_map_alloc+0x11c0/0x11c0 [ 653.856289][T12477] __do_sys_bpf+0x478/0x3810 [ 653.856307][T12477] ? bpf_prog_load+0x18f0/0x18f0 [ 653.856321][T12477] ? __kasan_check_write+0x14/0x20 [ 653.856338][T12477] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 653.856354][T12477] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 653.856372][T12477] ? wait_for_completion+0x440/0x440 19:31:42 executing program 0 (fault-call:3 fault-nth:38): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x5, r1, 0x0, [0x305f, 0xa]}, 0x2c) [ 653.856394][T12477] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 653.856425][T12477] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 653.856440][T12477] ? do_syscall_64+0x26/0x790 [ 653.856459][T12477] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 653.875397][T12477] ? do_syscall_64+0x26/0x790 [ 653.875421][T12477] __x64_sys_bpf+0x73/0xb0 [ 653.875439][T12477] do_syscall_64+0xfa/0x790 [ 653.875459][T12477] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 653.875477][T12477] RIP: 0033:0x45a6f9 [ 653.889128][T12477] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 653.889138][T12477] RSP: 002b:00007f3ba2ab9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 653.889154][T12477] RAX: ffffffffffffffda RBX: 00007f3ba2ab9c90 RCX: 000000000045a6f9 [ 653.889162][T12477] RDX: 000000000000002c RSI: 0000000020000400 RDI: 0000000000000000 [ 653.889171][T12477] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 653.889178][T12477] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3ba2aba6d4 [ 653.889194][T12477] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000005 19:31:42 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x5, 0x47, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r1, &(0x7f0000000540), &(0x7f0000000140)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r1, &(0x7f0000000000), &(0x7f0000000340), 0x1}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r1, &(0x7f0000000340)="2ee640ebb525860177a6f3b3645544f7f125a4af841a7953e22f84185b12aba908201cf2759c8677f246ab717dd60491126e844c7e94d0ccd01223f480a20d3d438ad0e8b8427a6c820851e393d9d961506ee1892c7470f3aaeeaa49878758372528d009cacf1747f56861d1cb2ba3eac51bbc638fa275674f380ddc1b4c90a39af37335c2f17d9ba7929d4252b0622e988bc91bbb48e0d9afac59de23e8f21fdf14d49280dafb4dd8d4c1be81f1baf445737df2aa3e0014642ca3122e92e272609c14144a0b51c839b562daf42dca81c670d852", &(0x7f0000000440)="c997c2302f06feb4e429ac04e02aed7e27d0941ccde49f764cb9397576e7af1c9c22e0bbac784d4425894d3b3f3fa1cdf47f4621fe78ebd35fbaa777837b5a8ba188c068c7bc056347bd7077c9219cb0b501fa6500a65949734352983a00b320ebb05bcbf7564847fa6135cea0c3b5e53cbeba48847558392827e92a9738af10b3c6101f00b9f5d9d004c8", 0x2}, 0x20) 19:31:42 executing program 5: perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e271f60d25b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318e2ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7eaa49c62ba0fe52fa65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd31a08b32808b802000000000000ea334d83239dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc18cae2ed4b4390af9a9ceafd07ed00b000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r2, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) [ 654.227023][T12488] FAULT_INJECTION: forcing a failure. [ 654.227023][T12488] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 654.241129][T12488] CPU: 1 PID: 12488 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 654.249820][T12488] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 654.249827][T12488] Call Trace: [ 654.249850][T12488] dump_stack+0x197/0x210 [ 654.249873][T12488] should_fail.cold+0xa/0x15 [ 654.249894][T12488] ? fault_create_debugfs_attr+0x180/0x180 [ 654.249908][T12488] ? ___might_sleep+0x163/0x2c0 [ 654.249931][T12488] should_fail_alloc_page+0x50/0x60 [ 654.249945][T12488] __alloc_pages_nodemask+0x1a1/0x910 [ 654.249962][T12488] ? __alloc_pages_slowpath+0x2920/0x2920 [ 654.249994][T12488] __vmalloc_node_range+0x2fd/0x810 [ 654.250017][T12488] ? bpf_map_area_alloc+0x20/0x30 [ 654.309533][T12488] __vmalloc_node_flags_caller+0x71/0x90 [ 654.315155][T12488] ? bpf_map_area_alloc+0x20/0x30 [ 654.320253][T12488] __bpf_map_area_alloc+0xde/0xf0 [ 654.325272][T12488] bpf_map_area_alloc+0x20/0x30 [ 654.330110][T12488] htab_map_alloc+0x589/0x11c0 [ 654.334880][T12488] ? __kmalloc+0x608/0x770 [ 654.339296][T12488] ? bpf_get_file_flag+0x80/0x80 [ 654.344492][T12488] ? fput+0x1b/0x20 [ 654.348290][T12488] htab_of_map_alloc+0x71/0x100 [ 654.353126][T12488] ? htab_map_alloc+0x11c0/0x11c0 [ 654.358143][T12488] __do_sys_bpf+0x478/0x3810 [ 654.362724][T12488] ? bpf_prog_load+0x18f0/0x18f0 [ 654.367658][T12488] ? __kasan_check_write+0x14/0x20 [ 654.372774][T12488] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 654.378576][T12488] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 654.383863][T12488] ? wait_for_completion+0x440/0x440 [ 654.389224][T12488] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 654.395457][T12488] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 654.400983][T12488] ? do_syscall_64+0x26/0x790 [ 654.405643][T12488] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 654.411695][T12488] ? do_syscall_64+0x26/0x790 [ 654.416366][T12488] __x64_sys_bpf+0x73/0xb0 [ 654.421293][T12488] do_syscall_64+0xfa/0x790 [ 654.425783][T12488] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 654.431675][T12488] RIP: 0033:0x45a6f9 [ 654.435555][T12488] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 654.455240][T12488] RSP: 002b:00007f3ba2ab9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 654.464349][T12488] RAX: ffffffffffffffda RBX: 00007f3ba2ab9c90 RCX: 000000000045a6f9 19:31:43 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x5, 0x47, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r1, &(0x7f0000000540), &(0x7f0000000140)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r1, &(0x7f0000000000), &(0x7f0000000340), 0x1}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r1, &(0x7f0000000340)="2ee640ebb525860177a6f3b3645544f7f125a4af841a7953e22f84185b12aba908201cf2759c8677f246ab717dd60491126e844c7e94d0ccd01223f480a20d3d438ad0e8b8427a6c820851e393d9d961506ee1892c7470f3aaeeaa49878758372528d009cacf1747f56861d1cb2ba3eac51bbc638fa275674f380ddc1b4c90a39af37335c2f17d9ba7929d4252b0622e988bc91bbb48e0d9afac59de23e8f21fdf14d49280dafb4dd8d4c1be81f1baf445737df2aa3e0014642ca3122e92e272609c14144a0b51c839b562daf42dca81c670d852", &(0x7f0000000440)="c997c2302f06feb4e429ac04e02aed7e27d0941ccde49f764cb9397576e7af1c9c22e0bbac784d4425894d3b3f3fa1cdf47f4621fe78ebd35fbaa777837b5a8ba188c068c7bc056347bd7077c9219cb0b501fa6500a65949734352983a00b320ebb05bcbf7564847fa6135cea0c3b5e53cbeba48847558392827e92a9738af10b3c6101f00b9f5d9d004c8", 0x2}, 0x20) [ 654.472314][T12488] RDX: 000000000000002c RSI: 0000000020000400 RDI: 0000000000000000 [ 654.480293][T12488] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 654.488286][T12488] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3ba2aba6d4 [ 654.496274][T12488] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000005 19:31:43 executing program 5: perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r2, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) 19:31:49 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x0, 0x48, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x2, 0x3, 0x2) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000180)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000200)=[{&(0x7f00000002c0)=""/213, 0xd5}], 0x1}, 0x15120) r4 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000180)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) ioctl$TUNGETVNETHDRSZ(r5, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r5, 0x0, 0xf800000000000000) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r5, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r5, 0x2401, 0x80000001) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x13, 0x0, &(0x7f0000000080), &(0x7f00000000c0)='syzkaller\x00', 0x3, 0x0, 0x0, 0x21680, 0x1, [], r3, 0x17, r5, 0x8, &(0x7f00000003c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000400)={0x2, 0x6, 0x81}, 0x10, 0xffffffffffffffff, r0}, 0x78) sendmsg$inet(r1, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r1, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000040)=r7) 19:31:49 executing program 0 (fault-call:3 fault-nth:39): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x5, r1, 0x0, [0x305f, 0xa]}, 0x2c) 19:31:49 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x324) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8904, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') 19:31:49 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x5, 0x47, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r1, &(0x7f0000000540), &(0x7f0000000140)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r1, &(0x7f0000000000), &(0x7f0000000340), 0x1}, 0x20) 19:31:49 executing program 5: perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r2, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) 19:31:49 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz0\x00', 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) r1 = socket$kcm(0x2b, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="1c0000002b00050ad22780648c6394fb0107fc001007b84002410200", 0x1c}], 0x1}, 0x800) [ 660.949947][T12526] FAULT_INJECTION: forcing a failure. [ 660.949947][T12526] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 660.963534][T12526] CPU: 1 PID: 12526 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 660.972225][T12526] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 660.982298][T12526] Call Trace: [ 660.985599][T12526] dump_stack+0x197/0x210 [ 660.989928][T12526] should_fail.cold+0xa/0x15 [ 660.994523][T12526] ? fault_create_debugfs_attr+0x180/0x180 [ 661.000321][T12526] ? ___might_sleep+0x163/0x2c0 [ 661.005182][T12526] should_fail_alloc_page+0x50/0x60 [ 661.010380][T12526] __alloc_pages_nodemask+0x1a1/0x910 [ 661.015744][T12526] ? __alloc_pages_slowpath+0x2920/0x2920 [ 661.021488][T12526] __vmalloc_node_range+0x2fd/0x810 [ 661.026803][T12526] ? bpf_map_area_alloc+0x20/0x30 [ 661.031836][T12526] __vmalloc_node_flags_caller+0x71/0x90 [ 661.037662][T12526] ? bpf_map_area_alloc+0x20/0x30 [ 661.043031][T12526] __bpf_map_area_alloc+0xde/0xf0 [ 661.048045][T12526] bpf_map_area_alloc+0x20/0x30 [ 661.053284][T12526] htab_map_alloc+0x589/0x11c0 [ 661.058047][T12526] ? __kmalloc+0x608/0x770 [ 661.062457][T12526] ? bpf_get_file_flag+0x80/0x80 [ 661.067431][T12526] ? fput+0x1b/0x20 [ 661.071248][T12526] htab_of_map_alloc+0x71/0x100 [ 661.076086][T12526] ? htab_map_alloc+0x11c0/0x11c0 [ 661.081111][T12526] __do_sys_bpf+0x478/0x3810 [ 661.085706][T12526] ? bpf_prog_load+0x18f0/0x18f0 [ 661.091081][T12526] ? __kasan_check_write+0x14/0x20 [ 661.096223][T12526] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 661.102328][T12526] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 661.107731][T12526] ? wait_for_completion+0x440/0x440 [ 661.113322][T12526] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 661.119615][T12526] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 661.125078][T12526] ? do_syscall_64+0x26/0x790 [ 661.129767][T12526] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 661.135997][T12526] ? do_syscall_64+0x26/0x790 [ 661.140668][T12526] __x64_sys_bpf+0x73/0xb0 [ 661.145094][T12526] do_syscall_64+0xfa/0x790 [ 661.149879][T12526] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 661.156236][T12526] RIP: 0033:0x45a6f9 [ 661.160845][T12526] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 661.180832][T12526] RSP: 002b:00007f3ba2ab9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 661.189349][T12526] RAX: ffffffffffffffda RBX: 00007f3ba2ab9c90 RCX: 000000000045a6f9 19:31:49 executing program 0 (fault-call:3 fault-nth:40): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x5, r1, 0x0, [0x305f, 0xa]}, 0x2c) [ 661.197432][T12526] RDX: 000000000000002c RSI: 0000000020000400 RDI: 0000000000000000 [ 661.205544][T12526] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 661.213523][T12526] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3ba2aba6d4 [ 661.221514][T12526] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000005 19:31:49 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="53400600ffffffff18000000080000000100000020000000c0bac4ffffffffff"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251, 0x100, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0xa}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xa}, 0x10}, 0x78) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r2, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r2, 0x0, 0xf800000000000000) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x80000001) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r3, &(0x7f0000000180)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) r4 = openat$cgroup(r3, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, r2, 0xd}, 0x231) mkdirat$cgroup(r0, &(0x7f00000000c0)='syz1\x00', 0x1ff) [ 661.338126][T12537] FAULT_INJECTION: forcing a failure. [ 661.338126][T12537] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 661.398532][T12537] CPU: 1 PID: 12537 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 661.407269][T12537] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 661.417474][T12537] Call Trace: [ 661.420799][T12537] dump_stack+0x197/0x210 [ 661.425430][T12537] should_fail.cold+0xa/0x15 [ 661.430050][T12537] ? fault_create_debugfs_attr+0x180/0x180 [ 661.435887][T12537] ? ___might_sleep+0x163/0x2c0 [ 661.435917][T12537] should_fail_alloc_page+0x50/0x60 [ 661.435932][T12537] __alloc_pages_nodemask+0x1a1/0x910 [ 661.435952][T12537] ? __alloc_pages_slowpath+0x2920/0x2920 [ 661.446034][T12537] __vmalloc_node_range+0x2fd/0x810 [ 661.446064][T12537] ? bpf_map_area_alloc+0x20/0x30 [ 661.467513][T12537] __vmalloc_node_flags_caller+0x71/0x90 [ 661.473185][T12537] ? bpf_map_area_alloc+0x20/0x30 [ 661.478244][T12537] __bpf_map_area_alloc+0xde/0xf0 [ 661.483303][T12537] bpf_map_area_alloc+0x20/0x30 [ 661.488182][T12537] htab_map_alloc+0x589/0x11c0 [ 661.492967][T12537] ? __kmalloc+0x608/0x770 [ 661.497416][T12537] ? bpf_get_file_flag+0x80/0x80 [ 661.502393][T12537] ? fput+0x1b/0x20 [ 661.506289][T12537] htab_of_map_alloc+0x71/0x100 [ 661.511551][T12537] ? htab_map_alloc+0x11c0/0x11c0 [ 661.516770][T12537] __do_sys_bpf+0x478/0x3810 [ 661.521399][T12537] ? bpf_prog_load+0x18f0/0x18f0 [ 661.526374][T12537] ? __kasan_check_write+0x14/0x20 [ 661.531492][T12537] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 661.537046][T12537] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 661.542333][T12537] ? wait_for_completion+0x440/0x440 [ 661.547616][T12537] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 661.553951][T12537] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 661.559470][T12537] ? do_syscall_64+0x26/0x790 [ 661.564145][T12537] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 661.570204][T12537] ? do_syscall_64+0x26/0x790 [ 661.575051][T12537] __x64_sys_bpf+0x73/0xb0 [ 661.579457][T12537] do_syscall_64+0xfa/0x790 [ 661.583951][T12537] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 661.589831][T12537] RIP: 0033:0x45a6f9 [ 661.593750][T12537] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 661.613353][T12537] RSP: 002b:00007f3ba2ab9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 661.621756][T12537] RAX: ffffffffffffffda RBX: 00007f3ba2ab9c90 RCX: 000000000045a6f9 [ 661.629917][T12537] RDX: 000000000000002c RSI: 0000000020000400 RDI: 0000000000000000 [ 661.637884][T12537] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 19:31:50 executing program 2: socket$kcm(0x10, 0x2, 0x10) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00080022008151e00f80ecdb4cb904044865160b000f0010000000000004140e000a0002000000dc2976d153b4", 0x2e}], 0x1, 0x0, 0x328}, 0x20000080) 19:31:50 executing program 5: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r2, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) 19:31:50 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x5, 0x47, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r1, &(0x7f0000000540), &(0x7f0000000140)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r1, &(0x7f0000000000), &(0x7f0000000340), 0x1}, 0x20) [ 661.645859][T12537] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3ba2aba6d4 [ 661.653833][T12537] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000005 19:31:50 executing program 0 (fault-call:3 fault-nth:41): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x5, r1, 0x0, [0x305f, 0xa]}, 0x2c) [ 661.839852][T12556] FAULT_INJECTION: forcing a failure. [ 661.839852][T12556] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 661.861162][T12556] CPU: 1 PID: 12556 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 661.872669][T12556] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 661.883374][T12556] Call Trace: [ 661.886690][T12556] dump_stack+0x197/0x210 [ 661.891068][T12556] should_fail.cold+0xa/0x15 [ 661.895693][T12556] ? fault_create_debugfs_attr+0x180/0x180 [ 661.901529][T12556] ? ___might_sleep+0x163/0x2c0 [ 661.906416][T12556] should_fail_alloc_page+0x50/0x60 [ 661.911654][T12556] __alloc_pages_nodemask+0x1a1/0x910 [ 661.917028][T12556] ? __alloc_pages_slowpath+0x2920/0x2920 [ 661.917058][T12556] __vmalloc_node_range+0x2fd/0x810 [ 661.917079][T12556] ? bpf_map_area_alloc+0x20/0x30 [ 661.917092][T12556] __vmalloc_node_flags_caller+0x71/0x90 [ 661.917104][T12556] ? bpf_map_area_alloc+0x20/0x30 [ 661.917122][T12556] __bpf_map_area_alloc+0xde/0xf0 [ 661.948989][T12556] bpf_map_area_alloc+0x20/0x30 [ 661.953863][T12556] htab_map_alloc+0x589/0x11c0 [ 661.958837][T12556] ? __kmalloc+0x608/0x770 [ 661.963247][T12556] ? bpf_get_file_flag+0x80/0x80 [ 661.968191][T12556] ? fput+0x1b/0x20 [ 661.971989][T12556] htab_of_map_alloc+0x71/0x100 [ 661.976826][T12556] ? htab_map_alloc+0x11c0/0x11c0 [ 661.981893][T12556] __do_sys_bpf+0x478/0x3810 [ 661.986476][T12556] ? bpf_prog_load+0x18f0/0x18f0 [ 661.991415][T12556] ? __kasan_check_write+0x14/0x20 [ 661.996517][T12556] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 662.002059][T12556] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 662.007334][T12556] ? wait_for_completion+0x440/0x440 [ 662.012618][T12556] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 662.019105][T12556] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 662.024573][T12556] ? do_syscall_64+0x26/0x790 [ 662.029281][T12556] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 662.035486][T12556] ? do_syscall_64+0x26/0x790 [ 662.040193][T12556] __x64_sys_bpf+0x73/0xb0 [ 662.044635][T12556] do_syscall_64+0xfa/0x790 [ 662.049149][T12556] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 662.055054][T12556] RIP: 0033:0x45a6f9 [ 662.058962][T12556] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 662.078763][T12556] RSP: 002b:00007f3ba2ab9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 662.087544][T12556] RAX: ffffffffffffffda RBX: 00007f3ba2ab9c90 RCX: 000000000045a6f9 [ 662.095605][T12556] RDX: 000000000000002c RSI: 0000000020000400 RDI: 0000000000000000 [ 662.103580][T12556] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 662.111550][T12556] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3ba2aba6d4 [ 662.119535][T12556] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000005 19:31:59 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x5, 0x47, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r1, &(0x7f0000000540), &(0x7f0000000140)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r1, &(0x7f0000000000), &(0x7f0000000340), 0x1}, 0x20) 19:31:59 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x0, 0x48, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x2, 0x3, 0x2) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000180)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000200)=[{&(0x7f00000002c0)=""/213, 0xd5}], 0x1}, 0x15120) r4 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000180)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) ioctl$TUNGETVNETHDRSZ(r5, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r5, 0x0, 0xf800000000000000) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r5, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r5, 0x2401, 0x80000001) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x13, 0x0, &(0x7f0000000080), &(0x7f00000000c0)='syzkaller\x00', 0x3, 0x0, 0x0, 0x21680, 0x1, [], r3, 0x17, r5, 0x8, &(0x7f00000003c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000400)={0x2, 0x6, 0x81}, 0x10, 0xffffffffffffffff, r0}, 0x78) sendmsg$inet(r1, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r1, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000040)=r7) 19:31:59 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xc, 0x3, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x35}}, &(0x7f0000000140)='Q7\\$', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={0xffffffffffffffff, r0, 0x11}, 0x10) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg$kcm(r1, &(0x7f0000001800)={&(0x7f0000000300)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, 0x80, &(0x7f0000001680)=[{&(0x7f0000000380)=""/204, 0xcc}, {&(0x7f0000000480)=""/88, 0x58}, {&(0x7f0000000080)=""/9, 0x9}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000001500)=""/44, 0x2c}, {&(0x7f0000001540)=""/214, 0xfffffffffffffeb8}, {&(0x7f0000001640)=""/19, 0x13}], 0x7, &(0x7f0000001700)=""/198, 0xc6}, 0x1) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x1, &(0x7f0000000040)=@raw=[@ldst={0x1, 0x0, 0x1, 0x0, 0x3, 0xfffffffffffffff0}], 0x0, 0x7, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000240)={0x0, 0x2, 0x5, 0x1f}, 0x10}, 0x78) 19:31:59 executing program 0 (fault-call:3 fault-nth:42): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x5, r1, 0x0, [0x305f, 0xa]}, 0x2c) 19:31:59 executing program 5: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e271f60d25b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318e2ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7eaa49c62ba0fe52fa65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd31a08b32808b802000000000000ea334d83239dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc18cae2ed4b4390af9a9ceafd07ed00b000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r2, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) 19:31:59 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x324) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8906, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') 19:31:59 executing program 2: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe70, &(0x7f0000000ec0), 0x0, 0x0, 0x0, 0x9080}, 0x80000) getpid() perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000017540)={0x0, 0x0, &(0x7f0000017480)=[{0x0, 0x41d}, {&(0x7f00000172c0)=""/140, 0x8c}, {&(0x7f0000017380)=""/200, 0xa3}], 0x3, &(0x7f00000174c0)=""/69, 0xfffffffffffffcdb}, 0x2) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8009}, 0x0, 0x0, 0xfffffffd, 0x4, 0x0, 0x0, 0xfffc}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0xa) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x12}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000300)='cpuacct\x00\x00segw\xad\r\x16_per\xe4d\x96Z\xf5\x19Q#\x00\x00\xfd|\x19D\xcf.\xff\xff\xff\x7f\xff\xff\xff\xff1\x03\xbf\xeb(\x1c\x05\x1em\xdb;\x01\xbc\x1f\xc4\x11\xfc%\t3V\xc8hn\x1a\x9f\x91\x82Y\x1a\xf3\xfd\xd3c\x96r\xfb\"U\x1b\n\x95\xbe\xf0\x04\x03t\xa2\xa3iRM;', 0x7a05, 0x1700) write$cgroup_pid(r3, &(0x7f0000000000), 0x10000000d) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000400)='memory.swap.current\x00\xca\xbe\x93\aC4\xf3\xddz\f\xaf\xcfv\xb1\xbfN\xd2\x9f\xd5\xee[J', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0xc020662a, 0x20000000) ioctl$TUNGETSNDBUF(r5, 0x800454d3, &(0x7f0000000080)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000500)=ANY=[], 0x0) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f0000000380)={0x0, 0x0}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) close(r1) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8916, &(0x7f0000000200)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\x02\x00UM\xbf\xef\xa9\xac\x03x\xf4D3A}?\x00\x8b\x9c[\xdd\x14\xa4\n\xf4\x94\xa8>\xb1\xb1\xa2_&') close(0xffffffffffffffff) close(r0) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0xc020662a, 0x20000000) openat$cgroup_ro(r6, 0x0, 0x7a05, 0x1700) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) [ 670.484927][T12570] FAULT_INJECTION: forcing a failure. [ 670.484927][T12570] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 670.520274][T12570] CPU: 1 PID: 12570 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 670.529135][T12570] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 670.539314][T12570] Call Trace: [ 670.542637][T12570] dump_stack+0x197/0x210 [ 670.546985][T12570] should_fail.cold+0xa/0x15 [ 670.551571][T12570] ? fault_create_debugfs_attr+0x180/0x180 [ 670.557379][T12570] ? ___might_sleep+0x163/0x2c0 [ 670.562232][T12570] should_fail_alloc_page+0x50/0x60 [ 670.567452][T12570] __alloc_pages_nodemask+0x1a1/0x910 [ 670.572831][T12570] ? __alloc_pages_slowpath+0x2920/0x2920 [ 670.578552][T12570] __vmalloc_node_range+0x2fd/0x810 [ 670.583752][T12570] ? bpf_map_area_alloc+0x20/0x30 [ 670.588788][T12570] __vmalloc_node_flags_caller+0x71/0x90 [ 670.594425][T12570] ? bpf_map_area_alloc+0x20/0x30 [ 670.599438][T12570] __bpf_map_area_alloc+0xde/0xf0 [ 670.604452][T12570] bpf_map_area_alloc+0x20/0x30 [ 670.609315][T12570] htab_map_alloc+0x589/0x11c0 [ 670.614078][T12570] ? __kmalloc+0x608/0x770 [ 670.618483][T12570] ? bpf_get_file_flag+0x80/0x80 [ 670.623420][T12570] ? fput+0x1b/0x20 [ 670.627227][T12570] htab_of_map_alloc+0x71/0x100 [ 670.632116][T12570] ? htab_map_alloc+0x11c0/0x11c0 [ 670.637331][T12570] __do_sys_bpf+0x478/0x3810 [ 670.641936][T12570] ? bpf_prog_load+0x18f0/0x18f0 [ 670.646902][T12570] ? __kasan_check_write+0x14/0x20 [ 670.652036][T12570] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 670.657837][T12570] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 670.663115][T12570] ? wait_for_completion+0x440/0x440 [ 670.668396][T12570] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 670.674653][T12570] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 670.680141][T12570] ? do_syscall_64+0x26/0x790 [ 670.684821][T12570] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 670.690904][T12570] ? do_syscall_64+0x26/0x790 [ 670.696460][T12570] __x64_sys_bpf+0x73/0xb0 [ 670.700903][T12570] do_syscall_64+0xfa/0x790 [ 670.705409][T12570] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 670.711293][T12570] RIP: 0033:0x45a6f9 [ 670.715199][T12570] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 670.735051][T12570] RSP: 002b:00007f3ba2ab9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 670.743447][T12570] RAX: ffffffffffffffda RBX: 00007f3ba2ab9c90 RCX: 000000000045a6f9 [ 670.751403][T12570] RDX: 000000000000002c RSI: 0000000020000400 RDI: 0000000000000000 [ 670.759375][T12570] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 670.767349][T12570] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3ba2aba6d4 [ 670.775308][T12570] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000005 19:31:59 executing program 5: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r2, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) 19:31:59 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x5, 0x47, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r1, &(0x7f0000000540), &(0x7f0000000140)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r1, &(0x7f0000000340)="2ee640ebb525860177a6f3b3645544f7f125a4af841a7953e22f84185b12aba908201cf2759c8677f246ab717dd60491126e844c7e94d0ccd01223f480a20d3d438ad0e8b8427a6c820851e393d9d961506ee1892c7470f3aaeeaa49878758372528d009cacf1747f56861d1cb2ba3eac51bbc638fa275674f380ddc1b4c90a39af37335c2f17d9ba7929d4252b0622e988bc91bbb48e0d9afac59de23e8f21fdf14d49280dafb4dd8d4c1be81f1baf445737df2aa3e0014642ca3122e92e272609c14144a0b51c839b562daf42dca81c670d852", &(0x7f0000000440)="c997c2302f06feb4e429ac04e02aed7e27d0941ccde49f764cb9397576e7af1c9c22e0bbac784d4425894d3b3f3fa1cdf47f4621fe78ebd35fbaa777837b5a8ba188c068c7bc056347bd7077c9219cb0b501fa6500a65949734352983a00b320ebb05bcbf7564847fa6135cea0c3b5e53cbeba48847558392827e92a9738af10b3c6101f00b9f5d9d004c8", 0x2}, 0x20) 19:31:59 executing program 0 (fault-call:3 fault-nth:43): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x5, r1, 0x0, [0x305f, 0xa]}, 0x2c) 19:31:59 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x5, 0x47, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r1, &(0x7f0000000340)="2ee640ebb525860177a6f3b3645544f7f125a4af841a7953e22f84185b12aba908201cf2759c8677f246ab717dd60491126e844c7e94d0ccd01223f480a20d3d438ad0e8b8427a6c820851e393d9d961506ee1892c7470f3aaeeaa49878758372528d009cacf1747f56861d1cb2ba3eac51bbc638fa275674f380ddc1b4c90a39af37335c2f17d9ba7929d4252b0622e988bc91bbb48e0d9afac59de23e8f21fdf14d49280dafb4dd8d4c1be81f1baf445737df2aa3e0014642ca3122e92e272609c14144a0b51c839b562daf42dca81c670d852", &(0x7f0000000440)="c997c2302f06feb4e429ac04e02aed7e27d0941ccde49f764cb9397576e7af1c9c22e0bbac784d4425894d3b3f3fa1cdf47f4621fe78ebd35fbaa777837b5a8ba188c068c7bc056347bd7077c9219cb0b501fa6500a65949734352983a00b320ebb05bcbf7564847fa6135cea0c3b5e53cbeba48847558392827e92a9738af10b3c6101f00b9f5d9d004c8", 0x2}, 0x20) 19:31:59 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r2, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) [ 671.152962][T12592] FAULT_INJECTION: forcing a failure. [ 671.152962][T12592] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 671.216128][T12592] CPU: 0 PID: 12592 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 671.224993][T12592] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 671.235241][T12592] Call Trace: [ 671.238602][T12592] dump_stack+0x197/0x210 [ 671.242980][T12592] should_fail.cold+0xa/0x15 [ 671.247596][T12592] ? fault_create_debugfs_attr+0x180/0x180 [ 671.253579][T12592] ? ___might_sleep+0x163/0x2c0 [ 671.258558][T12592] should_fail_alloc_page+0x50/0x60 [ 671.263818][T12592] __alloc_pages_nodemask+0x1a1/0x910 [ 671.270348][T12592] ? __alloc_pages_slowpath+0x2920/0x2920 [ 671.276220][T12592] __vmalloc_node_range+0x2fd/0x810 [ 671.276245][T12592] ? bpf_map_area_alloc+0x20/0x30 [ 671.276258][T12592] __vmalloc_node_flags_caller+0x71/0x90 [ 671.276271][T12592] ? bpf_map_area_alloc+0x20/0x30 [ 671.276285][T12592] __bpf_map_area_alloc+0xde/0xf0 [ 671.276307][T12592] bpf_map_area_alloc+0x20/0x30 [ 671.286603][T12592] htab_map_alloc+0x589/0x11c0 [ 671.286615][T12592] ? __kmalloc+0x608/0x770 [ 671.286627][T12592] ? bpf_get_file_flag+0x80/0x80 [ 671.286648][T12592] ? fput+0x1b/0x20 [ 671.286667][T12592] htab_of_map_alloc+0x71/0x100 [ 671.286678][T12592] ? htab_map_alloc+0x11c0/0x11c0 [ 671.286691][T12592] __do_sys_bpf+0x478/0x3810 [ 671.286710][T12592] ? bpf_prog_load+0x18f0/0x18f0 [ 671.286723][T12592] ? __kasan_check_write+0x14/0x20 [ 671.286740][T12592] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 671.286754][T12592] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 671.286770][T12592] ? wait_for_completion+0x440/0x440 [ 671.286789][T12592] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 671.286815][T12592] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 671.383279][T12592] ? do_syscall_64+0x26/0x790 [ 671.388262][T12592] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 671.394611][T12592] ? do_syscall_64+0x26/0x790 [ 671.399334][T12592] __x64_sys_bpf+0x73/0xb0 [ 671.403890][T12592] do_syscall_64+0xfa/0x790 [ 671.408499][T12592] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 671.414494][T12592] RIP: 0033:0x45a6f9 [ 671.418445][T12592] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 671.438328][T12592] RSP: 002b:00007f3ba2ab9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 671.447001][T12592] RAX: ffffffffffffffda RBX: 00007f3ba2ab9c90 RCX: 000000000045a6f9 [ 671.455390][T12592] RDX: 000000000000002c RSI: 0000000020000400 RDI: 0000000000000000 19:31:59 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000340)="2ee640ebb525860177a6f3b3645544f7f125a4af841a7953e22f84185b12aba908201cf2759c8677f246ab717dd60491126e844c7e94d0ccd01223f480a20d3d438ad0e8b8427a6c820851e393d9d961506ee1892c7470f3aaeeaa49878758372528d009cacf1747f56861d1cb2ba3eac51bbc638fa275674f380ddc1b4c90a39af37335c2f17d9ba7929d4252b0622e988bc91bbb48e0d9afac59de23e8f21fdf14d49280dafb4dd8d4c1be81f1baf445737df2aa3e0014642ca3122e92e272609c14144a0b51c839b562daf42dca81c670d852", &(0x7f0000000440)="c997c2302f06feb4e429ac04e02aed7e27d0941ccde49f764cb9397576e7af1c9c22e0bbac784d4425894d3b3f3fa1cdf47f4621fe78ebd35fbaa777837b5a8ba188c068c7bc056347bd7077c9219cb0b501fa6500a65949734352983a00b320ebb05bcbf7564847fa6135cea0c3b5e53cbeba48847558392827e92a9738af10b3c6101f00b9f5d9d004c8", 0x2}, 0x20) [ 671.464213][T12592] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 671.472871][T12592] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3ba2aba6d4 [ 671.481697][T12592] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000005 19:32:09 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x2, 0x3, 0x2) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000180)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000200)=[{&(0x7f00000002c0)=""/213, 0xd5}], 0x1}, 0x15120) r4 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000180)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) ioctl$TUNGETVNETHDRSZ(r5, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r5, 0x0, 0xf800000000000000) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r5, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r5, 0x2401, 0x80000001) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x13, 0x0, &(0x7f0000000080), &(0x7f00000000c0)='syzkaller\x00', 0x3, 0x0, 0x0, 0x21680, 0x1, [], r3, 0x17, r5, 0x8, &(0x7f00000003c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000400)={0x2, 0x6, 0x81}, 0x10, 0xffffffffffffffff, r0}, 0x78) sendmsg$inet(r1, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r1, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000040)=r7) 19:32:09 executing program 0 (fault-call:3 fault-nth:44): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x5, r1, 0x0, [0x305f, 0xa]}, 0x2c) 19:32:09 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000340)="2ee640ebb525860177a6f3b3645544f7f125a4af841a7953e22f84185b12aba908201cf2759c8677f246ab717dd60491126e844c7e94d0ccd01223f480a20d3d438ad0e8b8427a6c820851e393d9d961506ee1892c7470f3aaeeaa49878758372528d009cacf1747f56861d1cb2ba3eac51bbc638fa275674f380ddc1b4c90a39af37335c2f17d9ba7929d4252b0622e988bc91bbb48e0d9afac59de23e8f21fdf14d49280dafb4dd8d4c1be81f1baf445737df2aa3e0014642ca3122e92e272609c14144a0b51c839b562daf42dca81c670d852", &(0x7f0000000440)="c997c2302f06feb4e429ac04e02aed7e27d0941ccde49f764cb9397576e7af1c9c22e0bbac784d4425894d3b3f3fa1cdf47f4621fe78ebd35fbaa777837b5a8ba188c068c7bc056347bd7077c9219cb0b501fa6500a65949734352983a00b320ebb05bcbf7564847fa6135cea0c3b5e53cbeba48847558392827e92a9738af10b3c6101f00b9f5d9d004c8", 0x2}, 0x20) 19:32:09 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x324) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8907, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') 19:32:09 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e271f60d25b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318e2ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7eaa49c62ba0fe52fa65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd31a08b32808b802000000000000ea334d83239dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc18cae2ed4b4390af9a9ceafd07ed00b000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r2, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) 19:32:09 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x1, 0x5, 0x47, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r1, &(0x7f0000000340)="2ee640ebb525860177a6f3b3645544f7f125a4af841a7953e22f84185b12aba908201cf2759c8677f246ab717dd60491126e844c7e94d0ccd01223f480a20d3d438ad0e8b8427a6c820851e393d9d961506ee1892c7470f3aaeeaa49878758372528d009cacf1747f56861d1cb2ba3eac51bbc638fa275674f380ddc1b4c90a39af37335c2f17d9ba7929d4252b0622e988bc91bbb48e0d9afac59de23e8f21fdf14d49280dafb4dd8d4c1be81f1baf445737df2aa3e0014642ca3122e92e272609c14144a0b51c839b562daf42dca81c670d852", &(0x7f0000000440)="c997c2302f06feb4e429ac04e02aed7e27d0941ccde49f764cb9397576e7af1c9c22e0bbac784d4425894d3b3f3fa1cdf47f4621fe78ebd35fbaa777837b5a8ba188c068c7bc056347bd7077c9219cb0b501fa6500a65949734352983a00b320ebb05bcbf7564847fa6135cea0c3b5e53cbeba48847558392827e92a9738af10b3c6101f00b9f5d9d004c8", 0x2}, 0x20) [ 680.921588][T12622] FAULT_INJECTION: forcing a failure. [ 680.921588][T12622] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 680.921608][T12622] CPU: 1 PID: 12622 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 680.943944][T12622] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 680.943952][T12622] Call Trace: [ 680.944011][T12622] dump_stack+0x197/0x210 [ 680.944044][T12622] should_fail.cold+0xa/0x15 [ 680.944064][T12622] ? fault_create_debugfs_attr+0x180/0x180 [ 680.944084][T12622] ? ___might_sleep+0x163/0x2c0 [ 680.957559][T12622] should_fail_alloc_page+0x50/0x60 [ 680.957574][T12622] __alloc_pages_nodemask+0x1a1/0x910 [ 680.957590][T12622] ? __alloc_pages_slowpath+0x2920/0x2920 [ 680.957618][T12622] __vmalloc_node_range+0x2fd/0x810 [ 680.957642][T12622] ? bpf_map_area_alloc+0x20/0x30 [ 680.966565][T12622] __vmalloc_node_flags_caller+0x71/0x90 [ 680.966581][T12622] ? bpf_map_area_alloc+0x20/0x30 [ 680.966597][T12622] __bpf_map_area_alloc+0xde/0xf0 [ 680.966613][T12622] bpf_map_area_alloc+0x20/0x30 [ 680.966629][T12622] htab_map_alloc+0x589/0x11c0 [ 680.966640][T12622] ? __kmalloc+0x608/0x770 [ 680.966653][T12622] ? bpf_get_file_flag+0x80/0x80 [ 680.966672][T12622] ? fput+0x1b/0x20 [ 680.966690][T12622] htab_of_map_alloc+0x71/0x100 [ 681.047412][T12622] ? htab_map_alloc+0x11c0/0x11c0 [ 681.052454][T12622] __do_sys_bpf+0x478/0x3810 [ 681.057049][T12622] ? bpf_prog_load+0x18f0/0x18f0 [ 681.062148][T12622] ? __kasan_check_write+0x14/0x20 [ 681.067293][T12622] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 681.072832][T12622] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 681.078121][T12622] ? wait_for_completion+0x440/0x440 [ 681.083402][T12622] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 681.089657][T12622] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 681.095107][T12622] ? do_syscall_64+0x26/0x790 [ 681.099779][T12622] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 681.105921][T12622] ? do_syscall_64+0x26/0x790 [ 681.110603][T12622] __x64_sys_bpf+0x73/0xb0 [ 681.115112][T12622] do_syscall_64+0xfa/0x790 [ 681.119608][T12622] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 681.125492][T12622] RIP: 0033:0x45a6f9 [ 681.129378][T12622] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 681.148974][T12622] RSP: 002b:00007f3ba2ab9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 681.157392][T12622] RAX: ffffffffffffffda RBX: 00007f3ba2ab9c90 RCX: 000000000045a6f9 19:32:09 executing program 0 (fault-call:3 fault-nth:45): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x5, r1, 0x0, [0x305f, 0xa]}, 0x2c) [ 681.165368][T12622] RDX: 000000000000002c RSI: 0000000020000400 RDI: 0000000000000000 [ 681.173330][T12622] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 681.181296][T12622] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3ba2aba6d4 [ 681.189357][T12622] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000005 19:32:09 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000340)="2ee640ebb525860177a6f3b3645544f7f125a4af841a7953e22f84185b12aba908201cf2759c8677f246ab717dd60491126e844c7e94d0ccd01223f480a20d3d438ad0e8b8427a6c820851e393d9d961506ee1892c7470f3aaeeaa49878758372528d009cacf1747f56861d1cb2ba3eac51bbc638fa275674f380ddc1b4c90a39af37335c2f17d9ba7929d4252b0622e988bc91bbb48e0d9afac59de23e8f21fdf14d49280dafb4dd8d4c1be81f1baf445737df2aa3e0014642ca3122e92e272609c14144a0b51c839b562daf42dca81c670d852", &(0x7f0000000440)="c997c2302f06feb4e429ac04e02aed7e27d0941ccde49f764cb9397576e7af1c9c22e0bbac784d4425894d3b3f3fa1cdf47f4621fe78ebd35fbaa777837b5a8ba188c068c7bc056347bd7077c9219cb0b501fa6500a65949734352983a00b320ebb05bcbf7564847fa6135cea0c3b5e53cbeba48847558392827e92a9738af10b3c6101f00b9f5d9d004c8", 0x2}, 0x20) 19:32:09 executing program 2: socket$kcm(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x80040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001400)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000001440)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r4, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r4, 0x0, 0xf800000000000000) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r4, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x80000001) write$cgroup_type(r4, &(0x7f00000013c0)='threaded\x00', 0x9) recvmsg(r2, &(0x7f000000d000)={0x0, 0x0, 0x0}, 0x40000002) sendmsg$kcm(r2, &(0x7f0000000080)={0x0, 0x4a, &(0x7f0000000000)=[{&(0x7f00000000c0)="23000000420081aee405e9a400000000001dc6ff07d800400300"/35, 0x1d1}], 0x1}, 0x0) r5 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r6, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r6, 0x0, 0xf800000000000000) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r6, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r6, 0x2401, 0x80000001) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) sendmsg(r2, &(0x7f0000001380)={&(0x7f0000000100)=@rc={0x1f, {0x1f, 0x8, 0x5, 0x23, 0x1f, 0x9}, 0x6}, 0x80, &(0x7f0000001340)=[{&(0x7f0000000200)="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", 0x1000}, {&(0x7f0000001200)="05e0d0dd633549fafc8bc2c55163930b9f37117033bea504250a2d33847be7a71dbea53d2aba0e77410683372b71e7c01460d869542d50880d7f3dc4093da4073538c7a750e3ce70ce9a13a7289544de995acf67c686a8737a6044cfdd2d5c9521509b6d5df7db6a6546ce7f66d4905210c0d189", 0x74}, {&(0x7f0000001280)="755eacd5362a46392019c94de8d0afe7bda3d731040b71ca764f669c7a27ab236e5a0b95e0123fde9230e60949dd0b4338e1e0a4c134ebc834f1cdc4e981e409a73ddc76154c655082ae95db6cb92364a720f16507fda8da90bd8089678a6b6105e3316201e4244e3dd05558aae24d23bf4ab470f6a5902a306f6336f106cbf3a9c2", 0x82}], 0x3}, 0x20000000) [ 681.342729][T12633] FAULT_INJECTION: forcing a failure. [ 681.342729][T12633] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 681.409479][T12633] CPU: 0 PID: 12633 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 681.418205][T12633] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 681.428302][T12633] Call Trace: [ 681.431620][T12633] dump_stack+0x197/0x210 [ 681.435982][T12633] should_fail.cold+0xa/0x15 [ 681.440865][T12633] ? fault_create_debugfs_attr+0x180/0x180 [ 681.446696][T12633] ? ___might_sleep+0x163/0x2c0 [ 681.451584][T12633] should_fail_alloc_page+0x50/0x60 [ 681.456804][T12633] __alloc_pages_nodemask+0x1a1/0x910 [ 681.462374][T12633] ? __alloc_pages_slowpath+0x2920/0x2920 [ 681.468123][T12633] __vmalloc_node_range+0x2fd/0x810 [ 681.473360][T12633] ? bpf_map_area_alloc+0x20/0x30 [ 681.478521][T12633] __vmalloc_node_flags_caller+0x71/0x90 [ 681.484349][T12633] ? bpf_map_area_alloc+0x20/0x30 [ 681.489404][T12633] __bpf_map_area_alloc+0xde/0xf0 [ 681.494462][T12633] bpf_map_area_alloc+0x20/0x30 [ 681.499368][T12633] htab_map_alloc+0x589/0x11c0 [ 681.504157][T12633] ? __kmalloc+0x608/0x770 19:32:10 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000340)="2ee640ebb525860177a6f3b3645544f7f125a4af841a7953e22f84185b12aba908201cf2759c8677f246ab717dd60491126e844c7e94d0ccd01223f480a20d3d438ad0e8b8427a6c820851e393d9d961506ee1892c7470f3aaeeaa49878758372528d009cacf1747f56861d1cb2ba3eac51bbc638fa275674f380ddc1b4c90a39af37335c2f17d9ba7929d4252b0622e988bc91bbb48e0d9afac59de23e8f21fdf14d49280dafb4dd8d4c1be81f1baf445737df2aa3e0014642ca3122e92e272609c14144a0b51c839b562daf42dca81c670d852", &(0x7f0000000440)="c997c2302f06feb4e429ac04e02aed7e27d0941ccde49f764cb9397576e7af1c9c22e0bbac784d4425894d3b3f3fa1cdf47f4621fe78ebd35fbaa777837b5a8ba188c068c7bc056347bd7077c9219cb0b501fa6500a65949734352983a00b320ebb05bcbf7564847fa6135cea0c3b5e53cbeba48847558392827e92a9738af10b3c6101f00b9f5d9d004c8", 0x2}, 0x20) 19:32:10 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000340)="2ee640ebb525860177a6f3b3645544f7f125a4af841a7953e22f84185b12aba908201cf2759c8677f246ab717dd60491126e844c7e94d0ccd01223f480a20d3d438ad0e8b8427a6c820851e393d9d961506ee1892c7470f3aaeeaa49878758372528d009cacf1747f56861d1cb2ba3eac51bbc638fa275674f380ddc1b4c90a39af37335c2f17d9ba7929d4252b0622e988bc91bbb48e0d9afac59de23e8f21fdf14d49280dafb4dd8d4c1be81f1baf445737df2aa3e0014642ca3122e92e272609c14144a0b51c839b562daf42dca81c670d852", &(0x7f0000000440)="c997c2302f06feb4e429ac04e02aed7e27d0941ccde49f764cb9397576e7af1c9c22e0bbac784d4425894d3b3f3fa1cdf47f4621fe78ebd35fbaa777837b5a8ba188c068c7bc056347bd7077c9219cb0b501fa6500a65949734352983a00b320ebb05bcbf7564847fa6135cea0c3b5e53cbeba48847558392827e92a9738af10b3c6101f00b9f5d9d004c8", 0x2}, 0x20) [ 681.508596][T12633] ? bpf_get_file_flag+0x80/0x80 [ 681.513663][T12633] ? fput+0x1b/0x20 [ 681.517528][T12633] htab_of_map_alloc+0x71/0x100 [ 681.522429][T12633] ? htab_map_alloc+0x11c0/0x11c0 [ 681.527467][T12633] __do_sys_bpf+0x478/0x3810 [ 681.532080][T12633] ? bpf_prog_load+0x18f0/0x18f0 [ 681.537043][T12633] ? __kasan_check_write+0x14/0x20 [ 681.542285][T12633] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 681.548575][T12633] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 681.553893][T12633] ? wait_for_completion+0x440/0x440 [ 681.559652][T12633] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 681.566465][T12633] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 681.571945][T12633] ? do_syscall_64+0x26/0x790 [ 681.576623][T12633] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 681.582692][T12633] ? do_syscall_64+0x26/0x790 [ 681.587381][T12633] __x64_sys_bpf+0x73/0xb0 [ 681.591825][T12633] do_syscall_64+0xfa/0x790 [ 681.596384][T12633] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 681.602293][T12633] RIP: 0033:0x45a6f9 [ 681.606214][T12633] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 681.625858][T12633] RSP: 002b:00007f3ba2ab9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 681.639413][T12633] RAX: ffffffffffffffda RBX: 00007f3ba2ab9c90 RCX: 000000000045a6f9 [ 681.648513][T12633] RDX: 000000000000002c RSI: 0000000020000400 RDI: 0000000000000000 19:32:10 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e271f60d25b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318e2ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7eaa49c62ba0fe52fa65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd31a08b32808b802000000000000ea334d83239dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc18cae2ed4b4390af9a9ceafd07ed00b000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r2, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) [ 681.656512][T12633] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 681.664514][T12633] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3ba2aba6d4 [ 681.672516][T12633] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000005 19:32:18 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x2, 0x3, 0x2) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000180)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000200)=[{&(0x7f00000002c0)=""/213, 0xd5}], 0x1}, 0x15120) r4 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000180)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) ioctl$TUNGETVNETHDRSZ(r5, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r5, 0x0, 0xf800000000000000) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r5, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r5, 0x2401, 0x80000001) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x13, 0x0, &(0x7f0000000080), &(0x7f00000000c0)='syzkaller\x00', 0x3, 0x0, 0x0, 0x21680, 0x1, [], r3, 0x17, r5, 0x8, &(0x7f00000003c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000400)={0x2, 0x6, 0x81}, 0x10, 0xffffffffffffffff, r0}, 0x78) sendmsg$inet(r1, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r1, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000040)=r7) 19:32:18 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000340)="2ee640ebb525860177a6f3b3645544f7f125a4af841a7953e22f84185b12aba908201cf2759c8677f246ab717dd60491126e844c7e94d0ccd01223f480a20d3d438ad0e8b8427a6c820851e393d9d961506ee1892c7470f3aaeeaa49878758372528d009cacf1747f56861d1cb2ba3eac51bbc638fa275674f380ddc1b4c90a39af37335c2f17d9ba7929d4252b0622e988bc91bbb48e0d9afac59de23e8f21fdf14d49280dafb4dd8d4c1be81f1baf445737df2aa3e0014642ca3122e92e272609c14144a0b51c839b562daf42dca81c670d852", &(0x7f0000000440)="c997c2302f06feb4e429ac04e02aed7e27d0941ccde49f764cb9397576e7af1c9c22e0bbac784d4425894d3b3f3fa1cdf47f4621fe78ebd35fbaa777837b5a8ba188c068c7bc056347bd7077c9219cb0b501fa6500a65949734352983a00b320ebb05bcbf7564847fa6135cea0c3b5e53cbeba48847558392827e92a9738af10b3c6101f00b9f5d9d004c8", 0x2}, 0x20) 19:32:18 executing program 2: socket$kcm(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x80040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001400)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000001440)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r4, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r4, 0x0, 0xf800000000000000) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r4, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x80000001) write$cgroup_type(r4, &(0x7f00000013c0)='threaded\x00', 0x9) recvmsg(r2, &(0x7f000000d000)={0x0, 0x0, 0x0}, 0x40000002) sendmsg$kcm(r2, &(0x7f0000000080)={0x0, 0x4a, &(0x7f0000000000)=[{&(0x7f00000000c0)="23000000420081aee405e9a400000000001dc6ff07d800400300"/35, 0x1d1}], 0x1}, 0x0) r5 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r6, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r6, 0x0, 0xf800000000000000) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r6, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r6, 0x2401, 0x80000001) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) sendmsg(r2, &(0x7f0000001380)={&(0x7f0000000100)=@rc={0x1f, {0x1f, 0x8, 0x5, 0x23, 0x1f, 0x9}, 0x6}, 0x80, &(0x7f0000001340)=[{&(0x7f0000000200)="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", 0x1000}, {&(0x7f0000001200)="05e0d0dd633549fafc8bc2c55163930b9f37117033bea504250a2d33847be7a71dbea53d2aba0e77410683372b71e7c01460d869542d50880d7f3dc4093da4073538c7a750e3ce70ce9a13a7289544de995acf67c686a8737a6044cfdd2d5c9521509b6d5df7db6a6546ce7f66d4905210c0d189", 0x74}, {&(0x7f0000001280)="755eacd5362a46392019c94de8d0afe7bda3d731040b71ca764f669c7a27ab236e5a0b95e0123fde9230e60949dd0b4338e1e0a4c134ebc834f1cdc4e981e409a73ddc76154c655082ae95db6cb92364a720f16507fda8da90bd8089678a6b6105e3316201e4244e3dd05558aae24d23bf4ab470f6a5902a306f6336f106cbf3a9c2", 0x82}], 0x3}, 0x20000000) 19:32:18 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r2, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) 19:32:18 executing program 0 (fault-call:3 fault-nth:46): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x5, r1, 0x0, [0x305f, 0xa]}, 0x2c) 19:32:18 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x324) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8910, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') [ 690.150955][T12672] FAULT_INJECTION: forcing a failure. [ 690.150955][T12672] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 690.167230][T12672] CPU: 0 PID: 12672 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 690.176081][T12672] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 690.186530][T12672] Call Trace: [ 690.189834][T12672] dump_stack+0x197/0x210 [ 690.194358][T12672] should_fail.cold+0xa/0x15 [ 690.198960][T12672] ? fault_create_debugfs_attr+0x180/0x180 [ 690.204789][T12672] ? ___might_sleep+0x163/0x2c0 [ 690.209655][T12672] should_fail_alloc_page+0x50/0x60 [ 690.214865][T12672] __alloc_pages_nodemask+0x1a1/0x910 [ 690.220245][T12672] ? __alloc_pages_slowpath+0x2920/0x2920 [ 690.225995][T12672] __vmalloc_node_range+0x2fd/0x810 [ 690.231204][T12672] ? bpf_map_area_alloc+0x20/0x30 [ 690.236339][T12672] __vmalloc_node_flags_caller+0x71/0x90 [ 690.241970][T12672] ? bpf_map_area_alloc+0x20/0x30 [ 690.247001][T12672] __bpf_map_area_alloc+0xde/0xf0 [ 690.252032][T12672] bpf_map_area_alloc+0x20/0x30 [ 690.257106][T12672] htab_map_alloc+0x589/0x11c0 [ 690.261882][T12672] ? __kmalloc+0x608/0x770 [ 690.266318][T12672] ? bpf_get_file_flag+0x80/0x80 [ 690.271295][T12672] ? fput+0x1b/0x20 [ 690.275285][T12672] htab_of_map_alloc+0x71/0x100 [ 690.280231][T12672] ? htab_map_alloc+0x11c0/0x11c0 [ 690.285273][T12672] __do_sys_bpf+0x478/0x3810 [ 690.289979][T12672] ? bpf_prog_load+0x18f0/0x18f0 [ 690.294916][T12672] ? __kasan_check_write+0x14/0x20 [ 690.300033][T12672] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 690.305582][T12672] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 690.310888][T12672] ? wait_for_completion+0x440/0x440 [ 690.316222][T12672] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 690.322566][T12672] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 690.328041][T12672] ? do_syscall_64+0x26/0x790 [ 690.332740][T12672] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 690.338893][T12672] ? do_syscall_64+0x26/0x790 [ 690.343596][T12672] __x64_sys_bpf+0x73/0xb0 [ 690.348028][T12672] do_syscall_64+0xfa/0x790 [ 690.352553][T12672] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 690.358436][T12672] RIP: 0033:0x45a6f9 [ 690.362513][T12672] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 690.382256][T12672] RSP: 002b:00007f3ba2ab9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 690.390677][T12672] RAX: ffffffffffffffda RBX: 00007f3ba2ab9c90 RCX: 000000000045a6f9 19:32:19 executing program 0 (fault-call:3 fault-nth:47): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x5, r1, 0x0, [0x305f, 0xa]}, 0x2c) [ 690.398643][T12672] RDX: 000000000000002c RSI: 0000000020000400 RDI: 0000000000000000 [ 690.406706][T12672] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 690.414683][T12672] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3ba2aba6d4 [ 690.422657][T12672] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000005 19:32:19 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000340)="2ee640ebb525860177a6f3b3645544f7f125a4af841a7953e22f84185b12aba908201cf2759c8677f246ab717dd60491126e844c7e94d0ccd01223f480a20d3d438ad0e8b8427a6c820851e393d9d961506ee1892c7470f3aaeeaa49878758372528d009cacf1747f56861d1cb2ba3eac51bbc638fa275674f380ddc1b4c90a39af37335c2f17d9ba7929d4252b0622e988bc91bbb48e0d9afac59de23e8f21fdf14d49280dafb4dd8d4c1be81f1baf445737df2aa3e0014642ca3122e92e272609c14144a0b51c839b562daf42dca81c670d852", &(0x7f0000000440)="c997c2302f06feb4e429ac04e02aed7e27d0941ccde49f764cb9397576e7af1c9c22e0bbac784d4425894d3b3f3fa1cdf47f4621fe78ebd35fbaa777837b5a8ba188c068c7bc056347bd7077c9219cb0b501fa6500a65949734352983a00b320ebb05bcbf7564847fa6135cea0c3b5e53cbeba48847558392827e92a9738af10b3c6101f00b9f5d9d004c8", 0x2}, 0x20) 19:32:19 executing program 2: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() r1 = getpid() r2 = socket$kcm(0xa, 0x6, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x8, 0x6, 0xec, 0x0, 0xffffffffffffffe1, 0x8b1a, 0xc, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xe59, 0x1, @perf_config_ext={0x8, 0xa8}, 0x12048, 0x3, 0x101, 0x2, 0x4, 0x1f, 0x81d}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0xa) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890c, &(0x7f0000000100)) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000140)={'team_slave_0\x00'}) r4 = perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x3, 0x5, 0xa5, 0x0, 0x0, 0x451f587ba3fcddb3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x0, 0x6}, 0x400, 0x8001, 0xfffff800, 0x0, 0x0, 0x1}, r1, 0xffffffffffffffff, r3, 0x8) r5 = perf_event_open(&(0x7f0000000380)={0x5, 0x70, 0x3, 0xc0, 0x7f, 0x9, 0x0, 0x20, 0x8080, 0x5aefcd8e713fd841, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x7, 0x4, @perf_config_ext={0xdf, 0xffffffff}, 0x8000, 0x7fff, 0x8, 0x5, 0x7, 0x8, 0x7}, r1, 0xe, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x5, 0x7, 0x1f, 0x3f, 0x0, 0x1, 0x20, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x13, 0x0, @perf_bp={&(0x7f0000000080), 0x3}, 0x0, 0x8001, 0x8, 0x4, 0x2, 0x4a7, 0xff2c}, r0, 0xf, r5, 0x9) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0), 0x0}, 0x20) perf_event_open$cgroup(&(0x7f0000000440)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffff8, 0x2}, 0x1, 0x0, 0x0, 0x4f78b3bf39b888aa}, 0xffffffffffffffff, 0x800000, 0xffffffffffffffff, 0x8) recvmsg(0xffffffffffffffff, &(0x7f00000035c0)={&(0x7f0000002400)=@can, 0x80, &(0x7f00000034c0)=[{0x0}], 0x1}, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r6) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0x1}, 0x3c) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f00000000c0)=0x8) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r8) setsockopt$sock_attach_bpf(r9, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r9, &(0x7f0000000500)={&(0x7f0000000280), 0x10, &(0x7f00000002c0)=[{&(0x7f0000001580)="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", 0xe7b}], 0x1}, 0x0) 19:32:19 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000340)="2ee640ebb525860177a6f3b3645544f7f125a4af841a7953e22f84185b12aba908201cf2759c8677f246ab717dd60491126e844c7e94d0ccd01223f480a20d3d438ad0e8b8427a6c820851e393d9d961506ee1892c7470f3aaeeaa49878758372528d009cacf1747f56861d1cb2ba3eac51bbc638fa275674f380ddc1b4c90a39af37335c2f17d9ba7929d4252b0622e988bc91bbb48e0d9afac59de23e8f21fdf14d49280dafb4dd8d4c1be81f1baf445737df2aa3e0014642ca3122e92e272609c14144a0b51c839b562daf42dca81c670d852", &(0x7f0000000440)="c997c2302f06feb4e429ac04e02aed7e27d0941ccde49f764cb9397576e7af1c9c22e0bbac784d4425894d3b3f3fa1cdf47f4621fe78ebd35fbaa777837b5a8ba188c068c7bc056347bd7077c9219cb0b501fa6500a65949734352983a00b320ebb05bcbf7564847fa6135cea0c3b5e53cbeba48847558392827e92a9738af10b3c6101f00b9f5d9d004c8", 0x2}, 0x20) [ 690.628319][T12686] FAULT_INJECTION: forcing a failure. [ 690.628319][T12686] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 690.662603][T12686] CPU: 0 PID: 12686 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 690.671345][T12686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 690.681418][T12686] Call Trace: [ 690.684736][T12686] dump_stack+0x197/0x210 [ 690.689111][T12686] should_fail.cold+0xa/0x15 [ 690.693736][T12686] ? fault_create_debugfs_attr+0x180/0x180 [ 690.699675][T12686] ? ___might_sleep+0x163/0x2c0 [ 690.704641][T12686] should_fail_alloc_page+0x50/0x60 [ 690.709873][T12686] __alloc_pages_nodemask+0x1a1/0x910 [ 690.715487][T12686] ? __alloc_pages_slowpath+0x2920/0x2920 [ 690.721256][T12686] __vmalloc_node_range+0x2fd/0x810 [ 690.726481][T12686] ? bpf_map_area_alloc+0x20/0x30 [ 690.731506][T12686] __vmalloc_node_flags_caller+0x71/0x90 [ 690.737232][T12686] ? bpf_map_area_alloc+0x20/0x30 [ 690.742270][T12686] __bpf_map_area_alloc+0xde/0xf0 [ 690.747304][T12686] bpf_map_area_alloc+0x20/0x30 [ 690.752175][T12686] htab_map_alloc+0x589/0x11c0 [ 690.757221][T12686] ? __kmalloc+0x608/0x770 [ 690.761738][T12686] ? bpf_get_file_flag+0x80/0x80 [ 690.766718][T12686] ? fput+0x1b/0x20 [ 690.770534][T12686] htab_of_map_alloc+0x71/0x100 [ 690.775389][T12686] ? htab_map_alloc+0x11c0/0x11c0 [ 690.780588][T12686] __do_sys_bpf+0x478/0x3810 [ 690.785361][T12686] ? bpf_prog_load+0x18f0/0x18f0 [ 690.790326][T12686] ? __kasan_check_write+0x14/0x20 [ 690.795439][T12686] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 690.801945][T12686] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 690.807231][T12686] ? wait_for_completion+0x440/0x440 [ 690.812528][T12686] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 690.818783][T12686] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 690.824241][T12686] ? do_syscall_64+0x26/0x790 [ 690.828924][T12686] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 690.835025][T12686] ? do_syscall_64+0x26/0x790 [ 690.839709][T12686] __x64_sys_bpf+0x73/0xb0 [ 690.844228][T12686] do_syscall_64+0xfa/0x790 [ 690.848757][T12686] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 690.854759][T12686] RIP: 0033:0x45a6f9 [ 690.858673][T12686] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 19:32:19 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r2, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) [ 690.878281][T12686] RSP: 002b:00007f3ba2ab9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 690.886692][T12686] RAX: ffffffffffffffda RBX: 00007f3ba2ab9c90 RCX: 000000000045a6f9 [ 690.894664][T12686] RDX: 000000000000002c RSI: 0000000020000400 RDI: 0000000000000000 [ 690.902634][T12686] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 690.910602][T12686] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3ba2aba6d4 [ 690.918593][T12686] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000005 19:32:19 executing program 2: write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfffffffffffffeb8) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0}, 0x4) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0xc0185879, 0x20000000) r2 = perf_event_open$cgroup(&(0x7f0000000580)={0x2adb467024d76036, 0x70, 0x1, 0x3e, 0x3, 0xf7, 0x0, 0x7, 0x400, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, 0x5, @perf_config_ext={0x0, 0x6}, 0x8248, 0x3, 0x3, 0x2, 0x3, 0xd07b, 0x200}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x23619cfd4008c52) perf_event_open$cgroup(&(0x7f0000000400)={0x9549e4238c7e18a, 0x70, 0x1f, 0x9b, 0x7, 0xf9, 0x0, 0xffffffff, 0x40100, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x10000, 0x1, @perf_bp={&(0x7f0000000180), 0x8}, 0x4000, 0x10000, 0x9, 0x0, 0x80, 0x8, 0xffff}, r1, 0xb, r2, 0xa) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000140)={'team_slave_0\x00'}) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000080), 0x297ef) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x3, 0x6, &(0x7f0000000600)=ANY=[@ANYBLOB="0800000016f2e8bb35fba00800000000000000060500ff07000006d4fbfffeffffff00", @ANYRES32, @ANYBLOB="a3bcfd492b0de70400df02ff010000950000720fab2acf20bfc4ad3b9b7118d9f3c2c435ab9b30a3156f090018e42da199151fca5e205428c891510805bfe434746eea4b7e2d03a602974c096ccff5071c0feb87abf05882"], 0x0, 0x17, 0x0, &(0x7f0000000300), 0x41100, 0x4, [], 0x0, 0x0, r3, 0x8, &(0x7f0000000340)={0x4, 0x5}, 0x8, 0x10, &(0x7f0000000380)={0x2, 0xf, 0x4, 0x9}, 0x10}, 0x78) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b40)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00\xc7\xbal&\x1e\xab\ry\xab0\xe6\f<\xed_\xee\xe6\x1b\xc9\xb0\t\x81\xac\x03\xa8s+\x8di\xb7V\xde\x15\xd3,\xb4\xeb\xcfwz\x1b\xac\xf8\xff\xbd\xe4\xa2\x84\v\x17\xf4*\x14\x83\r\xe2>*\xd4{\xdcH\x1b_\xab&\x98\x1b\xd7\x9b\xe9\xd7A\xe2\xc4\xfc\x03\xc9^\xb8\xd4Z\xee\x98', 0x2761, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b40)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00\xc7\xbal&\x1e\xab\ry\xab0\xe6\f<\xed_\xee\xe6\x1b\xc9\xb0\t\x81\xac\x03\xa8s+\x8di\xb7V\xde\x15\xd3,\xb4\xeb\xcfwz\x1b\xac\xf8\xff\xbd\xe4\xa2\x84\v\x17\xf4*\x14\x83\r\xe2>*\xd4{\xdcH\x1b_\xab&\x98\x1b\xd7\x9b\xe9\xd7A\xe2\xc4\xfc\x03\xc9^\xb8\xd4Z\xee\x98', 0x2761, 0x0) write$cgroup_int(r6, &(0x7f0000000080), 0x297ef) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='memory.events\x00', 0x26e1, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x16, 0x0, 0x0, 0x0, 0x4400, 0x0, &(0x7f0000000300), 0x40f00, 0xe, [], 0x0, 0x14, r7, 0x8, &(0x7f0000000340)={0x4, 0x5}, 0x8, 0x10, &(0x7f0000000380)={0x2, 0xf, 0x4, 0x9}, 0x10, 0x0, r4}, 0x78) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x0, 0x1, 0x2, 0x0, 0x4, 0x0, 0x9, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x4, @perf_config_ext={0x80, 0x6}, 0x2080, 0x2, 0x0, 0x9, 0x1, 0x6}, r5, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 19:32:27 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x2, 0x3, 0x2) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000180)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000200)=[{&(0x7f00000002c0)=""/213, 0xd5}], 0x1}, 0x15120) r4 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000180)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) ioctl$TUNGETVNETHDRSZ(r5, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r5, 0x0, 0xf800000000000000) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r5, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r5, 0x2401, 0x80000001) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x13, 0x0, &(0x7f0000000080), &(0x7f00000000c0)='syzkaller\x00', 0x3, 0x0, 0x0, 0x21680, 0x1, [], r3, 0x17, r5, 0x8, &(0x7f00000003c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000400)={0x2, 0x6, 0x81}, 0x10, 0xffffffffffffffff, r0}, 0x78) sendmsg$inet(r1, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r1, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000040)=r7) 19:32:27 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000340)="2ee640ebb525860177a6f3b3645544f7f125a4af841a7953e22f84185b12aba908201cf2759c8677f246ab717dd60491126e844c7e94d0ccd01223f480a20d3d438ad0e8b8427a6c820851e393d9d961506ee1892c7470f3aaeeaa49878758372528d009cacf1747f56861d1cb2ba3eac51bbc638fa275674f380ddc1b4c90a39af37335c2f17d9ba7929d4252b0622e988bc91bbb48e0d9afac59de23e8f21fdf14d49280dafb4dd8d4c1be81f1baf445737df2aa3e0014642ca3122e92e272609c14144a0b51c839b562daf42dca81c670d852", &(0x7f0000000440)="c997c2302f06feb4e429ac04e02aed7e27d0941ccde49f764cb9397576e7af1c9c22e0bbac784d4425894d3b3f3fa1cdf47f4621fe78ebd35fbaa777837b5a8ba188c068c7bc056347bd7077c9219cb0b501fa6500a65949734352983a00b320ebb05bcbf7564847fa6135cea0c3b5e53cbeba48847558392827e92a9738af10b3c6101f00b9f5d9d004c8", 0x2}, 0x20) 19:32:27 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x324) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8911, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') 19:32:27 executing program 0 (fault-call:3 fault-nth:48): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x5, r1, 0x0, [0x305f, 0xa]}, 0x2c) 19:32:27 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r2, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) 19:32:27 executing program 2: write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfffffffffffffeb8) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, 0x0}, 0x4) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0xc0185879, 0x20000000) r2 = perf_event_open$cgroup(&(0x7f0000000580)={0x2adb467024d76036, 0x70, 0x1, 0x3e, 0x3, 0xf7, 0x0, 0x7, 0x400, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, 0x5, @perf_config_ext={0x0, 0x6}, 0x8248, 0x3, 0x3, 0x2, 0x3, 0xd07b, 0x200}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x23619cfd4008c52) perf_event_open$cgroup(&(0x7f0000000400)={0x9549e4238c7e18a, 0x70, 0x1f, 0x9b, 0x7, 0xf9, 0x0, 0xffffffff, 0x40100, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x10000, 0x1, @perf_bp={&(0x7f0000000180), 0x8}, 0x4000, 0x10000, 0x9, 0x0, 0x80, 0x8, 0xffff}, r1, 0xb, r2, 0xa) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000140)={'team_slave_0\x00'}) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000080), 0x297ef) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x3, 0x6, &(0x7f0000000600)=ANY=[@ANYBLOB="0800000016f2e8bb35fba00800000000000000060500ff07000006d4fbfffeffffff00", @ANYRES32, @ANYBLOB="a3bcfd492b0de70400df02ff010000950000720fab2acf20bfc4ad3b9b7118d9f3c2c435ab9b30a3156f090018e42da199151fca5e205428c891510805bfe434746eea4b7e2d03a602974c096ccff5071c0feb87abf05882"], 0x0, 0x17, 0x0, &(0x7f0000000300), 0x41100, 0x4, [], 0x0, 0x0, r3, 0x8, &(0x7f0000000340)={0x4, 0x5}, 0x8, 0x10, &(0x7f0000000380)={0x2, 0xf, 0x4, 0x9}, 0x10}, 0x78) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b40)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00\xc7\xbal&\x1e\xab\ry\xab0\xe6\f<\xed_\xee\xe6\x1b\xc9\xb0\t\x81\xac\x03\xa8s+\x8di\xb7V\xde\x15\xd3,\xb4\xeb\xcfwz\x1b\xac\xf8\xff\xbd\xe4\xa2\x84\v\x17\xf4*\x14\x83\r\xe2>*\xd4{\xdcH\x1b_\xab&\x98\x1b\xd7\x9b\xe9\xd7A\xe2\xc4\xfc\x03\xc9^\xb8\xd4Z\xee\x98', 0x2761, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b40)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00\xc7\xbal&\x1e\xab\ry\xab0\xe6\f<\xed_\xee\xe6\x1b\xc9\xb0\t\x81\xac\x03\xa8s+\x8di\xb7V\xde\x15\xd3,\xb4\xeb\xcfwz\x1b\xac\xf8\xff\xbd\xe4\xa2\x84\v\x17\xf4*\x14\x83\r\xe2>*\xd4{\xdcH\x1b_\xab&\x98\x1b\xd7\x9b\xe9\xd7A\xe2\xc4\xfc\x03\xc9^\xb8\xd4Z\xee\x98', 0x2761, 0x0) write$cgroup_int(r6, &(0x7f0000000080), 0x297ef) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='memory.events\x00', 0x26e1, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x16, 0x0, 0x0, 0x0, 0x4400, 0x0, &(0x7f0000000300), 0x40f00, 0xe, [], 0x0, 0x14, r7, 0x8, &(0x7f0000000340)={0x4, 0x5}, 0x8, 0x10, &(0x7f0000000380)={0x2, 0xf, 0x4, 0x9}, 0x10, 0x0, r4}, 0x78) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f00000002c0)={0x3, 0x70, 0x1, 0x0, 0x1, 0x2, 0x0, 0x4, 0x0, 0x9, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x4, @perf_config_ext={0x80, 0x6}, 0x2080, 0x2, 0x0, 0x9, 0x1, 0x6}, r5, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) [ 699.424682][T12719] FAULT_INJECTION: forcing a failure. [ 699.424682][T12719] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 699.438580][T12719] CPU: 1 PID: 12719 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 699.447271][T12719] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 699.457344][T12719] Call Trace: [ 699.460662][T12719] dump_stack+0x197/0x210 [ 699.465048][T12719] should_fail.cold+0xa/0x15 [ 699.469653][T12719] ? fault_create_debugfs_attr+0x180/0x180 [ 699.475474][T12719] ? ___might_sleep+0x163/0x2c0 [ 699.480347][T12719] should_fail_alloc_page+0x50/0x60 [ 699.485576][T12719] __alloc_pages_nodemask+0x1a1/0x910 [ 699.490995][T12719] ? __alloc_pages_slowpath+0x2920/0x2920 [ 699.496755][T12719] __vmalloc_node_range+0x2fd/0x810 [ 699.502449][T12719] ? bpf_map_area_alloc+0x20/0x30 [ 699.507644][T12719] __vmalloc_node_flags_caller+0x71/0x90 [ 699.513282][T12719] ? bpf_map_area_alloc+0x20/0x30 [ 699.518324][T12719] __bpf_map_area_alloc+0xde/0xf0 [ 699.523354][T12719] bpf_map_area_alloc+0x20/0x30 [ 699.528234][T12719] htab_map_alloc+0x589/0x11c0 [ 699.533020][T12719] ? __kmalloc+0x608/0x770 [ 699.537446][T12719] ? bpf_get_file_flag+0x80/0x80 [ 699.542429][T12719] ? fput+0x1b/0x20 [ 699.546245][T12719] htab_of_map_alloc+0x71/0x100 [ 699.551102][T12719] ? htab_map_alloc+0x11c0/0x11c0 [ 699.556128][T12719] __do_sys_bpf+0x478/0x3810 [ 699.560736][T12719] ? bpf_prog_load+0x18f0/0x18f0 [ 699.565679][T12719] ? __kasan_check_write+0x14/0x20 [ 699.570804][T12719] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 699.576703][T12719] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 699.582003][T12719] ? wait_for_completion+0x440/0x440 [ 699.587302][T12719] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 699.593584][T12719] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 699.599069][T12719] ? do_syscall_64+0x26/0x790 [ 699.603769][T12719] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 699.609838][T12719] ? do_syscall_64+0x26/0x790 [ 699.614623][T12719] __x64_sys_bpf+0x73/0xb0 [ 699.619087][T12719] do_syscall_64+0xfa/0x790 [ 699.623646][T12719] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 699.629539][T12719] RIP: 0033:0x45a6f9 [ 699.633438][T12719] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 699.653090][T12719] RSP: 002b:00007f3ba2ab9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 699.661516][T12719] RAX: ffffffffffffffda RBX: 00007f3ba2ab9c90 RCX: 000000000045a6f9 19:32:28 executing program 4: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="850000004f0000003f00000000000000950000e600000000002ce85fbf62c21eb4d98183dd3c429de1c9486c70bfaa1243267d558865039af316a920c7e2b2ca81dde11ccf869c0d8d4add1f02645b52cd5fa052ac6f1ce71eb092d6aa8833238d4a939203656e384b45145c2ebc8b27040c493814ee51d4bcfc9ed7070afb5b5a17ff386243a11b2d2c53115d3c8e4c565bb4f9d3a29971f06cf45869c081787f6260b6f21854551f5ed4dac7a39847d928f5f33da8637f00c589cac9b859f624db94a7a9dd6187c46f63615afef93d594e53beebf5ae0ea05ad7af1c5072d32e37ef675a80f4729390d8b2ce649ffd2193b8e0c7c92f01909e61ed54e3b8757b7d43f4e593620ec1dd6ef2d2204c7db1b7c75e765f9cd1cb5334"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000340)="2ee640ebb525860177a6f3b3645544f7f125a4af841a7953e22f84185b12aba908201cf2759c8677f246ab717dd60491126e844c7e94d0ccd01223f480a20d3d438ad0e8b8427a6c820851e393d9d961506ee1892c7470f3aaeeaa49878758372528d009cacf1747f56861d1cb2ba3eac51bbc638fa275674f380ddc1b4c90a39af37335c2f17d9ba7929d4252b0622e988bc91bbb48e0d9afac59de23e8f21fdf14d49280dafb4dd8d4c1be81f1baf445737df2aa3e0014642ca3122e92e272609c14144a0b51c839b562daf42dca81c670d852", &(0x7f0000000440)="c997c2302f06feb4e429ac04e02aed7e27d0941ccde49f764cb9397576e7af1c9c22e0bbac784d4425894d3b3f3fa1cdf47f4621fe78ebd35fbaa777837b5a8ba188c068c7bc056347bd7077c9219cb0b501fa6500a65949734352983a00b320ebb05bcbf7564847fa6135cea0c3b5e53cbeba48847558392827e92a9738af10b3c6101f00b9f5d9d004c8", 0x2}, 0x20) 19:32:28 executing program 0 (fault-call:3 fault-nth:49): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x5, r1, 0x0, [0x305f, 0xa]}, 0x2c) [ 699.669583][T12719] RDX: 000000000000002c RSI: 0000000020000400 RDI: 0000000000000000 [ 699.677558][T12719] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 699.685549][T12719] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3ba2aba6d4 [ 699.693533][T12719] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000005 [ 699.786269][T12727] FAULT_INJECTION: forcing a failure. [ 699.786269][T12727] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 699.830563][T12727] CPU: 0 PID: 12727 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 699.839357][T12727] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 699.849437][T12727] Call Trace: [ 699.853016][T12727] dump_stack+0x197/0x210 [ 699.857398][T12727] should_fail.cold+0xa/0x15 [ 699.862005][T12727] ? fault_create_debugfs_attr+0x180/0x180 [ 699.867866][T12727] ? ___might_sleep+0x163/0x2c0 [ 699.872739][T12727] should_fail_alloc_page+0x50/0x60 [ 699.877945][T12727] __alloc_pages_nodemask+0x1a1/0x910 [ 699.883314][T12727] ? __alloc_pages_slowpath+0x2920/0x2920 [ 699.889088][T12727] __vmalloc_node_range+0x2fd/0x810 [ 699.894291][T12727] ? bpf_map_area_alloc+0x20/0x30 [ 699.899583][T12727] __vmalloc_node_flags_caller+0x71/0x90 [ 699.905301][T12727] ? bpf_map_area_alloc+0x20/0x30 [ 699.910322][T12727] __bpf_map_area_alloc+0xde/0xf0 [ 699.915347][T12727] bpf_map_area_alloc+0x20/0x30 [ 699.920213][T12727] htab_map_alloc+0x589/0x11c0 [ 699.925013][T12727] ? __kmalloc+0x608/0x770 [ 699.930238][T12727] ? bpf_get_file_flag+0x80/0x80 [ 699.935640][T12727] ? fput+0x1b/0x20 [ 699.939554][T12727] htab_of_map_alloc+0x71/0x100 [ 699.944495][T12727] ? htab_map_alloc+0x11c0/0x11c0 [ 699.949851][T12727] __do_sys_bpf+0x478/0x3810 [ 699.954472][T12727] ? bpf_prog_load+0x18f0/0x18f0 [ 699.959547][T12727] ? __kasan_check_write+0x14/0x20 [ 699.964805][T12727] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 699.970609][T12727] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 699.976194][T12727] ? wait_for_completion+0x440/0x440 [ 699.981502][T12727] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 699.987905][T12727] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 699.993361][T12727] ? do_syscall_64+0x26/0x790 [ 699.998082][T12727] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 700.004325][T12727] ? do_syscall_64+0x26/0x790 [ 700.009015][T12727] __x64_sys_bpf+0x73/0xb0 [ 700.013598][T12727] do_syscall_64+0xfa/0x790 [ 700.018792][T12727] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 700.025435][T12727] RIP: 0033:0x45a6f9 [ 700.030570][T12727] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 700.050598][T12727] RSP: 002b:00007f3ba2ab9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 700.059550][T12727] RAX: ffffffffffffffda RBX: 00007f3ba2ab9c90 RCX: 000000000045a6f9 [ 700.067650][T12727] RDX: 000000000000002c RSI: 0000000020000400 RDI: 0000000000000000 19:32:28 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r2, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) [ 700.075778][T12727] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 700.083783][T12727] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3ba2aba6d4 [ 700.092040][T12727] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000005 19:32:28 executing program 4: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000340)="2ee640ebb525860177a6f3b3645544f7f125a4af841a7953e22f84185b12aba908201cf2759c8677f246ab717dd60491126e844c7e94d0ccd01223f480a20d3d438ad0e8b8427a6c820851e393d9d961506ee1892c7470f3aaeeaa49878758372528d009cacf1747f56861d1cb2ba3eac51bbc638fa275674f380ddc1b4c90a39af37335c2f17d9ba7929d4252b0622e988bc91bbb48e0d9afac59de23e8f21fdf14d49280dafb4dd8d4c1be81f1baf445737df2aa3e0014642ca3122e92e272609c14144a0b51c839b562daf42dca81c670d852", &(0x7f0000000440)="c997c2302f06feb4e429ac04e02aed7e27d0941ccde49f764cb9397576e7af1c9c22e0bbac784d4425894d3b3f3fa1cdf47f4621fe78ebd35fbaa777837b5a8ba188c068c7bc056347bd7077c9219cb0b501fa6500a65949734352983a00b320ebb05bcbf7564847fa6135cea0c3b5e53cbeba48847558392827e92a9738af10b3c6101f00b9f5d9d004c8", 0x2}, 0x20) 19:32:28 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r2, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) 19:32:28 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000340)="2ee640ebb525860177a6f3b3645544f7f125a4af841a7953e22f84185b12aba908201cf2759c8677f246ab717dd60491126e844c7e94d0ccd01223f480a20d3d438ad0e8b8427a6c820851e393d9d961506ee1892c7470f3aaeeaa49878758372528d009cacf1747f56861d1cb2ba3eac51bbc638fa275674f380ddc1b4c90a39af37335c2f17d9ba7929d4252b0622e988bc91bbb48e0d9afac59de23e8f21fdf14d49280dafb4dd8d4c1be81f1baf445737df2aa3e0014642ca3122e92e272609c14144a0b51c839b562daf42dca81c670d852", &(0x7f0000000440)="c997c2302f06feb4e429ac04e02aed7e27d0941ccde49f764cb9397576e7af1c9c22e0bbac784d4425894d3b3f3fa1cdf47f4621fe78ebd35fbaa777837b5a8ba188c068c7bc056347bd7077c9219cb0b501fa6500a65949734352983a00b320ebb05bcbf7564847fa6135cea0c3b5e53cbeba48847558392827e92a9738af10b3c6101f00b9f5d9d004c8", 0x2}, 0x20) 19:32:37 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x0, 0x0, &(0x7f0000000880)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x2, 0x3, 0x2) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000180)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000200)=[{&(0x7f00000002c0)=""/213, 0xd5}], 0x1}, 0x15120) r4 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000180)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) ioctl$TUNGETVNETHDRSZ(r5, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r5, 0x0, 0xf800000000000000) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r5, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r5, 0x2401, 0x80000001) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x13, 0x0, &(0x7f0000000080), &(0x7f00000000c0)='syzkaller\x00', 0x3, 0x0, 0x0, 0x21680, 0x1, [], r3, 0x17, r5, 0x8, &(0x7f00000003c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000400)={0x2, 0x6, 0x81}, 0x10, 0xffffffffffffffff, r0}, 0x78) sendmsg$inet(r1, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r1, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000040)=r7) 19:32:37 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r2, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) 19:32:37 executing program 0 (fault-call:3 fault-nth:50): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x5, r1, 0x0, [0x305f, 0xa]}, 0x2c) 19:32:37 executing program 2: socket$kcm(0x10, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuset.effective_cpus\x00', 0x0, 0x0) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$sock(r1, &(0x7f0000000600)={&(0x7f0000000440)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x1, 0x0, 0x0, 0x1, {0xa, 0x4e24, 0x8, @rand_addr="5a06fda4686e19d8c60fa273647b264d", 0x7}}}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000200)="519867973d5c3a999ea979ccaf627972391f60dbcdd78adb8eee6c8895a77b0f69931075689b01fd1c129c3b7265b741f6b76c03eb", 0x35}], 0x1, &(0x7f0000000580)=[@mark={{0x14}}, @mark={{0x14, 0x1, 0x24, 0x5}}, @txtime={{0x18, 0x1, 0x3d, 0x81}}], 0x48}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='memory.current\x00', 0x2761, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x4a) socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x28e) sendmsg$kcm(r4, &(0x7f0000000340)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r4, &(0x7f0000000280)=ANY=[@ANYBLOB='\x00mqmory '], 0xfdef) socket$kcm(0x11, 0xb85437420fb7c9e, 0x300) socket$kcm(0xa, 0x0, 0x11) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x149, 0x0}, 0x0) write$cgroup_subtree(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="6ec79dd2eab54a47d0e582585aca36928a3f3b4810bdcfb77997942d6f5422b089cb31ab8a912f1ddb91693ddfb9433f3533c2bb1e7d5120ed187a37b5c915092737be88c758be06f89ec3f59b12fbc05d32cb0b147b876759fd3154d611ee393f9d2309218f74f89e5c31483e083c692828f911989eeb467eba4a1fc970b5aa61c37f83f7df9e1b71516b4b8ef61045f12fccaa62aae85745ae92107a9dd1077b0be0d0c63193f7682896b74398ed24e4535ae6547ac3bc3ca04eb77ef0791c2aea8be58170a5663e195b40b97627e7141d38af665f8efd"], 0xcd) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuset.effective_cpus\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000004c0)='cgroup.type\x00') openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) socket$kcm(0xa, 0x2, 0x11) r5 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r6, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r6, 0x0, 0xf800000000000000) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r6, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r6, 0x2401, 0x80000001) r7 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r7, 0x29, 0x14, &(0x7f0000000080)=r6, 0x1a6) 19:32:37 executing program 4: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000340)="2ee640ebb525860177a6f3b3645544f7f125a4af841a7953e22f84185b12aba908201cf2759c8677f246ab717dd60491126e844c7e94d0ccd01223f480a20d3d438ad0e8b8427a6c820851e393d9d961506ee1892c7470f3aaeeaa49878758372528d009cacf1747f56861d1cb2ba3eac51bbc638fa275674f380ddc1b4c90a39af37335c2f17d9ba7929d4252b0622e988bc91bbb48e0d9afac59de23e8f21fdf14d49280dafb4dd8d4c1be81f1baf445737df2aa3e0014642ca3122e92e272609c14144a0b51c839b562daf42dca81c670d852", &(0x7f0000000440)="c997c2302f06feb4e429ac04e02aed7e27d0941ccde49f764cb9397576e7af1c9c22e0bbac784d4425894d3b3f3fa1cdf47f4621fe78ebd35fbaa777837b5a8ba188c068c7bc056347bd7077c9219cb0b501fa6500a65949734352983a00b320ebb05bcbf7564847fa6135cea0c3b5e53cbeba48847558392827e92a9738af10b3c6101f00b9f5d9d004c8", 0x2}, 0x20) 19:32:37 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x324) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8912, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') 19:32:37 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000340)="2ee640ebb525860177a6f3b3645544f7f125a4af841a7953e22f84185b12aba908201cf2759c8677f246ab717dd60491126e844c7e94d0ccd01223f480a20d3d438ad0e8b8427a6c820851e393d9d961506ee1892c7470f3aaeeaa49878758372528d009cacf1747f56861d1cb2ba3eac51bbc638fa275674f380ddc1b4c90a39af37335c2f17d9ba7929d4252b0622e988bc91bbb48e0d9afac59de23e8f21fdf14d49280dafb4dd8d4c1be81f1baf445737df2aa3e0014642ca3122e92e272609c14144a0b51c839b562daf42dca81c670d852", &(0x7f0000000440)="c997c2302f06feb4e429ac04e02aed7e27d0941ccde49f764cb9397576e7af1c9c22e0bbac784d4425894d3b3f3fa1cdf47f4621fe78ebd35fbaa777837b5a8ba188c068c7bc056347bd7077c9219cb0b501fa6500a65949734352983a00b320ebb05bcbf7564847fa6135cea0c3b5e53cbeba48847558392827e92a9738af10b3c6101f00b9f5d9d004c8", 0x2}, 0x20) [ 708.630793][T12761] FAULT_INJECTION: forcing a failure. [ 708.630793][T12761] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 708.657154][T12761] CPU: 0 PID: 12761 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 708.666143][T12761] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 708.676970][T12761] Call Trace: [ 708.680589][T12761] dump_stack+0x197/0x210 [ 708.685100][T12761] should_fail.cold+0xa/0x15 [ 708.689736][T12761] ? fault_create_debugfs_attr+0x180/0x180 [ 708.696305][T12761] ? ___might_sleep+0x163/0x2c0 [ 708.701288][T12761] should_fail_alloc_page+0x50/0x60 [ 708.706611][T12761] __alloc_pages_nodemask+0x1a1/0x910 [ 708.712007][T12761] ? __alloc_pages_slowpath+0x2920/0x2920 [ 708.718146][T12761] __vmalloc_node_range+0x2fd/0x810 [ 708.723638][T12761] ? bpf_map_area_alloc+0x20/0x30 [ 708.729206][T12761] __vmalloc_node_flags_caller+0x71/0x90 [ 708.734864][T12761] ? bpf_map_area_alloc+0x20/0x30 [ 708.740009][T12761] __bpf_map_area_alloc+0xde/0xf0 [ 708.745321][T12761] bpf_map_area_alloc+0x20/0x30 [ 708.750168][T12761] htab_map_alloc+0x589/0x11c0 [ 708.755362][T12761] ? __kmalloc+0x608/0x770 [ 708.759895][T12761] ? bpf_get_file_flag+0x80/0x80 [ 708.765712][T12761] ? fput+0x1b/0x20 [ 708.769526][T12761] htab_of_map_alloc+0x71/0x100 [ 708.775502][T12761] ? htab_map_alloc+0x11c0/0x11c0 [ 708.780523][T12761] __do_sys_bpf+0x478/0x3810 [ 708.785225][T12761] ? bpf_prog_load+0x18f0/0x18f0 [ 708.790162][T12761] ? __kasan_check_write+0x14/0x20 [ 708.795274][T12761] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 708.800814][T12761] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 708.806101][T12761] ? wait_for_completion+0x440/0x440 [ 708.811385][T12761] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 708.817712][T12761] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 708.823178][T12761] ? do_syscall_64+0x26/0x790 [ 708.828035][T12761] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 708.834273][T12761] ? do_syscall_64+0x26/0x790 [ 708.838992][T12761] __x64_sys_bpf+0x73/0xb0 [ 708.843529][T12761] do_syscall_64+0xfa/0x790 [ 708.848035][T12761] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 708.854244][T12761] RIP: 0033:0x45a6f9 [ 708.858189][T12761] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 708.878313][T12761] RSP: 002b:00007f3ba2ab9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 708.886791][T12761] RAX: ffffffffffffffda RBX: 00007f3ba2ab9c90 RCX: 000000000045a6f9 [ 708.894890][T12761] RDX: 000000000000002c RSI: 0000000020000400 RDI: 0000000000000000 [ 708.903293][T12761] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 708.911521][T12761] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3ba2aba6d4 [ 708.919806][T12761] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000005 19:32:37 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r2, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) 19:32:37 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="850000004f0000003f00000000000000950000e600000000002ce85fbf62c21eb4d98183dd3c429de1c9486c70bfaa1243267d558865039af316a920c7e2b2ca81dde11ccf869c0d8d4add1f02645b52cd5fa052ac6f1ce71eb092d6aa8833238d4a939203656e384b45145c2ebc8b27040c493814ee51d4bcfc9ed7070afb5b5a17ff386243a11b2d2c53115d3c8e4c565bb4f9d3a29971f06cf45869c081787f6260b6f21854551f5ed4dac7a39847d928f5f33da8637f00c589cac9b859f624db94a7a9dd6187c46f63615afef93d594e53beebf5ae0ea05ad7af1c5072d32e37ef675a80f4729390d8b2ce649ffd2193b8e0c7c92f01909e61ed54e3b8757b7d43f4e593620ec1dd6ef2d2204c7db1b7c75e765f9cd1cb5334"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000340)="2ee640ebb525860177a6f3b3645544f7f125a4af841a7953e22f84185b12aba908201cf2759c8677f246ab717dd60491126e844c7e94d0ccd01223f480a20d3d438ad0e8b8427a6c820851e393d9d961506ee1892c7470f3aaeeaa49878758372528d009cacf1747f56861d1cb2ba3eac51bbc638fa275674f380ddc1b4c90a39af37335c2f17d9ba7929d4252b0622e988bc91bbb48e0d9afac59de23e8f21fdf14d49280dafb4dd8d4c1be81f1baf445737df2aa3e0014642ca3122e92e272609c14144a0b51c839b562daf42dca81c670d852", &(0x7f0000000440)="c997c2302f06feb4e429ac04e02aed7e27d0941ccde49f764cb9397576e7af1c9c22e0bbac784d4425894d3b3f3fa1cdf47f4621fe78ebd35fbaa777837b5a8ba188c068c7bc056347bd7077c9219cb0b501fa6500a65949734352983a00b320ebb05bcbf7564847fa6135cea0c3b5e53cbeba48847558392827e92a9738af10b3c6101f00b9f5d9d004c8", 0x2}, 0x20) 19:32:37 executing program 0 (fault-call:3 fault-nth:51): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x5, r1, 0x0, [0x305f, 0xa]}, 0x2c) 19:32:37 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="850000004f0000003f00000000000000950000e600000000002ce85fbf62c21eb4d98183dd3c429de1c9486c70bfaa1243267d558865039af316a920c7e2b2ca81dde11ccf869c0d8d4add1f02645b52cd5fa052ac6f1ce71eb092d6aa8833238d4a939203656e384b45145c2ebc8b27040c493814ee51d4bcfc9ed7070afb5b5a17ff386243a11b2d2c53115d3c8e4c565bb4f9d3a29971f06cf45869c081787f6260b6f21854551f5ed4dac7a39847d928f5f33da8637f00c589cac9b859f624db94a7a9dd6187c46f63615afef93d594e53beebf5ae0ea05ad7af1c5072d32e37ef675a80f4729390d8b2ce649ffd2193b8e0c7c92f01909e61ed54e3b8757b7d43f4e593620ec1dd6ef2d2204c7db1b7c75e765f9cd1cb5334"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000340)="2ee640ebb525860177a6f3b3645544f7f125a4af841a7953e22f84185b12aba908201cf2759c8677f246ab717dd60491126e844c7e94d0ccd01223f480a20d3d438ad0e8b8427a6c820851e393d9d961506ee1892c7470f3aaeeaa49878758372528d009cacf1747f56861d1cb2ba3eac51bbc638fa275674f380ddc1b4c90a39af37335c2f17d9ba7929d4252b0622e988bc91bbb48e0d9afac59de23e8f21fdf14d49280dafb4dd8d4c1be81f1baf445737df2aa3e0014642ca3122e92e272609c14144a0b51c839b562daf42dca81c670d852", &(0x7f0000000440)="c997c2302f06feb4e429ac04e02aed7e27d0941ccde49f764cb9397576e7af1c9c22e0bbac784d4425894d3b3f3fa1cdf47f4621fe78ebd35fbaa777837b5a8ba188c068c7bc056347bd7077c9219cb0b501fa6500a65949734352983a00b320ebb05bcbf7564847fa6135cea0c3b5e53cbeba48847558392827e92a9738af10b3c6101f00b9f5d9d004c8", 0x2}, 0x20) 19:32:37 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r2, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) [ 709.213971][T12780] FAULT_INJECTION: forcing a failure. [ 709.213971][T12780] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 709.291171][T12780] CPU: 0 PID: 12780 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 709.300252][T12780] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 709.310336][T12780] Call Trace: [ 709.313835][T12780] dump_stack+0x197/0x210 [ 709.318409][T12780] should_fail.cold+0xa/0x15 [ 709.323039][T12780] ? fault_create_debugfs_attr+0x180/0x180 [ 709.329052][T12780] ? ___might_sleep+0x163/0x2c0 [ 709.334207][T12780] should_fail_alloc_page+0x50/0x60 [ 709.339446][T12780] __alloc_pages_nodemask+0x1a1/0x910 [ 709.345116][T12780] ? __alloc_pages_slowpath+0x2920/0x2920 [ 709.351011][T12780] __vmalloc_node_range+0x2fd/0x810 [ 709.356254][T12780] ? bpf_map_area_alloc+0x20/0x30 [ 709.361427][T12780] __vmalloc_node_flags_caller+0x71/0x90 [ 709.367569][T12780] ? bpf_map_area_alloc+0x20/0x30 [ 709.372626][T12780] __bpf_map_area_alloc+0xde/0xf0 [ 709.372644][T12780] bpf_map_area_alloc+0x20/0x30 [ 709.372658][T12780] htab_map_alloc+0x589/0x11c0 [ 709.372669][T12780] ? __kmalloc+0x608/0x770 [ 709.372687][T12780] ? bpf_get_file_flag+0x80/0x80 [ 709.372708][T12780] ? fput+0x1b/0x20 [ 709.372726][T12780] htab_of_map_alloc+0x71/0x100 [ 709.372744][T12780] ? htab_map_alloc+0x11c0/0x11c0 [ 709.388279][T12780] __do_sys_bpf+0x478/0x3810 [ 709.388301][T12780] ? bpf_prog_load+0x18f0/0x18f0 [ 709.388320][T12780] ? __kasan_check_write+0x14/0x20 [ 709.430380][T12780] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 709.436135][T12780] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 709.441621][T12780] ? wait_for_completion+0x440/0x440 [ 709.447054][T12780] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 709.453554][T12780] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 709.459045][T12780] ? do_syscall_64+0x26/0x790 [ 709.463826][T12780] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 709.463843][T12780] ? do_syscall_64+0x26/0x790 [ 709.463864][T12780] __x64_sys_bpf+0x73/0xb0 [ 709.463878][T12780] do_syscall_64+0xfa/0x790 [ 709.463895][T12780] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 709.463907][T12780] RIP: 0033:0x45a6f9 [ 709.463922][T12780] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 709.463929][T12780] RSP: 002b:00007f3ba2ab9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 709.463942][T12780] RAX: ffffffffffffffda RBX: 00007f3ba2ab9c90 RCX: 000000000045a6f9 [ 709.463950][T12780] RDX: 000000000000002c RSI: 0000000020000400 RDI: 0000000000000000 [ 709.463964][T12780] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 709.475095][T12780] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3ba2aba6d4 [ 709.475104][T12780] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000005 19:32:46 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x0, 0x0, &(0x7f0000000880)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x2, 0x3, 0x2) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000180)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000200)=[{&(0x7f00000002c0)=""/213, 0xd5}], 0x1}, 0x15120) r4 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000180)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) ioctl$TUNGETVNETHDRSZ(r5, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r5, 0x0, 0xf800000000000000) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r5, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r5, 0x2401, 0x80000001) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x13, 0x0, &(0x7f0000000080), &(0x7f00000000c0)='syzkaller\x00', 0x3, 0x0, 0x0, 0x21680, 0x1, [], r3, 0x17, r5, 0x8, &(0x7f00000003c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000400)={0x2, 0x6, 0x81}, 0x10, 0xffffffffffffffff, r0}, 0x78) sendmsg$inet(r1, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r1, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000040)=r7) 19:32:46 executing program 2: r0 = getpid() r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000140)={'team_slave_0\x00'}) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x3, 0x5, 0xa5, 0x0, 0x0, 0x451f587ba3fcddb3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x0, 0x6}, 0x400, 0x8001, 0xfffff800, 0x0, 0x0, 0x1}, r0, 0xffffffffffffffff, r1, 0x8) r2 = perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x7f, 0x7f, 0x8, 0x1, 0x0, 0x6, 0x80, 0x7, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x7f, 0x4, @perf_config_ext={0x4, 0x2}, 0x100, 0x81, 0xf100557e, 0x3, 0x6, 0xfffffff7, 0x1}, r0, 0x0, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_config_ext}, 0x0, 0xffffffffffffffff, r2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00'}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) gettid() r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) r7 = openat$cgroup_subtree(r5, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r7, &(0x7f0000000280)={[{0x2b, 'pids'}, {0x0, 'memory'}, {0x111a6ef9d1526e81, 'pids'}, {0x2b, 'io'}, {0x2b, 'pids'}, {0x2d, 'cpu'}]}, 0x23) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r8 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r4, &(0x7f0000000080)={[{0x8847000000000000, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0xfdef) r9 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r10 = openat$cgroup_ro(r9, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r10, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r10, 0x0, 0xf800000000000000) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r10, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r10, 0x2401, 0x80000001) ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f00000000c0)={'teql0\x00', 0x200}) 19:32:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r2, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) 19:32:46 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000340)="2ee640ebb525860177a6f3b3645544f7f125a4af841a7953e22f84185b12aba908201cf2759c8677f246ab717dd60491126e844c7e94d0ccd01223f480a20d3d438ad0e8b8427a6c820851e393d9d961506ee1892c7470f3aaeeaa49878758372528d009cacf1747f56861d1cb2ba3eac51bbc638fa275674f380ddc1b4c90a39af37335c2f17d9ba7929d4252b0622e988bc91bbb48e0d9afac59de23e8f21fdf14d49280dafb4dd8d4c1be81f1baf445737df2aa3e0014642ca3122e92e272609c14144a0b51c839b562daf42dca81c670d852", &(0x7f0000000440)="c997c2302f06feb4e429ac04e02aed7e27d0941ccde49f764cb9397576e7af1c9c22e0bbac784d4425894d3b3f3fa1cdf47f4621fe78ebd35fbaa777837b5a8ba188c068c7bc056347bd7077c9219cb0b501fa6500a65949734352983a00b320ebb05bcbf7564847fa6135cea0c3b5e53cbeba48847558392827e92a9738af10b3c6101f00b9f5d9d004c8", 0x2}, 0x20) 19:32:46 executing program 0 (fault-call:3 fault-nth:52): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x5, r1, 0x0, [0x305f, 0xa]}, 0x2c) 19:32:46 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x324) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8913, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') [ 717.917593][T12808] FAULT_INJECTION: forcing a failure. [ 717.917593][T12808] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 717.930988][T12808] CPU: 0 PID: 12808 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 717.939871][T12808] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 717.949923][T12808] Call Trace: [ 717.953225][T12808] dump_stack+0x197/0x210 [ 717.957552][T12808] should_fail.cold+0xa/0x15 [ 717.962143][T12808] ? fault_create_debugfs_attr+0x180/0x180 [ 717.967944][T12808] ? ___might_sleep+0x163/0x2c0 [ 717.972810][T12808] should_fail_alloc_page+0x50/0x60 [ 717.977997][T12808] __alloc_pages_nodemask+0x1a1/0x910 [ 717.983360][T12808] ? __alloc_pages_slowpath+0x2920/0x2920 [ 717.989078][T12808] __vmalloc_node_range+0x2fd/0x810 [ 717.994271][T12808] ? bpf_map_area_alloc+0x20/0x30 [ 717.999285][T12808] __vmalloc_node_flags_caller+0x71/0x90 [ 718.004964][T12808] ? bpf_map_area_alloc+0x20/0x30 [ 718.009996][T12808] __bpf_map_area_alloc+0xde/0xf0 [ 718.015131][T12808] bpf_map_area_alloc+0x20/0x30 [ 718.019999][T12808] htab_map_alloc+0x589/0x11c0 [ 718.024847][T12808] ? __kmalloc+0x608/0x770 [ 718.029255][T12808] ? bpf_get_file_flag+0x80/0x80 [ 718.034208][T12808] ? fput+0x1b/0x20 [ 718.038012][T12808] htab_of_map_alloc+0x71/0x100 [ 718.042879][T12808] ? htab_map_alloc+0x11c0/0x11c0 [ 718.047920][T12808] __do_sys_bpf+0x478/0x3810 [ 718.052593][T12808] ? bpf_prog_load+0x18f0/0x18f0 [ 718.057608][T12808] ? __kasan_check_write+0x14/0x20 [ 718.062797][T12808] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 718.068336][T12808] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 718.073612][T12808] ? wait_for_completion+0x440/0x440 [ 718.078903][T12808] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 718.085143][T12808] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 718.090616][T12808] ? do_syscall_64+0x26/0x790 [ 718.095653][T12808] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 718.101707][T12808] ? do_syscall_64+0x26/0x790 [ 718.106472][T12808] __x64_sys_bpf+0x73/0xb0 [ 718.110879][T12808] do_syscall_64+0xfa/0x790 [ 718.115378][T12808] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 718.121345][T12808] RIP: 0033:0x45a6f9 [ 718.125229][T12808] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 718.144996][T12808] RSP: 002b:00007f3ba2ab9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 718.153495][T12808] RAX: ffffffffffffffda RBX: 00007f3ba2ab9c90 RCX: 000000000045a6f9 [ 718.161459][T12808] RDX: 000000000000002c RSI: 0000000020000400 RDI: 0000000000000000 [ 718.169454][T12808] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 718.177424][T12808] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3ba2aba6d4 [ 718.185386][T12808] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000005 19:32:46 executing program 0 (fault-call:3 fault-nth:53): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x5, r1, 0x0, [0x305f, 0xa]}, 0x2c) 19:32:46 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000340)="2ee640ebb525860177a6f3b3645544f7f125a4af841a7953e22f84185b12aba908201cf2759c8677f246ab717dd60491126e844c7e94d0ccd01223f480a20d3d438ad0e8b8427a6c820851e393d9d961506ee1892c7470f3aaeeaa49878758372528d009cacf1747f56861d1cb2ba3eac51bbc638fa275674f380ddc1b4c90a39af37335c2f17d9ba7929d4252b0622e988bc91bbb48e0d9afac59de23e8f21fdf14d49280dafb4dd8d4c1be81f1baf445737df2aa3e0014642ca3122e92e272609c14144a0b51c839b562daf42dca81c670d852", &(0x7f0000000440)="c997c2302f06feb4e429ac04e02aed7e27d0941ccde49f764cb9397576e7af1c9c22e0bbac784d4425894d3b3f3fa1cdf47f4621fe78ebd35fbaa777837b5a8ba188c068c7bc056347bd7077c9219cb0b501fa6500a65949734352983a00b320ebb05bcbf7564847fa6135cea0c3b5e53cbeba48847558392827e92a9738af10b3c6101f00b9f5d9d004c8", 0x2}, 0x20) 19:32:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r2, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) [ 718.367838][T12820] FAULT_INJECTION: forcing a failure. [ 718.367838][T12820] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 718.412391][T12820] CPU: 1 PID: 12820 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 718.421154][T12820] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 718.431226][T12820] Call Trace: [ 718.434566][T12820] dump_stack+0x197/0x210 [ 718.438929][T12820] should_fail.cold+0xa/0x15 [ 718.443547][T12820] ? fault_create_debugfs_attr+0x180/0x180 [ 718.450070][T12820] ? ___might_sleep+0x163/0x2c0 [ 718.455047][T12820] should_fail_alloc_page+0x50/0x60 [ 718.460270][T12820] __alloc_pages_nodemask+0x1a1/0x910 [ 718.465688][T12820] ? __alloc_pages_slowpath+0x2920/0x2920 [ 718.471460][T12820] __vmalloc_node_range+0x2fd/0x810 [ 718.476692][T12820] ? bpf_map_area_alloc+0x20/0x30 [ 718.481753][T12820] __vmalloc_node_flags_caller+0x71/0x90 [ 718.487410][T12820] ? bpf_map_area_alloc+0x20/0x30 [ 718.492454][T12820] __bpf_map_area_alloc+0xde/0xf0 [ 718.497491][T12820] bpf_map_area_alloc+0x20/0x30 [ 718.502378][T12820] htab_map_alloc+0x589/0x11c0 [ 718.507240][T12820] ? __kmalloc+0x608/0x770 [ 718.511708][T12820] ? bpf_get_file_flag+0x80/0x80 [ 718.516683][T12820] ? fput+0x1b/0x20 [ 718.520527][T12820] htab_of_map_alloc+0x71/0x100 [ 718.525392][T12820] ? htab_map_alloc+0x11c0/0x11c0 [ 718.530440][T12820] __do_sys_bpf+0x478/0x3810 [ 718.535068][T12820] ? bpf_prog_load+0x18f0/0x18f0 [ 718.540048][T12820] ? __kasan_check_write+0x14/0x20 [ 718.545220][T12820] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 718.550880][T12820] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 718.556224][T12820] ? wait_for_completion+0x440/0x440 [ 718.561606][T12820] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 718.567873][T12820] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 718.573348][T12820] ? do_syscall_64+0x26/0x790 [ 718.578057][T12820] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 718.584755][T12820] ? do_syscall_64+0x26/0x790 [ 718.589541][T12820] __x64_sys_bpf+0x73/0xb0 [ 718.593992][T12820] do_syscall_64+0xfa/0x790 [ 718.598507][T12820] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 718.604413][T12820] RIP: 0033:0x45a6f9 19:32:47 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000340)="2ee640ebb525860177a6f3b3645544f7f125a4af841a7953e22f84185b12aba908201cf2759c8677f246ab717dd60491126e844c7e94d0ccd01223f480a20d3d438ad0e8b8427a6c820851e393d9d961506ee1892c7470f3aaeeaa49878758372528d009cacf1747f56861d1cb2ba3eac51bbc638fa275674f380ddc1b4c90a39af37335c2f17d9ba7929d4252b0622e988bc91bbb48e0d9afac59de23e8f21fdf14d49280dafb4dd8d4c1be81f1baf445737df2aa3e0014642ca3122e92e272609c14144a0b51c839b562daf42dca81c670d852", &(0x7f0000000440)="c997c2302f06feb4e429ac04e02aed7e27d0941ccde49f764cb9397576e7af1c9c22e0bbac784d4425894d3b3f3fa1cdf47f4621fe78ebd35fbaa777837b5a8ba188c068c7bc056347bd7077c9219cb0b501fa6500a65949734352983a00b320ebb05bcbf7564847fa6135cea0c3b5e53cbeba48847558392827e92a9738af10b3c6101f00b9f5d9d004c8", 0x2}, 0x20) 19:32:47 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r2, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) [ 718.608318][T12820] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 718.613164][T12804] device nr0 entered promiscuous mode [ 718.627938][T12820] RSP: 002b:00007f3ba2a98c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 718.627954][T12820] RAX: ffffffffffffffda RBX: 00007f3ba2a98c90 RCX: 000000000045a6f9 [ 718.627961][T12820] RDX: 000000000000002c RSI: 0000000020000400 RDI: 0000000000000000 [ 718.627968][T12820] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 718.627976][T12820] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3ba2a996d4 [ 718.627984][T12820] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000005 19:32:47 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r2, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) 19:32:53 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x0, 0x0, &(0x7f0000000880)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x2, 0x3, 0x2) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000180)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000200)=[{&(0x7f00000002c0)=""/213, 0xd5}], 0x1}, 0x15120) r4 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000180)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) ioctl$TUNGETVNETHDRSZ(r5, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r5, 0x0, 0xf800000000000000) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r5, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r5, 0x2401, 0x80000001) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x13, 0x0, &(0x7f0000000080), &(0x7f00000000c0)='syzkaller\x00', 0x3, 0x0, 0x0, 0x21680, 0x1, [], r3, 0x17, r5, 0x8, &(0x7f00000003c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000400)={0x2, 0x6, 0x81}, 0x10, 0xffffffffffffffff, r0}, 0x78) sendmsg$inet(r1, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r1, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000040)=r7) 19:32:53 executing program 0 (fault-call:3 fault-nth:54): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x5, r1, 0x0, [0x305f, 0xa]}, 0x2c) 19:32:53 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000340)="2ee640ebb525860177a6f3b3645544f7f125a4af841a7953e22f84185b12aba908201cf2759c8677f246ab717dd60491126e844c7e94d0ccd01223f480a20d3d438ad0e8b8427a6c820851e393d9d961506ee1892c7470f3aaeeaa49878758372528d009cacf1747f56861d1cb2ba3eac51bbc638fa275674f380ddc1b4c90a39af37335c2f17d9ba7929d4252b0622e988bc91bbb48e0d9afac59de23e8f21fdf14d49280dafb4dd8d4c1be81f1baf445737df2aa3e0014642ca3122e92e272609c14144a0b51c839b562daf42dca81c670d852", &(0x7f0000000440)="c997c2302f06feb4e429ac04e02aed7e27d0941ccde49f764cb9397576e7af1c9c22e0bbac784d4425894d3b3f3fa1cdf47f4621fe78ebd35fbaa777837b5a8ba188c068c7bc056347bd7077c9219cb0b501fa6500a65949734352983a00b320ebb05bcbf7564847fa6135cea0c3b5e53cbeba48847558392827e92a9738af10b3c6101f00b9f5d9d004c8", 0x2}, 0x20) 19:32:53 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000640)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r2, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) 19:32:53 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x324) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x891d, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') 19:32:53 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x247, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = openat$cgroup_ro(r3, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x32600) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(r5, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_subtree(r6, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$TUNSETLINK(r6, 0x400454cd, 0x321) write$cgroup_int(r6, &(0x7f0000000280)=0x38cd, 0x12) openat$cgroup_subtree(r4, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$TUNSETLINK(r4, 0x400454cd, 0x321) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000300), 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x5d, 0x9f, 0x6, 0x0, 0x0, 0x1, 0x10000, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x4, @perf_config_ext={0x7, 0x101}, 0x28088, 0x3, 0x80, 0x6, 0xffffffffffffffff, 0x10000, 0x2}, r2, 0xd, r4, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/Xyz0\x00', 0x1ff) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/585], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xff0b}, 0x48) r8 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r9 = openat$cgroup_ro(r8, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r9, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r9, 0x0, 0xf800000000000000) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r9, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r9, 0x2401, 0x80000001) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000000380)='GPL-\x8akeyring/\\(selfmime_type#\'^,vboxnet0keyringkeyring@trusted\\\x00') bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r7, 0x1800000000000060, 0x1b, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795e88a80008000000000000000affff08", 0x0, 0x100, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x2, 0xffffffffffffffff, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7fff}, 0x1024, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, r1, 0xd, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x4) openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) r10 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r10, &(0x7f0000000240)='cgroup.stat\x00', 0x26e1, 0x0) [ 725.102025][T12848] FAULT_INJECTION: forcing a failure. [ 725.102025][T12848] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 725.116022][T12848] CPU: 1 PID: 12848 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 725.125177][T12848] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 725.125184][T12848] Call Trace: [ 725.125210][T12848] dump_stack+0x197/0x210 [ 725.125237][T12848] should_fail.cold+0xa/0x15 [ 725.125259][T12848] ? fault_create_debugfs_attr+0x180/0x180 [ 725.125272][T12848] ? ___might_sleep+0x163/0x2c0 [ 725.125305][T12848] should_fail_alloc_page+0x50/0x60 [ 725.125319][T12848] __alloc_pages_nodemask+0x1a1/0x910 [ 725.125335][T12848] ? __alloc_pages_slowpath+0x2920/0x2920 [ 725.125366][T12848] __vmalloc_node_range+0x2fd/0x810 [ 725.125391][T12848] ? bpf_map_area_alloc+0x20/0x30 [ 725.125405][T12848] __vmalloc_node_flags_caller+0x71/0x90 [ 725.125423][T12848] ? bpf_map_area_alloc+0x20/0x30 [ 725.143162][T12848] __bpf_map_area_alloc+0xde/0xf0 [ 725.143178][T12848] bpf_map_area_alloc+0x20/0x30 [ 725.143193][T12848] htab_map_alloc+0x589/0x11c0 [ 725.143205][T12848] ? __kmalloc+0x608/0x770 [ 725.143219][T12848] ? bpf_get_file_flag+0x80/0x80 [ 725.143239][T12848] ? fput+0x1b/0x20 [ 725.143263][T12848] htab_of_map_alloc+0x71/0x100 [ 725.228406][T12848] ? htab_map_alloc+0x11c0/0x11c0 [ 725.233439][T12848] __do_sys_bpf+0x478/0x3810 [ 725.238020][T12848] ? bpf_prog_load+0x18f0/0x18f0 [ 725.242962][T12848] ? __kasan_check_write+0x14/0x20 [ 725.248060][T12848] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 725.253620][T12848] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 725.258908][T12848] ? wait_for_completion+0x440/0x440 [ 725.264374][T12848] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 725.270613][T12848] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 725.276060][T12848] ? do_syscall_64+0x26/0x790 [ 725.280727][T12848] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 725.287744][T12848] ? do_syscall_64+0x26/0x790 [ 725.292415][T12848] __x64_sys_bpf+0x73/0xb0 [ 725.296837][T12848] do_syscall_64+0xfa/0x790 [ 725.301335][T12848] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 725.307211][T12848] RIP: 0033:0x45a6f9 [ 725.311110][T12848] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 725.330706][T12848] RSP: 002b:00007f3ba2ab9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 725.339104][T12848] RAX: ffffffffffffffda RBX: 00007f3ba2ab9c90 RCX: 000000000045a6f9 19:32:54 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000640)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r2, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) 19:32:54 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000340)="2ee640ebb525860177a6f3b3645544f7f125a4af841a7953e22f84185b12aba908201cf2759c8677f246ab717dd60491126e844c7e94d0ccd01223f480a20d3d438ad0e8b8427a6c820851e393d9d961506ee1892c7470f3aaeeaa49878758372528d009cacf1747f56861d1cb2ba3eac51bbc638fa275674f380ddc1b4c90a39af37335c2f17d9ba7929d4252b0622e988bc91bbb48e0d9afac59de23e8f21fdf14d49280dafb4dd8d4c1be81f1baf445737df2aa3e0014642ca3122e92e272609c14144a0b51c839b562daf42dca81c670d852", &(0x7f0000000440)="c997c2302f06feb4e429ac04e02aed7e27d0941ccde49f764cb9397576e7af1c9c22e0bbac784d4425894d3b3f3fa1cdf47f4621fe78ebd35fbaa777837b5a8ba188c068c7bc056347bd7077c9219cb0b501fa6500a65949734352983a00b320ebb05bcbf7564847fa6135cea0c3b5e53cbeba48847558392827e92a9738af10b3c6101f00b9f5d9d004c8", 0x2}, 0x20) [ 725.347065][T12848] RDX: 000000000000002c RSI: 0000000020000400 RDI: 0000000000000000 [ 725.355196][T12848] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 725.363172][T12848] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3ba2aba6d4 [ 725.371478][T12848] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000005 19:32:54 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000640)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r2, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) 19:32:54 executing program 0 (fault-call:3 fault-nth:55): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x5, r1, 0x0, [0x305f, 0xa]}, 0x2c) 19:32:54 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000340)="2ee640ebb525860177a6f3b3645544f7f125a4af841a7953e22f84185b12aba908201cf2759c8677f246ab717dd60491126e844c7e94d0ccd01223f480a20d3d438ad0e8b8427a6c820851e393d9d961506ee1892c7470f3aaeeaa49878758372528d009cacf1747f56861d1cb2ba3eac51bbc638fa275674f380ddc1b4c90a39af37335c2f17d9ba7929d4252b0622e988bc91bbb48e0d9afac59de23e8f21fdf14d49280dafb4dd8d4c1be81f1baf445737df2aa3e0014642ca3122e92e272609c14144a0b51c839b562daf42dca81c670d852", &(0x7f0000000440)="c997c2302f06feb4e429ac04e02aed7e27d0941ccde49f764cb9397576e7af1c9c22e0bbac784d4425894d3b3f3fa1cdf47f4621fe78ebd35fbaa777837b5a8ba188c068c7bc056347bd7077c9219cb0b501fa6500a65949734352983a00b320ebb05bcbf7564847fa6135cea0c3b5e53cbeba48847558392827e92a9738af10b3c6101f00b9f5d9d004c8", 0x2}, 0x20) 19:32:54 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r2, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) [ 725.650525][T12866] FAULT_INJECTION: forcing a failure. [ 725.650525][T12866] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 725.700059][T12866] CPU: 0 PID: 12866 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 725.708792][T12866] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 725.718875][T12866] Call Trace: [ 725.722199][T12866] dump_stack+0x197/0x210 [ 725.726698][T12866] should_fail.cold+0xa/0x15 [ 725.731486][T12866] ? fault_create_debugfs_attr+0x180/0x180 [ 725.737324][T12866] ? ___might_sleep+0x163/0x2c0 [ 725.742223][T12866] should_fail_alloc_page+0x50/0x60 [ 725.747450][T12866] __alloc_pages_nodemask+0x1a1/0x910 [ 725.752938][T12866] ? __alloc_pages_slowpath+0x2920/0x2920 [ 725.758699][T12866] __vmalloc_node_range+0x2fd/0x810 [ 725.763959][T12866] ? bpf_map_area_alloc+0x20/0x30 [ 725.769012][T12866] __vmalloc_node_flags_caller+0x71/0x90 [ 725.774670][T12866] ? bpf_map_area_alloc+0x20/0x30 [ 725.779731][T12866] __bpf_map_area_alloc+0xde/0xf0 [ 725.784813][T12866] bpf_map_area_alloc+0x20/0x30 [ 725.789686][T12866] htab_map_alloc+0x589/0x11c0 [ 725.794462][T12866] ? __kmalloc+0x608/0x770 [ 725.799245][T12866] ? bpf_get_file_flag+0x80/0x80 [ 725.804219][T12866] ? fput+0x1b/0x20 [ 725.808057][T12866] htab_of_map_alloc+0x71/0x100 [ 725.812943][T12866] ? htab_map_alloc+0x11c0/0x11c0 [ 725.817982][T12866] __do_sys_bpf+0x478/0x3810 [ 725.822577][T12866] ? bpf_prog_load+0x18f0/0x18f0 [ 725.822592][T12866] ? __kasan_check_write+0x14/0x20 [ 725.822607][T12866] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 725.822620][T12866] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 725.822641][T12866] ? wait_for_completion+0x440/0x440 [ 725.849042][T12866] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 725.855433][T12866] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 725.860937][T12866] ? do_syscall_64+0x26/0x790 [ 725.865631][T12866] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 725.871715][T12866] ? do_syscall_64+0x26/0x790 [ 725.876399][T12866] __x64_sys_bpf+0x73/0xb0 [ 725.880817][T12866] do_syscall_64+0xfa/0x790 [ 725.885480][T12866] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 725.891507][T12866] RIP: 0033:0x45a6f9 [ 725.895495][T12866] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 725.915766][T12866] RSP: 002b:00007f3ba2ab9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 725.924165][T12866] RAX: ffffffffffffffda RBX: 00007f3ba2ab9c90 RCX: 000000000045a6f9 [ 725.932217][T12866] RDX: 000000000000002c RSI: 0000000020000400 RDI: 0000000000000000 [ 725.940194][T12866] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 725.948155][T12866] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3ba2aba6d4 [ 725.956107][T12866] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000005 19:33:02 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x0, 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x2, 0x3, 0x2) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000180)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000200)=[{&(0x7f00000002c0)=""/213, 0xd5}], 0x1}, 0x15120) r4 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000180)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) ioctl$TUNGETVNETHDRSZ(r5, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r5, 0x0, 0xf800000000000000) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r5, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r5, 0x2401, 0x80000001) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x13, 0x0, &(0x7f0000000080), &(0x7f00000000c0)='syzkaller\x00', 0x3, 0x0, 0x0, 0x21680, 0x1, [], r3, 0x17, r5, 0x8, &(0x7f00000003c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000400)={0x2, 0x6, 0x81}, 0x10, 0xffffffffffffffff, r0}, 0x78) sendmsg$inet(r1, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r1, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000040)=r7) 19:33:02 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="850000004f0000003f00000000000000950000e600000000002ce85fbf62c21eb4d98183dd3c429de1c9486c70bfaa1243267d558865039af316a920c7e2b2ca81dde11ccf869c0d8d4add1f02645b52cd5fa052ac6f1ce71eb092d6aa8833238d4a939203656e384b45145c2ebc8b27040c493814ee51d4bcfc9ed7070afb5b5a17ff386243a11b2d2c53115d3c8e4c565bb4f9d3a29971f06cf45869c081787f6260b6f21854551f5ed4dac7a39847d928f5f33da8637f00c589cac9b859f624db94a7a9dd6187c46f63615afef93d594e53beebf5ae0ea05ad7af1c5072d32e37ef675a80f4729390d8b2ce649ffd2193b8e0c7c92f01909e61ed54e3b8757b7d43f4e593620ec1dd6ef2d2204c7db1b7c75e765f9cd1cb5334"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000340)="2ee640ebb525860177a6f3b3645544f7f125a4af841a7953e22f84185b12aba908201cf2759c8677f246ab717dd60491126e844c7e94d0ccd01223f480a20d3d438ad0e8b8427a6c820851e393d9d961506ee1892c7470f3aaeeaa49878758372528d009cacf1747f56861d1cb2ba3eac51bbc638fa275674f380ddc1b4c90a39af37335c2f17d9ba7929d4252b0622e988bc91bbb48e0d9afac59de23e8f21fdf14d49280dafb4dd8d4c1be81f1baf445737df2aa3e0014642ca3122e92e272609c14144a0b51c839b562daf42dca81c670d852", &(0x7f0000000440)="c997c2302f06feb4e429ac04e02aed7e27d0941ccde49f764cb9397576e7af1c9c22e0bbac784d4425894d3b3f3fa1cdf47f4621fe78ebd35fbaa777837b5a8ba188c068c7bc056347bd7077c9219cb0b501fa6500a65949734352983a00b320ebb05bcbf7564847fa6135cea0c3b5e53cbeba48847558392827e92a9738af10b3c6101f00b9f5d9d004c8", 0x2}, 0x20) 19:33:02 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r2, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) 19:33:02 executing program 2: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) socket$kcm(0xa, 0x5, 0x11) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f00000000c0)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r1 = openat$cgroup(r0, 0x0, 0x200002, 0x0) socket$kcm(0x29, 0x1, 0x0) recvmsg$kcm(r0, 0x0, 0x10000) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x8) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000340)=@ethernet={0x1, @random="06e5596b0f8a"}, 0x80, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="507ca302a5ed7e4a8ca969a32bcff05c61a672deee53c88be7238a13616253b1381c1b06e316c5065f100bee5569bb88"]}, 0x0) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$kcm(0xa, 0x8000000001, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a0, &(0x7f0000000000)='&@[\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a1, &(0x7f0000000680)='&@[\x00') mkdirat$cgroup(r1, &(0x7f0000000100)='syz0\x00', 0x1ff) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r4, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r4, 0x0, 0xf800000000000000) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r4, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x80000001) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x0) 19:33:02 executing program 0 (fault-call:3 fault-nth:56): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x5, r1, 0x0, [0x305f, 0xa]}, 0x2c) 19:33:02 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x324) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x891e, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') [ 734.329872][T12895] FAULT_INJECTION: forcing a failure. [ 734.329872][T12895] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 734.375966][T12895] CPU: 0 PID: 12895 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 734.384871][T12895] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 734.394937][T12895] Call Trace: [ 734.398257][T12895] dump_stack+0x197/0x210 [ 734.402589][T12895] should_fail.cold+0xa/0x15 [ 734.407184][T12895] ? fault_create_debugfs_attr+0x180/0x180 [ 734.412986][T12895] ? ___might_sleep+0x163/0x2c0 [ 734.417840][T12895] should_fail_alloc_page+0x50/0x60 [ 734.423047][T12895] __alloc_pages_nodemask+0x1a1/0x910 [ 734.428412][T12895] ? __alloc_pages_slowpath+0x2920/0x2920 [ 734.434146][T12895] __vmalloc_node_range+0x2fd/0x810 [ 734.439351][T12895] ? bpf_map_area_alloc+0x20/0x30 [ 734.444385][T12895] __vmalloc_node_flags_caller+0x71/0x90 [ 734.450025][T12895] ? bpf_map_area_alloc+0x20/0x30 [ 734.455058][T12895] __bpf_map_area_alloc+0xde/0xf0 [ 734.460077][T12895] bpf_map_area_alloc+0x20/0x30 [ 734.464933][T12895] htab_map_alloc+0x589/0x11c0 [ 734.469683][T12895] ? __kmalloc+0x608/0x770 [ 734.474131][T12895] ? bpf_get_file_flag+0x80/0x80 [ 734.479064][T12895] ? fput+0x1b/0x20 [ 734.482864][T12895] htab_of_map_alloc+0x71/0x100 [ 734.487737][T12895] ? htab_map_alloc+0x11c0/0x11c0 [ 734.492763][T12895] __do_sys_bpf+0x478/0x3810 [ 734.497359][T12895] ? bpf_prog_load+0x18f0/0x18f0 [ 734.502324][T12895] ? __kasan_check_write+0x14/0x20 [ 734.507453][T12895] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 734.513001][T12895] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 734.518641][T12895] ? wait_for_completion+0x440/0x440 [ 734.523924][T12895] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 734.530304][T12895] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 734.535782][T12895] ? do_syscall_64+0x26/0x790 [ 734.540474][T12895] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 734.546537][T12895] ? do_syscall_64+0x26/0x790 [ 734.551213][T12895] __x64_sys_bpf+0x73/0xb0 [ 734.555628][T12895] do_syscall_64+0xfa/0x790 [ 734.560121][T12895] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 734.565999][T12895] RIP: 0033:0x45a6f9 [ 734.569881][T12895] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 734.589471][T12895] RSP: 002b:00007f3ba2ab9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 734.597876][T12895] RAX: ffffffffffffffda RBX: 00007f3ba2ab9c90 RCX: 000000000045a6f9 [ 734.605837][T12895] RDX: 000000000000002c RSI: 0000000020000400 RDI: 0000000000000000 [ 734.614770][T12895] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 19:33:03 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r2, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) [ 734.622728][T12895] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3ba2aba6d4 [ 734.630687][T12895] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000005 19:33:03 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000340)="2ee640ebb525860177a6f3b3645544f7f125a4af841a7953e22f84185b12aba908201cf2759c8677f246ab717dd60491126e844c7e94d0ccd01223f480a20d3d438ad0e8b8427a6c820851e393d9d961506ee1892c7470f3aaeeaa49878758372528d009cacf1747f56861d1cb2ba3eac51bbc638fa275674f380ddc1b4c90a39af37335c2f17d9ba7929d4252b0622e988bc91bbb48e0d9afac59de23e8f21fdf14d49280dafb4dd8d4c1be81f1baf445737df2aa3e0014642ca3122e92e272609c14144a0b51c839b562daf42dca81c670d852", &(0x7f0000000440)="c997c2302f06feb4e429ac04e02aed7e27d0941ccde49f764cb9397576e7af1c9c22e0bbac784d4425894d3b3f3fa1cdf47f4621fe78ebd35fbaa777837b5a8ba188c068c7bc056347bd7077c9219cb0b501fa6500a65949734352983a00b320ebb05bcbf7564847fa6135cea0c3b5e53cbeba48847558392827e92a9738af10b3c6101f00b9f5d9d004c8", 0x2}, 0x20) 19:33:03 executing program 0 (fault-call:3 fault-nth:57): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x5, r1, 0x0, [0x305f, 0xa]}, 0x2c) 19:33:03 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1c, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e271f60d25b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318e2ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r2, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) 19:33:03 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000340)="2ee640ebb525860177a6f3b3645544f7f125a4af841a7953e22f84185b12aba908201cf2759c8677f246ab717dd60491126e844c7e94d0ccd01223f480a20d3d438ad0e8b8427a6c820851e393d9d961506ee1892c7470f3aaeeaa49878758372528d009cacf1747f56861d1cb2ba3eac51bbc638fa275674f380ddc1b4c90a39af37335c2f17d9ba7929d4252b0622e988bc91bbb48e0d9afac59de23e8f21fdf14d49280dafb4dd8d4c1be81f1baf445737df2aa3e0014642ca3122e92e272609c14144a0b51c839b562daf42dca81c670d852", &(0x7f0000000440)="c997c2302f06feb4e429ac04e02aed7e27d0941ccde49f764cb9397576e7af1c9c22e0bbac784d4425894d3b3f3fa1cdf47f4621fe78ebd35fbaa777837b5a8ba188c068c7bc056347bd7077c9219cb0b501fa6500a65949734352983a00b320ebb05bcbf7564847fa6135cea0c3b5e53cbeba48847558392827e92a9738af10b3c6101f00b9f5d9d004c8", 0x2}, 0x20) [ 734.839376][T12909] FAULT_INJECTION: forcing a failure. [ 734.839376][T12909] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 734.900112][T12909] CPU: 0 PID: 12909 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 734.908975][T12909] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 734.919057][T12909] Call Trace: [ 734.922377][T12909] dump_stack+0x197/0x210 [ 734.926833][T12909] should_fail.cold+0xa/0x15 [ 734.931455][T12909] ? fault_create_debugfs_attr+0x180/0x180 [ 734.937285][T12909] ? ___might_sleep+0x163/0x2c0 [ 734.942160][T12909] should_fail_alloc_page+0x50/0x60 [ 734.947366][T12909] __alloc_pages_nodemask+0x1a1/0x910 [ 734.952756][T12909] ? __alloc_pages_slowpath+0x2920/0x2920 [ 734.958487][T12909] __vmalloc_node_range+0x2fd/0x810 [ 734.963689][T12909] ? bpf_map_area_alloc+0x20/0x30 [ 734.968725][T12909] __vmalloc_node_flags_caller+0x71/0x90 [ 734.975301][T12909] ? bpf_map_area_alloc+0x20/0x30 [ 734.980319][T12909] __bpf_map_area_alloc+0xde/0xf0 [ 734.985342][T12909] bpf_map_area_alloc+0x20/0x30 [ 734.990184][T12909] htab_map_alloc+0x589/0x11c0 [ 734.994937][T12909] ? __kmalloc+0x608/0x770 [ 734.999340][T12909] ? bpf_get_file_flag+0x80/0x80 [ 735.004274][T12909] ? fput+0x1b/0x20 [ 735.008080][T12909] htab_of_map_alloc+0x71/0x100 [ 735.012918][T12909] ? htab_map_alloc+0x11c0/0x11c0 [ 735.017934][T12909] __do_sys_bpf+0x478/0x3810 [ 735.022516][T12909] ? bpf_prog_load+0x18f0/0x18f0 [ 735.027533][T12909] ? __kasan_check_write+0x14/0x20 [ 735.032734][T12909] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 735.038620][T12909] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 735.044107][T12909] ? wait_for_completion+0x440/0x440 [ 735.049409][T12909] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 735.055652][T12909] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 735.061275][T12909] ? do_syscall_64+0x26/0x790 [ 735.065968][T12909] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 735.072116][T12909] ? do_syscall_64+0x26/0x790 [ 735.076793][T12909] __x64_sys_bpf+0x73/0xb0 [ 735.081206][T12909] do_syscall_64+0xfa/0x790 [ 735.085702][T12909] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 735.091931][T12909] RIP: 0033:0x45a6f9 [ 735.095813][T12909] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 735.115509][T12909] RSP: 002b:00007f3ba2ab9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 735.124344][T12909] RAX: ffffffffffffffda RBX: 00007f3ba2ab9c90 RCX: 000000000045a6f9 [ 735.132305][T12909] RDX: 000000000000002c RSI: 0000000020000400 RDI: 0000000000000000 [ 735.140266][T12909] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 19:33:03 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000340)="2ee640ebb525860177a6f3b3645544f7f125a4af841a7953e22f84185b12aba908201cf2759c8677f246ab717dd60491126e844c7e94d0ccd01223f480a20d3d438ad0e8b8427a6c820851e393d9d961506ee1892c7470f3aaeeaa49878758372528d009cacf1747f56861d1cb2ba3eac51bbc638fa275674f380ddc1b4c90a39af37335c2f17d9ba7929d4252b0622e988bc91bbb48e0d9afac59de23e8f21fdf14d49280dafb4dd8d4c1be81f1baf445737df2aa3e0014642ca3122e92e272609c14144a0b51c839b562daf42dca81c670d852", &(0x7f0000000440)="c997c2302f06feb4e429ac04e02aed7e27d0941ccde49f764cb9397576e7af1c9c22e0bbac784d4425894d3b3f3fa1cdf47f4621fe78ebd35fbaa777837b5a8ba188c068c7bc056347bd7077c9219cb0b501fa6500a65949734352983a00b320ebb05bcbf7564847fa6135cea0c3b5e53cbeba48847558392827e92a9738af10b3c6101f00b9f5d9d004c8", 0x2}, 0x20) [ 735.148764][T12909] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3ba2aba6d4 [ 735.156728][T12909] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000005 19:33:09 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x0, 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x2, 0x3, 0x2) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000180)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000200)=[{&(0x7f00000002c0)=""/213, 0xd5}], 0x1}, 0x15120) r4 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000180)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) ioctl$TUNGETVNETHDRSZ(r5, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r5, 0x0, 0xf800000000000000) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r5, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r5, 0x2401, 0x80000001) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x13, 0x0, &(0x7f0000000080), &(0x7f00000000c0)='syzkaller\x00', 0x3, 0x0, 0x0, 0x21680, 0x1, [], r3, 0x17, r5, 0x8, &(0x7f00000003c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000400)={0x2, 0x6, 0x81}, 0x10, 0xffffffffffffffff, r0}, 0x78) sendmsg$inet(r1, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r1, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000040)=r7) 19:33:09 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1c, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e271f60d25b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318e2ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r2, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) 19:33:09 executing program 0 (fault-call:3 fault-nth:58): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x5, r1, 0x0, [0x305f, 0xa]}, 0x2c) 19:33:09 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000340)="2ee640ebb525860177a6f3b3645544f7f125a4af841a7953e22f84185b12aba908201cf2759c8677f246ab717dd60491126e844c7e94d0ccd01223f480a20d3d438ad0e8b8427a6c820851e393d9d961506ee1892c7470f3aaeeaa49878758372528d009cacf1747f56861d1cb2ba3eac51bbc638fa275674f380ddc1b4c90a39af37335c2f17d9ba7929d4252b0622e988bc91bbb48e0d9afac59de23e8f21fdf14d49280dafb4dd8d4c1be81f1baf445737df2aa3e0014642ca3122e92e272609c14144a0b51c839b562daf42dca81c670d852", &(0x7f0000000440)="c997c2302f06feb4e429ac04e02aed7e27d0941ccde49f764cb9397576e7af1c9c22e0bbac784d4425894d3b3f3fa1cdf47f4621fe78ebd35fbaa777837b5a8ba188c068c7bc056347bd7077c9219cb0b501fa6500a65949734352983a00b320ebb05bcbf7564847fa6135cea0c3b5e53cbeba48847558392827e92a9738af10b3c6101f00b9f5d9d004c8", 0x2}, 0x20) 19:33:09 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x324) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x891f, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') 19:33:09 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="036386dd"], 0x4) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000b796af4bafc0bea21b58bdd99e5419f163a11ddc0f32094f89ad3b6f92f5d999ba342b551282b5b2fb42715126696f4aa1786b009c798729eef14381491e7d5f3a7095af40c3af725f6cfaec7f6169f89f4bb503042ad18a9f9df099f9cde53a1652867ebc4f68dd3bd462c49e210fefebc1106e30080923275122f7d6359f6b8b57b5c5aedc43ccf1426c9dec512854cb7af0e6bc01b50895eef762f273bb"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = getpid() r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000140)={'team_slave_0\x00'}) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x3, 0x5, 0xa5, 0x0, 0x0, 0x451f587ba3fcddb3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x0, 0x6}, 0x400, 0x8001, 0xfffff800, 0x0, 0x0, 0x1}, r3, 0xffffffffffffffff, r4, 0x8) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0xb, 0x6, 0x3, 0xfc, 0x0, 0x2, 0x8000, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x81, 0x3, @perf_bp={&(0x7f0000000100), 0x4}, 0x10, 0x6, 0x800, 0x8, 0x9, 0x5, 0x7}, r3, 0x5, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x18000000000002a0, 0xe80, 0x0, &(0x7f0000000500)="b9ff0300000d698cb89e14f08864000fffff00004000638877fbac141421e9", 0x0, 0x100}, 0x28) [ 740.588497][T12939] FAULT_INJECTION: forcing a failure. [ 740.588497][T12939] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 740.607972][T12939] CPU: 1 PID: 12939 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 740.616974][T12939] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 740.627323][T12939] Call Trace: [ 740.630625][T12939] dump_stack+0x197/0x210 [ 740.634969][T12939] should_fail.cold+0xa/0x15 [ 740.639598][T12939] ? fault_create_debugfs_attr+0x180/0x180 [ 740.645409][T12939] ? ___might_sleep+0x163/0x2c0 [ 740.650268][T12939] should_fail_alloc_page+0x50/0x60 [ 740.655481][T12939] __alloc_pages_nodemask+0x1a1/0x910 [ 740.660846][T12939] ? __alloc_pages_slowpath+0x2920/0x2920 [ 740.666578][T12939] __vmalloc_node_range+0x2fd/0x810 [ 740.671793][T12939] ? bpf_map_area_alloc+0x20/0x30 [ 740.676825][T12939] __vmalloc_node_flags_caller+0x71/0x90 [ 740.682537][T12939] ? bpf_map_area_alloc+0x20/0x30 [ 740.687554][T12939] __bpf_map_area_alloc+0xde/0xf0 [ 740.692568][T12939] bpf_map_area_alloc+0x20/0x30 [ 740.697413][T12939] htab_map_alloc+0x589/0x11c0 [ 740.702191][T12939] ? __kmalloc+0x608/0x770 [ 740.706616][T12939] ? bpf_get_file_flag+0x80/0x80 [ 740.711571][T12939] ? fput+0x1b/0x20 [ 740.715371][T12939] htab_of_map_alloc+0x71/0x100 [ 740.720210][T12939] ? htab_map_alloc+0x11c0/0x11c0 [ 740.725530][T12939] __do_sys_bpf+0x478/0x3810 [ 740.730110][T12939] ? bpf_prog_load+0x18f0/0x18f0 [ 740.735121][T12939] ? __kasan_check_write+0x14/0x20 [ 740.740225][T12939] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 740.745756][T12939] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 740.751040][T12939] ? wait_for_completion+0x440/0x440 [ 740.756324][T12939] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 740.762567][T12939] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 740.768016][T12939] ? do_syscall_64+0x26/0x790 [ 740.772693][T12939] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 740.778747][T12939] ? do_syscall_64+0x26/0x790 [ 740.783414][T12939] __x64_sys_bpf+0x73/0xb0 [ 740.788190][T12939] do_syscall_64+0xfa/0x790 [ 740.792682][T12939] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 740.798605][T12939] RIP: 0033:0x45a6f9 [ 740.802637][T12939] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 740.822411][T12939] RSP: 002b:00007f3ba2ab9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 740.830815][T12939] RAX: ffffffffffffffda RBX: 00007f3ba2ab9c90 RCX: 000000000045a6f9 [ 740.838772][T12939] RDX: 000000000000002c RSI: 0000000020000400 RDI: 0000000000000000 [ 740.846740][T12939] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 740.854712][T12939] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3ba2aba6d4 [ 740.862671][T12939] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000005 19:33:09 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1c, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e271f60d25b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318e2ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r2, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) 19:33:09 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="850000004f0000003f00000000000000950000e600000000002ce85fbf62c21eb4d98183dd3c429de1c9486c70bfaa1243267d558865039af316a920c7e2b2ca81dde11ccf869c0d8d4add1f02645b52cd5fa052ac6f1ce71eb092d6aa8833238d4a939203656e384b45145c2ebc8b27040c493814ee51d4bcfc9ed7070afb5b5a17ff386243a11b2d2c53115d3c8e4c565bb4f9d3a29971f06cf45869c081787f6260b6f21854551f5ed4dac7a39847d928f5f33da8637f00c589cac9b859f624db94a7a9dd6187c46f63615afef93d594e53beebf5ae0ea05ad7af1c5072d32e37ef675a80f4729390d8b2ce649ffd2193b8e0c7c92f01909e61ed54e3b8757b7d43f4e593620ec1dd6ef2d2204c7db1b7c75e765f9cd1cb5334"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000340)="2ee640ebb525860177a6f3b3645544f7f125a4af841a7953e22f84185b12aba908201cf2759c8677f246ab717dd60491126e844c7e94d0ccd01223f480a20d3d438ad0e8b8427a6c820851e393d9d961506ee1892c7470f3aaeeaa49878758372528d009cacf1747f56861d1cb2ba3eac51bbc638fa275674f380ddc1b4c90a39af37335c2f17d9ba7929d4252b0622e988bc91bbb48e0d9afac59de23e8f21fdf14d49280dafb4dd8d4c1be81f1baf445737df2aa3e0014642ca3122e92e272609c14144a0b51c839b562daf42dca81c670d852", &(0x7f0000000440)="c997c2302f06feb4e429ac04e02aed7e27d0941ccde49f764cb9397576e7af1c9c22e0bbac784d4425894d3b3f3fa1cdf47f4621fe78ebd35fbaa777837b5a8ba188c068c7bc056347bd7077c9219cb0b501fa6500a65949734352983a00b320ebb05bcbf7564847fa6135cea0c3b5e53cbeba48847558392827e92a9738af10b3c6101f00b9f5d9d004c8", 0x2}, 0x20) 19:33:09 executing program 0 (fault-call:3 fault-nth:59): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x5, r1, 0x0, [0x305f, 0xa]}, 0x2c) 19:33:09 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000340)="2ee640ebb525860177a6f3b3645544f7f125a4af841a7953e22f84185b12aba908201cf2759c8677f246ab717dd60491126e844c7e94d0ccd01223f480a20d3d438ad0e8b8427a6c820851e393d9d961506ee1892c7470f3aaeeaa49878758372528d009cacf1747f56861d1cb2ba3eac51bbc638fa275674f380ddc1b4c90a39af37335c2f17d9ba7929d4252b0622e988bc91bbb48e0d9afac59de23e8f21fdf14d49280dafb4dd8d4c1be81f1baf445737df2aa3e0014642ca3122e92e272609c14144a0b51c839b562daf42dca81c670d852", &(0x7f0000000440)="c997c2302f06feb4e429ac04e02aed7e27d0941ccde49f764cb9397576e7af1c9c22e0bbac784d4425894d3b3f3fa1cdf47f4621fe78ebd35fbaa777837b5a8ba188c068c7bc056347bd7077c9219cb0b501fa6500a65949734352983a00b320ebb05bcbf7564847fa6135cea0c3b5e53cbeba48847558392827e92a9738af10b3c6101f00b9f5d9d004c8", 0x2}, 0x20) [ 741.084464][T12953] FAULT_INJECTION: forcing a failure. [ 741.084464][T12953] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 741.170201][T12953] CPU: 0 PID: 12953 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 741.178930][T12953] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 741.189003][T12953] Call Trace: [ 741.192316][T12953] dump_stack+0x197/0x210 [ 741.196666][T12953] should_fail.cold+0xa/0x15 [ 741.201283][T12953] ? fault_create_debugfs_attr+0x180/0x180 [ 741.207115][T12953] ? ___might_sleep+0x163/0x2c0 [ 741.212017][T12953] should_fail_alloc_page+0x50/0x60 19:33:09 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x2a, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r2, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) [ 741.217239][T12953] __alloc_pages_nodemask+0x1a1/0x910 [ 741.222634][T12953] ? __alloc_pages_slowpath+0x2920/0x2920 [ 741.228405][T12953] __vmalloc_node_range+0x2fd/0x810 [ 741.233625][T12953] ? bpf_map_area_alloc+0x20/0x30 [ 741.238656][T12953] __vmalloc_node_flags_caller+0x71/0x90 [ 741.244304][T12953] ? bpf_map_area_alloc+0x20/0x30 [ 741.249346][T12953] __bpf_map_area_alloc+0xde/0xf0 [ 741.254383][T12953] bpf_map_area_alloc+0x20/0x30 [ 741.259237][T12953] htab_map_alloc+0x589/0x11c0 [ 741.264011][T12953] ? __kmalloc+0x608/0x770 19:33:09 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000340)="2ee640ebb525860177a6f3b3645544f7f125a4af841a7953e22f84185b12aba908201cf2759c8677f246ab717dd60491126e844c7e94d0ccd01223f480a20d3d438ad0e8b8427a6c820851e393d9d961506ee1892c7470f3aaeeaa49878758372528d009cacf1747f56861d1cb2ba3eac51bbc638fa275674f380ddc1b4c90a39af37335c2f17d9ba7929d4252b0622e988bc91bbb48e0d9afac59de23e8f21fdf14d49280dafb4dd8d4c1be81f1baf445737df2aa3e0014642ca3122e92e272609c14144a0b51c839b562daf42dca81c670d852", &(0x7f0000000440)="c997c2302f06feb4e429ac04e02aed7e27d0941ccde49f764cb9397576e7af1c9c22e0bbac784d4425894d3b3f3fa1cdf47f4621fe78ebd35fbaa777837b5a8ba188c068c7bc056347bd7077c9219cb0b501fa6500a65949734352983a00b320ebb05bcbf7564847fa6135cea0c3b5e53cbeba48847558392827e92a9738af10b3c6101f00b9f5d9d004c8", 0x2}, 0x20) [ 741.268784][T12953] ? bpf_get_file_flag+0x80/0x80 [ 741.273915][T12953] ? fput+0x1b/0x20 [ 741.277761][T12953] htab_of_map_alloc+0x71/0x100 [ 741.282614][T12953] ? htab_map_alloc+0x11c0/0x11c0 [ 741.287646][T12953] __do_sys_bpf+0x478/0x3810 [ 741.292268][T12953] ? bpf_prog_load+0x18f0/0x18f0 [ 741.297220][T12953] ? __kasan_check_write+0x14/0x20 [ 741.302350][T12953] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 741.307909][T12953] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 741.313214][T12953] ? wait_for_completion+0x440/0x440 [ 741.318527][T12953] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 741.324794][T12953] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 741.324810][T12953] ? do_syscall_64+0x26/0x790 [ 741.324824][T12953] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 741.324837][T12953] ? do_syscall_64+0x26/0x790 [ 741.324859][T12953] __x64_sys_bpf+0x73/0xb0 [ 741.324876][T12953] do_syscall_64+0xfa/0x790 [ 741.324893][T12953] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 741.324904][T12953] RIP: 0033:0x45a6f9 [ 741.324918][T12953] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 741.324925][T12953] RSP: 002b:00007f3ba2ab9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 741.324937][T12953] RAX: ffffffffffffffda RBX: 00007f3ba2ab9c90 RCX: 000000000045a6f9 [ 741.324952][T12953] RDX: 000000000000002c RSI: 0000000020000400 RDI: 0000000000000000 [ 741.341560][T12953] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 741.341573][T12953] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3ba2aba6d4 [ 741.429194][T12953] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000005 19:33:18 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x0, 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x2, 0x3, 0x2) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000180)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000200)=[{&(0x7f00000002c0)=""/213, 0xd5}], 0x1}, 0x15120) r4 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000180)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) ioctl$TUNGETVNETHDRSZ(r5, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r5, 0x0, 0xf800000000000000) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r5, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r5, 0x2401, 0x80000001) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x13, 0x0, &(0x7f0000000080), &(0x7f00000000c0)='syzkaller\x00', 0x3, 0x0, 0x0, 0x21680, 0x1, [], r3, 0x17, r5, 0x8, &(0x7f00000003c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000400)={0x2, 0x6, 0x81}, 0x10, 0xffffffffffffffff, r0}, 0x78) sendmsg$inet(r1, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r1, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000040)=r7) 19:33:18 executing program 0 (fault-call:3 fault-nth:60): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x5, r1, 0x0, [0x305f, 0xa]}, 0x2c) 19:33:18 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x2a, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e271f60d25b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318e2ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7eaa49c62ba0fe52fa65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd31a08b32808b802000000000000ea334d83239dd2"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r2, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) 19:33:18 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000340)="2ee640ebb525860177a6f3b3645544f7f125a4af841a7953e22f84185b12aba908201cf2759c8677f246ab717dd60491126e844c7e94d0ccd01223f480a20d3d438ad0e8b8427a6c820851e393d9d961506ee1892c7470f3aaeeaa49878758372528d009cacf1747f56861d1cb2ba3eac51bbc638fa275674f380ddc1b4c90a39af37335c2f17d9ba7929d4252b0622e988bc91bbb48e0d9afac59de23e8f21fdf14d49280dafb4dd8d4c1be81f1baf445737df2aa3e0014642ca3122e92e272609c14144a0b51c839b562daf42dca81c670d852", &(0x7f0000000440)="c997c2302f06feb4e429ac04e02aed7e27d0941ccde49f764cb9397576e7af1c9c22e0bbac784d4425894d3b3f3fa1cdf47f4621fe78ebd35fbaa777837b5a8ba188c068c7bc056347bd7077c9219cb0b501fa6500a65949734352983a00b320ebb05bcbf7564847fa6135cea0c3b5e53cbeba48847558392827e92a9738af10b3c6101f00b9f5d9d004c8", 0x2}, 0x20) 19:33:18 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x324) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8920, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') 19:33:18 executing program 2: r0 = gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xc0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, &(0x7f0000000200)=0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=0x6}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r0, r1, 0x0, 0xd1, &(0x7f0000000080)='memory.high\x00\x90\x80\xa4\x96\xbb\xe4\xb2\xa2\x01\xc0\xb8*Z\xef\xf8\x0e\x1f]\xf7\x10\xdb\xfe\xe4\x1d\xc6\x92\x7f\xeeK_p\t\x8c\x9f5\xd0\xef)\xd8\x04\xbf\xc2N\x1c\xf0R\xdc\r\xb1Gf\xba\xd11#<\xaf^,s\x85\x10R\x99\xc2D\xee\n\"\xf9c\x15{\xc1[\xef\x06\x8a\xcd\x9d\xc8\x90#\xd0\xe7\xe3\xe0\xa9\xf3\xc0n\x1f\xd1\x11P\xe20\xcd\x1c\xfa\xfd\xa3\xcf\x9c\xc6\xb7]\x16\xc7\xd7\xb4/\x82\xd1\xae\xd9TM\x05a\xe5\xc5U\x91\xbe\x81\xac4\x9d\x02`\xe7\xa6q\x1f@\x1f\x1f?tm\x9c\xd1\x8c\xa1\xb5\xe0`H)\x97r\xc0?y\x9cc=c`A^\x9f\xcd\xbc\xf4m>I\xae\xdf\x946\xe7M`\xeb\x9fm\xbe+n\x00\x18k\x98\xab\xd5\xeet\"d\x81\x94\x04\xf5\xeb', r2}, 0x30) openat$cgroup(0xffffffffffffffff, &(0x7f0000000500)='syz0\x00', 0x200002, 0x0) socket$kcm(0xa, 0x0, 0x0) socketpair(0x0, 0x5, 0x0, &(0x7f00000000c0)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x7, 0x4, 0x0, 0x101}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r3, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x161) r7 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r8 = gettid() socket$kcm(0x2, 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xfffffffffffffef3, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, &(0x7f0000000200)=0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=0x6}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r8, 0xffffffffffffffff, 0x0, 0xbc, &(0x7f0000000080)='memory.high\x00\x90\x80\xa4\x96\xbb\xe4\xb2\xa2\x01\xc0\xb8*Z\xef\xf8\x0e\x1f]\xf7\x10\xdb\xfe\xe4\x1d\xc6\x92\x7f\xeeK_p\t\x8c\x9f5\xd0\xef)\xd8\x04\xbf\xc2N\x1c\xf0R\xdc\r\xb1Gf\xba\xd11#<\xaf^,s\x85\x10R\x99\xc2D\xee\n\"\xf9c\x15{\xc1[\xef\x06\x8a\xcd\x9d\xc8\x90#\xd0\xe7\xe3\xe0\xa9\xf3\xc0n\x1f\xd1\x11P\xe20\xcd\x1c\xfa\xfd\xa3\xcf\x9c\xc6\xb7]\x16\xc7\xd7\xb4/\x82\xd1\xae\xd9TM\x05a\xe5\xc5U\x91\xbe\x81\xac4\x9d\x02`\xe7\xa6q\x1f@\x1f\x1f?tm\x9c\xd1\x8c\xa1\xb5\xe0`H)\x97r\xc0?y\x9cc=c`A^\x9f\xcd\xbc\xf4m>I\xae\xdf\x946\xe7M`\xeb\x9fm\xbe+n\x00\x18k\x98\xab\xd5\xeet\"d\x81\x94\x04\xf5\xeb', r9}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000a40)={0x0, r7, 0x0, 0x15, &(0x7f0000000a00)='\x80+@cpuset.nodevppp1)\x00', r9}, 0x30) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={r4, 0x5}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000640)={r4, 0xfffffffd, 0x8}, 0xc) recvmsg(0xffffffffffffffff, 0x0, 0x2301) r10 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='s\x00\x00kaller\b', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r10, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0xe80, 0xe0ffffff, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010105090100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) socketpair(0x0, 0x0, 0x2, &(0x7f00000001c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x7, 0x80000000, 0x0, 0x0, 0x1, 0x1, 0x1ff, [], 0x0, 0xffffffffffffffff, 0x1, 0x2}, 0x3c) [ 749.921071][T12982] FAULT_INJECTION: forcing a failure. [ 749.921071][T12982] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 749.934942][T12982] CPU: 0 PID: 12982 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 749.943689][T12982] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 749.953942][T12982] Call Trace: [ 749.957255][T12982] dump_stack+0x197/0x210 [ 749.961622][T12982] should_fail.cold+0xa/0x15 [ 749.966469][T12982] ? fault_create_debugfs_attr+0x180/0x180 [ 749.972418][T12982] ? ___might_sleep+0x163/0x2c0 [ 749.977339][T12982] should_fail_alloc_page+0x50/0x60 [ 749.982553][T12982] __alloc_pages_nodemask+0x1a1/0x910 [ 749.988048][T12982] ? __alloc_pages_slowpath+0x2920/0x2920 [ 749.993910][T12982] __vmalloc_node_range+0x2fd/0x810 [ 749.999120][T12982] ? bpf_map_area_alloc+0x20/0x30 [ 750.004176][T12982] __vmalloc_node_flags_caller+0x71/0x90 [ 750.009806][T12982] ? bpf_map_area_alloc+0x20/0x30 [ 750.014833][T12982] __bpf_map_area_alloc+0xde/0xf0 [ 750.019862][T12982] bpf_map_area_alloc+0x20/0x30 [ 750.024715][T12982] htab_map_alloc+0x589/0x11c0 [ 750.029473][T12982] ? __kmalloc+0x608/0x770 [ 750.033899][T12982] ? bpf_get_file_flag+0x80/0x80 [ 750.038832][T12982] ? fput+0x1b/0x20 [ 750.042722][T12982] htab_of_map_alloc+0x71/0x100 [ 750.047572][T12982] ? htab_map_alloc+0x11c0/0x11c0 [ 750.052584][T12982] __do_sys_bpf+0x478/0x3810 [ 750.057189][T12982] ? bpf_prog_load+0x18f0/0x18f0 [ 750.062170][T12982] ? __kasan_check_write+0x14/0x20 [ 750.067394][T12982] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 750.072967][T12982] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 750.078346][T12982] ? wait_for_completion+0x440/0x440 [ 750.083641][T12982] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 750.089886][T12982] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 750.100384][T12982] ? do_syscall_64+0x26/0x790 [ 750.105055][T12982] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 750.111142][T12982] ? do_syscall_64+0x26/0x790 [ 750.115833][T12982] __x64_sys_bpf+0x73/0xb0 [ 750.120246][T12982] do_syscall_64+0xfa/0x790 [ 750.124752][T12982] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 750.130632][T12982] RIP: 0033:0x45a6f9 [ 750.134519][T12982] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 750.154912][T12982] RSP: 002b:00007f3ba2ab9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 750.163312][T12982] RAX: ffffffffffffffda RBX: 00007f3ba2ab9c90 RCX: 000000000045a6f9 [ 750.171366][T12982] RDX: 000000000000002c RSI: 0000000020000400 RDI: 0000000000000000 [ 750.179425][T12982] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 750.187393][T12982] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3ba2aba6d4 [ 750.195353][T12982] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000005 19:33:18 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000340)="2ee640ebb525860177a6f3b3645544f7f125a4af841a7953e22f84185b12aba908201cf2759c8677f246ab717dd60491126e844c7e94d0ccd01223f480a20d3d438ad0e8b8427a6c820851e393d9d961506ee1892c7470f3aaeeaa49878758372528d009cacf1747f56861d1cb2ba3eac51bbc638fa275674f380ddc1b4c90a39af37335c2f17d9ba7929d4252b0622e988bc91bbb48e0d9afac59de23e8f21fdf14d49280dafb4dd8d4c1be81f1baf445737df2aa3e0014642ca3122e92e272609c14144a0b51c839b562daf42dca81c670d852", &(0x7f0000000440)="c997c2302f06feb4e429ac04e02aed7e27d0941ccde49f764cb9397576e7af1c9c22e0bbac784d4425894d3b3f3fa1cdf47f4621fe78ebd35fbaa777837b5a8ba188c068c7bc056347bd7077c9219cb0b501fa6500a65949734352983a00b320ebb05bcbf7564847fa6135cea0c3b5e53cbeba48847558392827e92a9738af10b3c6101f00b9f5d9d004c8", 0x2}, 0x20) 19:33:18 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x2a, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r2, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) 19:33:18 executing program 0 (fault-call:3 fault-nth:61): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x5, r1, 0x0, [0x305f, 0xa]}, 0x2c) 19:33:18 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) socket$kcm(0x2, 0x3, 0x2) socket$kcm(0x2, 0x1000000000000002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x3) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0xff, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(r2, &(0x7f0000000100)='cgroup.stat\x00', 0x0, 0x0) socket$kcm(0x29, 0x4, 0x0) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000300)=r3) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f00000002c0)=0xa7) perf_event_open(&(0x7f0000000180)={0x1, 0xffffffffffffffd1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) perf_event_open(&(0x7f0000000340)={0xaff886739fca9b64, 0x70, 0xae, 0x8b, 0x81, 0xfd, 0x0, 0x3, 0x20040, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0x1f}, 0x200, 0x95, 0x93b, 0x6, 0xda0, 0x6, 0x7f}, r4, 0xe, 0xffffffffffffffff, 0x0) r5 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r6, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r6, 0x0, 0xf800000000000000) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r6, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r6, 0x2401, 0x80000001) r7 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r8 = openat$cgroup_ro(r7, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r8, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r8, 0x0, 0xf800000000000000) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r8, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r8, 0x2401, 0x80000001) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x40082406, &(0x7f0000000440)='\x9e\xf8J\x8e\xaf\xb6$\xbd\xb6m\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) r9 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r10 = openat$cgroup_ro(r9, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r10, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r10, 0x0, 0xf800000000000000) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r10, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r10, 0x2401, 0x80000001) [ 750.414381][T13006] FAULT_INJECTION: forcing a failure. [ 750.414381][T13006] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 750.460786][T13006] CPU: 0 PID: 13006 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 750.469507][T13006] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 750.479563][T13006] Call Trace: [ 750.479593][T13006] dump_stack+0x197/0x210 [ 750.479614][T13006] should_fail.cold+0xa/0x15 [ 750.479632][T13006] ? fault_create_debugfs_attr+0x180/0x180 [ 750.479647][T13006] ? ___might_sleep+0x163/0x2c0 [ 750.479671][T13006] should_fail_alloc_page+0x50/0x60 [ 750.479684][T13006] __alloc_pages_nodemask+0x1a1/0x910 [ 750.479707][T13006] ? __alloc_pages_slowpath+0x2920/0x2920 [ 750.519315][T13006] __vmalloc_node_range+0x2fd/0x810 [ 750.524571][T13006] ? bpf_map_area_alloc+0x20/0x30 [ 750.524593][T13006] __vmalloc_node_flags_caller+0x71/0x90 [ 750.535359][T13006] ? bpf_map_area_alloc+0x20/0x30 [ 750.540410][T13006] __bpf_map_area_alloc+0xde/0xf0 [ 750.545461][T13006] bpf_map_area_alloc+0x20/0x30 [ 750.550331][T13006] htab_map_alloc+0x589/0x11c0 [ 750.555101][T13006] ? __kmalloc+0x608/0x770 [ 750.555117][T13006] ? bpf_get_file_flag+0x80/0x80 [ 750.555137][T13006] ? fput+0x1b/0x20 [ 750.555157][T13006] htab_of_map_alloc+0x71/0x100 [ 750.555170][T13006] ? htab_map_alloc+0x11c0/0x11c0 [ 750.555184][T13006] __do_sys_bpf+0x478/0x3810 [ 750.555205][T13006] ? bpf_prog_load+0x18f0/0x18f0 [ 750.555219][T13006] ? __kasan_check_write+0x14/0x20 [ 750.555235][T13006] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 750.555252][T13006] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 750.555268][T13006] ? wait_for_completion+0x440/0x440 19:33:19 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000340)="2ee640ebb525860177a6f3b3645544f7f125a4af841a7953e22f84185b12aba908201cf2759c8677f246ab717dd60491126e844c7e94d0ccd01223f480a20d3d438ad0e8b8427a6c820851e393d9d961506ee1892c7470f3aaeeaa49878758372528d009cacf1747f56861d1cb2ba3eac51bbc638fa275674f380ddc1b4c90a39af37335c2f17d9ba7929d4252b0622e988bc91bbb48e0d9afac59de23e8f21fdf14d49280dafb4dd8d4c1be81f1baf445737df2aa3e0014642ca3122e92e272609c14144a0b51c839b562daf42dca81c670d852", &(0x7f0000000440)="c997c2302f06feb4e429ac04e02aed7e27d0941ccde49f764cb9397576e7af1c9c22e0bbac784d4425894d3b3f3fa1cdf47f4621fe78ebd35fbaa777837b5a8ba188c068c7bc056347bd7077c9219cb0b501fa6500a65949734352983a00b320ebb05bcbf7564847fa6135cea0c3b5e53cbeba48847558392827e92a9738af10b3c6101f00b9f5d9d004c8", 0x2}, 0x20) 19:33:19 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x31, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r2, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) [ 750.555290][T13006] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 750.555321][T13006] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 750.555336][T13006] ? do_syscall_64+0x26/0x790 [ 750.555351][T13006] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 750.555364][T13006] ? do_syscall_64+0x26/0x790 [ 750.555384][T13006] __x64_sys_bpf+0x73/0xb0 [ 750.555401][T13006] do_syscall_64+0xfa/0x790 [ 750.555419][T13006] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 750.555432][T13006] RIP: 0033:0x45a6f9 [ 750.555448][T13006] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 750.555455][T13006] RSP: 002b:00007f3ba2ab9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 750.555469][T13006] RAX: ffffffffffffffda RBX: 00007f3ba2ab9c90 RCX: 000000000045a6f9 [ 750.555477][T13006] RDX: 000000000000002c RSI: 0000000020000400 RDI: 0000000000000000 [ 750.555485][T13006] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 750.555493][T13006] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3ba2aba6d4 [ 750.555516][T13006] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000005 [ 750.825923][T13021] device nr0 entered promiscuous mode 19:33:27 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x0, 0x24, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x2, 0x3, 0x2) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000180)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000200)=[{&(0x7f00000002c0)=""/213, 0xd5}], 0x1}, 0x15120) r4 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000180)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) ioctl$TUNGETVNETHDRSZ(r5, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r5, 0x0, 0xf800000000000000) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r5, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r5, 0x2401, 0x80000001) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x13, 0x0, &(0x7f0000000080), &(0x7f00000000c0)='syzkaller\x00', 0x3, 0x0, 0x0, 0x21680, 0x1, [], r3, 0x17, r5, 0x8, &(0x7f00000003c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000400)={0x2, 0x6, 0x81}, 0x10, 0xffffffffffffffff, r0}, 0x78) sendmsg$inet(r1, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r1, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000040)=r7) 19:33:27 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x31, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r2, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) 19:33:27 executing program 0 (fault-call:3 fault-nth:62): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x5, r1, 0x0, [0x305f, 0xa]}, 0x2c) 19:33:27 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000340)="2ee640ebb525860177a6f3b3645544f7f125a4af841a7953e22f84185b12aba908201cf2759c8677f246ab717dd60491126e844c7e94d0ccd01223f480a20d3d438ad0e8b8427a6c820851e393d9d961506ee1892c7470f3aaeeaa49878758372528d009cacf1747f56861d1cb2ba3eac51bbc638fa275674f380ddc1b4c90a39af37335c2f17d9ba7929d4252b0622e988bc91bbb48e0d9afac59de23e8f21fdf14d49280dafb4dd8d4c1be81f1baf445737df2aa3e0014642ca3122e92e272609c14144a0b51c839b562daf42dca81c670d852", &(0x7f0000000440)="c997c2302f06feb4e429ac04e02aed7e27d0941ccde49f764cb9397576e7af1c9c22e0bbac784d4425894d3b3f3fa1cdf47f4621fe78ebd35fbaa777837b5a8ba188c068c7bc056347bd7077c9219cb0b501fa6500a65949734352983a00b320ebb05bcbf7564847fa6135cea0c3b5e53cbeba48847558392827e92a9738af10b3c6101f00b9f5d9d004c8", 0x2}, 0x20) 19:33:27 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x324) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8921, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') 19:33:27 executing program 2: r0 = socket$kcm(0x2, 0x3, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000700)={'team0\x00\x00\x00\x00\x00\x00\x00\xf7\x00', @local}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x4) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x40) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x80, 0x5}, 0xc) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000700)={'team0\x00\x00\x00\x00\x00\x00\x00\xf7\x00', @broadcast}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) r3 = gettid() r4 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x1f, 0x9, 0x2, 0x9, 0x0, 0xffffffffffffffff, 0x42000, 0x8, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80, 0x0, @perf_config_ext={0x9, 0x5}, 0x400, 0xd7, 0xffffffff, 0x7, 0x7, 0x4, 0x80}, r3, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000280)='veth0\x00') r5 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8946, &(0x7f00000001c0)='veth0\x00') close(r5) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2845f}, r3, 0xb, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='team0\x00\x00\x00\x00\x00\x00\x00\xf7\x00'}, 0x10) ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffff"]) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) gettid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) socket$kcm(0x11, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000004c0)) [ 759.163164][T13039] FAULT_INJECTION: forcing a failure. [ 759.163164][T13039] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 759.176671][T13039] CPU: 1 PID: 13039 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 759.185367][T13039] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 759.195435][T13039] Call Trace: [ 759.198767][T13039] dump_stack+0x197/0x210 [ 759.203123][T13039] should_fail.cold+0xa/0x15 [ 759.207734][T13039] ? fault_create_debugfs_attr+0x180/0x180 [ 759.213539][T13039] ? ___might_sleep+0x163/0x2c0 [ 759.218397][T13039] should_fail_alloc_page+0x50/0x60 [ 759.223623][T13039] __alloc_pages_nodemask+0x1a1/0x910 [ 759.229007][T13039] ? __alloc_pages_slowpath+0x2920/0x2920 [ 759.234744][T13039] __vmalloc_node_range+0x2fd/0x810 [ 759.239949][T13039] ? bpf_map_area_alloc+0x20/0x30 [ 759.244961][T13039] __vmalloc_node_flags_caller+0x71/0x90 [ 759.250587][T13039] ? bpf_map_area_alloc+0x20/0x30 [ 759.255607][T13039] __bpf_map_area_alloc+0xde/0xf0 [ 759.260623][T13039] bpf_map_area_alloc+0x20/0x30 [ 759.265465][T13039] htab_map_alloc+0x589/0x11c0 [ 759.270414][T13039] ? __kmalloc+0x608/0x770 [ 759.274830][T13039] ? bpf_get_file_flag+0x80/0x80 [ 759.279891][T13039] ? fput+0x1b/0x20 [ 759.283712][T13039] htab_of_map_alloc+0x71/0x100 [ 759.288577][T13039] ? htab_map_alloc+0x11c0/0x11c0 [ 759.293599][T13039] __do_sys_bpf+0x478/0x3810 [ 759.298195][T13039] ? bpf_prog_load+0x18f0/0x18f0 [ 759.303141][T13039] ? __kasan_check_write+0x14/0x20 [ 759.308258][T13039] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 759.313802][T13039] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 759.319076][T13039] ? wait_for_completion+0x440/0x440 [ 759.324354][T13039] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 759.330591][T13039] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 759.336036][T13039] ? do_syscall_64+0x26/0x790 [ 759.340698][T13039] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 759.346752][T13039] ? do_syscall_64+0x26/0x790 [ 759.351421][T13039] __x64_sys_bpf+0x73/0xb0 [ 759.355827][T13039] do_syscall_64+0xfa/0x790 [ 759.360321][T13039] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 759.366199][T13039] RIP: 0033:0x45a6f9 [ 759.370083][T13039] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 759.389860][T13039] RSP: 002b:00007f3ba2ab9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 759.398366][T13039] RAX: ffffffffffffffda RBX: 00007f3ba2ab9c90 RCX: 000000000045a6f9 [ 759.406329][T13039] RDX: 000000000000002c RSI: 0000000020000400 RDI: 0000000000000000 19:33:28 executing program 0 (fault-call:3 fault-nth:63): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x5, r1, 0x0, [0x305f, 0xa]}, 0x2c) [ 759.414294][T13039] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 759.422270][T13039] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3ba2aba6d4 [ 759.430233][T13039] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000005 19:33:28 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x0, 0x0, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000340)="2ee640ebb525860177a6f3b3645544f7f125a4af841a7953e22f84185b12aba908201cf2759c8677f246ab717dd60491126e844c7e94d0ccd01223f480a20d3d438ad0e8b8427a6c820851e393d9d961506ee1892c7470f3aaeeaa49878758372528d009cacf1747f56861d1cb2ba3eac51bbc638fa275674f380ddc1b4c90a39af37335c2f17d9ba7929d4252b0622e988bc91bbb48e0d9afac59de23e8f21fdf14d49280dafb4dd8d4c1be81f1baf445737df2aa3e0014642ca3122e92e272609c14144a0b51c839b562daf42dca81c670d852", &(0x7f0000000440)="c997c2302f06feb4e429ac04e02aed7e27d0941ccde49f764cb9397576e7af1c9c22e0bbac784d4425894d3b3f3fa1cdf47f4621fe78ebd35fbaa777837b5a8ba188c068c7bc056347bd7077c9219cb0b501fa6500a65949734352983a00b320ebb05bcbf7564847fa6135cea0c3b5e53cbeba48847558392827e92a9738af10b3c6101f00b9f5d9d004c8", 0x2}, 0x20) 19:33:28 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x31, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r2, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) [ 759.580524][T13056] FAULT_INJECTION: forcing a failure. [ 759.580524][T13056] name fail_page_alloc, interval 1, probability 0, space 0, times 0 19:33:28 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x0, 0x0, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000340)="2ee640ebb525860177a6f3b3645544f7f125a4af841a7953e22f84185b12aba908201cf2759c8677f246ab717dd60491126e844c7e94d0ccd01223f480a20d3d438ad0e8b8427a6c820851e393d9d961506ee1892c7470f3aaeeaa49878758372528d009cacf1747f56861d1cb2ba3eac51bbc638fa275674f380ddc1b4c90a39af37335c2f17d9ba7929d4252b0622e988bc91bbb48e0d9afac59de23e8f21fdf14d49280dafb4dd8d4c1be81f1baf445737df2aa3e0014642ca3122e92e272609c14144a0b51c839b562daf42dca81c670d852", &(0x7f0000000440)="c997c2302f06feb4e429ac04e02aed7e27d0941ccde49f764cb9397576e7af1c9c22e0bbac784d4425894d3b3f3fa1cdf47f4621fe78ebd35fbaa777837b5a8ba188c068c7bc056347bd7077c9219cb0b501fa6500a65949734352983a00b320ebb05bcbf7564847fa6135cea0c3b5e53cbeba48847558392827e92a9738af10b3c6101f00b9f5d9d004c8", 0x2}, 0x20) [ 759.686867][T13056] CPU: 1 PID: 13056 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 759.698742][T13056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 759.698757][T13056] Call Trace: [ 759.712140][T13056] dump_stack+0x197/0x210 [ 759.716509][T13056] should_fail.cold+0xa/0x15 [ 759.721127][T13056] ? fault_create_debugfs_attr+0x180/0x180 [ 759.727160][T13056] ? ___might_sleep+0x163/0x2c0 [ 759.732042][T13056] should_fail_alloc_page+0x50/0x60 [ 759.737261][T13056] __alloc_pages_nodemask+0x1a1/0x910 [ 759.742651][T13056] ? __alloc_pages_slowpath+0x2920/0x2920 [ 759.742684][T13056] __vmalloc_node_range+0x2fd/0x810 [ 759.742707][T13056] ? bpf_map_area_alloc+0x20/0x30 [ 759.742727][T13056] __vmalloc_node_flags_caller+0x71/0x90 [ 759.742740][T13056] ? bpf_map_area_alloc+0x20/0x30 [ 759.742759][T13056] __bpf_map_area_alloc+0xde/0xf0 [ 759.774454][T13056] bpf_map_area_alloc+0x20/0x30 [ 759.774473][T13056] htab_map_alloc+0x589/0x11c0 [ 759.774483][T13056] ? __kmalloc+0x608/0x770 [ 759.774500][T13056] ? bpf_get_file_flag+0x80/0x80 [ 759.784104][T13056] ? fput+0x1b/0x20 [ 759.784125][T13056] htab_of_map_alloc+0x71/0x100 [ 759.784136][T13056] ? htab_map_alloc+0x11c0/0x11c0 [ 759.784150][T13056] __do_sys_bpf+0x478/0x3810 [ 759.784168][T13056] ? bpf_prog_load+0x18f0/0x18f0 [ 759.784181][T13056] ? __kasan_check_write+0x14/0x20 [ 759.784203][T13056] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 759.828075][T13056] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 759.833372][T13056] ? wait_for_completion+0x440/0x440 [ 759.833397][T13056] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 759.833423][T13056] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 759.833435][T13056] ? do_syscall_64+0x26/0x790 [ 759.833453][T13056] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 759.844966][T13056] ? do_syscall_64+0x26/0x790 [ 759.844988][T13056] __x64_sys_bpf+0x73/0xb0 [ 759.845006][T13056] do_syscall_64+0xfa/0x790 [ 759.845024][T13056] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 759.845034][T13056] RIP: 0033:0x45a6f9 [ 759.845048][T13056] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 759.845055][T13056] RSP: 002b:00007f3ba2a98c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 759.845068][T13056] RAX: ffffffffffffffda RBX: 00007f3ba2a98c90 RCX: 000000000045a6f9 [ 759.845081][T13056] RDX: 000000000000002c RSI: 0000000020000400 RDI: 0000000000000000 [ 759.884892][T13056] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 19:33:28 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x0, 0x0, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000340)="2ee640ebb525860177a6f3b3645544f7f125a4af841a7953e22f84185b12aba908201cf2759c8677f246ab717dd60491126e844c7e94d0ccd01223f480a20d3d438ad0e8b8427a6c820851e393d9d961506ee1892c7470f3aaeeaa49878758372528d009cacf1747f56861d1cb2ba3eac51bbc638fa275674f380ddc1b4c90a39af37335c2f17d9ba7929d4252b0622e988bc91bbb48e0d9afac59de23e8f21fdf14d49280dafb4dd8d4c1be81f1baf445737df2aa3e0014642ca3122e92e272609c14144a0b51c839b562daf42dca81c670d852", &(0x7f0000000440)="c997c2302f06feb4e429ac04e02aed7e27d0941ccde49f764cb9397576e7af1c9c22e0bbac784d4425894d3b3f3fa1cdf47f4621fe78ebd35fbaa777837b5a8ba188c068c7bc056347bd7077c9219cb0b501fa6500a65949734352983a00b320ebb05bcbf7564847fa6135cea0c3b5e53cbeba48847558392827e92a9738af10b3c6101f00b9f5d9d004c8", 0x2}, 0x20) 19:33:28 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x35, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r2, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) [ 759.938161][T13056] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3ba2a996d4 [ 759.946147][T13056] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000005 [ 760.024513][T13054] device team0 entered promiscuous mode [ 760.034648][T13054] device team_slave_0 entered promiscuous mode [ 760.072658][T13054] device team_slave_1 entered promiscuous mode [ 760.123334][T13054] 8021q: adding VLAN 0 to HW filter on device team0 [ 760.184377][T13049] device team0 left promiscuous mode [ 760.189896][T13049] device team_slave_0 left promiscuous mode [ 760.203988][T13049] device team_slave_1 left promiscuous mode [ 760.283180][T13054] device team0 entered promiscuous mode [ 760.289022][T13054] device team_slave_0 entered promiscuous mode [ 760.299350][T13054] device team_slave_1 entered promiscuous mode [ 760.310092][T13054] 8021q: adding VLAN 0 to HW filter on device team0 19:33:36 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x0, 0x24, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x2, 0x3, 0x2) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000180)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000200)=[{&(0x7f00000002c0)=""/213, 0xd5}], 0x1}, 0x15120) r4 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000180)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) ioctl$TUNGETVNETHDRSZ(r5, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r5, 0x0, 0xf800000000000000) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r5, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r5, 0x2401, 0x80000001) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x13, 0x0, &(0x7f0000000080), &(0x7f00000000c0)='syzkaller\x00', 0x3, 0x0, 0x0, 0x21680, 0x1, [], r3, 0x17, r5, 0x8, &(0x7f00000003c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000400)={0x2, 0x6, 0x81}, 0x10, 0xffffffffffffffff, r0}, 0x78) sendmsg$inet(r1, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r1, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000040)=r7) 19:33:36 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x35, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e271f60d25b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318e2ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7eaa49c62ba0fe52fa65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd31a08b32808b802000000000000ea334d83239dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad979"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r2, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) 19:33:36 executing program 0 (fault-call:3 fault-nth:64): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x5, r1, 0x0, [0x305f, 0xa]}, 0x2c) 19:33:36 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x0, &(0x7f0000000500)=ANY=[], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000340)="2ee640ebb525860177a6f3b3645544f7f125a4af841a7953e22f84185b12aba908201cf2759c8677f246ab717dd60491126e844c7e94d0ccd01223f480a20d3d438ad0e8b8427a6c820851e393d9d961506ee1892c7470f3aaeeaa49878758372528d009cacf1747f56861d1cb2ba3eac51bbc638fa275674f380ddc1b4c90a39af37335c2f17d9ba7929d4252b0622e988bc91bbb48e0d9afac59de23e8f21fdf14d49280dafb4dd8d4c1be81f1baf445737df2aa3e0014642ca3122e92e272609c14144a0b51c839b562daf42dca81c670d852", &(0x7f0000000440)="c997c2302f06feb4e429ac04e02aed7e27d0941ccde49f764cb9397576e7af1c9c22e0bbac784d4425894d3b3f3fa1cdf47f4621fe78ebd35fbaa777837b5a8ba188c068c7bc056347bd7077c9219cb0b501fa6500a65949734352983a00b320ebb05bcbf7564847fa6135cea0c3b5e53cbeba48847558392827e92a9738af10b3c6101f00b9f5d9d004c8", 0x2}, 0x20) 19:33:36 executing program 2: r0 = socket$kcm(0x2, 0x3, 0x2) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000700)={'team0\x00\x00\x00\x00\x00\x00\x00\xf7\x00', @local}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x4) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x40) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x80, 0x5}, 0xc) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000700)={'team0\x00\x00\x00\x00\x00\x00\x00\xf7\x00', @broadcast}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) r3 = gettid() r4 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x1f, 0x9, 0x2, 0x9, 0x0, 0xffffffffffffffff, 0x42000, 0x8, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80, 0x0, @perf_config_ext={0x9, 0x5}, 0x400, 0xd7, 0xffffffff, 0x7, 0x7, 0x4, 0x80}, r3, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000280)='veth0\x00') r5 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8946, &(0x7f00000001c0)='veth0\x00') close(r5) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2845f}, r3, 0xb, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='team0\x00\x00\x00\x00\x00\x00\x00\xf7\x00'}, 0x10) ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffff"]) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) gettid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) socket$kcm(0x11, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000004c0)) 19:33:36 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x324) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8922, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') [ 767.631063][T13092] FAULT_INJECTION: forcing a failure. [ 767.631063][T13092] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 767.645521][T13089] device team0 left promiscuous mode [ 767.650996][T13089] device team_slave_0 left promiscuous mode [ 767.656768][T13092] CPU: 1 PID: 13092 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 767.657330][T13089] device team_slave_1 left promiscuous mode [ 767.665572][T13092] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 767.665579][T13092] Call Trace: [ 767.665609][T13092] dump_stack+0x197/0x210 [ 767.665640][T13092] should_fail.cold+0xa/0x15 [ 767.665660][T13092] ? fault_create_debugfs_attr+0x180/0x180 [ 767.665675][T13092] ? ___might_sleep+0x163/0x2c0 [ 767.665704][T13092] should_fail_alloc_page+0x50/0x60 [ 767.710380][T13092] __alloc_pages_nodemask+0x1a1/0x910 [ 767.715773][T13092] ? __alloc_pages_slowpath+0x2920/0x2920 [ 767.721667][T13092] __vmalloc_node_range+0x2fd/0x810 [ 767.727948][T13092] ? bpf_map_area_alloc+0x20/0x30 [ 767.733152][T13092] __vmalloc_node_flags_caller+0x71/0x90 [ 767.738808][T13092] ? bpf_map_area_alloc+0x20/0x30 [ 767.743851][T13092] __bpf_map_area_alloc+0xde/0xf0 [ 767.749100][T13092] bpf_map_area_alloc+0x20/0x30 [ 767.753999][T13092] htab_map_alloc+0x589/0x11c0 [ 767.758770][T13092] ? __kmalloc+0x608/0x770 [ 767.763194][T13092] ? bpf_get_file_flag+0x80/0x80 [ 767.768157][T13092] ? fput+0x1b/0x20 [ 767.772001][T13092] htab_of_map_alloc+0x71/0x100 [ 767.776956][T13092] ? htab_map_alloc+0x11c0/0x11c0 [ 767.782001][T13092] __do_sys_bpf+0x478/0x3810 [ 767.786607][T13092] ? bpf_prog_load+0x18f0/0x18f0 [ 767.791668][T13092] ? __kasan_check_write+0x14/0x20 [ 767.796788][T13092] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 767.796807][T13092] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 767.796825][T13092] ? wait_for_completion+0x440/0x440 [ 767.796861][T13092] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 767.796891][T13092] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 767.807830][T13092] ? do_syscall_64+0x26/0x790 [ 767.807849][T13092] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 767.807862][T13092] ? do_syscall_64+0x26/0x790 [ 767.807881][T13092] __x64_sys_bpf+0x73/0xb0 [ 767.807901][T13092] do_syscall_64+0xfa/0x790 [ 767.835658][T13092] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 767.835671][T13092] RIP: 0033:0x45a6f9 [ 767.835686][T13092] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 19:33:36 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x0, &(0x7f0000000500)=ANY=[], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000340)="2ee640ebb525860177a6f3b3645544f7f125a4af841a7953e22f84185b12aba908201cf2759c8677f246ab717dd60491126e844c7e94d0ccd01223f480a20d3d438ad0e8b8427a6c820851e393d9d961506ee1892c7470f3aaeeaa49878758372528d009cacf1747f56861d1cb2ba3eac51bbc638fa275674f380ddc1b4c90a39af37335c2f17d9ba7929d4252b0622e988bc91bbb48e0d9afac59de23e8f21fdf14d49280dafb4dd8d4c1be81f1baf445737df2aa3e0014642ca3122e92e272609c14144a0b51c839b562daf42dca81c670d852", &(0x7f0000000440)="c997c2302f06feb4e429ac04e02aed7e27d0941ccde49f764cb9397576e7af1c9c22e0bbac784d4425894d3b3f3fa1cdf47f4621fe78ebd35fbaa777837b5a8ba188c068c7bc056347bd7077c9219cb0b501fa6500a65949734352983a00b320ebb05bcbf7564847fa6135cea0c3b5e53cbeba48847558392827e92a9738af10b3c6101f00b9f5d9d004c8", 0x2}, 0x20) [ 767.835693][T13092] RSP: 002b:00007f3ba2ab9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 767.835707][T13092] RAX: ffffffffffffffda RBX: 00007f3ba2ab9c90 RCX: 000000000045a6f9 [ 767.835715][T13092] RDX: 000000000000002c RSI: 0000000020000400 RDI: 0000000000000000 [ 767.835724][T13092] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 767.835733][T13092] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3ba2aba6d4 [ 767.835741][T13092] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000005 19:33:36 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x35, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e271f60d25b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318e2ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7eaa49c62ba0fe52fa65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd31a08b32808b802000000000000ea334d83239dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad979"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r2, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) 19:33:36 executing program 0 (fault-call:3 fault-nth:65): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x5, r1, 0x0, [0x305f, 0xa]}, 0x2c) 19:33:36 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x37, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r2, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) 19:33:36 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x0, &(0x7f0000000500)=ANY=[], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000340)="2ee640ebb525860177a6f3b3645544f7f125a4af841a7953e22f84185b12aba908201cf2759c8677f246ab717dd60491126e844c7e94d0ccd01223f480a20d3d438ad0e8b8427a6c820851e393d9d961506ee1892c7470f3aaeeaa49878758372528d009cacf1747f56861d1cb2ba3eac51bbc638fa275674f380ddc1b4c90a39af37335c2f17d9ba7929d4252b0622e988bc91bbb48e0d9afac59de23e8f21fdf14d49280dafb4dd8d4c1be81f1baf445737df2aa3e0014642ca3122e92e272609c14144a0b51c839b562daf42dca81c670d852", &(0x7f0000000440)="c997c2302f06feb4e429ac04e02aed7e27d0941ccde49f764cb9397576e7af1c9c22e0bbac784d4425894d3b3f3fa1cdf47f4621fe78ebd35fbaa777837b5a8ba188c068c7bc056347bd7077c9219cb0b501fa6500a65949734352983a00b320ebb05bcbf7564847fa6135cea0c3b5e53cbeba48847558392827e92a9738af10b3c6101f00b9f5d9d004c8", 0x2}, 0x20) 19:33:36 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x37, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r2, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) [ 768.154219][T13101] device team0 entered promiscuous mode [ 768.159824][T13101] device team_slave_0 entered promiscuous mode [ 768.212943][T13101] device team_slave_1 entered promiscuous mode [ 768.234275][T13101] 8021q: adding VLAN 0 to HW filter on device team0 [ 768.240593][T13125] FAULT_INJECTION: forcing a failure. [ 768.240593][T13125] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 768.249660][T13102] nr0: mtu less than device minimum [ 768.266182][T13125] CPU: 1 PID: 13125 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 768.274930][T13125] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 768.285176][T13125] Call Trace: [ 768.288580][T13125] dump_stack+0x197/0x210 [ 768.292959][T13125] should_fail.cold+0xa/0x15 [ 768.292981][T13125] ? fault_create_debugfs_attr+0x180/0x180 [ 768.292997][T13125] ? ___might_sleep+0x163/0x2c0 [ 768.293018][T13125] should_fail_alloc_page+0x50/0x60 [ 768.293031][T13125] __alloc_pages_nodemask+0x1a1/0x910 [ 768.293050][T13125] ? __alloc_pages_slowpath+0x2920/0x2920 [ 768.303468][T13125] __vmalloc_node_range+0x2fd/0x810 [ 768.303492][T13125] ? bpf_map_area_alloc+0x20/0x30 [ 768.303510][T13125] __vmalloc_node_flags_caller+0x71/0x90 [ 768.342098][T13125] ? bpf_map_area_alloc+0x20/0x30 [ 768.347118][T13125] __bpf_map_area_alloc+0xde/0xf0 [ 768.352214][T13125] bpf_map_area_alloc+0x20/0x30 [ 768.357186][T13125] htab_map_alloc+0x589/0x11c0 [ 768.362200][T13125] ? __kmalloc+0x608/0x770 [ 768.366638][T13125] ? bpf_get_file_flag+0x80/0x80 [ 768.371658][T13125] ? fput+0x1b/0x20 [ 768.375887][T13125] htab_of_map_alloc+0x71/0x100 [ 768.380745][T13125] ? htab_map_alloc+0x11c0/0x11c0 [ 768.386030][T13125] __do_sys_bpf+0x478/0x3810 [ 768.390636][T13125] ? bpf_prog_load+0x18f0/0x18f0 [ 768.395575][T13125] ? __kasan_check_write+0x14/0x20 [ 768.400704][T13125] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 768.407145][T13125] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 768.412483][T13125] ? wait_for_completion+0x440/0x440 [ 768.417933][T13125] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 768.424177][T13125] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 768.429634][T13125] ? do_syscall_64+0x26/0x790 [ 768.434309][T13125] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 768.440379][T13125] ? do_syscall_64+0x26/0x790 [ 768.445333][T13125] __x64_sys_bpf+0x73/0xb0 [ 768.449747][T13125] do_syscall_64+0xfa/0x790 [ 768.454262][T13125] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 768.460172][T13125] RIP: 0033:0x45a6f9 [ 768.464060][T13125] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 768.483785][T13125] RSP: 002b:00007f3ba2a98c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 768.492206][T13125] RAX: ffffffffffffffda RBX: 00007f3ba2a98c90 RCX: 000000000045a6f9 [ 768.500184][T13125] RDX: 000000000000002c RSI: 0000000020000400 RDI: 0000000000000000 [ 768.508180][T13125] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 768.516163][T13125] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3ba2a996d4 [ 768.524153][T13125] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000005 [ 768.747621][T13093] nr0: mtu less than device minimum 19:33:43 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x0, 0x24, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x2, 0x3, 0x2) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000180)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000200)=[{&(0x7f00000002c0)=""/213, 0xd5}], 0x1}, 0x15120) r4 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000180)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) ioctl$TUNGETVNETHDRSZ(r5, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r5, 0x0, 0xf800000000000000) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r5, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r5, 0x2401, 0x80000001) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x13, 0x0, &(0x7f0000000080), &(0x7f00000000c0)='syzkaller\x00', 0x3, 0x0, 0x0, 0x21680, 0x1, [], r3, 0x17, r5, 0x8, &(0x7f00000003c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000400)={0x2, 0x6, 0x81}, 0x10, 0xffffffffffffffff, r0}, 0x78) sendmsg$inet(r1, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r1, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000040)=r7) 19:33:43 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000340)="2ee640ebb525860177a6f3b3645544f7f125a4af841a7953e22f84185b12aba908201cf2759c8677f246ab717dd60491126e844c7e94d0ccd01223f480a20d3d438ad0e8b8427a6c820851e393d9d961506ee1892c7470f3aaeeaa49878758372528d009cacf1747f56861d1cb2ba3eac51bbc638fa275674f380ddc1b4c90a39af37335c2f17d9ba7929d4252b0622e988bc91bbb48e0d9afac59de23e8f21fdf14d49280dafb4dd8d4c1be81f1baf445737df2aa3e0014642ca3122e92e272609c14144a0b51c839b562daf42dca81c670d852", &(0x7f0000000440)="c997c2302f06feb4e429ac04e02aed7e27d0941ccde49f764cb9397576e7af1c9c22e0bbac784d4425894d3b3f3fa1cdf47f4621fe78ebd35fbaa777837b5a8ba188c068c7bc056347bd7077c9219cb0b501fa6500a65949734352983a00b320ebb05bcbf7564847fa6135cea0c3b5e53cbeba48847558392827e92a9738af10b3c6101f00b9f5d9d004c8", 0x2}, 0x20) 19:33:43 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x37, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r2, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) 19:33:43 executing program 0 (fault-call:3 fault-nth:66): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x5, r1, 0x0, [0x305f, 0xa]}, 0x2c) 19:33:43 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2f, 0x3d}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x1, 0x5ed, &(0x7f000000cf3d)=""/195}, 0x48) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r2, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r2, 0x0, 0xf800000000000000) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'veth0_to_bond\x00', 0x20}) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x80000001) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r4, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r4, 0x0, 0xf800000000000000) r5 = getpid() r6 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r7 = openat$cgroup_ro(r6, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r7, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r7, 0x0, 0xf800000000000000) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r7, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r7, 0x2401, 0x80000001) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, r5, 0x13, r7, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x80000001) ioctl$TUNSETFILTEREBPF(r2, 0x800454e1, &(0x7f0000000080)=r4) 19:33:43 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x324) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8923, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') [ 774.809312][T13142] FAULT_INJECTION: forcing a failure. [ 774.809312][T13142] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 774.840671][T13142] CPU: 0 PID: 13142 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 774.849401][T13142] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 19:33:43 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000340)="2ee640ebb525860177a6f3b3645544f7f125a4af841a7953e22f84185b12aba908201cf2759c8677f246ab717dd60491126e844c7e94d0ccd01223f480a20d3d438ad0e8b8427a6c820851e393d9d961506ee1892c7470f3aaeeaa49878758372528d009cacf1747f56861d1cb2ba3eac51bbc638fa275674f380ddc1b4c90a39af37335c2f17d9ba7929d4252b0622e988bc91bbb48e0d9afac59de23e8f21fdf14d49280dafb4dd8d4c1be81f1baf445737df2aa3e0014642ca3122e92e272609c14144a0b51c839b562daf42dca81c670d852", &(0x7f0000000440)="c997c2302f06feb4e429ac04e02aed7e27d0941ccde49f764cb9397576e7af1c9c22e0bbac784d4425894d3b3f3fa1cdf47f4621fe78ebd35fbaa777837b5a8ba188c068c7bc056347bd7077c9219cb0b501fa6500a65949734352983a00b320ebb05bcbf7564847fa6135cea0c3b5e53cbeba48847558392827e92a9738af10b3c6101f00b9f5d9d004c8", 0x2}, 0x20) [ 774.859642][T13142] Call Trace: [ 774.862953][T13142] dump_stack+0x197/0x210 [ 774.867303][T13142] should_fail.cold+0xa/0x15 [ 774.871916][T13142] ? fault_create_debugfs_attr+0x180/0x180 [ 774.877751][T13142] ? ___might_sleep+0x163/0x2c0 [ 774.882638][T13142] should_fail_alloc_page+0x50/0x60 [ 774.888571][T13142] __alloc_pages_nodemask+0x1a1/0x910 [ 774.894048][T13142] ? __alloc_pages_slowpath+0x2920/0x2920 [ 774.899788][T13142] __vmalloc_node_range+0x2fd/0x810 [ 774.905050][T13142] ? bpf_map_area_alloc+0x20/0x30 [ 774.910090][T13142] __vmalloc_node_flags_caller+0x71/0x90 [ 774.915747][T13142] ? bpf_map_area_alloc+0x20/0x30 [ 774.920798][T13142] __bpf_map_area_alloc+0xde/0xf0 [ 774.925848][T13142] bpf_map_area_alloc+0x20/0x30 [ 774.930904][T13142] htab_map_alloc+0x589/0x11c0 [ 774.935693][T13142] ? __kmalloc+0x608/0x770 [ 774.940136][T13142] ? bpf_get_file_flag+0x80/0x80 [ 774.945182][T13142] ? fput+0x1b/0x20 [ 774.949072][T13142] htab_of_map_alloc+0x71/0x100 [ 774.953932][T13142] ? htab_map_alloc+0x11c0/0x11c0 19:33:43 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000340)="2ee640ebb525860177a6f3b3645544f7f125a4af841a7953e22f84185b12aba908201cf2759c8677f246ab717dd60491126e844c7e94d0ccd01223f480a20d3d438ad0e8b8427a6c820851e393d9d961506ee1892c7470f3aaeeaa49878758372528d009cacf1747f56861d1cb2ba3eac51bbc638fa275674f380ddc1b4c90a39af37335c2f17d9ba7929d4252b0622e988bc91bbb48e0d9afac59de23e8f21fdf14d49280dafb4dd8d4c1be81f1baf445737df2aa3e0014642ca3122e92e272609c14144a0b51c839b562daf42dca81c670d852", &(0x7f0000000440)="c997c2302f06feb4e429ac04e02aed7e27d0941ccde49f764cb9397576e7af1c9c22e0bbac784d4425894d3b3f3fa1cdf47f4621fe78ebd35fbaa777837b5a8ba188c068c7bc056347bd7077c9219cb0b501fa6500a65949734352983a00b320ebb05bcbf7564847fa6135cea0c3b5e53cbeba48847558392827e92a9738af10b3c6101f00b9f5d9d004c8", 0x2}, 0x20) [ 774.958968][T13142] __do_sys_bpf+0x478/0x3810 [ 774.963831][T13142] ? bpf_prog_load+0x18f0/0x18f0 [ 774.968781][T13142] ? __kasan_check_write+0x14/0x20 [ 774.973999][T13142] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 774.979560][T13142] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 774.984851][T13142] ? wait_for_completion+0x440/0x440 [ 774.984872][T13142] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 774.984899][T13142] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 774.984912][T13142] ? do_syscall_64+0x26/0x790 [ 774.984924][T13142] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 774.984941][T13142] ? do_syscall_64+0x26/0x790 [ 775.006594][T13142] __x64_sys_bpf+0x73/0xb0 [ 775.006616][T13142] do_syscall_64+0xfa/0x790 [ 775.026342][T13142] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 775.032264][T13142] RIP: 0033:0x45a6f9 [ 775.036177][T13142] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 19:33:43 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x11, &(0x7f0000000500)=ANY=[@ANYBLOB="850000004f0000003f00000000000000950000e600000000002ce85fbf62c21eb4d98183dd3c429de1c9486c70bfaa1243267d558865039af316a920c7e2b2ca81dde11ccf869c0d8d4add1f02645b52cd5fa052ac6f1ce71eb092d6aa8833238d4a939203656e384b45145c2ebc8b27040c493814ee51d4bcfc9ed7070afb5b5a17ff386243a11b2d2c53115d3c"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000340)="2ee640ebb525860177a6f3b3645544f7f125a4af841a7953e22f84185b12aba908201cf2759c8677f246ab717dd60491126e844c7e94d0ccd01223f480a20d3d438ad0e8b8427a6c820851e393d9d961506ee1892c7470f3aaeeaa49878758372528d009cacf1747f56861d1cb2ba3eac51bbc638fa275674f380ddc1b4c90a39af37335c2f17d9ba7929d4252b0622e988bc91bbb48e0d9afac59de23e8f21fdf14d49280dafb4dd8d4c1be81f1baf445737df2aa3e0014642ca3122e92e272609c14144a0b51c839b562daf42dca81c670d852", &(0x7f0000000440)="c997c2302f06feb4e429ac04e02aed7e27d0941ccde49f764cb9397576e7af1c9c22e0bbac784d4425894d3b3f3fa1cdf47f4621fe78ebd35fbaa777837b5a8ba188c068c7bc056347bd7077c9219cb0b501fa6500a65949734352983a00b320ebb05bcbf7564847fa6135cea0c3b5e53cbeba48847558392827e92a9738af10b3c6101f00b9f5d9d004c8", 0x2}, 0x20) [ 775.056142][T13142] RSP: 002b:00007f3ba2ab9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 775.064575][T13142] RAX: ffffffffffffffda RBX: 00007f3ba2ab9c90 RCX: 000000000045a6f9 [ 775.072574][T13142] RDX: 000000000000002c RSI: 0000000020000400 RDI: 0000000000000000 [ 775.080589][T13142] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 775.088576][T13142] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3ba2aba6d4 [ 775.096567][T13142] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000005 19:33:43 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x38, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e271f60d25b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318e2ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7eaa49c62ba0fe52fa65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd31a08b32808b802000000000000ea334d83239dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc18cae2ed4b4390af9a9ceaf"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r2, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) 19:33:43 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x324) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8922, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') 19:33:43 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x38, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e271f60d25b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318e2ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7eaa49c62ba0fe52fa65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd31a08b32808b802000000000000ea334d83239dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc18cae2ed4b4390af9a9ceaf"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r2, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) [ 775.290457][T13162] nr0: mtu less than device minimum 19:33:50 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x0, 0x37, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x2, 0x3, 0x2) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000180)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000200)=[{&(0x7f00000002c0)=""/213, 0xd5}], 0x1}, 0x15120) r4 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000180)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) ioctl$TUNGETVNETHDRSZ(r5, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r5, 0x0, 0xf800000000000000) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r5, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r5, 0x2401, 0x80000001) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x13, 0x0, &(0x7f0000000080), &(0x7f00000000c0)='syzkaller\x00', 0x3, 0x0, 0x0, 0x21680, 0x1, [], r3, 0x17, r5, 0x8, &(0x7f00000003c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000400)={0x2, 0x6, 0x81}, 0x10, 0xffffffffffffffff, r0}, 0x78) sendmsg$inet(r1, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r1, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000040)=r7) 19:33:50 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x11, &(0x7f0000000500)=ANY=[@ANYBLOB="850000004f0000003f00000000000000950000e600000000002ce85fbf62c21eb4d98183dd3c429de1c9486c70bfaa1243267d558865039af316a920c7e2b2ca81dde11ccf869c0d8d4add1f02645b52cd5fa052ac6f1ce71eb092d6aa8833238d4a939203656e384b45145c2ebc8b27040c493814ee51d4bcfc9ed7070afb5b5a17ff386243a11b2d2c53115d3c"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000340)="2ee640ebb525860177a6f3b3645544f7f125a4af841a7953e22f84185b12aba908201cf2759c8677f246ab717dd60491126e844c7e94d0ccd01223f480a20d3d438ad0e8b8427a6c820851e393d9d961506ee1892c7470f3aaeeaa49878758372528d009cacf1747f56861d1cb2ba3eac51bbc638fa275674f380ddc1b4c90a39af37335c2f17d9ba7929d4252b0622e988bc91bbb48e0d9afac59de23e8f21fdf14d49280dafb4dd8d4c1be81f1baf445737df2aa3e0014642ca3122e92e272609c14144a0b51c839b562daf42dca81c670d852", &(0x7f0000000440)="c997c2302f06feb4e429ac04e02aed7e27d0941ccde49f764cb9397576e7af1c9c22e0bbac784d4425894d3b3f3fa1cdf47f4621fe78ebd35fbaa777837b5a8ba188c068c7bc056347bd7077c9219cb0b501fa6500a65949734352983a00b320ebb05bcbf7564847fa6135cea0c3b5e53cbeba48847558392827e92a9738af10b3c6101f00b9f5d9d004c8", 0x2}, 0x20) 19:33:50 executing program 0 (fault-call:3 fault-nth:67): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x5, r1, 0x0, [0x305f, 0xa]}, 0x2c) 19:33:50 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x38, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r2, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) 19:33:50 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x324) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8924, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') 19:33:50 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x3628, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000140)={'team_slave_0\x00'}) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x2, 0x3, 0x5, 0xa5, 0x0, 0x0, 0x451f587ba3fcddb3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x0, 0x6}, 0x400, 0x8001, 0xfffff800, 0x0, 0x0, 0x1}, r1, 0xffffffffffffffff, r2, 0x8) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r4, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r4, 0x0, 0xf800000000000000) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r4, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x80000001) perf_event_open(&(0x7f0000000280)={0x763fa438e852df55, 0x70, 0x3f, 0x39, 0x5, 0x6, 0x0, 0x8, 0x80000, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x101, 0x5, @perf_bp={&(0x7f0000000000), 0x4}, 0x1800, 0x200, 0x7, 0x3, 0x8, 0x7ff, 0x2}, r1, 0x5, r4, 0x5379bf9f108d6cb8) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="ce25ccd44b54769041e161e9e0cee137153b0ad14e1b16dc207c4ced8b9608381231207d11f1de9b04370e3c69946a3f83683c6a7b6c8a54008b3ac2ee8ae760853b788b2d0a8f020010d8d980eaa67fc21da2a20fa5a59a0c429ede171c2aa7a566d84843686573c99f71d6ed2bf9efdfbb4a097eccc2dbed43e08290784fb6557a4afc44725838bd5b111143bb1f694c3e713b82cdc76734df1c4c92419330dc5012872613b792c127b431f4d89e27affef833d134caf80bb80bcee3a7213c00000000000000"], 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) r5 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r6, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r6, 0x0, 0xf800000000000000) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r6, 0x1) r7 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r8 = openat$cgroup_ro(r7, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r8, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r8, 0x0, 0xf800000000000000) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r8, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r8, 0x2401, 0x80000001) r9 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r10 = openat$cgroup_ro(r9, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r10, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r10, 0x0, 0xf800000000000000) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r10, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r10, 0x2401, 0x80000001) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x4) [ 781.990161][ T27] audit: type=1804 audit(1576006430.563:55): pid=13179 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir959784610/syzkaller.Jfsvcs/235/memory.events" dev="sda1" ino=16588 res=1 [ 782.021951][T13180] FAULT_INJECTION: forcing a failure. [ 782.021951][T13180] name fail_page_alloc, interval 1, probability 0, space 0, times 0 19:33:50 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)=@sco={0x1f, {0x2, 0x7f, 0x81, 0x3, 0x4, 0x3}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000001200)="a698e00f52d42746cc02f952851c70ab2855f051eb8365b7ad788648d5d6f127e9b3dd83e8bd4b718e445bed7c295da11342d20b96de4cf859763eb2385f745f456b87162759c068d075cddb5771238988eabb4aa5a221413f7d67a0579e1c8fc64b117f320d1cd7fdb0cf2df92eb8d16a079a6d14327b1933f74931f1d32b7f20fc72694304e36d7362fc04db72ff64706b1ff38abd640de6157933c8232d4f675077f2fb0737f541d7ab69976693ef61d5471d07a46a71b72bd0e98b15e998c1a3495e8162b82018c4141794955bdfb7455db54e40e55d730970b0f8405d1a715786fa50ea1236329b1b017ed6fda83061b0", 0xf3}], 0x1, &(0x7f0000001300)=[{0xf8, 0x14, 0x7f, "a33a32d2a334878ab4af0c0056d2c9d340af9a5ea0d8957a6a1378324fae03b61d618a1748bca6702d928d6234515e8ae97341c3dfa1fe1c9c20fd33c08e3af0ccd28082204631f76e7c4c95fab83d28c77411708b162fe849eb4e1dcc03f144dc2c73a33d9afbd79cd414b9e72f980a8a52279ef64370aa2b2a1d352f91095e1b8381e5b7b27cb6486859f6a510e0e7a95c5c755986b15a1c51dd146803ec105a8e502d837a7192c661108585ad3848fd52e971e7c4e4ffc0d10e79c58c6d19625508a7e36c2c72b81480d27f7b3179e4c815a4529bdd693aef30711d41ce1b851d5157"}, {0x38, 0x29, 0x7, "2414c791ab7743dd4066708d49f15d52ef8416cbb1bb363dac47b93a9c99655de65b8edf"}, {0x1010, 0x113, 0x6, "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"}, {0x30, 0x3b9, 0x9, "8a7bd9695caaf49486ed3cced684d049b647d8edbfa0df2f87f740c506c0"}, {0xa8, 0x115, 0x9068, "af92134bf6c8000d0435be5299d386199bee59ce0eaa8cf15cd4776be806a78dec1c0be14fd0235801087785c41161e85e1a2d9cf28702a11b11928d052d02045275c27f9097486262d21065cc84cc92424852c92f972a5a0792f332378eb22494ee24c4d29bfade517488c8280f5b562dbebed413b02615cdaaebf863ce394b7737ea7a114153a1de6245d7d5b584a990"}], 0x1218}, 0x8000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) recvmsg$kcm(r0, &(0x7f0000004800)={&(0x7f0000004600)=@xdp, 0x80, &(0x7f00000046c0)=[{&(0x7f0000004680)=""/8, 0x8}], 0x1, &(0x7f0000004700)=""/208, 0xd0}, 0x143) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4}, [@alu={0x7, 0x1, 0x9, 0x6, 0xb, 0x58}]}, &(0x7f0000000040)='GPL\x00', 0x7, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 782.041613][T13180] CPU: 0 PID: 13180 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 782.051039][T13180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 782.061143][T13180] Call Trace: [ 782.064457][T13180] dump_stack+0x197/0x210 [ 782.068825][T13180] should_fail.cold+0xa/0x15 [ 782.073448][T13180] ? fault_create_debugfs_attr+0x180/0x180 [ 782.079275][T13180] ? ___might_sleep+0x163/0x2c0 [ 782.084171][T13180] should_fail_alloc_page+0x50/0x60 [ 782.089397][T13180] __alloc_pages_nodemask+0x1a1/0x910 [ 782.094801][T13180] ? __alloc_pages_slowpath+0x2920/0x2920 [ 782.101264][T13180] __vmalloc_node_range+0x2fd/0x810 [ 782.106502][T13180] ? bpf_map_area_alloc+0x20/0x30 [ 782.111589][T13180] __vmalloc_node_flags_caller+0x71/0x90 [ 782.117249][T13180] ? bpf_map_area_alloc+0x20/0x30 [ 782.122295][T13180] __bpf_map_area_alloc+0xde/0xf0 [ 782.127344][T13180] bpf_map_area_alloc+0x20/0x30 [ 782.132220][T13180] htab_map_alloc+0x589/0x11c0 [ 782.136998][T13180] ? __kmalloc+0x608/0x770 19:33:50 executing program 2: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2}}, 0xfffffc58, &(0x7f0000000700)=[{&(0x7f0000000440)="c4", 0xffe0}], 0x1, &(0x7f0000000380)=[{0x18, 0x84, 0x7, '\n'}], 0xffffffc5}, 0xfc) [ 782.141437][T13180] ? bpf_get_file_flag+0x80/0x80 [ 782.146404][T13180] ? fput+0x1b/0x20 [ 782.150226][T13180] htab_of_map_alloc+0x71/0x100 [ 782.155091][T13180] ? htab_map_alloc+0x11c0/0x11c0 [ 782.160175][T13180] __do_sys_bpf+0x478/0x3810 [ 782.164785][T13180] ? bpf_prog_load+0x18f0/0x18f0 [ 782.169745][T13180] ? __kasan_check_write+0x14/0x20 [ 782.174869][T13180] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 782.174883][T13180] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 782.174899][T13180] ? wait_for_completion+0x440/0x440 [ 782.174919][T13180] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 782.174946][T13180] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 782.174961][T13180] ? do_syscall_64+0x26/0x790 [ 782.174974][T13180] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 782.174986][T13180] ? do_syscall_64+0x26/0x790 [ 782.175004][T13180] __x64_sys_bpf+0x73/0xb0 [ 782.175022][T13180] do_syscall_64+0xfa/0x790 [ 782.191155][T13180] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 782.191169][T13180] RIP: 0033:0x45a6f9 19:33:50 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x20, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) mkdirat$cgroup(r1, &(0x7f0000000000)='syz0\x00', 0x1ff) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f0000000100)={0x2, 0x70, 0x3, 0x0, 0x3f, 0x1f, 0x0, 0x3ff, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x0, 0x0, 0x0, 0x4f78b3bf39b888aa, 0x0, 0x5, 0x3}, r2, 0x0, 0xffffffffffffffff, 0x8) r3 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000000)={0xa, 0x1ff, 0x4, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r3, &(0x7f0000000340), &(0x7f0000000400)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000c88000)={r3, &(0x7f0000847f95), &(0x7f000089b000)}, 0x20) r4 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000000)={0xa, 0x1ff, 0x4, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x10) r5 = socket$kcm(0x10, 0x2, 0x10) r6 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r6, &(0x7f0000000080)={0x0, 0x1200, &(0x7f0000000040)=[{&(0x7f0000000000)="2e0000002c008151e00f80ecdb4cb904014865160b00014105000000000800140e00060000000001000000000300", 0x2d6}], 0x1}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000580)=ANY=[@ANYRESDEC=r6, @ANYRESDEC=r5, @ANYPTR, @ANYBLOB="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", @ANYPTR=&(0x7f0000000400)=ANY=[@ANYRES16=0x0, @ANYRES16=r4, @ANYRES16=r2]], 0xa1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000019c0)={&(0x7f0000000900)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000001980)}, 0x1) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r7, &(0x7f0000000180)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) r8 = openat$cgroup(r0, &(0x7f00000004c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_int(r8, &(0x7f0000000440)='hugetlb.2MB.failcnt\x00', 0x2, 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r9, &(0x7f0000000180)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) r10 = openat$cgroup_ro(r9, &(0x7f0000000540)='cpuset?effectid\xf9g\xa0ems\x00', 0x7a05, 0x1700) write$cgroup_subtree(r10, &(0x7f0000000000)=ANY=[], 0x32600) bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x7, 0x4, 0x8}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140), 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0x0, 0x5}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0x0, 0x6, 0x10}, 0xc) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000007340)={&(0x7f0000006f40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000007240)=[{&(0x7f0000006fc0)=""/41, 0x29}, {&(0x7f0000007000)=""/62, 0x3e}, {&(0x7f0000007040)=""/81, 0x51}, {&(0x7f00000070c0)=""/168, 0xa8}, {0x0}, {&(0x7f0000007200)=""/48, 0x30}], 0x6}, 0x0) perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x7f, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x9, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8ab, 0x5}, 0x24800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x667a}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r11 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='memory.evenvs\x00', 0x7a05, 0x1700) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000400)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0xb8, 0x0, &(0x7f0000001bc0)="676dd686eb0660021f3a96c87a36fe6ebb5b8fd4b5a66e6948d209ff52b57e97f9716f801b9252a394b2c95bc04c6d203d3fdefd58411ed7f5b654730594445cc1f64e12ead93318a1b607cc4a945859a7822169bfaced867e441c4d79ad4270ec724c9285ff20e0721cd38494cc79229fd87b4203ab0506b63f7331b4af161c8a4b1693e7c162bd31bb51469a1065551fceac2a4ddfffd896b9aebb5d31d33b7528b27202e51a92d430aa8cb4479944c1e8c5511b974c8d"}, 0x40) [ 782.191184][T13180] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 782.191196][T13180] RSP: 002b:00007f3ba2ab9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 782.266841][T13180] RAX: ffffffffffffffda RBX: 00007f3ba2ab9c90 RCX: 000000000045a6f9 [ 782.274920][T13180] RDX: 000000000000002c RSI: 0000000020000400 RDI: 0000000000000000 [ 782.282906][T13180] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 782.290894][T13180] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3ba2aba6d4 [ 782.299061][T13180] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000005 19:33:50 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x38, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r2, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) 19:33:50 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x11, &(0x7f0000000500)=ANY=[@ANYBLOB="850000004f0000003f00000000000000950000e600000000002ce85fbf62c21eb4d98183dd3c429de1c9486c70bfaa1243267d558865039af316a920c7e2b2ca81dde11ccf869c0d8d4add1f02645b52cd5fa052ac6f1ce71eb092d6aa8833238d4a939203656e384b45145c2ebc8b27040c493814ee51d4bcfc9ed7070afb5b5a17ff386243a11b2d2c53115d3c"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000340)="2ee640ebb525860177a6f3b3645544f7f125a4af841a7953e22f84185b12aba908201cf2759c8677f246ab717dd60491126e844c7e94d0ccd01223f480a20d3d438ad0e8b8427a6c820851e393d9d961506ee1892c7470f3aaeeaa49878758372528d009cacf1747f56861d1cb2ba3eac51bbc638fa275674f380ddc1b4c90a39af37335c2f17d9ba7929d4252b0622e988bc91bbb48e0d9afac59de23e8f21fdf14d49280dafb4dd8d4c1be81f1baf445737df2aa3e0014642ca3122e92e272609c14144a0b51c839b562daf42dca81c670d852", &(0x7f0000000440)="c997c2302f06feb4e429ac04e02aed7e27d0941ccde49f764cb9397576e7af1c9c22e0bbac784d4425894d3b3f3fa1cdf47f4621fe78ebd35fbaa777837b5a8ba188c068c7bc056347bd7077c9219cb0b501fa6500a65949734352983a00b320ebb05bcbf7564847fa6135cea0c3b5e53cbeba48847558392827e92a9738af10b3c6101f00b9f5d9d004c8", 0x2}, 0x20) 19:33:50 executing program 0 (fault-call:3 fault-nth:68): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x5, r1, 0x0, [0x305f, 0xa]}, 0x2c) [ 782.558358][T13213] FAULT_INJECTION: forcing a failure. [ 782.558358][T13213] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 782.604665][T13213] CPU: 1 PID: 13213 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 782.613403][T13213] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 782.623573][T13213] Call Trace: [ 782.623601][T13213] dump_stack+0x197/0x210 [ 782.623625][T13213] should_fail.cold+0xa/0x15 [ 782.623651][T13213] ? fault_create_debugfs_attr+0x180/0x180 [ 782.635856][T13213] ? ___might_sleep+0x163/0x2c0 [ 782.635891][T13213] should_fail_alloc_page+0x50/0x60 [ 782.651732][T13213] __alloc_pages_nodemask+0x1a1/0x910 [ 782.657103][T13213] ? __alloc_pages_slowpath+0x2920/0x2920 [ 782.657135][T13213] __vmalloc_node_range+0x2fd/0x810 [ 782.657159][T13213] ? bpf_map_area_alloc+0x20/0x30 [ 782.657172][T13213] __vmalloc_node_flags_caller+0x71/0x90 [ 782.657189][T13213] ? bpf_map_area_alloc+0x20/0x30 [ 782.683760][T13213] __bpf_map_area_alloc+0xde/0xf0 [ 782.688811][T13213] bpf_map_area_alloc+0x20/0x30 [ 782.693681][T13213] htab_map_alloc+0x589/0x11c0 [ 782.698465][T13213] ? __kmalloc+0x608/0x770 [ 782.702908][T13213] ? bpf_get_file_flag+0x80/0x80 [ 782.707874][T13213] ? fput+0x1b/0x20 [ 782.712260][T13213] htab_of_map_alloc+0x71/0x100 [ 782.717214][T13213] ? htab_map_alloc+0x11c0/0x11c0 [ 782.722424][T13213] __do_sys_bpf+0x478/0x3810 [ 782.727243][T13213] ? bpf_prog_load+0x18f0/0x18f0 [ 782.732455][T13213] ? __kasan_check_write+0x14/0x20 [ 782.737711][T13213] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 782.743357][T13213] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 782.748800][T13213] ? wait_for_completion+0x440/0x440 [ 782.754105][T13213] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 782.760369][T13213] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 782.765823][T13213] ? do_syscall_64+0x26/0x790 [ 782.770484][T13213] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 782.776549][T13213] ? do_syscall_64+0x26/0x790 [ 782.781226][T13213] __x64_sys_bpf+0x73/0xb0 [ 782.785642][T13213] do_syscall_64+0xfa/0x790 [ 782.790153][T13213] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 782.796039][T13213] RIP: 0033:0x45a6f9 [ 782.799925][T13213] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 782.819655][T13213] RSP: 002b:00007f3ba2ab9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 782.828066][T13213] RAX: ffffffffffffffda RBX: 00007f3ba2ab9c90 RCX: 000000000045a6f9 [ 782.836025][T13213] RDX: 000000000000002c RSI: 0000000020000400 RDI: 0000000000000000 [ 782.843992][T13213] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 782.851963][T13213] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3ba2aba6d4 [ 782.859921][T13213] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000005 19:33:59 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x0, 0x37, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x2, 0x3, 0x2) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000180)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000200)=[{&(0x7f00000002c0)=""/213, 0xd5}], 0x1}, 0x15120) r4 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000180)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) ioctl$TUNGETVNETHDRSZ(r5, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r5, 0x0, 0xf800000000000000) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r5, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r5, 0x2401, 0x80000001) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x13, 0x0, &(0x7f0000000080), &(0x7f00000000c0)='syzkaller\x00', 0x3, 0x0, 0x0, 0x21680, 0x1, [], r3, 0x17, r5, 0x8, &(0x7f00000003c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000400)={0x2, 0x6, 0x81}, 0x10, 0xffffffffffffffff, r0}, 0x78) sendmsg$inet(r1, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r1, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000040)=r7) 19:33:59 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000240), 0x5}, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x4000007}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x5}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180)}, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) socketpair$tipc(0x1e, 0x27197ef151c9b187, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r1, &(0x7f0000000580)={&(0x7f00000002c0)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x4e22, @empty}, 0x0, 0x0, 0x1, 0x3}}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000340)="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", 0xff}, {&(0x7f00000004c0)="462aadad353e996b9ae188353b2356d572f8d161915d0008b5cbb1ca85e0a050ee48e5c2a0374adb139e0064d7459d1daf49a3605400bae97dbd96226f7284644da2fabb28c476b2e242fa482309637c85931df6b13629ef6eea303ed728697e2ee0468c1489ea9ea8a4b971f5e25662b2cfe909", 0x74}, {&(0x7f0000000440)="5c05", 0x2}], 0x3}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000200)={r1}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x76ee5e3e7ee9492b, 0x70, 0x80, 0x0, 0x2, 0x2, 0x0, 0x7f, 0x12618, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x3ff, 0x5}, 0x1000, 0x0, 0xd9, 0x6}, 0x0, 0xb, 0xffffffffffffffff, 0x0) 19:33:59 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x38, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r2, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) 19:33:59 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x1a, &(0x7f0000000500)=ANY=[@ANYBLOB="850000004f0000003f00000000000000950000e600000000002ce85fbf62c21eb4d98183dd3c429de1c9486c70bfaa1243267d558865039af316a920c7e2b2ca81dde11ccf869c0d8d4add1f02645b52cd5fa052ac6f1ce71eb092d6aa8833238d4a939203656e384b45145c2ebc8b27040c493814ee51d4bcfc9ed7070afb5b5a17ff386243a11b2d2c53115d3c8e4c565bb4f9d3a29971f06cf45869c081787f6260b6f21854551f5ed4dac7a39847d928f5f33da8637f00c589cac9b859f624db94a7a9dd6187c46f63615afef93d594e53beeb"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000340)="2ee640ebb525860177a6f3b3645544f7f125a4af841a7953e22f84185b12aba908201cf2759c8677f246ab717dd60491126e844c7e94d0ccd01223f480a20d3d438ad0e8b8427a6c820851e393d9d961506ee1892c7470f3aaeeaa49878758372528d009cacf1747f56861d1cb2ba3eac51bbc638fa275674f380ddc1b4c90a39af37335c2f17d9ba7929d4252b0622e988bc91bbb48e0d9afac59de23e8f21fdf14d49280dafb4dd8d4c1be81f1baf445737df2aa3e0014642ca3122e92e272609c14144a0b51c839b562daf42dca81c670d852", &(0x7f0000000440)="c997c2302f06feb4e429ac04e02aed7e27d0941ccde49f764cb9397576e7af1c9c22e0bbac784d4425894d3b3f3fa1cdf47f4621fe78ebd35fbaa777837b5a8ba188c068c7bc056347bd7077c9219cb0b501fa6500a65949734352983a00b320ebb05bcbf7564847fa6135cea0c3b5e53cbeba48847558392827e92a9738af10b3c6101f00b9f5d9d004c8", 0x2}, 0x20) 19:33:59 executing program 0 (fault-call:3 fault-nth:69): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x5, r1, 0x0, [0x305f, 0xa]}, 0x2c) 19:33:59 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x324) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8927, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') [ 791.260140][T13230] FAULT_INJECTION: forcing a failure. [ 791.260140][T13230] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 791.274527][T13230] CPU: 1 PID: 13230 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 791.283206][T13230] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 791.283213][T13230] Call Trace: [ 791.283238][T13230] dump_stack+0x197/0x210 [ 791.283261][T13230] should_fail.cold+0xa/0x15 [ 791.283281][T13230] ? fault_create_debugfs_attr+0x180/0x180 [ 791.283297][T13230] ? ___might_sleep+0x163/0x2c0 [ 791.283321][T13230] should_fail_alloc_page+0x50/0x60 [ 791.283333][T13230] __alloc_pages_nodemask+0x1a1/0x910 [ 791.283352][T13230] ? __alloc_pages_slowpath+0x2920/0x2920 [ 791.296762][T13230] __vmalloc_node_range+0x2fd/0x810 [ 791.305657][T13230] ? bpf_map_area_alloc+0x20/0x30 [ 791.305672][T13230] __vmalloc_node_flags_caller+0x71/0x90 [ 791.305686][T13230] ? bpf_map_area_alloc+0x20/0x30 [ 791.305704][T13230] __bpf_map_area_alloc+0xde/0xf0 [ 791.305721][T13230] bpf_map_area_alloc+0x20/0x30 [ 791.305741][T13230] htab_map_alloc+0x589/0x11c0 [ 791.305751][T13230] ? __kmalloc+0x608/0x770 [ 791.305768][T13230] ? bpf_get_file_flag+0x80/0x80 [ 791.316404][T13230] ? fput+0x1b/0x20 [ 791.316429][T13230] htab_of_map_alloc+0x71/0x100 [ 791.316442][T13230] ? htab_map_alloc+0x11c0/0x11c0 [ 791.316457][T13230] __do_sys_bpf+0x478/0x3810 [ 791.316527][T13230] ? bpf_prog_load+0x18f0/0x18f0 [ 791.316546][T13230] ? __kasan_check_write+0x14/0x20 19:34:00 executing program 0 (fault-call:3 fault-nth:70): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x5, r1, 0x0, [0x305f, 0xa]}, 0x2c) [ 791.327104][T13230] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 791.327122][T13230] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 791.327139][T13230] ? wait_for_completion+0x440/0x440 [ 791.327162][T13230] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 791.327187][T13230] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 791.338067][T13230] ? do_syscall_64+0x26/0x790 [ 791.338084][T13230] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 791.338098][T13230] ? do_syscall_64+0x26/0x790 [ 791.338120][T13230] __x64_sys_bpf+0x73/0xb0 [ 791.338142][T13230] do_syscall_64+0xfa/0x790 [ 791.348946][T13230] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 791.348959][T13230] RIP: 0033:0x45a6f9 [ 791.348974][T13230] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 791.348982][T13230] RSP: 002b:00007f3ba2ab9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 791.348996][T13230] RAX: ffffffffffffffda RBX: 00007f3ba2ab9c90 RCX: 000000000045a6f9 [ 791.349005][T13230] RDX: 000000000000002c RSI: 0000000020000400 RDI: 0000000000000000 [ 791.349013][T13230] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 791.349021][T13230] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3ba2aba6d4 [ 791.349028][T13230] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000005 19:34:00 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x38, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e271f60d25b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318e2ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7eaa49c62ba0fe52fa65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd31a08b32808b802000000000000ea334d83239dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc18cae2ed4b4390af9a9ceafd07ed00b"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r2, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) 19:34:00 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x1a, &(0x7f0000000500)=ANY=[@ANYBLOB="850000004f0000003f00000000000000950000e600000000002ce85fbf62c21eb4d98183dd3c429de1c9486c70bfaa1243267d558865039af316a920c7e2b2ca81dde11ccf869c0d8d4add1f02645b52cd5fa052ac6f1ce71eb092d6aa8833238d4a939203656e384b45145c2ebc8b27040c493814ee51d4bcfc9ed7070afb5b5a17ff386243a11b2d2c53115d3c8e4c565bb4f9d3a29971f06cf45869c081787f6260b6f21854551f5ed4dac7a39847d928f5f33da8637f00c589cac9b859f624db94a7a9dd6187c46f63615afef93d594e53beeb"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000340)="2ee640ebb525860177a6f3b3645544f7f125a4af841a7953e22f84185b12aba908201cf2759c8677f246ab717dd60491126e844c7e94d0ccd01223f480a20d3d438ad0e8b8427a6c820851e393d9d961506ee1892c7470f3aaeeaa49878758372528d009cacf1747f56861d1cb2ba3eac51bbc638fa275674f380ddc1b4c90a39af37335c2f17d9ba7929d4252b0622e988bc91bbb48e0d9afac59de23e8f21fdf14d49280dafb4dd8d4c1be81f1baf445737df2aa3e0014642ca3122e92e272609c14144a0b51c839b562daf42dca81c670d852", &(0x7f0000000440)="c997c2302f06feb4e429ac04e02aed7e27d0941ccde49f764cb9397576e7af1c9c22e0bbac784d4425894d3b3f3fa1cdf47f4621fe78ebd35fbaa777837b5a8ba188c068c7bc056347bd7077c9219cb0b501fa6500a65949734352983a00b320ebb05bcbf7564847fa6135cea0c3b5e53cbeba48847558392827e92a9738af10b3c6101f00b9f5d9d004c8", 0x2}, 0x20) [ 791.559528][T13244] FAULT_INJECTION: forcing a failure. [ 791.559528][T13244] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 791.607618][T13244] CPU: 1 PID: 13244 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 791.616332][T13244] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 791.616340][T13244] Call Trace: [ 791.616365][T13244] dump_stack+0x197/0x210 [ 791.616390][T13244] should_fail.cold+0xa/0x15 [ 791.616413][T13244] ? fault_create_debugfs_attr+0x180/0x180 [ 791.644499][T13244] ? ___might_sleep+0x163/0x2c0 [ 791.649380][T13244] should_fail_alloc_page+0x50/0x60 [ 791.654600][T13244] __alloc_pages_nodemask+0x1a1/0x910 [ 791.660090][T13244] ? __alloc_pages_slowpath+0x2920/0x2920 [ 791.665881][T13244] __vmalloc_node_range+0x2fd/0x810 [ 791.671101][T13244] ? bpf_map_area_alloc+0x20/0x30 [ 791.676196][T13244] __vmalloc_node_flags_caller+0x71/0x90 [ 791.683330][T13244] ? bpf_map_area_alloc+0x20/0x30 [ 791.683349][T13244] __bpf_map_area_alloc+0xde/0xf0 [ 791.683365][T13244] bpf_map_area_alloc+0x20/0x30 [ 791.683380][T13244] htab_map_alloc+0x589/0x11c0 [ 791.683392][T13244] ? __kmalloc+0x608/0x770 [ 791.683404][T13244] ? bpf_get_file_flag+0x80/0x80 [ 791.683424][T13244] ? fput+0x1b/0x20 [ 791.683444][T13244] htab_of_map_alloc+0x71/0x100 [ 791.698335][T13244] ? htab_map_alloc+0x11c0/0x11c0 [ 791.721061][T13244] __do_sys_bpf+0x478/0x3810 [ 791.721084][T13244] ? bpf_prog_load+0x18f0/0x18f0 [ 791.721100][T13244] ? __kasan_check_write+0x14/0x20 [ 791.721121][T13244] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 791.740885][T13244] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 791.751723][T13244] ? wait_for_completion+0x440/0x440 [ 791.757023][T13244] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 791.757054][T13244] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 791.757072][T13244] ? do_syscall_64+0x26/0x790 [ 791.768759][T13244] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 791.768776][T13244] ? do_syscall_64+0x26/0x790 [ 791.768799][T13244] __x64_sys_bpf+0x73/0xb0 [ 791.768818][T13244] do_syscall_64+0xfa/0x790 [ 791.793673][T13244] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 791.799664][T13244] RIP: 0033:0x45a6f9 19:34:00 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x38, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r2, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) [ 791.803578][T13244] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 791.823284][T13244] RSP: 002b:00007f3ba2a98c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 791.823300][T13244] RAX: ffffffffffffffda RBX: 00007f3ba2a98c90 RCX: 000000000045a6f9 [ 791.823308][T13244] RDX: 000000000000002c RSI: 0000000020000400 RDI: 0000000000000000 [ 791.823315][T13244] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 791.823324][T13244] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3ba2a996d4 [ 791.823332][T13244] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000005 19:34:00 executing program 2: gettid() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.\x93sage_sys\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x4009}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x123, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) socketpair(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f2, &(0x7f0000000080)='ip6tnl0\x00') sendmsg$kcm(r4, &(0x7f0000000880)={&(0x7f00000003c0)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x0, @empty}, 0x0, 0x1, 0x3}}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="9344f03b9486a4d5c5f9532e4c62ca648a5c149a69c9c104296aedb07ca46f5d8990527a56863af1", 0x28}, {&(0x7f0000000540)="16", 0x1}, {&(0x7f0000000600)="50f545e670abfab1db7a07dc739f9c1da56792186b688e16932144caf863a6d8e9d1099303b6e268aaf8e672c330445c35e39828b7f37e4a7d21cba0f818c076b48c0323503181270f9013cf4030f0360c9b9e075e81f0f77c11d9f783405f0d0343be6316731f227a64f34dee37daf1dbbc4357682f70f28b6fd86b56883a06c42934914d8a73cc94742a2860bb7c9c42ee24964255af9c520552", 0x9b}, {&(0x7f0000000240)="c1", 0x1}], 0x4, &(0x7f0000000740)=ANY=[]}, 0xc0) write$cgroup_int(r3, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f2, &(0x7f0000000080)='ip6tnl0\x00') bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000000)=r2, 0x4) sendmsg$kcm(r5, &(0x7f0000000880)={&(0x7f00000003c0)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e20, @empty}, 0x0, 0x1, 0x3}}, 0x80, &(0x7f0000000700)=[{0x0}, {0x0}, {0x0}], 0x3}, 0xc0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpuacct.\x93sage_sys\x00') ioctl$TUNSETLINK(r0, 0x400454cd, 0x308) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0xfffffd21) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000001c0)) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x401c5820, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-0\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') 19:34:00 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x38, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r2, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) [ 792.113440][T13264] device nr0 entered promiscuous mode 19:34:11 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x0, 0x37, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x2, 0x3, 0x2) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000180)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000200)=[{&(0x7f00000002c0)=""/213, 0xd5}], 0x1}, 0x15120) r4 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000180)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) ioctl$TUNGETVNETHDRSZ(r5, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r5, 0x0, 0xf800000000000000) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r5, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r5, 0x2401, 0x80000001) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x13, 0x0, &(0x7f0000000080), &(0x7f00000000c0)='syzkaller\x00', 0x3, 0x0, 0x0, 0x21680, 0x1, [], r3, 0x17, r5, 0x8, &(0x7f00000003c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000400)={0x2, 0x6, 0x81}, 0x10, 0xffffffffffffffff, r0}, 0x78) sendmsg$inet(r1, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r1, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000040)=r7) 19:34:11 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x1a, &(0x7f0000000500)=ANY=[@ANYBLOB="850000004f0000003f00000000000000950000e600000000002ce85fbf62c21eb4d98183dd3c429de1c9486c70bfaa1243267d558865039af316a920c7e2b2ca81dde11ccf869c0d8d4add1f02645b52cd5fa052ac6f1ce71eb092d6aa8833238d4a939203656e384b45145c2ebc8b27040c493814ee51d4bcfc9ed7070afb5b5a17ff386243a11b2d2c53115d3c8e4c565bb4f9d3a29971f06cf45869c081787f6260b6f21854551f5ed4dac7a39847d928f5f33da8637f00c589cac9b859f624db94a7a9dd6187c46f63615afef93d594e53beeb"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000340)="2ee640ebb525860177a6f3b3645544f7f125a4af841a7953e22f84185b12aba908201cf2759c8677f246ab717dd60491126e844c7e94d0ccd01223f480a20d3d438ad0e8b8427a6c820851e393d9d961506ee1892c7470f3aaeeaa49878758372528d009cacf1747f56861d1cb2ba3eac51bbc638fa275674f380ddc1b4c90a39af37335c2f17d9ba7929d4252b0622e988bc91bbb48e0d9afac59de23e8f21fdf14d49280dafb4dd8d4c1be81f1baf445737df2aa3e0014642ca3122e92e272609c14144a0b51c839b562daf42dca81c670d852", &(0x7f0000000440)="c997c2302f06feb4e429ac04e02aed7e27d0941ccde49f764cb9397576e7af1c9c22e0bbac784d4425894d3b3f3fa1cdf47f4621fe78ebd35fbaa777837b5a8ba188c068c7bc056347bd7077c9219cb0b501fa6500a65949734352983a00b320ebb05bcbf7564847fa6135cea0c3b5e53cbeba48847558392827e92a9738af10b3c6101f00b9f5d9d004c8", 0x2}, 0x20) 19:34:11 executing program 0 (fault-call:3 fault-nth:71): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x5, r1, 0x0, [0x305f, 0xa]}, 0x2c) 19:34:11 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x38, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r2, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) 19:34:11 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x324) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8929, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') 19:34:11 executing program 2: gettid() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.\x93sage_sys\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x4009}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x123, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) socketpair(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f2, &(0x7f0000000080)='ip6tnl0\x00') sendmsg$kcm(r4, &(0x7f0000000880)={&(0x7f00000003c0)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x0, @empty}, 0x0, 0x1, 0x3}}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="9344f03b9486a4d5c5f9532e4c62ca648a5c149a69c9c104296aedb07ca46f5d8990527a56863af1", 0x28}, {&(0x7f0000000540)="16", 0x1}, {&(0x7f0000000600)="50f545e670abfab1db7a07dc739f9c1da56792186b688e16932144caf863a6d8e9d1099303b6e268aaf8e672c330445c35e39828b7f37e4a7d21cba0f818c076b48c0323503181270f9013cf4030f0360c9b9e075e81f0f77c11d9f783405f0d0343be6316731f227a64f34dee37daf1dbbc4357682f70f28b6fd86b56883a06c42934914d8a73cc94742a2860bb7c9c42ee24964255af9c520552", 0x9b}, {&(0x7f0000000240)="c1", 0x1}], 0x4, &(0x7f0000000740)=ANY=[]}, 0xc0) write$cgroup_int(r3, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f2, &(0x7f0000000080)='ip6tnl0\x00') bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000000)=r2, 0x4) sendmsg$kcm(r5, &(0x7f0000000880)={&(0x7f00000003c0)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e20, @empty}, 0x0, 0x1, 0x3}}, 0x80, &(0x7f0000000700)=[{0x0}, {0x0}, {0x0}], 0x3}, 0xc0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='cpuacct.\x93sage_sys\x00') ioctl$TUNSETLINK(r0, 0x400454cd, 0x308) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0xfffffd21) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000001c0)) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x401c5820, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-0\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') [ 802.554201][T13283] FAULT_INJECTION: forcing a failure. [ 802.554201][T13283] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 802.567740][T13283] CPU: 0 PID: 13283 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 802.576425][T13283] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 802.586483][T13283] Call Trace: [ 802.589785][T13283] dump_stack+0x197/0x210 [ 802.594121][T13283] should_fail.cold+0xa/0x15 [ 802.598706][T13283] ? fault_create_debugfs_attr+0x180/0x180 [ 802.604503][T13283] ? ___might_sleep+0x163/0x2c0 [ 802.609352][T13283] should_fail_alloc_page+0x50/0x60 [ 802.614552][T13283] __alloc_pages_nodemask+0x1a1/0x910 [ 802.619920][T13283] ? __alloc_pages_slowpath+0x2920/0x2920 [ 802.625685][T13283] __vmalloc_node_range+0x2fd/0x810 [ 802.630892][T13283] ? bpf_map_area_alloc+0x20/0x30 [ 802.635914][T13283] __vmalloc_node_flags_caller+0x71/0x90 [ 802.641550][T13283] ? bpf_map_area_alloc+0x20/0x30 [ 802.646735][T13283] __bpf_map_area_alloc+0xde/0xf0 [ 802.651770][T13283] bpf_map_area_alloc+0x20/0x30 [ 802.656620][T13283] htab_map_alloc+0x589/0x11c0 [ 802.661371][T13283] ? __kmalloc+0x608/0x770 [ 802.665777][T13283] ? bpf_get_file_flag+0x80/0x80 [ 802.670705][T13283] ? fput+0x1b/0x20 [ 802.674514][T13283] htab_of_map_alloc+0x71/0x100 [ 802.679356][T13283] ? htab_map_alloc+0x11c0/0x11c0 [ 802.684567][T13283] __do_sys_bpf+0x478/0x3810 [ 802.689166][T13283] ? bpf_prog_load+0x18f0/0x18f0 [ 802.694200][T13283] ? __kasan_check_write+0x14/0x20 [ 802.699395][T13283] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 802.704945][T13283] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 802.710228][T13283] ? wait_for_completion+0x440/0x440 [ 802.715505][T13283] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 802.721751][T13283] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 802.727205][T13283] ? do_syscall_64+0x26/0x790 [ 802.732028][T13283] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 802.738130][T13283] ? do_syscall_64+0x26/0x790 [ 802.742807][T13283] __x64_sys_bpf+0x73/0xb0 [ 802.747214][T13283] do_syscall_64+0xfa/0x790 [ 802.751709][T13283] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 802.757587][T13283] RIP: 0033:0x45a6f9 [ 802.761469][T13283] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 802.781057][T13283] RSP: 002b:00007f3ba2ab9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 802.789466][T13283] RAX: ffffffffffffffda RBX: 00007f3ba2ab9c90 RCX: 000000000045a6f9 [ 802.797422][T13283] RDX: 000000000000002c RSI: 0000000020000400 RDI: 0000000000000000 [ 802.805472][T13283] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 802.813427][T13283] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3ba2aba6d4 [ 802.821424][T13283] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000005 19:34:11 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x1f, &(0x7f0000000500)=ANY=[@ANYBLOB="850000004f0000003f00000000000000950000e600000000002ce85fbf62c21eb4d98183dd3c429de1c9486c70bfaa1243267d558865039af316a920c7e2b2ca81dde11ccf869c0d8d4add1f02645b52cd5fa052ac6f1ce71eb092d6aa8833238d4a939203656e384b45145c2ebc8b27040c493814ee51d4bcfc9ed7070afb5b5a17ff386243a11b2d2c53115d3c8e4c565bb4f9d3a29971f06cf45869c081787f6260b6f21854551f5ed4dac7a39847d928f5f33da8637f00c589cac9b859f624db94a7a9dd6187c46f63615afef93d594e53beebf5ae0ea05ad7af1c5072d32e37ef675a80f4729390d8b2ce649ffd2193b8e0c7c92f01"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000340)="2ee640ebb525860177a6f3b3645544f7f125a4af841a7953e22f84185b12aba908201cf2759c8677f246ab717dd60491126e844c7e94d0ccd01223f480a20d3d438ad0e8b8427a6c820851e393d9d961506ee1892c7470f3aaeeaa49878758372528d009cacf1747f56861d1cb2ba3eac51bbc638fa275674f380ddc1b4c90a39af37335c2f17d9ba7929d4252b0622e988bc91bbb48e0d9afac59de23e8f21fdf14d49280dafb4dd8d4c1be81f1baf445737df2aa3e0014642ca3122e92e272609c14144a0b51c839b562daf42dca81c670d852", &(0x7f0000000440)="c997c2302f06feb4e429ac04e02aed7e27d0941ccde49f764cb9397576e7af1c9c22e0bbac784d4425894d3b3f3fa1cdf47f4621fe78ebd35fbaa777837b5a8ba188c068c7bc056347bd7077c9219cb0b501fa6500a65949734352983a00b320ebb05bcbf7564847fa6135cea0c3b5e53cbeba48847558392827e92a9738af10b3c6101f00b9f5d9d004c8", 0x2}, 0x20) 19:34:11 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x39, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r2, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) [ 802.860432][T13287] device nr0 entered promiscuous mode 19:34:11 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x1f, &(0x7f0000000500)=ANY=[@ANYBLOB="850000004f0000003f00000000000000950000e600000000002ce85fbf62c21eb4d98183dd3c429de1c9486c70bfaa1243267d558865039af316a920c7e2b2ca81dde11ccf869c0d8d4add1f02645b52cd5fa052ac6f1ce71eb092d6aa8833238d4a939203656e384b45145c2ebc8b27040c493814ee51d4bcfc9ed7070afb5b5a17ff386243a11b2d2c53115d3c8e4c565bb4f9d3a29971f06cf45869c081787f6260b6f21854551f5ed4dac7a39847d928f5f33da8637f00c589cac9b859f624db94a7a9dd6187c46f63615afef93d594e53beebf5ae0ea05ad7af1c5072d32e37ef675a80f4729390d8b2ce649ffd2193b8e0c7c92f01"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000340)="2ee640ebb525860177a6f3b3645544f7f125a4af841a7953e22f84185b12aba908201cf2759c8677f246ab717dd60491126e844c7e94d0ccd01223f480a20d3d438ad0e8b8427a6c820851e393d9d961506ee1892c7470f3aaeeaa49878758372528d009cacf1747f56861d1cb2ba3eac51bbc638fa275674f380ddc1b4c90a39af37335c2f17d9ba7929d4252b0622e988bc91bbb48e0d9afac59de23e8f21fdf14d49280dafb4dd8d4c1be81f1baf445737df2aa3e0014642ca3122e92e272609c14144a0b51c839b562daf42dca81c670d852", &(0x7f0000000440)="c997c2302f06feb4e429ac04e02aed7e27d0941ccde49f764cb9397576e7af1c9c22e0bbac784d4425894d3b3f3fa1cdf47f4621fe78ebd35fbaa777837b5a8ba188c068c7bc056347bd7077c9219cb0b501fa6500a65949734352983a00b320ebb05bcbf7564847fa6135cea0c3b5e53cbeba48847558392827e92a9738af10b3c6101f00b9f5d9d004c8", 0x2}, 0x20) 19:34:11 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x39, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r2, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) 19:34:11 executing program 0 (fault-call:3 fault-nth:72): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x5, r1, 0x0, [0x305f, 0xa]}, 0x2c) 19:34:11 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x1f, &(0x7f0000000500)=ANY=[@ANYBLOB="850000004f0000003f00000000000000950000e600000000002ce85fbf62c21eb4d98183dd3c429de1c9486c70bfaa1243267d558865039af316a920c7e2b2ca81dde11ccf869c0d8d4add1f02645b52cd5fa052ac6f1ce71eb092d6aa8833238d4a939203656e384b45145c2ebc8b27040c493814ee51d4bcfc9ed7070afb5b5a17ff386243a11b2d2c53115d3c8e4c565bb4f9d3a29971f06cf45869c081787f6260b6f21854551f5ed4dac7a39847d928f5f33da8637f00c589cac9b859f624db94a7a9dd6187c46f63615afef93d594e53beebf5ae0ea05ad7af1c5072d32e37ef675a80f4729390d8b2ce649ffd2193b8e0c7c92f01"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000340)="2ee640ebb525860177a6f3b3645544f7f125a4af841a7953e22f84185b12aba908201cf2759c8677f246ab717dd60491126e844c7e94d0ccd01223f480a20d3d438ad0e8b8427a6c820851e393d9d961506ee1892c7470f3aaeeaa49878758372528d009cacf1747f56861d1cb2ba3eac51bbc638fa275674f380ddc1b4c90a39af37335c2f17d9ba7929d4252b0622e988bc91bbb48e0d9afac59de23e8f21fdf14d49280dafb4dd8d4c1be81f1baf445737df2aa3e0014642ca3122e92e272609c14144a0b51c839b562daf42dca81c670d852", &(0x7f0000000440)="c997c2302f06feb4e429ac04e02aed7e27d0941ccde49f764cb9397576e7af1c9c22e0bbac784d4425894d3b3f3fa1cdf47f4621fe78ebd35fbaa777837b5a8ba188c068c7bc056347bd7077c9219cb0b501fa6500a65949734352983a00b320ebb05bcbf7564847fa6135cea0c3b5e53cbeba48847558392827e92a9738af10b3c6101f00b9f5d9d004c8", 0x2}, 0x20) [ 803.265015][T13308] FAULT_INJECTION: forcing a failure. [ 803.265015][T13308] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 803.320703][T13308] CPU: 1 PID: 13308 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 803.329623][T13308] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 803.339687][T13308] Call Trace: [ 803.342997][T13308] dump_stack+0x197/0x210 [ 803.347341][T13308] should_fail.cold+0xa/0x15 [ 803.351943][T13308] ? fault_create_debugfs_attr+0x180/0x180 [ 803.357884][T13308] ? ___might_sleep+0x163/0x2c0 [ 803.362763][T13308] should_fail_alloc_page+0x50/0x60 [ 803.367975][T13308] __alloc_pages_nodemask+0x1a1/0x910 [ 803.373388][T13308] ? __alloc_pages_slowpath+0x2920/0x2920 [ 803.379138][T13308] __vmalloc_node_range+0x2fd/0x810 [ 803.384377][T13308] ? bpf_map_area_alloc+0x20/0x30 [ 803.389416][T13308] __vmalloc_node_flags_caller+0x71/0x90 [ 803.395079][T13308] ? bpf_map_area_alloc+0x20/0x30 [ 803.400121][T13308] __bpf_map_area_alloc+0xde/0xf0 [ 803.405163][T13308] bpf_map_area_alloc+0x20/0x30 [ 803.410028][T13308] htab_map_alloc+0x589/0x11c0 [ 803.414799][T13308] ? __kmalloc+0x608/0x770 [ 803.419216][T13308] ? bpf_get_file_flag+0x80/0x80 [ 803.424171][T13308] ? fput+0x1b/0x20 [ 803.427999][T13308] htab_of_map_alloc+0x71/0x100 [ 803.432858][T13308] ? htab_map_alloc+0x11c0/0x11c0 [ 803.437883][T13308] __do_sys_bpf+0x478/0x3810 [ 803.442479][T13308] ? bpf_prog_load+0x18f0/0x18f0 [ 803.447419][T13308] ? __kasan_check_write+0x14/0x20 [ 803.452530][T13308] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 803.458086][T13308] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 803.463401][T13308] ? wait_for_completion+0x440/0x440 [ 803.468716][T13308] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 803.474981][T13308] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 803.480442][T13308] ? do_syscall_64+0x26/0x790 [ 803.485144][T13308] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 803.491211][T13308] ? do_syscall_64+0x26/0x790 [ 803.495898][T13308] __x64_sys_bpf+0x73/0xb0 [ 803.500321][T13308] do_syscall_64+0xfa/0x790 [ 803.504832][T13308] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 803.510726][T13308] RIP: 0033:0x45a6f9 [ 803.514973][T13308] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 803.535100][T13308] RSP: 002b:00007f3ba2a98c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 803.543850][T13308] RAX: ffffffffffffffda RBX: 00007f3ba2a98c90 RCX: 000000000045a6f9 [ 803.551833][T13308] RDX: 000000000000002c RSI: 0000000020000400 RDI: 0000000000000000 [ 803.559817][T13308] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 803.567790][T13308] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3ba2a996d4 [ 803.575760][T13308] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000004 19:34:21 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x0, 0x24, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x2, 0x3, 0x2) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000180)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000200)=[{&(0x7f00000002c0)=""/213, 0xd5}], 0x1}, 0x15120) r4 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000180)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) ioctl$TUNGETVNETHDRSZ(r5, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r5, 0x0, 0xf800000000000000) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r5, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r5, 0x2401, 0x80000001) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x13, 0x0, &(0x7f0000000080), &(0x7f00000000c0)='syzkaller\x00', 0x3, 0x0, 0x0, 0x21680, 0x1, [], r3, 0x17, r5, 0x8, &(0x7f00000003c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000400)={0x2, 0x6, 0x81}, 0x10, 0xffffffffffffffff, r0}, 0x78) sendmsg$inet(r1, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r1, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000040)=r7) 19:34:21 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x39, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r2, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) 19:34:21 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x21, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000340)="2ee640ebb525860177a6f3b3645544f7f125a4af841a7953e22f84185b12aba908201cf2759c8677f246ab717dd60491126e844c7e94d0ccd01223f480a20d3d438ad0e8b8427a6c820851e393d9d961506ee1892c7470f3aaeeaa49878758372528d009cacf1747f56861d1cb2ba3eac51bbc638fa275674f380ddc1b4c90a39af37335c2f17d9ba7929d4252b0622e988bc91bbb48e0d9afac59de23e8f21fdf14d49280dafb4dd8d4c1be81f1baf445737df2aa3e0014642ca3122e92e272609c14144a0b51c839b562daf42dca81c670d852", &(0x7f0000000440)="c997c2302f06feb4e429ac04e02aed7e27d0941ccde49f764cb9397576e7af1c9c22e0bbac784d4425894d3b3f3fa1cdf47f4621fe78ebd35fbaa777837b5a8ba188c068c7bc056347bd7077c9219cb0b501fa6500a65949734352983a00b320ebb05bcbf7564847fa6135cea0c3b5e53cbeba48847558392827e92a9738af10b3c6101f00b9f5d9d004c8", 0x2}, 0x20) 19:34:21 executing program 0 (fault-call:3 fault-nth:73): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x5, r1, 0x0, [0x305f, 0xa]}, 0x2c) 19:34:21 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x324) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8930, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') 19:34:21 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000180)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='cpuset.memory_pressure\x00', 0x0, 0x0) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socket$kcm(0x10, 0x0, 0x10) write$cgroup_subtree(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0xfdef) [ 813.026783][T13324] FAULT_INJECTION: forcing a failure. [ 813.026783][T13324] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 813.054472][T13320] device nr0 entered promiscuous mode [ 813.105094][T13324] CPU: 0 PID: 13324 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 813.114620][T13324] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 813.124738][T13324] Call Trace: [ 813.128055][T13324] dump_stack+0x197/0x210 [ 813.132408][T13324] should_fail.cold+0xa/0x15 [ 813.132434][T13324] ? fault_create_debugfs_attr+0x180/0x180 [ 813.132449][T13324] ? ___might_sleep+0x163/0x2c0 [ 813.132476][T13324] should_fail_alloc_page+0x50/0x60 [ 813.132490][T13324] __alloc_pages_nodemask+0x1a1/0x910 [ 813.132508][T13324] ? __alloc_pages_slowpath+0x2920/0x2920 [ 813.132534][T13324] __vmalloc_node_range+0x2fd/0x810 [ 813.132556][T13324] ? bpf_map_area_alloc+0x20/0x30 [ 813.143119][T13324] __vmalloc_node_flags_caller+0x71/0x90 [ 813.143136][T13324] ? bpf_map_area_alloc+0x20/0x30 [ 813.143150][T13324] __bpf_map_area_alloc+0xde/0xf0 [ 813.143164][T13324] bpf_map_area_alloc+0x20/0x30 [ 813.143180][T13324] htab_map_alloc+0x589/0x11c0 [ 813.143191][T13324] ? __kmalloc+0x608/0x770 [ 813.143204][T13324] ? bpf_get_file_flag+0x80/0x80 [ 813.143226][T13324] ? fput+0x1b/0x20 [ 813.143243][T13324] htab_of_map_alloc+0x71/0x100 [ 813.143254][T13324] ? htab_map_alloc+0x11c0/0x11c0 [ 813.143268][T13324] __do_sys_bpf+0x478/0x3810 [ 813.143288][T13324] ? bpf_prog_load+0x18f0/0x18f0 [ 813.233735][T13324] ? __kasan_check_write+0x14/0x20 [ 813.238856][T13324] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 813.244499][T13324] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 813.249798][T13324] ? wait_for_completion+0x440/0x440 [ 813.255100][T13324] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 813.261356][T13324] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 813.266820][T13324] ? do_syscall_64+0x26/0x790 [ 813.271504][T13324] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 813.277582][T13324] ? do_syscall_64+0x26/0x790 [ 813.282277][T13324] __x64_sys_bpf+0x73/0xb0 [ 813.286724][T13324] do_syscall_64+0xfa/0x790 [ 813.291235][T13324] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 813.297126][T13324] RIP: 0033:0x45a6f9 [ 813.301195][T13324] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 813.321000][T13324] RSP: 002b:00007f3ba2ab9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 813.329426][T13324] RAX: ffffffffffffffda RBX: 00007f3ba2ab9c90 RCX: 000000000045a6f9 [ 813.337426][T13324] RDX: 000000000000002c RSI: 0000000020000400 RDI: 0000000000000000 [ 813.345400][T13324] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 19:34:21 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x39, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r2, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) 19:34:21 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x21, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000340)="2ee640ebb525860177a6f3b3645544f7f125a4af841a7953e22f84185b12aba908201cf2759c8677f246ab717dd60491126e844c7e94d0ccd01223f480a20d3d438ad0e8b8427a6c820851e393d9d961506ee1892c7470f3aaeeaa49878758372528d009cacf1747f56861d1cb2ba3eac51bbc638fa275674f380ddc1b4c90a39af37335c2f17d9ba7929d4252b0622e988bc91bbb48e0d9afac59de23e8f21fdf14d49280dafb4dd8d4c1be81f1baf445737df2aa3e0014642ca3122e92e272609c14144a0b51c839b562daf42dca81c670d852", &(0x7f0000000440)="c997c2302f06feb4e429ac04e02aed7e27d0941ccde49f764cb9397576e7af1c9c22e0bbac784d4425894d3b3f3fa1cdf47f4621fe78ebd35fbaa777837b5a8ba188c068c7bc056347bd7077c9219cb0b501fa6500a65949734352983a00b320ebb05bcbf7564847fa6135cea0c3b5e53cbeba48847558392827e92a9738af10b3c6101f00b9f5d9d004c8", 0x2}, 0x20) 19:34:21 executing program 0 (fault-call:3 fault-nth:74): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x5, r1, 0x0, [0x305f, 0xa]}, 0x2c) [ 813.353371][T13324] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3ba2aba6d4 [ 813.362122][T13324] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000005 19:34:22 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x21, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000340)="2ee640ebb525860177a6f3b3645544f7f125a4af841a7953e22f84185b12aba908201cf2759c8677f246ab717dd60491126e844c7e94d0ccd01223f480a20d3d438ad0e8b8427a6c820851e393d9d961506ee1892c7470f3aaeeaa49878758372528d009cacf1747f56861d1cb2ba3eac51bbc638fa275674f380ddc1b4c90a39af37335c2f17d9ba7929d4252b0622e988bc91bbb48e0d9afac59de23e8f21fdf14d49280dafb4dd8d4c1be81f1baf445737df2aa3e0014642ca3122e92e272609c14144a0b51c839b562daf42dca81c670d852", &(0x7f0000000440)="c997c2302f06feb4e429ac04e02aed7e27d0941ccde49f764cb9397576e7af1c9c22e0bbac784d4425894d3b3f3fa1cdf47f4621fe78ebd35fbaa777837b5a8ba188c068c7bc056347bd7077c9219cb0b501fa6500a65949734352983a00b320ebb05bcbf7564847fa6135cea0c3b5e53cbeba48847558392827e92a9738af10b3c6101f00b9f5d9d004c8", 0x2}, 0x20) [ 813.444494][T13335] FAULT_INJECTION: forcing a failure. [ 813.444494][T13335] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 813.507602][T13335] CPU: 1 PID: 13335 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 813.516333][T13335] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 813.526405][T13335] Call Trace: [ 813.529725][T13335] dump_stack+0x197/0x210 [ 813.534092][T13335] should_fail.cold+0xa/0x15 [ 813.538716][T13335] ? fault_create_debugfs_attr+0x180/0x180 [ 813.544658][T13335] ? ___might_sleep+0x163/0x2c0 [ 813.549549][T13335] should_fail_alloc_page+0x50/0x60 [ 813.554777][T13335] __alloc_pages_nodemask+0x1a1/0x910 [ 813.560211][T13335] ? __alloc_pages_slowpath+0x2920/0x2920 [ 813.565976][T13335] __vmalloc_node_range+0x2fd/0x810 [ 813.571208][T13335] ? bpf_map_area_alloc+0x20/0x30 [ 813.576356][T13335] __vmalloc_node_flags_caller+0x71/0x90 [ 813.582035][T13335] ? bpf_map_area_alloc+0x20/0x30 [ 813.587515][T13335] __bpf_map_area_alloc+0xde/0xf0 [ 813.592567][T13335] bpf_map_area_alloc+0x20/0x30 [ 813.597429][T13335] htab_map_alloc+0x589/0x11c0 [ 813.602358][T13335] ? __kmalloc+0x608/0x770 [ 813.602372][T13335] ? bpf_get_file_flag+0x80/0x80 [ 813.602391][T13335] ? fput+0x1b/0x20 [ 813.602407][T13335] htab_of_map_alloc+0x71/0x100 [ 813.602418][T13335] ? htab_map_alloc+0x11c0/0x11c0 [ 813.602430][T13335] __do_sys_bpf+0x478/0x3810 [ 813.602446][T13335] ? bpf_prog_load+0x18f0/0x18f0 [ 813.602462][T13335] ? __kasan_check_write+0x14/0x20 [ 813.640110][T13335] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 813.645680][T13335] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 813.650995][T13335] ? wait_for_completion+0x440/0x440 [ 813.656311][T13335] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 813.662590][T13335] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 813.668071][T13335] ? do_syscall_64+0x26/0x790 [ 813.672777][T13335] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 813.678856][T13335] ? do_syscall_64+0x26/0x790 [ 813.683560][T13335] __x64_sys_bpf+0x73/0xb0 [ 813.683578][T13335] do_syscall_64+0xfa/0x790 [ 813.683597][T13335] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 813.683607][T13335] RIP: 0033:0x45a6f9 [ 813.683624][T13335] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 813.722247][T13335] RSP: 002b:00007f3ba2ab9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 813.730674][T13335] RAX: ffffffffffffffda RBX: 00007f3ba2ab9c90 RCX: 000000000045a6f9 [ 813.738669][T13335] RDX: 000000000000002c RSI: 0000000020000400 RDI: 0000000000000000 [ 813.746677][T13335] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 19:34:22 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x22, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000340)="2ee640ebb525860177a6f3b3645544f7f125a4af841a7953e22f84185b12aba908201cf2759c8677f246ab717dd60491126e844c7e94d0ccd01223f480a20d3d438ad0e8b8427a6c820851e393d9d961506ee1892c7470f3aaeeaa49878758372528d009cacf1747f56861d1cb2ba3eac51bbc638fa275674f380ddc1b4c90a39af37335c2f17d9ba7929d4252b0622e988bc91bbb48e0d9afac59de23e8f21fdf14d49280dafb4dd8d4c1be81f1baf445737df2aa3e0014642ca3122e92e272609c14144a0b51c839b562daf42dca81c670d852", &(0x7f0000000440)="c997c2302f06feb4e429ac04e02aed7e27d0941ccde49f764cb9397576e7af1c9c22e0bbac784d4425894d3b3f3fa1cdf47f4621fe78ebd35fbaa777837b5a8ba188c068c7bc056347bd7077c9219cb0b501fa6500a65949734352983a00b320ebb05bcbf7564847fa6135cea0c3b5e53cbeba48847558392827e92a9738af10b3c6101f00b9f5d9d004c8", 0x2}, 0x20) 19:34:22 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x22, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000340)="2ee640ebb525860177a6f3b3645544f7f125a4af841a7953e22f84185b12aba908201cf2759c8677f246ab717dd60491126e844c7e94d0ccd01223f480a20d3d438ad0e8b8427a6c820851e393d9d961506ee1892c7470f3aaeeaa49878758372528d009cacf1747f56861d1cb2ba3eac51bbc638fa275674f380ddc1b4c90a39af37335c2f17d9ba7929d4252b0622e988bc91bbb48e0d9afac59de23e8f21fdf14d49280dafb4dd8d4c1be81f1baf445737df2aa3e0014642ca3122e92e272609c14144a0b51c839b562daf42dca81c670d852", &(0x7f0000000440)="c997c2302f06feb4e429ac04e02aed7e27d0941ccde49f764cb9397576e7af1c9c22e0bbac784d4425894d3b3f3fa1cdf47f4621fe78ebd35fbaa777837b5a8ba188c068c7bc056347bd7077c9219cb0b501fa6500a65949734352983a00b320ebb05bcbf7564847fa6135cea0c3b5e53cbeba48847558392827e92a9738af10b3c6101f00b9f5d9d004c8", 0x2}, 0x20) [ 813.754661][T13335] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3ba2aba6d4 [ 813.762638][T13335] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000005 [ 813.856669][T13320] device nr0 entered promiscuous mode 19:34:26 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x0, 0x24, &(0x7f0000000880)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000570600000fff0700670600000200000027cd2973eb3ddb8bed3b3e77e60000bf250000000000002d350000000000006500001f74fffffffffe00bf54000000000000070400004400f9f0ad32010000000000950000000000000005000000000000009500000000000000debfa255e44e4cc39f211fb04d7f202e6a536618f63a3fbd86bde99b679b4e6d24b8125690361eec3b181dcfd7c2fb2d1f8975b579a085bee32d414ca9de6185ae8021f48a33b9b35fe817e98beb9cefe7f40fd6f0aa3affbdaaa897c70fb01d270a7b00d36fb5ab8fa92ac014a106e3e4decc68652503ca54fcef43"], &(0x7f0000000100)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x2, 0x3, 0x2) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000180)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000200)=[{&(0x7f00000002c0)=""/213, 0xd5}], 0x1}, 0x15120) r4 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000180)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) ioctl$TUNGETVNETHDRSZ(r5, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r5, 0x0, 0xf800000000000000) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r5, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r5, 0x2401, 0x80000001) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x13, 0x0, &(0x7f0000000080), &(0x7f00000000c0)='syzkaller\x00', 0x3, 0x0, 0x0, 0x21680, 0x1, [], r3, 0x17, r5, 0x8, &(0x7f00000003c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000400)={0x2, 0x6, 0x81}, 0x10, 0xffffffffffffffff, r0}, 0x78) sendmsg$inet(r1, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r1, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000040)=r7) 19:34:26 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x22, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000340)="2ee640ebb525860177a6f3b3645544f7f125a4af841a7953e22f84185b12aba908201cf2759c8677f246ab717dd60491126e844c7e94d0ccd01223f480a20d3d438ad0e8b8427a6c820851e393d9d961506ee1892c7470f3aaeeaa49878758372528d009cacf1747f56861d1cb2ba3eac51bbc638fa275674f380ddc1b4c90a39af37335c2f17d9ba7929d4252b0622e988bc91bbb48e0d9afac59de23e8f21fdf14d49280dafb4dd8d4c1be81f1baf445737df2aa3e0014642ca3122e92e272609c14144a0b51c839b562daf42dca81c670d852", &(0x7f0000000440)="c997c2302f06feb4e429ac04e02aed7e27d0941ccde49f764cb9397576e7af1c9c22e0bbac784d4425894d3b3f3fa1cdf47f4621fe78ebd35fbaa777837b5a8ba188c068c7bc056347bd7077c9219cb0b501fa6500a65949734352983a00b320ebb05bcbf7564847fa6135cea0c3b5e53cbeba48847558392827e92a9738af10b3c6101f00b9f5d9d004c8", 0x2}, 0x20) 19:34:26 executing program 0 (fault-call:3 fault-nth:75): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x5, r1, 0x0, [0x305f, 0xa]}, 0x2c) 19:34:26 executing program 2: socket$kcm(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000480)=@ethernet={0x0, @random="fa0870439355"}, 0x80, &(0x7f0000000640)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4}, 0x10) socketpair(0x0, 0x0, 0x0, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x6609, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0xc0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x4, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x2}, 0x0, 0x0, &(0x7f0000000280)={0x0, 0x7, 0x1}, &(0x7f00000002c0)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=0x81}}, 0x39b) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000500)=@hci, 0x80, 0x0, 0x0, 0x0, 0x13308726d82294c4}, 0x50000c0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x00\xd2\x97\x04\x03\xdc\r') r2 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r3, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r3, 0x0, 0xf800000000000000) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r3, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x80000001) ioctl$TUNSETIFF(r3, 0x400454ca, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x40286608, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, @perf_config_ext={0x63c, 0x8}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffff8000}) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000000)) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='\b\x00', 0x1430c2, 0x0) write$cgroup_subtree(r4, &(0x7f00000000c0)=ANY=[@ANYBLOB=']'], 0x1) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)=@nfc, 0x80, 0x0, 0x0, 0x0, 0x0, 0x50}, 0x0) socket$kcm(0x29, 0x5, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x7a05, 0x1700) write$cgroup_subtree(r5, 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f00000000c0)) r7 = openat$cgroup_ro(r6, &(0x7f00000003c0)='pids.events\x00', 0x0, 0x0) write$cgroup_subtree(r7, &(0x7f0000000d80)=ANY=[@ANYRES64, @ANYBLOB="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", @ANYRESHEX], 0xba) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000140)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x00\xd2\x97\x04\x03\xdc\r') 19:34:26 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x39, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r2, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) 19:34:26 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x324) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8932, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') [ 818.235166][T13362] FAULT_INJECTION: forcing a failure. [ 818.235166][T13362] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 818.252770][T13362] CPU: 0 PID: 13362 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 818.261493][T13362] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 818.271562][T13362] Call Trace: [ 818.274886][T13362] dump_stack+0x197/0x210 [ 818.279271][T13362] should_fail.cold+0xa/0x15 [ 818.283892][T13362] ? fault_create_debugfs_attr+0x180/0x180 [ 818.289716][T13362] ? ___might_sleep+0x163/0x2c0 [ 818.294602][T13362] should_fail_alloc_page+0x50/0x60 [ 818.299822][T13362] __alloc_pages_nodemask+0x1a1/0x910 [ 818.305239][T13362] ? __alloc_pages_slowpath+0x2920/0x2920 [ 818.311025][T13362] __vmalloc_node_range+0x2fd/0x810 [ 818.316258][T13362] ? bpf_map_area_alloc+0x20/0x30 [ 818.321296][T13362] __vmalloc_node_flags_caller+0x71/0x90 [ 818.326945][T13362] ? bpf_map_area_alloc+0x20/0x30 [ 818.331995][T13362] __bpf_map_area_alloc+0xde/0xf0 [ 818.337053][T13362] bpf_map_area_alloc+0x20/0x30 [ 818.341923][T13362] htab_map_alloc+0x589/0x11c0 [ 818.346786][T13362] ? __kmalloc+0x608/0x770 [ 818.351211][T13362] ? bpf_get_file_flag+0x80/0x80 [ 818.356197][T13362] ? fput+0x1b/0x20 [ 818.360034][T13362] htab_of_map_alloc+0x71/0x100 [ 818.364900][T13362] ? htab_map_alloc+0x11c0/0x11c0 [ 818.369938][T13362] __do_sys_bpf+0x478/0x3810 [ 818.374572][T13362] ? bpf_prog_load+0x18f0/0x18f0 [ 818.379524][T13362] ? __kasan_check_write+0x14/0x20 [ 818.385174][T13362] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 818.390762][T13362] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 818.396071][T13362] ? wait_for_completion+0x440/0x440 [ 818.401358][T13362] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 818.407598][T13362] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 818.413164][T13362] ? do_syscall_64+0x26/0x790 [ 818.418007][T13362] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 818.424111][T13362] ? do_syscall_64+0x26/0x790 [ 818.428921][T13362] __x64_sys_bpf+0x73/0xb0 [ 818.433361][T13362] do_syscall_64+0xfa/0x790 [ 818.437977][T13362] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 818.444088][T13362] RIP: 0033:0x45a6f9 [ 818.448087][T13362] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 818.467965][T13362] RSP: 002b:00007f3ba2ab9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 818.476614][T13362] RAX: ffffffffffffffda RBX: 00007f3ba2ab9c90 RCX: 000000000045a6f9 19:34:27 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x39, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r2, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) 19:34:27 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x22, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000340)="2ee640ebb525860177a6f3b3645544f7f125a4af841a7953e22f84185b12aba908201cf2759c8677f246ab717dd60491126e844c7e94d0ccd01223f480a20d3d438ad0e8b8427a6c820851e393d9d961506ee1892c7470f3aaeeaa49878758372528d009cacf1747f56861d1cb2ba3eac51bbc638fa275674f380ddc1b4c90a39af37335c2f17d9ba7929d4252b0622e988bc91bbb48e0d9afac59de23e8f21fdf14d49280dafb4dd8d4c1be81f1baf445737df2aa3e0014642ca3122e92e272609c14144a0b51c839b562daf42dca81c670d852", &(0x7f0000000440)="c997c2302f06feb4e429ac04e02aed7e27d0941ccde49f764cb9397576e7af1c9c22e0bbac784d4425894d3b3f3fa1cdf47f4621fe78ebd35fbaa777837b5a8ba188c068c7bc056347bd7077c9219cb0b501fa6500a65949734352983a00b320ebb05bcbf7564847fa6135cea0c3b5e53cbeba48847558392827e92a9738af10b3c6101f00b9f5d9d004c8", 0x2}, 0x20) [ 818.484607][T13362] RDX: 000000000000002c RSI: 0000000020000400 RDI: 0000000000000000 [ 818.492598][T13362] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 818.500573][T13362] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3ba2aba6d4 [ 818.508536][T13362] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000005 [ 818.518409][T13365] device lo entered promiscuous mode 19:34:27 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x22, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000340)="2ee640ebb525860177a6f3b3645544f7f125a4af841a7953e22f84185b12aba908201cf2759c8677f246ab717dd60491126e844c7e94d0ccd01223f480a20d3d438ad0e8b8427a6c820851e393d9d961506ee1892c7470f3aaeeaa49878758372528d009cacf1747f56861d1cb2ba3eac51bbc638fa275674f380ddc1b4c90a39af37335c2f17d9ba7929d4252b0622e988bc91bbb48e0d9afac59de23e8f21fdf14d49280dafb4dd8d4c1be81f1baf445737df2aa3e0014642ca3122e92e272609c14144a0b51c839b562daf42dca81c670d852", &(0x7f0000000440)="c997c2302f06feb4e429ac04e02aed7e27d0941ccde49f764cb9397576e7af1c9c22e0bbac784d4425894d3b3f3fa1cdf47f4621fe78ebd35fbaa777837b5a8ba188c068c7bc056347bd7077c9219cb0b501fa6500a65949734352983a00b320ebb05bcbf7564847fa6135cea0c3b5e53cbeba48847558392827e92a9738af10b3c6101f00b9f5d9d004c8", 0x2}, 0x20) 19:34:27 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x39, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r2, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) 19:34:27 executing program 0 (fault-call:3 fault-nth:76): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x5, r1, 0x0, [0x305f, 0xa]}, 0x2c) 19:34:27 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x22, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000340)="2ee640ebb525860177a6f3b3645544f7f125a4af841a7953e22f84185b12aba908201cf2759c8677f246ab717dd60491126e844c7e94d0ccd01223f480a20d3d438ad0e8b8427a6c820851e393d9d961506ee1892c7470f3aaeeaa49878758372528d009cacf1747f56861d1cb2ba3eac51bbc638fa275674f380ddc1b4c90a39af37335c2f17d9ba7929d4252b0622e988bc91bbb48e0d9afac59de23e8f21fdf14d49280dafb4dd8d4c1be81f1baf445737df2aa3e0014642ca3122e92e272609c14144a0b51c839b562daf42dca81c670d852", &(0x7f0000000440)="c997c2302f06feb4e429ac04e02aed7e27d0941ccde49f764cb9397576e7af1c9c22e0bbac784d4425894d3b3f3fa1cdf47f4621fe78ebd35fbaa777837b5a8ba188c068c7bc056347bd7077c9219cb0b501fa6500a65949734352983a00b320ebb05bcbf7564847fa6135cea0c3b5e53cbeba48847558392827e92a9738af10b3c6101f00b9f5d9d004c8", 0x2}, 0x20) [ 818.870705][T13391] FAULT_INJECTION: forcing a failure. [ 818.870705][T13391] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 818.910778][T13391] CPU: 0 PID: 13391 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 818.919531][T13391] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 818.929591][T13391] Call Trace: [ 818.932919][T13391] dump_stack+0x197/0x210 [ 818.937275][T13391] should_fail.cold+0xa/0x15 [ 818.941890][T13391] ? fault_create_debugfs_attr+0x180/0x180 [ 818.947716][T13391] ? ___might_sleep+0x163/0x2c0 [ 818.952594][T13391] should_fail_alloc_page+0x50/0x60 [ 818.957825][T13391] __alloc_pages_nodemask+0x1a1/0x910 [ 818.963222][T13391] ? __alloc_pages_slowpath+0x2920/0x2920 [ 818.968979][T13391] __vmalloc_node_range+0x2fd/0x810 [ 818.974384][T13391] ? bpf_map_area_alloc+0x20/0x30 [ 818.979634][T13391] __vmalloc_node_flags_caller+0x71/0x90 [ 818.985439][T13391] ? bpf_map_area_alloc+0x20/0x30 [ 818.990496][T13391] __bpf_map_area_alloc+0xde/0xf0 [ 818.995822][T13391] bpf_map_area_alloc+0x20/0x30 [ 819.000799][T13391] htab_map_alloc+0x589/0x11c0 [ 819.005576][T13391] ? __kmalloc+0x608/0x770 [ 819.010049][T13391] ? bpf_get_file_flag+0x80/0x80 [ 819.015106][T13391] ? fput+0x1b/0x20 [ 819.018942][T13391] htab_of_map_alloc+0x71/0x100 [ 819.023817][T13391] ? htab_map_alloc+0x11c0/0x11c0 [ 819.028854][T13391] __do_sys_bpf+0x478/0x3810 [ 819.033477][T13391] ? bpf_prog_load+0x18f0/0x18f0 [ 819.038450][T13391] ? __kasan_check_write+0x14/0x20 [ 819.043568][T13391] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 819.049127][T13391] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 819.054504][T13391] ? wait_for_completion+0x440/0x440 [ 819.059820][T13391] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 819.066108][T13391] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 819.071664][T13391] ? do_syscall_64+0x26/0x790 [ 819.076364][T13391] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 819.082452][T13391] ? do_syscall_64+0x26/0x790 [ 819.087156][T13391] __x64_sys_bpf+0x73/0xb0 [ 819.091933][T13391] do_syscall_64+0xfa/0x790 [ 819.096443][T13391] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 819.102424][T13391] RIP: 0033:0x45a6f9 [ 819.106322][T13391] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 819.125933][T13391] RSP: 002b:00007f3ba2a98c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 819.134358][T13391] RAX: ffffffffffffffda RBX: 00007f3ba2a98c90 RCX: 000000000045a6f9 [ 819.142374][T13391] RDX: 000000000000002c RSI: 0000000020000400 RDI: 0000000000000000 [ 819.150355][T13391] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 819.158366][T13391] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3ba2a996d4 [ 819.166397][T13391] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000005 19:34:36 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x23, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000340)="2ee640ebb525860177a6f3b3645544f7f125a4af841a7953e22f84185b12aba908201cf2759c8677f246ab717dd60491126e844c7e94d0ccd01223f480a20d3d438ad0e8b8427a6c820851e393d9d961506ee1892c7470f3aaeeaa49878758372528d009cacf1747f56861d1cb2ba3eac51bbc638fa275674f380ddc1b4c90a39af37335c2f17d9ba7929d4252b0622e988bc91bbb48e0d9afac59de23e8f21fdf14d49280dafb4dd8d4c1be81f1baf445737df2aa3e0014642ca3122e92e272609c14144a0b51c839b562daf42dca81c670d852", &(0x7f0000000440)="c997c2302f06feb4e429ac04e02aed7e27d0941ccde49f764cb9397576e7af1c9c22e0bbac784d4425894d3b3f3fa1cdf47f4621fe78ebd35fbaa777837b5a8ba188c068c7bc056347bd7077c9219cb0b501fa6500a65949734352983a00b320ebb05bcbf7564847fa6135cea0c3b5e53cbeba48847558392827e92a9738af10b3c6101f00b9f5d9d004c8", 0x2}, 0x20) 19:34:36 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x0, 0x24, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x2, 0x3, 0x2) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000180)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000200)=[{&(0x7f00000002c0)=""/213, 0xd5}], 0x1}, 0x15120) r4 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000180)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) ioctl$TUNGETVNETHDRSZ(r5, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r5, 0x0, 0xf800000000000000) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r5, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r5, 0x2401, 0x80000001) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x13, 0x0, &(0x7f0000000080), &(0x7f00000000c0)='syzkaller\x00', 0x3, 0x0, 0x0, 0x21680, 0x1, [], r3, 0x17, r5, 0x8, &(0x7f00000003c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000400)={0x2, 0x6, 0x81}, 0x10, 0xffffffffffffffff, r0}, 0x78) sendmsg$inet(r1, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r1, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000040)=r7) 19:34:36 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x39, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r2, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) 19:34:36 executing program 0 (fault-call:3 fault-nth:77): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x5, r1, 0x0, [0x305f, 0xa]}, 0x2c) 19:34:36 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x324) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8933, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') 19:34:36 executing program 2: socket$kcm(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000480)=@ethernet={0x0, @random="fa0870439355"}, 0x80, &(0x7f0000000640)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4}, 0x10) socketpair(0x0, 0x0, 0x0, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x6609, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0xc0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x4, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x2}, 0x0, 0x0, &(0x7f0000000280)={0x0, 0x7, 0x1}, &(0x7f00000002c0)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=0x81}}, 0x39b) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000500)=@hci, 0x80, 0x0, 0x0, 0x0, 0x13308726d82294c4}, 0x50000c0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x00\xd2\x97\x04\x03\xdc\r') r2 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r3, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r3, 0x0, 0xf800000000000000) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r3, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x80000001) ioctl$TUNSETIFF(r3, 0x400454ca, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x40286608, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, @perf_config_ext={0x63c, 0x8}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffff8000}) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000000)) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='\b\x00', 0x1430c2, 0x0) write$cgroup_subtree(r4, &(0x7f00000000c0)=ANY=[@ANYBLOB=']'], 0x1) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)=@nfc, 0x80, 0x0, 0x0, 0x0, 0x0, 0x50}, 0x0) socket$kcm(0x29, 0x5, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x7a05, 0x1700) write$cgroup_subtree(r5, 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f00000000c0)) r7 = openat$cgroup_ro(r6, &(0x7f00000003c0)='pids.events\x00', 0x0, 0x0) write$cgroup_subtree(r7, &(0x7f0000000d80)=ANY=[@ANYRES64, @ANYBLOB="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", @ANYRESHEX], 0xba) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000140)='lo\x00\x96o\xd6Q\xb9Y\xa9dJ,\x00\xd2\x97\x04\x03\xdc\r') [ 827.532253][T13418] FAULT_INJECTION: forcing a failure. [ 827.532253][T13418] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 827.549057][T13418] CPU: 0 PID: 13418 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 827.557808][T13418] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 827.567971][T13418] Call Trace: [ 827.571275][T13418] dump_stack+0x197/0x210 [ 827.575695][T13418] should_fail.cold+0xa/0x15 [ 827.581321][T13418] ? fault_create_debugfs_attr+0x180/0x180 [ 827.587162][T13418] ? ___might_sleep+0x163/0x2c0 [ 827.592040][T13418] should_fail_alloc_page+0x50/0x60 [ 827.597232][T13418] __alloc_pages_nodemask+0x1a1/0x910 [ 827.602610][T13418] ? __alloc_pages_slowpath+0x2920/0x2920 [ 827.608354][T13418] __vmalloc_node_range+0x2fd/0x810 [ 827.613545][T13418] ? bpf_map_area_alloc+0x20/0x30 [ 827.618576][T13418] __vmalloc_node_flags_caller+0x71/0x90 [ 827.624222][T13418] ? bpf_map_area_alloc+0x20/0x30 [ 827.629248][T13418] __bpf_map_area_alloc+0xde/0xf0 [ 827.634270][T13418] bpf_map_area_alloc+0x20/0x30 [ 827.639105][T13418] htab_map_alloc+0x589/0x11c0 [ 827.643884][T13418] ? __kmalloc+0x608/0x770 [ 827.648855][T13418] ? bpf_get_file_flag+0x80/0x80 [ 827.653794][T13418] ? fput+0x1b/0x20 [ 827.657597][T13418] htab_of_map_alloc+0x71/0x100 [ 827.662560][T13418] ? htab_map_alloc+0x11c0/0x11c0 [ 827.667976][T13418] __do_sys_bpf+0x478/0x3810 [ 827.672604][T13418] ? bpf_prog_load+0x18f0/0x18f0 [ 827.677657][T13418] ? __kasan_check_write+0x14/0x20 [ 827.682770][T13418] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 827.688549][T13418] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 827.693844][T13418] ? wait_for_completion+0x440/0x440 [ 827.699272][T13418] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 827.705840][T13418] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 827.711304][T13418] ? do_syscall_64+0x26/0x790 [ 827.715972][T13418] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 827.722061][T13418] ? do_syscall_64+0x26/0x790 [ 827.726750][T13418] __x64_sys_bpf+0x73/0xb0 [ 827.731172][T13418] do_syscall_64+0xfa/0x790 [ 827.735700][T13418] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 827.741589][T13418] RIP: 0033:0x45a6f9 [ 827.745651][T13418] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 827.765264][T13418] RSP: 002b:00007f3ba2ab9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 827.773694][T13418] RAX: ffffffffffffffda RBX: 00007f3ba2ab9c90 RCX: 000000000045a6f9 19:34:36 executing program 0 (fault-call:3 fault-nth:78): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x5, r1, 0x0, [0x305f, 0xa]}, 0x2c) [ 827.781681][T13418] RDX: 000000000000002c RSI: 0000000020000400 RDI: 0000000000000000 [ 827.789668][T13418] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 827.797743][T13418] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3ba2aba6d4 [ 827.805726][T13418] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000005 19:34:36 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x23, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000340)="2ee640ebb525860177a6f3b3645544f7f125a4af841a7953e22f84185b12aba908201cf2759c8677f246ab717dd60491126e844c7e94d0ccd01223f480a20d3d438ad0e8b8427a6c820851e393d9d961506ee1892c7470f3aaeeaa49878758372528d009cacf1747f56861d1cb2ba3eac51bbc638fa275674f380ddc1b4c90a39af37335c2f17d9ba7929d4252b0622e988bc91bbb48e0d9afac59de23e8f21fdf14d49280dafb4dd8d4c1be81f1baf445737df2aa3e0014642ca3122e92e272609c14144a0b51c839b562daf42dca81c670d852", &(0x7f0000000440)="c997c2302f06feb4e429ac04e02aed7e27d0941ccde49f764cb9397576e7af1c9c22e0bbac784d4425894d3b3f3fa1cdf47f4621fe78ebd35fbaa777837b5a8ba188c068c7bc056347bd7077c9219cb0b501fa6500a65949734352983a00b320ebb05bcbf7564847fa6135cea0c3b5e53cbeba48847558392827e92a9738af10b3c6101f00b9f5d9d004c8", 0x2}, 0x20) 19:34:36 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x39, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r2, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r2, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) 19:34:36 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x23, &(0x7f0000000500)=ANY=[@ANYBLOB="850000004f0000003f00000000000000950000e600000000002ce85fbf62c21eb4d98183dd3c429de1c9486c70bfaa1243267d558865039af316a920c7e2b2ca81dde11ccf869c0d8d4add1f02645b52cd5fa052ac6f1ce71eb092d6aa8833238d4a939203656e384b45145c2ebc8b27040c493814ee51d4bcfc9ed7070afb5b5a17ff386243a11b2d2c53115d3c8e4c565bb4f9d3a29971f06cf45869c081787f6260b6f21854551f5ed4dac7a39847d928f5f33da8637f00c589cac9b859f624db94a7a9dd6187c46f63615afef93d594e53beebf5ae0ea05ad7af1c5072d32e37ef675a80f4729390d8b2ce649ffd2193b8e0c7c92f01909e61ed54e3b8757b7d43f4e593620ec1dd6ef2d2204c7db1b7c75e765f9cd1cb"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000340)="2ee640ebb525860177a6f3b3645544f7f125a4af841a7953e22f84185b12aba908201cf2759c8677f246ab717dd60491126e844c7e94d0ccd01223f480a20d3d438ad0e8b8427a6c820851e393d9d961506ee1892c7470f3aaeeaa49878758372528d009cacf1747f56861d1cb2ba3eac51bbc638fa275674f380ddc1b4c90a39af37335c2f17d9ba7929d4252b0622e988bc91bbb48e0d9afac59de23e8f21fdf14d49280dafb4dd8d4c1be81f1baf445737df2aa3e0014642ca3122e92e272609c14144a0b51c839b562daf42dca81c670d852", &(0x7f0000000440)="c997c2302f06feb4e429ac04e02aed7e27d0941ccde49f764cb9397576e7af1c9c22e0bbac784d4425894d3b3f3fa1cdf47f4621fe78ebd35fbaa777837b5a8ba188c068c7bc056347bd7077c9219cb0b501fa6500a65949734352983a00b320ebb05bcbf7564847fa6135cea0c3b5e53cbeba48847558392827e92a9738af10b3c6101f00b9f5d9d004c8", 0x2}, 0x20) [ 828.041607][T13438] FAULT_INJECTION: forcing a failure. [ 828.041607][T13438] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 828.088794][T13438] CPU: 0 PID: 13438 Comm: syz-executor.0 Not tainted 5.5.0-rc1-syzkaller #0 [ 828.097512][T13438] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 828.097519][T13438] Call Trace: [ 828.097542][T13438] dump_stack+0x197/0x210 [ 828.097566][T13438] should_fail.cold+0xa/0x15 [ 828.097586][T13438] ? fault_create_debugfs_attr+0x180/0x180 [ 828.097600][T13438] ? ___might_sleep+0x163/0x2c0 [ 828.097625][T13438] should_fail_alloc_page+0x50/0x60 [ 828.097637][T13438] __alloc_pages_nodemask+0x1a1/0x910 [ 828.097652][T13438] ? __alloc_pages_slowpath+0x2920/0x2920 [ 828.097679][T13438] __vmalloc_node_range+0x2fd/0x810 [ 828.154054][T13438] ? bpf_map_area_alloc+0x20/0x30 [ 828.160824][T13438] __vmalloc_node_flags_caller+0x71/0x90 [ 828.166563][T13438] ? bpf_map_area_alloc+0x20/0x30 [ 828.171631][T13438] __bpf_map_area_alloc+0xde/0xf0 [ 828.176679][T13438] bpf_map_area_alloc+0x20/0x30 [ 828.181552][T13438] htab_map_alloc+0x589/0x11c0 [ 828.186331][T13438] ? __kmalloc+0x608/0x770 [ 828.190752][T13438] ? bpf_get_file_flag+0x80/0x80 [ 828.195713][T13438] ? fput+0x1b/0x20 [ 828.199542][T13438] htab_of_map_alloc+0x71/0x100 [ 828.204495][T13438] ? htab_map_alloc+0x11c0/0x11c0 [ 828.209718][T13438] __do_sys_bpf+0x478/0x3810 [ 828.214325][T13438] ? bpf_prog_load+0x18f0/0x18f0 [ 828.219254][T13438] ? __kasan_check_write+0x14/0x20 [ 828.224386][T13438] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 828.229949][T13438] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 828.235252][T13438] ? wait_for_completion+0x440/0x440 [ 828.240563][T13438] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 828.246859][T13438] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 828.252322][T13438] ? do_syscall_64+0x26/0x790 [ 828.257040][T13438] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 828.263127][T13438] ? do_syscall_64+0x26/0x790 [ 828.267830][T13438] __x64_sys_bpf+0x73/0xb0 [ 828.272257][T13438] do_syscall_64+0xfa/0x790 [ 828.276771][T13438] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 828.282673][T13438] RIP: 0033:0x45a6f9 [ 828.286582][T13438] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 828.306356][T13438] RSP: 002b:00007f3ba2ab9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 828.314787][T13438] RAX: ffffffffffffffda RBX: 00007f3ba2ab9c90 RCX: 000000000045a6f9 [ 828.322883][T13438] RDX: 000000000000002c RSI: 0000000020000400 RDI: 0000000000000000 [ 828.330895][T13438] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 19:34:36 executing program 2: r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f0000000080)) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_type(r1, 0x0, 0xf800000000000000) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x22020, 0x0) recvmsg(r2, &(0x7f00000098c0)={&(0x7f0000009640)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000009780)=[{&(0x7f00000096c0)=""/188, 0xbc}], 0x1, &(0x7f00000097c0)=""/255, 0xff}, 0x20) ioctl$TUNSETIFINDEX(r3, 0x400454da, &(0x7f0000009900)=r4) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r1, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x80000001) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'veth1_to_team\x00', 0x100}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004700)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb01001800000000000000300000003000000007000000000000000000000404faffffff000000000000090100000000000000010000840000000200000000020021000000000000300000612e00"], &(0x7f0000004600)=""/210, 0x4f, 0x193, 0x1}, 0x20) 19:34:36 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r1, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r1, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) 19:34:36 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x23, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000340)="2ee640ebb525860177a6f3b3645544f7f125a4af841a7953e22f84185b12aba908201cf2759c8677f246ab717dd60491126e844c7e94d0ccd01223f480a20d3d438ad0e8b8427a6c820851e393d9d961506ee1892c7470f3aaeeaa49878758372528d009cacf1747f56861d1cb2ba3eac51bbc638fa275674f380ddc1b4c90a39af37335c2f17d9ba7929d4252b0622e988bc91bbb48e0d9afac59de23e8f21fdf14d49280dafb4dd8d4c1be81f1baf445737df2aa3e0014642ca3122e92e272609c14144a0b51c839b562daf42dca81c670d852", &(0x7f0000000440)="c997c2302f06feb4e429ac04e02aed7e27d0941ccde49f764cb9397576e7af1c9c22e0bbac784d4425894d3b3f3fa1cdf47f4621fe78ebd35fbaa777837b5a8ba188c068c7bc056347bd7077c9219cb0b501fa6500a65949734352983a00b320ebb05bcbf7564847fa6135cea0c3b5e53cbeba48847558392827e92a9738af10b3c6101f00b9f5d9d004c8", 0x2}, 0x20) [ 828.338897][T13438] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3ba2aba6d4 [ 828.346896][T13438] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000005 [ 828.547444][T13446] BUG: sleeping function called from invalid context at mm/page_alloc.c:4695 [ 828.557179][T13446] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 13446, name: syz-executor.5 [ 828.567080][T13446] 2 locks held by syz-executor.5/13446: [ 828.572803][T13446] #0: ffffffff89a40820 (vmap_purge_lock){+.+.}, at: _vm_unmap_aliases+0x386/0x480 [ 828.582676][T13446] #1: ffffffff89a409b8 (free_vmap_area_lock){+.+.}, at: __purge_vmap_area_lazy+0x194/0x1ef0 [ 828.593508][T13446] Preemption disabled at: [ 828.593550][T13446] [] __purge_vmap_area_lazy+0x194/0x1ef0 [ 828.607800][T13446] CPU: 0 PID: 13446 Comm: syz-executor.5 Not tainted 5.5.0-rc1-syzkaller #0 [ 828.616565][T13446] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 828.626625][T13446] Call Trace: [ 828.629910][T13446] dump_stack+0x197/0x210 [ 828.634244][T13446] ? __purge_vmap_area_lazy+0x194/0x1ef0 [ 828.639886][T13446] ___might_sleep.cold+0x1fb/0x23e [ 828.644994][T13446] __might_sleep+0x95/0x190 [ 828.649655][T13446] __alloc_pages_nodemask+0x523/0x910 [ 828.655024][T13446] ? lockdep_hardirqs_on+0x421/0x5e0 [ 828.660367][T13446] ? retint_kernel+0x2b/0x2b [ 828.664973][T13446] ? __alloc_pages_slowpath+0x2920/0x2920 [ 828.670847][T13446] ? __this_cpu_preempt_check+0x35/0x190 [ 828.676511][T13446] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 828.682857][T13446] alloc_pages_current+0x107/0x210 [ 828.687990][T13446] __get_free_pages+0xc/0x40 [ 828.692588][T13446] __pte_alloc_kernel+0x1d/0x210 [ 828.697525][T13446] apply_to_page_range+0x621/0x700 [ 828.702665][T13446] ? __kasan_slab_free+0x150/0x150 [ 828.707876][T13446] kasan_release_vmalloc+0xa9/0xc0 [ 828.713005][T13446] __purge_vmap_area_lazy+0xca5/0x1ef0 [ 828.718496][T13446] _vm_unmap_aliases+0x396/0x480 [ 828.723456][T13446] vm_unmap_aliases+0x19/0x20 [ 828.728244][T13446] change_page_attr_set_clr+0x22e/0x840 [ 828.733803][T13446] ? __set_pages_p+0x130/0x130 [ 828.738575][T13446] ? __set_pages_p+0x130/0x130 [ 828.743341][T13446] ? find_held_lock+0x35/0x130 [ 828.748114][T13446] ? find_vmap_area+0xf9/0x140 [ 828.752974][T13446] ? rwlock_bug.part.0+0x90/0x90 [ 828.757916][T13446] set_memory_x+0xb5/0x110 [ 828.762332][T13446] ? _set_memory_wb+0xa0/0xa0 [ 828.767008][T13446] bpf_int_jit_compile+0xeef/0x12ce [ 828.772214][T13446] ? arch_prepare_bpf_trampoline+0x9a0/0x9a0 [ 828.778377][T13446] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 828.784629][T13446] ? bpf_prog_alloc_jited_linfo+0xd3/0x1c0 [ 828.790443][T13446] ? __bpf_prog_run_args32+0x120/0x120 [ 828.795906][T13446] bpf_prog_select_runtime+0x4b9/0x850 [ 828.801397][T13446] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 828.807658][T13446] bpf_prog_load+0xe69/0x18f0 [ 828.812478][T13446] ? bpf_prog_new_fd+0x60/0x60 [ 828.817248][T13446] ? lock_downgrade+0x920/0x920 [ 828.822228][T13446] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 828.828506][T13446] ? security_bpf+0x8b/0xc0 [ 828.833135][T13446] __do_sys_bpf+0xa48/0x3810 [ 828.837792][T13446] ? bpf_prog_load+0x18f0/0x18f0 [ 828.842740][T13446] ? _copy_to_user+0x10b/0x160 [ 828.847528][T13446] ? write_comp_data+0x9/0x70 [ 828.852215][T13446] ? __kasan_check_read+0x11/0x20 [ 828.857254][T13446] ? _copy_to_user+0x118/0x160 [ 828.862034][T13446] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 828.868389][T13446] ? put_timespec64+0xda/0x140 [ 828.873196][T13446] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 828.878669][T13446] ? do_syscall_64+0x26/0x790 [ 828.883346][T13446] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 828.889764][T13446] ? do_syscall_64+0x26/0x790 [ 828.894478][T13446] __x64_sys_bpf+0x73/0xb0 [ 828.899043][T13446] do_syscall_64+0xfa/0x790 [ 828.903560][T13446] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 828.909471][T13446] RIP: 0033:0x45a6f9 [ 828.913512][T13446] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 828.933255][T13446] RSP: 002b:00007f83a75d5c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 828.942007][T13446] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a6f9 [ 828.949977][T13446] RDX: 0000000000000048 RSI: 0000000020000200 RDI: 0000000000000005 [ 828.957945][T13446] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 828.966011][T13446] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f83a75d66d4 [ 828.974111][T13446] R13: 00000000004c0d87 R14: 00000000004d4968 R15: 00000000ffffffff 19:34:41 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x0, 0x2e, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x2, 0x3, 0x2) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000180)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000200)=[{&(0x7f00000002c0)=""/213, 0xd5}], 0x1}, 0x15120) r4 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000180)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) ioctl$TUNGETVNETHDRSZ(r5, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r5, 0x0, 0xf800000000000000) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r5, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r5, 0x2401, 0x80000001) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x13, 0x0, &(0x7f0000000080), &(0x7f00000000c0)='syzkaller\x00', 0x3, 0x0, 0x0, 0x21680, 0x1, [], r3, 0x17, r5, 0x8, &(0x7f00000003c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000400)={0x2, 0x6, 0x81}, 0x10, 0xffffffffffffffff, r0}, 0x78) sendmsg$inet(r1, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast1}}}], 0x20}, 0x0) recvmsg(r1, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000040)=r7) 19:34:41 executing program 0 (fault-call:3 fault-nth:79): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x5, r1, 0x0, [0x305f, 0xa]}, 0x2c) 19:34:41 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x23, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000340)="2ee640ebb525860177a6f3b3645544f7f125a4af841a7953e22f84185b12aba908201cf2759c8677f246ab717dd60491126e844c7e94d0ccd01223f480a20d3d438ad0e8b8427a6c820851e393d9d961506ee1892c7470f3aaeeaa49878758372528d009cacf1747f56861d1cb2ba3eac51bbc638fa275674f380ddc1b4c90a39af37335c2f17d9ba7929d4252b0622e988bc91bbb48e0d9afac59de23e8f21fdf14d49280dafb4dd8d4c1be81f1baf445737df2aa3e0014642ca3122e92e272609c14144a0b51c839b562daf42dca81c670d852", &(0x7f0000000440)="c997c2302f06feb4e429ac04e02aed7e27d0941ccde49f764cb9397576e7af1c9c22e0bbac784d4425894d3b3f3fa1cdf47f4621fe78ebd35fbaa777837b5a8ba188c068c7bc056347bd7077c9219cb0b501fa6500a65949734352983a00b320ebb05bcbf7564847fa6135cea0c3b5e53cbeba48847558392827e92a9738af10b3c6101f00b9f5d9d004c8", 0x2}, 0x20) 19:34:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r1, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r1, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) 19:34:41 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x324) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8937, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') 19:34:41 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x3}, 0x3c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r1, 0x0, 0xf800000000000000) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r1, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x80000001) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x4, &(0x7f00000003c0)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3}, @ldst={0x2, 0x0, 0x2, 0x4, 0x677b7d06a0671afa, 0x10, 0x58566dc3ed937e75}, @alu={0x4, 0x1, 0xa, 0x6ceac49a2fd78e1a, 0x0, 0x40, 0x1}], &(0x7f0000000440)='syzkaller\x00', 0x5, 0xfffffffffffffdf5, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x71000000}, 0x2, 0x10, &(0x7f0000000000)={0x0, 0x0, 0xfffffffe, 0x4}, 0x10, 0x0, r1}, 0x6e) recvmsg(0xffffffffffffffff, &(0x7f000000efc0)={&(0x7f000000dbc0)=@can={0x1d, 0x0}, 0x80, &(0x7f000000ee40)=[{&(0x7f000000dc40)=""/55, 0x37}, {&(0x7f000000dc80)=""/4096, 0x1000}, {&(0x7f000000ec80)=""/71, 0x47}, {&(0x7f000000ed00)=""/142, 0x8e}, {&(0x7f000000edc0)=""/112, 0x70}], 0x5, &(0x7f000000eec0)=""/252, 0xfc}, 0x0) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r4, 0x800454d7, &(0x7f0000000080)) write$cgroup_type(r4, 0x0, 0xf800000000000000) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r4, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x80000001) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f000000f140)={r4, 0x10, &(0x7f000000f100)={&(0x7f000000f080)=""/77, 0x4d, 0xffffffffffffffff}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f000000f180)={0x5, 0x7, &(0x7f00000000c0)=@raw=[@call={0x85, 0x0, 0x0, 0x48}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x80000000}, @ldst={0x3, 0x3, 0x3, 0x6, 0x372057fa2434ad4, 0xc, 0x9}, @alu={0x9519d625a51b0c95, 0x1, 0xa, 0xb8c51cc9933965b9, 0x1, 0xffffffffffffffe0, 0xffffffffffffffff}, @generic={0x81, 0x7, 0x1, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x48}], &(0x7f0000000100)='syzkaller\x00', 0x80000001, 0x97, &(0x7f0000000140)=""/151, 0x41100, 0x514840ad1dac9b6b, [], r2, 0x12, 0xffffffffffffffff, 0x8, &(0x7f000000f000)={0x1, 0x4}, 0x8, 0x10, &(0x7f000000f040)={0x0, 0xe, 0x7fff, 0x7}, 0x10, r5}, 0x78) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) [ 832.536119][T13470] FAULT_INJECTION: forcing a failure. [ 832.536119][T13470] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 832.550056][T13470] CPU: 1 PID: 13470 Comm: syz-executor.0 Tainted: G W 5.5.0-rc1-syzkaller #0 [ 832.560135][T13470] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 832.560144][T13470] Call Trace: [ 832.560172][T13470] dump_stack+0x197/0x210 [ 832.560198][T13470] should_fail.cold+0xa/0x15 [ 832.560221][T13470] ? fault_create_debugfs_attr+0x180/0x180 [ 832.560235][T13470] ? ___might_sleep+0x163/0x2c0 [ 832.560260][T13470] should_fail_alloc_page+0x50/0x60 [ 832.560273][T13470] __alloc_pages_nodemask+0x1a1/0x910 [ 832.560291][T13470] ? __alloc_pages_slowpath+0x2920/0x2920 [ 832.560321][T13470] __vmalloc_node_range+0x2fd/0x810 [ 832.560346][T13470] ? bpf_map_area_alloc+0x20/0x30 [ 832.573707][T13470] __vmalloc_node_flags_caller+0x71/0x90 [ 832.573726][T13470] ? bpf_map_area_alloc+0x20/0x30 [ 832.573745][T13470] __bpf_map_area_alloc+0xde/0xf0 [ 832.573762][T13470] bpf_map_area_alloc+0x20/0x30 [ 832.573779][T13470] htab_map_alloc+0x589/0x11c0 [ 832.573790][T13470] ? __kmalloc+0x608/0x770 [ 832.573809][T13470] ? bpf_get_file_flag+0x80/0x80 [ 832.582718][T13470] ? fput+0x1b/0x20 [ 832.582741][T13470] htab_of_map_alloc+0x71/0x100 [ 832.582754][T13470] ? htab_map_alloc+0x11c0/0x11c0 [ 832.582770][T13470] __do_sys_bpf+0x478/0x3810 [ 832.582791][T13470] ? bpf_prog_load+0x18f0/0x18f0 [ 832.582805][T13470] ? __kasan_check_write+0x14/0x20 [ 832.582825][T13470] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 832.688128][T13470] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 832.693667][T13470] ? wait_for_completion+0x440/0x440 [ 832.698983][T13470] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 832.705333][T13470] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 832.710798][T13470] ? do_syscall_64+0x26/0x790 [ 832.715463][T13470] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 832.721516][T13470] ? do_syscall_64+0x26/0x790 [ 832.726198][T13470] __x64_sys_bpf+0x73/0xb0 [ 832.730614][T13470] do_syscall_64+0xfa/0x790 [ 832.735112][T13470] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 832.740988][T13470] RIP: 0033:0x45a6f9 [ 832.744882][T13470] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 832.764563][T13470] RSP: 002b:00007f3ba2ab9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 832.772961][T13470] RAX: ffffffffffffffda RBX: 00007f3ba2ab9c90 RCX: 000000000045a6f9 [ 832.781191][T13470] RDX: 000000000000002c RSI: 0000000020000400 RDI: 0000000000000000 [ 832.789150][T13470] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 832.797122][T13470] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3ba2aba6d4 [ 832.805078][T13470] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000005 19:34:41 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x23, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000340)="2ee640ebb525860177a6f3b3645544f7f125a4af841a7953e22f84185b12aba908201cf2759c8677f246ab717dd60491126e844c7e94d0ccd01223f480a20d3d438ad0e8b8427a6c820851e393d9d961506ee1892c7470f3aaeeaa49878758372528d009cacf1747f56861d1cb2ba3eac51bbc638fa275674f380ddc1b4c90a39af37335c2f17d9ba7929d4252b0622e988bc91bbb48e0d9afac59de23e8f21fdf14d49280dafb4dd8d4c1be81f1baf445737df2aa3e0014642ca3122e92e272609c14144a0b51c839b562daf42dca81c670d852", &(0x7f0000000440)="c997c2302f06feb4e429ac04e02aed7e27d0941ccde49f764cb9397576e7af1c9c22e0bbac784d4425894d3b3f3fa1cdf47f4621fe78ebd35fbaa777837b5a8ba188c068c7bc056347bd7077c9219cb0b501fa6500a65949734352983a00b320ebb05bcbf7564847fa6135cea0c3b5e53cbeba48847558392827e92a9738af10b3c6101f00b9f5d9d004c8", 0x2}, 0x20) 19:34:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r1, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r1, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) 19:34:41 executing program 0 (fault-call:3 fault-nth:80): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xd, 0x4, 0x4000000004, 0x7fa5, 0x5, r1, 0x0, [0x305f, 0xa]}, 0x2c) 19:34:41 executing program 2: perf_event_open(&(0x7f0000000400)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xeb, &(0x7f00000003c0)=""/235, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="d80000002d008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900b8000699030000000500150006008178a8001600400003000300000003ac000000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e9703", 0xd8}], 0x1, 0x0, 0x0, 0x4000}, 0x0) socket$kcm(0x29, 0x2, 0x0) recvmsg(r1, &(0x7f0000007400)={&(0x7f0000006d40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f00000072c0)=[{&(0x7f0000006dc0)=""/141, 0x8d}, {&(0x7f0000006e80)=""/150, 0x96}, {&(0x7f0000006f40)=""/5, 0x5}, {&(0x7f0000006f80)=""/237, 0xed}, {&(0x7f0000007080)=""/249, 0xf9}, {&(0x7f0000007180)=""/45, 0x2d}, {&(0x7f00000071c0)=""/55, 0x37}, {&(0x7f0000007200)=""/157, 0x9d}], 0x8, &(0x7f0000007340)=""/155, 0x9b}, 0x20000000) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) recvmsg(r3, &(0x7f0000002580)={&(0x7f0000000180)=@can, 0x80, &(0x7f0000002500)=[{&(0x7f00000012c0)=""/192, 0xc0}, {&(0x7f0000001400)=""/197, 0xc5}, {&(0x7f0000001500)=""/4096, 0x1000}], 0x3, &(0x7f0000000240)=""/14, 0xe}, 0x40000002) ioctl$TUNDETACHFILTER(r3, 0x401054d6, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, 0x0, 0xc58ca891f70830a2) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r6, &(0x7f0000000000), 0x200) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000440)='!,eth0GPL.\x00') r7 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000d40)={r7, 0xc0, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)=0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000b80)={0x2}, 0x0, 0x0, &(0x7f0000000bc0)={0x0, 0x5, 0x5, 0x8000}, &(0x7f0000000c00)=0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3612ee43fe38d9a1, 0xc, &(0x7f00000001c0)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x7fff}, @ldst={0x1, 0x0, 0x1, 0x9, 0x9, 0x1, 0xffffffffffffffff}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x40}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0x0, 0x5, 0x7, 0x5, 0xf8}, @map_val={0x18, 0x4, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x8}, @exit], &(0x7f00000002c0)='GPL\x00', 0x8001, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, r8, r5}, 0x78) r9 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000004340)=r8, 0x4) r10 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r10, 0x40042408, r11) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000004600)={r11, 0xc0, &(0x7f0000004540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000004400)=0x10ff4015, 0x0, 0x0, 0x0, &(0x7f0000004440)={0x4, 0x4}, 0x0, 0x0, &(0x7f0000004480)={0x3, 0x0, 0x80000000, 0xdc}, &(0x7f00000044c0)=0x1b, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001880)=0x4}}, 0x10) r13 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) mkdirat$cgroup(r13, &(0x7f0000000100)='syz1\x00', 0x1ff) r14 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r14, 0x0, 0x0) write$cgroup_subtree(r14, &(0x7f0000000000)=ANY=[@ANYBLOB="3cd1c555f4b61a028704038157"], 0x1) r15 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r15, 0x0, 0x0) write$cgroup_subtree(r15, &(0x7f0000000000)=ANY=[@ANYBLOB="3cd1c555f4b61a028704038157"], 0x1) r16 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r16, &(0x7f0000005940)={&(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10, 0x0}, 0x0) recvmsg$kcm(r16, &(0x7f000000f080)={&(0x7f000000de40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}, 0x0) r18 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r19 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000001a40)='syzkaller\x00', 0x80, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x19, r13, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000001a80), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r18, 0x40042408, r19) r20 = bpf$PROG_LOAD(0x5, &(0x7f00000047c0)={0x1, 0x13, &(0x7f0000004640)=ANY=[@ANYBLOB="18000000e50a0000000000000100000018230000", @ANYRES32=0x1, @ANYBLOB="00000000f0a2000018200000", @ANYRES32=r13, @ANYBLOB="0000000007000000851000000500000018110000", @ANYRES32=r14, @ANYBLOB="01800156b968f91118100000", @ANYRES32=r15, @ANYBLOB="000000000000000085000000660000005d621000f0ffffff18100000", @ANYRES32=r4, @ANYBLOB="0000000000000000950000000000000018180000", @ANYRES32, @ANYBLOB="00000000000000009500000000000000"], &(0x7f0000004700)='GPL\x00', 0xfffffff8, 0x0, 0x0, 0x40f00, 0x2, [], r17, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000004740)={0x7, 0x3}, 0x122, 0x10, &(0x7f0000004780)={0x5, 0xa, 0x6, 0xffffad2c}, 0x10, 0x0, r19}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000004840)={0x19, 0x3, &(0x7f0000001700)=@raw=[@alu={0x7, 0x0, 0x0, 0xb, 0xd, 0x100, 0x10}, @ldst={0x2, 0x0, 0x7, 0x8, 0x9, 0x1, 0x12}, @alu={0x4, 0x0, 0x8, 0x6, 0xb, 0x2, 0x1}], &(0x7f0000001740)='syzkaller\x00', 0xd79, 0xce, &(0x7f0000001780)=""/206, 0x40f00, 0x8, [], 0x0, 0x17, r9, 0x8, &(0x7f0000004380)={0x9, 0x1}, 0x8, 0x10, &(0x7f00000043c0)={0x1, 0xe, 0x1, 0xd3de}, 0x10, r12, r20}, 0x78) r21 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000600)=r12, 0x4) r22 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r23 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r23, r22, 0xd}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000074c0)={0x4, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="180000000800008000000000000000009500000000000000df292000f0ffffff9500000000000000378e2ad60efa37cb"], &(0x7f00000002c0)='GPL\x00', 0x6, 0x2b, &(0x7f0000000340)=""/43, 0x40f00, 0x3, [], r2, 0x16, r21, 0x8, &(0x7f0000007440)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000007480)={0x6, 0x45, 0x2, 0x81}, 0x10, 0x0, r22}, 0x78) r24 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./kgrQup.net/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r24, r0, 0xd}, 0x10) r25 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r26 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r26, &(0x7f0000000680)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @remote, 0x1}, 0x80, 0x0}, 0x0) write$cgroup_subtree(r25, &(0x7f0000000000)=ANY=[], 0x32600) socketpair(0x7, 0x3, 0x4b, &(0x7f0000000380)) write$cgroup_subtree(r25, &(0x7f00000004c0)=ANY=[@ANYBLOB="200234438a389e9b3d76b80ed9db0054e3261122e04b340c34b2547c749523bec22c2d11239ec2ca7e1ec95eec94e2df194818e79de06b4dc0035506be73ae602237ff8f72305cbbb752f2c63c673d21630a566a3dc0780e937b181627eeb97a191361342093eb27beca2a615a2ef5a6cac2d15572590329516878153a6ae7d468e3e9a6375eb08fc50655b5eadc4e017011da939173563946989df893d02658fd3b7f5ad55b39c2a160060d39cb8841a0e76d90f1f5a0ff7a02d36d26cd0e0ea8062e506ce21b332186"], 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r25, 0x40082404, &(0x7f0000000080)=0x3) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r24, 0xffffffffffffffff, 0x8000000000d}, 0xe) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 832.992897][T13485] FAULT_INJECTION: forcing a failure. [ 832.992897][T13485] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 833.017789][T13485] CPU: 1 PID: 13485 Comm: syz-executor.0 Tainted: G W 5.5.0-rc1-syzkaller #0 [ 833.027905][T13485] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 833.038106][T13485] Call Trace: [ 833.041426][T13485] dump_stack+0x197/0x210 [ 833.045792][T13485] should_fail.cold+0xa/0x15 [ 833.050427][T13485] ? fault_create_debugfs_attr+0x180/0x180 [ 833.056912][T13485] ? ___might_sleep+0x163/0x2c0 [ 833.061928][T13485] should_fail_alloc_page+0x50/0x60 [ 833.067157][T13485] __alloc_pages_nodemask+0x1a1/0x910 [ 833.072699][T13485] ? __alloc_pages_slowpath+0x2920/0x2920 [ 833.072730][T13485] __vmalloc_node_range+0x2fd/0x810 [ 833.072752][T13485] ? bpf_map_area_alloc+0x20/0x30 [ 833.072765][T13485] __vmalloc_node_flags_caller+0x71/0x90 [ 833.072783][T13485] ? bpf_map_area_alloc+0x20/0x30 [ 833.099813][T13485] __bpf_map_area_alloc+0xde/0xf0 [ 833.104956][T13485] bpf_map_area_alloc+0x20/0x30 [ 833.109920][T13485] htab_map_alloc+0x589/0x11c0 [ 833.114701][T13485] ? __kmalloc+0x608/0x770 [ 833.119145][T13485] ? bpf_get_file_flag+0x80/0x80 [ 833.124215][T13485] ? fput+0x1b/0x20 [ 833.128042][T13485] htab_of_map_alloc+0x71/0x100 [ 833.133956][T13485] ? htab_map_alloc+0x11c0/0x11c0 [ 833.139001][T13485] __do_sys_bpf+0x478/0x3810 [ 833.143606][T13485] ? bpf_prog_load+0x18f0/0x18f0 [ 833.148578][T13485] ? __kasan_check_write+0x14/0x20 [ 833.153695][T13485] ? __mutex_unlock_slowpath+0xf0/0x6a0 [ 833.159236][T13485] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 833.164538][T13485] ? wait_for_completion+0x440/0x440 [ 833.169865][T13485] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 833.176154][T13485] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 833.181621][T13485] ? do_syscall_64+0x26/0x790 [ 833.186298][T13485] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 833.192377][T13485] ? do_syscall_64+0x26/0x790 [ 833.197091][T13485] __x64_sys_bpf+0x73/0xb0 [ 833.201606][T13485] do_syscall_64+0xfa/0x790 [ 833.206127][T13485] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 833.212175][T13485] RIP: 0033:0x45a6f9 [ 833.216069][T13485] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 833.235865][T13485] RSP: 002b:00007f3ba2ab9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 19:34:41 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x23, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="263abd03d8ee2fe50655a15c88a8", 0x0, 0x3ff}, 0x28) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000340)="2ee640ebb525860177a6f3b3645544f7f125a4af841a7953e22f84185b12aba908201cf2759c8677f246ab717dd60491126e844c7e94d0ccd01223f480a20d3d438ad0e8b8427a6c820851e393d9d961506ee1892c7470f3aaeeaa49878758372528d009cacf1747f56861d1cb2ba3eac51bbc638fa275674f380ddc1b4c90a39af37335c2f17d9ba7929d4252b0622e988bc91bbb48e0d9afac59de23e8f21fdf14d49280dafb4dd8d4c1be81f1baf445737df2aa3e0014642ca3122e92e272609c14144a0b51c839b562daf42dca81c670d852", &(0x7f0000000440)="c997c2302f06feb4e429ac04e02aed7e27d0941ccde49f764cb9397576e7af1c9c22e0bbac784d4425894d3b3f3fa1cdf47f4621fe78ebd35fbaa777837b5a8ba188c068c7bc056347bd7077c9219cb0b501fa6500a65949734352983a00b320ebb05bcbf7564847fa6135cea0c3b5e53cbeba48847558392827e92a9738af10b3c6101f00b9f5d9d004c8", 0x2}, 0x20) 19:34:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x2b, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f088641fffffff00000057632f77fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x0, 0xaa, 0x0, 0x0, 0x0, 0x1, 0x10c0, 0x8, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x2}, 0x0, 0x13, r1, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000000ea80)={r1, 0xc0, &(0x7f000000e9c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e880)=0x3ff, 0x0, 0x0, 0x0, &(0x7f000000e8c0)={0x1, 0x4}, 0x0, 0x0, &(0x7f000000e900)={0x3, 0xf, 0x5, 0xfff}, &(0x7f000000e940)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e980)=0x20}}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) [ 833.244282][T13485] RAX: ffffffffffffffda RBX: 00007f3ba2ab9c90 RCX: 000000000045a6f9 [ 833.252281][T13485] RDX: 000000000000002c RSI: 0000000020000400 RDI: 0000000000000000 [ 833.260285][T13485] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 833.268260][T13485] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3ba2aba6d4 [ 833.276245][T13485] R13: 00000000004c0ce5 R14: 00000000004d4890 R15: 0000000000000005 [ 833.343393][T13492] netlink: 180 bytes leftover after parsing attributes in process `syz-executor.2'. [ 833.624018][T13501] netlink: 180 bytes leftover after parsing attributes in process `syz-executor.2'.